SHARE
Facebook X Pinterest WhatsApp

Security Complexity Drives Mobile Management Demand

When it comes to mobile computing, most of the focus is on the productivity benefits. Yet the specter of increased security breaches is a major concern that is driving more customers into the embrace of their local solution provider. Beyond the complexity of building and deploying mobile applications, the biggest challenge most IT organizations face […]

Written By
thumbnail Michael Vizard
Michael Vizard
Apr 21, 2014
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

When it comes to mobile computing, most of the focus is on the productivity benefits. Yet the specter of increased security breaches is a major concern that is driving more customers into the embrace of their local solution provider.

Beyond the complexity of building and deploying mobile applications, the biggest challenge most IT organizations face is securing them. Few have the necessary expertise to secure mobile computing devices that on any given day can wind up visiting malware-laden Websites through any number of untrusted networks.

Typically, the primary challenge solution providers face when trying to tap that demand is that they are rarely the primary source through which smartphones or tablets are acquired. Most smartphones are acquired through carriers, although Apple dominates the tablet market by largely selling direct.

Inserting themselves into the mobile computing conversation often requires some effort on the part of the solution provider. The good news is that increased demand for everything from more secure wireless network infrastructure to services that encrypt every piece of data on a mobile computing device is providing that opportunity.

Much of that demand is being driven by high-profile security breaches. But that’s just the tip of the iceberg, said Caleb Barlow, director for critical infrastructure security application, data and mobile security at IBM.

“Most people have no idea who built that application they are using or where their data is actually going,” said Barlow. “Mobile applications get hijacked all the time by people that set up fake applications that people download.”

To expand its mobile security offerings, IBM recently acquired Fiberlink, a mobile-device management (MDM) service provider, and security specialist Trusteer, Barlow said.

“We think application reputation is about to become very important in the mobile space,” said Barlow. “Long-term customers are going to want vetted application repositories.”

Also pursuing a security-centric approach to mobile computing is Dell, which recently announced the general availability of its enterprise mobile management platform. Coupled with Dell’s acquisition of SonicWALL to provide network security, Dell is helping partners build mobile computing practices around four pillars: device enablement, the network, custom application development and management, and consulting, according to Roger Bjork, director of enterprise mobility solutions for Dell Software.

“The solution provider has the benefit of local touch and customer trust,” said Bjork. “Our goal is to provide the console to integrate the management of data and security.”

Meanwhile, Hewlett-Packard, as part of an effort to incentivize solution providers to create a mobility practice, just extended the HP Partner Anywhere Program to include sales enablement and training tools specific to mobile computing solutions.

Genefa Murphy, director of product management for user experience for HP Software, said the full gamut of the mobile computing opportunity for solution providers extends from application development and testing to distribution and monitoring of the end-user experience with security built into every phase.

“Enterprise mobility is reality, not a fad,” said Murphy. “The mobile app is only the initial entry point.”

The biggest challenge with mobility, however, may not be the technology, but rather the impact it has on how solution providers deliver support. With the average end user now owning three or more devices, IT support models that were priced based on the number of devices that needed to be supported are growing rapidly.

Vince Arden, founder and chief financial officer for Preferred Communication Systems (PCSI), said that as IT service contracts come up for renewal, PCSI is nudging customers toward per-user pricing models in which the basic assumption is that every user has on average three devices.

“The way we look at is that we’re going to wind up supporting these devices anyway,” said Arden. “With MDM, we can get a small uplift on services.”

Ben Pearce, president of ACP Technologies, said the real concern is that without some standardization on the client, the bring-your-own-device (BYOD) phenomenon can result in support costs spiraling out of control.

“The conversation always has to be around the support agreement, not necessarily about fixing new problems the customer creates,” said Pearce. “You can’t expect to support everything without charging them extra.”

No matter how solution providers approach the challenge, a combination of VPNs, gateways, firewalls, application containers, wrappers, virtualization and encryption technologies will all be in the mix.

The number of devices that need to be supported in most businesses is not likely to decrease any time soon, said David Applebaum, senior vice president of marketing for MokaFive, a provider of desktop virtualization software.

“It’s not likely Microsoft is going to dominate the desktop again,” said Applebaum. “In that regard, it’s been like the collapse of the Soviet Union.”

That means there’s going to be a lot of complexity and mystery involved, which usually creates an opportunity for solution providers to deliver profitable services. At the same time, however, as mobile computing continues to mature, some vendors are already making the case that it is rapidly being folded into IT service management (ITSM) in general.

As such, solution providers are better off with one integrated console for managing both mobile and desktop devices, said Pam Seale, senior director of product marketing for Absolute Software, a provider of IT management and security software.

“The reality today is that there is a lot of swivel-chair management,” said Seale. “We think it’s time to reunify the management of IT.”

Regardless of the approach taken to manage and secure the mobile computing environment, as long as some care is taken in terms of both optimizing the delivery of the service and identifying what devices and applications will, within reason, actually be covered, solution providers stand to be one of the primary beneficiaries of the rise of mobile computing.

Michael Vizard has been covering IT issues in the enterprise for 25 years as an editor and columnist for publications such as InfoWorld, eWEEK, Baseline, CRN, ComputerWorld and Digital Review.

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

What Top Technologies IT Leaders Want From Solution Providers in 2025
Jordan Smith
Jan 2, 2025
MSPs’ Guide to Building an AI Strategy
Pamela Winikoff
Feb 16, 2024
What is Partner Relationship Management (PRM) and Why Is It Important?
Sam Ingalls
Nov 19, 2021
Analytics Emerges as a Means to an AI Solution’s End
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.