Requirements Check-List for Mobile Device Management Solutions

Conclusion:
Allowing employees to use personal devices for work purposes comes with a unique security challenge. How can the organisation keep track of so many endpoints and make sure that each one is secure? Organisations need to examine their mobile device management (MDM) capabilities in order to protect the organisation from security breaches as a result of insecure mobile devices.

About The Advisor
Joseph Sweeney
Dr. Joseph Sweeney is an IBRS advisor specialising in the areas of workforce transformation and the future of work, including; workplace strategies, end-user computing, collaboration, workflow and low code development, data-driven strategies, policy, and organisational cultural change. He is the author of IBRS’s Digital Workspaces methodology. Dr Sweeney has a particular focus on Microsoft, Google, AWS, VMWare, and Citrix. He often assists organisations in rationalising their licensing spend while increasing workforce engagement. He is also deeply engaged in the education sector. Joseph was awarded the University of Newcastle Medal in 2007 for his studies in Education, and his doctorate, granted in 2015, was based on research into Australia’s educational ICT policies for student device deployments.