Security Challenges for the “New Normal” in Enterprise Mobility

The New Normal

With nearly 42% of the U.S. labor force working from home full-time, the pandemic has normalized remote work.

In fact, according to a survey conducted by the business communication platform, Slack, the majority of knowledge workers never want to go back to the old way of working. Only 12% want to return to full-time office work, and 72% want a hybrid remote-office model moving forward. Additionally, a new report published by, LiveCareer, an online resume and job search consulting service, reveals that nearly 30% of working professionals would quit their jobs if they couldn’t continue working remotely. 

Remote work looks like it’s here to stay. As they say, it’s hard to put the genie back in the bottle. And within this “new normal” organizations are experiencing a whole host of new challenges. Our CEO, Jane Sydolwski, touched on how organizations might confront some of the employee engagement, innovation and leadership challenges of this era in her recent LinkedIn post.

Another area of the enterprise that’s feeling the strain of the “new normal” is mobility and IoT management. Corporate mobility departments and managers are finding that one of the biggest challenges of a remote workforce is maintaining data and device security.  Here’s why:

  1. Employees are increasingly relying on their smartphones rather than a traditional computer. In fact, 4 in 10 say that their smart phone will replace their computer within the next 5 years. Why is this a security risk? Where a traditional computer would be outfitted with proper security to protect the machine and the company’s data from bad actors, a smartphone is far less likely to have the same levels of protection – opening it up to security vulnerabilities.
  2. Additionally, employees are using their personal smartphones – what the industry calls “bring your own device” or BYOD – to conduct business. Again, these devices are not set up in such a way that support today’s cyber security best practices. For example:
    • Passwords may not be as secure as necessary
    • These devices might be more prone to hacks or malware where a cyber attack could then enter into a business system through the back door of an employee’s device
    • The security of a smart phone may not meet compliance standards and requirements
    • The employee may be accessing sensitive company information on unsecure networks

And so on…

For these reasons and more, 31% of C-suite executives have enacted policies that require employees to keep work data on work computers only. But in today’s environment, that’s not a tenable solution for the long term. What will work for organizations in the near AND long term is a corporate mobility and IoT policy that’s supported by mobile device management technology (MDM).

AMI Strategies consults with companies to help them fully assess the mobility and IoT needs of their organization – including where there may be gaps in device security and how to close these gaps. From there, we can put in place a custom MDM solution through our mobilityNOW MDM that targeted to the specific mobility challenges an organization may be facing. For example, MDM technology can help organizations with:

  • Content Management
  • Containerization
  • OS Updates
  • Remote Control
  • Location History
  • Geofencing
  • Device Onboarding
  • Profile Management
  • Email
  • And so much more

Meet the “new normal” with tools in place that ease the data and device concerns of your enterprise.  Contact us today to learn more about AMI’s approach and how our MDM solutions can provide greater peace of mind around mobility and IoT security within a remote workforce.

Discover
Something Great

Book a time below and select any of our practices that interest you

AMI's Average Turnaround

Across All Customers, Categories & Invoices Processed

Before Invoice Due Date

Fully Allocated

Fully Audited

Sent to AP for Approval and/or Payment

Self-Service Portal

BuiltonNow-white
Screenshot 2023-01-06 at 2.14.34 PM
WOB_LONG_INFO_REVERSE_RGB

Fractured Inventory

Invoice
Cost & Usage Details

General Ledger
Cost Centers

Human Resources
Business Owners

Procurement
Contracted Rates & Terms

IT Asset Management
Hardware Details

MDM/UEM
Software & Applications

Information Security
Policies

Information Technology
Backup & Maintenance Services

Pop-up in a pop-up!

SmartAudit™

Invoice Audited
Contract Terms, Allocations, Usage, Trending, Inventory, Cost Items, Opportunities
& Custom Audit Rules

Validation

Flags Researched
Valid Rates are Linked to Page and Paragraph in Contractual Document in the
AMI Contract Manager

Negotiation

Disputes Managed
Progress Tracked
in Real Time
and Credits are Validated
on Subsequent Invoices

AMI's Historical Telecom Audit

Through this contingency-based analysis, AMI can assist you in reducing your IT budget or unlocking new funds to pursue other projects through a complete MRI of your largest telecom service providers.
What We'll Need:
  • Three months of your PDF invoices from the largest carriers in your environment (domestic and/or global)
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate securely sharing your invoice data with us.
  • Post Analysis: A call once the analysis is complete to review our findings.
What We Typically Review:
  • An extensive review consisting of thousands of automated audits that hunt for savings based on known billing errors, NNI/UNI/EVC correlations, filling in data from FCC databases/LERG/NECA/other industry databases, benchmark savings, service provider consolidation, and modernization savings.
How Far Back in TIme Can AMI Dispute Identified Billing Errors?
  • In most cases two years, but in some cases up to seven years.
Get Started Now:

AMI's
Complimentary
Mobility Health Check

Through this analysis, we run your latest three mobility invoices through the AMI platform. Then, our analysts review the results and prepare a personalized summary of their findings.
What We'll Need:
  • Three months of your PDF invoices from any carrier in your environment (domestic and/or global)
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate securely sharing your invoice data with us.
  • Post Analysis: A call once the analysis is complete to review our findings.
What We Typically Review:
Recommendations on:
  • Domestic data & voice pool optimization 
  • Standalone & bundled plan optimization
  • Zero/low/high usage devices, plans & features
  • Overages & usage charges
  • 3rd party charges
  • Situational savings (early termination fees, activation fees, late fees, etc.)
  • Anything else that jumps off the page
Get Started Now:

Schedule Time with an
Managed Automation Specialist

We will connect you with a specialist to discuss:
  • Your current environment
  • The manual business process you want to automate
  • Automation solutions that make sense, and ones that don’t

Schedule Time with an
AMI ServiceNow Specialist

We will connect you with an expert to discuss how AMI can help you achieve your ServiceNow goals

AMI's
Utility & Sustainability

Test Drive

Through our Utility & Sustainability Test Drive, you decide what you would like us to do.

We load three months of gas, water, and power invoices from your largest facilities through our platform. Then, our analysts review the results and prepare a summary of their findings.
What We'll Need:
  • Three months of your PDF invoices from any carrier in your environment (domestic and/or global)
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate securely sharing your invoice data with us.
  • Post Analysis: A call once the analysis is complete to review our findings.
Option 1: Sustainability Baselining:
Complimentary review providing you:
  • A tour of your data in the AMI platform, detailing granular site-by-site energy consumption and spend.
  • Quick identification of usage spikes based on trending data
  • Avoidable spend savings 
  • An overview on how you can create targets, measure results, identify outliers and prioritize improvements.
  • A demonstration of how easy it is to integrate Scope 2 consumption data directly from our system to any desired environmental reporting framework.
Option 2: Historical Utility Audit:
Contingency-based audit that analyzes:
  • Site-by-site energy consumption and spend
  • Historical billing and tariff errors
  • Benchmarking recommendations
  • Underutilized tax incentives
  • Other state, local, and federal programs you qualify for
  • Alternative utility provider options (deregulated markets)
  • Green energy alternatives
  • Anything else that jumps off the page
Choose One or Both Options - Get Started Now:

Schedule Time with an
AMI Partner Specialist

We will connect you with partner specialist to discuss:
  • What you are looking to achieve with an AMI partnership
  • Partnership options
  • Next steps

AMI's Cloud Management Test Drive

Ready to see AMI's Cloud Management in action? Take a test drive with your existing cloud providers to see how easy it is to manage one or more public or private cloud environments
What We'll Need:
  • About 30 minutes with you appropriate cloud technical owners to establish the appropriate data feeds with your providers
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate establishing the right data feeds. 
  • Post Analysis: A call once the analysis is complete to review your data in the AMI system.
What We'll Review:
  • A tour of your normalized cloud data in the AMI platform.
  • Rightsizing recommendations based on CPU, RAM and Storage for sizing, power state, and reserved instances in public cloud environments.
  • Identified security vulnerabilities, misconfigurations, and other anomalies. 
  • An overview on how you can deploy 150x faster with role based access controls and group designations with built-in guardrails such as predefined catalogs and security policies.
Get Started Now:

Master
Invoice Schedule

Never Misses Invoices & Identifies Duplicates

Automated Invoice Retrieval

RPA, API, EDI & BDF Technologies

Granular
Data Extraction

Lowest-level Cost & Usage Data

SmartCMDB™
Invoice Inventories

ETL: Inventories Invoice & Flags Changes
Rates, Fees, Quantities, Assets, Service Status, Entities, Addresses, Identifiers & Relationships

Inventory Enrichment

One Pane of Glass For:

Business Owners

Spend & Usage

Policies

Cost Centers

Hardware Details

Periphery Services

Contracted Rates

Software & Apps

Maintenance Services

Apps

ServiceNow_technology-partner_logo_white-3
Scoped, Certified Apps for Plug & Play Implementation
on your ServiceNow Instance

Options

ServiceNow_MSP-partner_logo_white-2
Available for Customers Without an Existing ServiceNow Implementation

Know-How

ServiceNow_service-partner_logo_white-2
Solution Architects,
Design, Development, Deployment & Maintenance
BuiltonNow-white

Manual Equivalent of AMI's Automation

Customer Case Study

Invoice Retrieval: 

27.08 Hours

PO Verification & Financial Allocation:  

93.75 Hours

Approving Invoices for Payment: 

97.08 Hours

Sub Total: 218 Hours (5.5 FTEs) + 5-60min per P2P Fallout Issue

Accurate Organizational Chargebacks

1,000.8 Hours

Complete Validation of All Cost Items: 

3,543.2 Hours

Additional Time: 4,544 Hours (113.5 FTEs) + 5-60min per Disputable Charge

Total Time to Replicate AMI's Automation?

119 FTEs

To Achieve Complete Cost Assurance & Accountability

Allocate

Copied from Previous Period
& Fallout Flagged
for Analyst Follow Up

Approve

Settings Available for
Threshold-Based
Auto Approval to ERP

Pay

vCard, ACH or Check
90-Day Currency Lock
Diversity Spend Attribution

Service Provider APIs & RPAs

Available 24/7
Instantaneous Transactions
Forced Accuracy
Faster Turnaround & Delivery

Big, Complex Invoices

change-mobility3

Mobility & UEM

inventory-2

Network & Telecom

smart-sustainability-2

Utility Providers

one-screen-3

Public/Private Cloud

Hundreds to Thousands of Invoice Pages

Tens of Thousands of Cost Items

Mission Critical Services

Cross-Department Business Accountability

Impossibly Labor Intensive to Audit

Easy to Leave Money on the Table

freelancer

Never Miss an Invoice

Predictive & proactive

Do More Than Humanly Possible

Exponential processing capability that forces accuracy

Keep Your Staff Engaged

Scale your talent by managing exceptions, not minutia

Fearless Change Management

Fully integrated with your inventory and validated for cost accuracy

Single Source of Truth

View all dimensions of your vendor relationships in one pane of glass

Never Pay More Than You're Supposed to

Complete confidence, transparency & accountability for every dollar spent

5 Minutes Per Invoice

Manual Invoice Retrieval & Processing

Web Portal Download
Locating in Email
Scanning from Paper

12 Invoices = 1 Hour of Manual Work

Missed or Improperly Processed Invoices Create Service Disruption Risk

Big, Deep & Complex Invoices

change-mobility3

Mobility & UEM

inventory-2

Network & Telecom

smart-sustainability-2

Utility Providers

one-screen-3

Public/Private Cloud

Hundreds to Thousands of Invoice Pages

Tens of Thousands of Cost Items

Mission Critical Services

Cross-Department Business Accountability

Impossibly Labor Intensive to Audit

Easy to Leave Money on the Table

3 Minutes Per Line Item

Manually Checking Against the PO

10 Line Items = 1/2 Hour of Manual Work

5 Minutes Per Page

Financial GL Code Cost Allocation

12 Pages = 1 Hour of Manual Work

Reporting is Limited to Financial Structure, Not Business Structure

5 Minutes Per Invoice

Manual Approvals & Payments

Emails
Phone Calls
Initiating Payment by Paper Check or ACH

12 Invoices = 1 Hour of Manual Work

Slow Approval & Payment Processes Result in Late Fees & Service Disruption Risk

5-60 Minutes Per Issue

Managing Unexpected Cost Items

Anomaly Research
Evidence Collection
Dispute Process

6 Anomalies = 30-120 Minutes of Manual Work

Requiring Verification in Multiple Systems and Managed by Phone or Email