How to Prepare Your Enterprise for Apple's iPad

 
 
By Mark Shull  |  Posted 2010-09-22 Email Print this article Print
 
 
 
 
 
 
 

While Apple's iPad is meant for consumers, employees already want to bring Apple's iPad into the enterprise. Before IT can deploy Apple's iPad, security, connectivity, personalization, integration and scale issues need to be addressed. By using enterprise mobility management, Knowledge Center contributor Mark Shull explains here how you can seamlessly and successfully integrate Apple's iPad into your enterprise.

Today, enterprises are intent on mobilizing business applications to increase productivity, drive topline growth and improve customer satisfaction-in short, to improve business performance. With the release of the iPad, Apple has helped to accelerate when the enterprise will mobilize lines of business applications such as business intelligence, sales force automation (SFA), point-of-sale and document sharing, among others.

But before corporate IT can begin rolling out the iPad, there are five foundational underpinnings necessary for an organization to succeed with their application mobilization initiatives. These underpinnings are security, connectivity, personalization, integration and scale. Here, I will detail how enterprise mobility management (EMM) platforms can be used by the enterprise to address these foundational requirements.

Security

Enterprises are required to protect corporate data on devices such as the iPad, including business application data, user credentials, shared credentials, e-mail and personal information. To meet this requirement, organizations can rely on EMM platforms to reduce the risks associated with violations of regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act and the Federal Information Security Management Act of 2002 (FISMA), while enforcing compliance with corporate IT security policies.

When selecting an EMM platform, look for one whose architecture leverages native security (for example, PIN and password, encryption, and local and remote wipe) and management features that are built into enterprise-class mobile devices. By properly configuring mobile devices-such as the iPad-to connect into an existing IT infrastructure, data services can be delivered while maximizing infrastructure investment-and offering the best possible experience to users.

By following this architecture, IT can provide the necessary security controls yet remain seamless and unobtrusive to users. Also, doing so does not negatively affect device performance, battery life or impact the productivity benefits of the iPad.




 
 
 
 
Mark Shull joined McAfee in June 2010 via the Trust Digital acquisition. Mark now acts as Senior Vice President of Mobile Security at McAfee. Prior to the acquisition, Mark was chief executive officer for Trust Digital. Mark has also held senior positions at VeriSign and served as group president of enterprise security services. Prior to that, Mark was president and CEO at MarkMonitor, where he grew revenues from $1.5 to $30M in just over three years. Additionally, as president and CEO of Digex, Mark increased revenues from $22M to $214M in just over three years and completed a successful $200 million IPO. He can be reached at mark_shull@mcafee.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...

 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel