Security Challenges for the “New Normal” in Enterprise Mobility

The New Normal

With nearly 42% of the U.S. labor force working from home full-time, the pandemic has normalized remote work.

In fact, according to a survey conducted by the business communication platform, Slack, the majority of knowledge workers never want to go back to the old way of working. Only 12% want to return to full-time office work, and 72% want a hybrid remote-office model moving forward. Additionally, a new report published by, LiveCareer, an online resume and job search consulting service, reveals that nearly 30% of working professionals would quit their jobs if they couldn’t continue working remotely. 

Remote work looks like it’s here to stay. As they say, it’s hard to put the genie back in the bottle. And within this “new normal” organizations are experiencing a whole host of new challenges. Our CEO, Jane Sydolwski, touched on how organizations might confront some of the employee engagement, innovation and leadership challenges of this era in her recent LinkedIn post.

Another area of the enterprise that’s feeling the strain of the “new normal” is mobility and IoT management. Corporate mobility departments and managers are finding that one of the biggest challenges of a remote workforce is maintaining data and device security.  Here’s why:

  1. Employees are increasingly relying on their smartphones rather than a traditional computer. In fact, 4 in 10 say that their smart phone will replace their computer within the next 5 years. Why is this a security risk? Where a traditional computer would be outfitted with proper security to protect the machine and the company’s data from bad actors, a smartphone is far less likely to have the same levels of protection – opening it up to security vulnerabilities.
  2. Additionally, employees are using their personal smartphones – what the industry calls “bring your own device” or BYOD – to conduct business. Again, these devices are not set up in such a way that support today’s cyber security best practices. For example:
    • Passwords may not be as secure as necessary
    • These devices might be more prone to hacks or malware where a cyber attack could then enter into a business system through the back door of an employee’s device
    • The security of a smart phone may not meet compliance standards and requirements
    • The employee may be accessing sensitive company information on unsecure networks

And so on…

For these reasons and more, 31% of C-suite executives have enacted policies that require employees to keep work data on work computers only. But in today’s environment, that’s not a tenable solution for the long term. What will work for organizations in the near AND long term is a corporate mobility and IoT policy that’s supported by mobile device management technology (MDM).

AMI Strategies consults with companies to help them fully assess the mobility and IoT needs of their organization – including where there may be gaps in device security and how to close these gaps. From there, we can put in place a custom MDM solution through our mobilityNOW MDM that targeted to the specific mobility challenges an organization may be facing. For example, MDM technology can help organizations with:

  • Content Management
  • Containerization
  • OS Updates
  • Remote Control
  • Location History
  • Geofencing
  • Device Onboarding
  • Profile Management
  • Email
  • And so much more

Meet the “new normal” with tools in place that ease the data and device concerns of your enterprise.  Contact us today to learn more about AMI’s approach and how our MDM solutions can provide greater peace of mind around mobility and IoT security within a remote workforce.

Discover
Something Great

Book a time below and select any of our practices that interest you

AMI's Cloud Management Test Drive

Ready to see AMI's Cloud Management in action? Take a test drive with your existing cloud providers to see how easy it is to manage one or more public or private cloud environments
What We'll Need:
  • About 30 minutes with you appropriate cloud technical owners to establish the appropriate data feeds with your providers
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate establishing the right data feeds. 
  • Post Analysis: A call once the analysis is complete to review your data in the AMI system.
What We'll Review:
  • A tour of your normalized cloud data in the AMI platform.
  • Rightsizing recommendations based on CPU, RAM and Storage for sizing, power state, and reserved instances in public cloud environments.
  • Identified security vulnerabilities, misconfigurations, and other anomalies. 
  • An overview on how you can deploy 150x faster with role based access controls and group designations with built-in guardrails such as predefined catalogs and security policies.
Get Started Now:

Schedule Time with an
AMI Partner Specialist

We will connect you with partner specialist to discuss:
  • What you are looking to achieve with an AMI partnership
  • Partnership options
  • Next steps

AMI's
Utility & Sustainability

Test Drive

Through our Utility & Sustainability Test Drive, you decide what you would like us to do.

We load three months of gas, water, and power invoices from your largest facilities through our platform. Then, our analysts review the results and prepare a summary of their findings.
What We'll Need:
  • Three months of your PDF invoices from any carrier in your environment (domestic and/or global)
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate securely sharing your invoice data with us.
  • Post Analysis: A call once the analysis is complete to review our findings.
Option 1: Sustainability Baselining:
Complimentary review providing you:
  • A tour of your data in the AMI platform, detailing granular site-by-site energy consumption and spend.
  • Quick identification of usage spikes based on trending data
  • Avoidable spend savings 
  • An overview on how you can create targets, measure results, identify outliers and prioritize improvements.
  • A demonstration of how easy it is to integrate Scope 2 consumption data directly from our system to any desired environmental reporting framework.
Option 2: Historical Utility Audit:
Contingency-based audit that analyzes:
  • Site-by-site energy consumption and spend
  • Historical billing and tariff errors
  • Benchmarking recommendations
  • Underutilized tax incentives
  • Other state, local, and federal programs you qualify for
  • Alternative utility provider options (deregulated markets)
  • Green energy alternatives
  • Anything else that jumps off the page
Choose One or Both Options - Get Started Now:

Schedule Time with an
AMI ServiceNow Specialist

We will connect you with an expert to discuss how AMI can help you achieve your ServiceNow goals

Schedule Time with an
Managed Automation Specialist

We will connect you with a specialist to discuss:
  • Your current environment
  • The manual business process you want to automate
  • Automation solutions that make sense, and ones that don’t

AMI's
Complimentary
Mobility Health Check

Through this analysis, we run your latest three mobility invoices through the AMI platform. Then, our analysts review the results and prepare a personalized summary of their findings.
What We'll Need:
  • Three months of your PDF invoices from any carrier in your environment (domestic and/or global)
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate securely sharing your invoice data with us.
  • Post Analysis: A call once the analysis is complete to review our findings.
What We Typically Review:
Recommendations on:
  • Domestic data & voice pool optimization 
  • Standalone & bundled plan optimization
  • Zero/low/high usage devices, plans & features
  • Overages & usage charges
  • 3rd party charges
  • Situational savings (early termination fees, activation fees, late fees, etc.)
  • Anything else that jumps off the page
Get Started Now:

AMI's Historical Telecom Audit

Through this contingency-based analysis, AMI can assist you in reducing your IT budget or unlocking new funds to pursue other projects through a complete MRI of your largest telecom service providers.
What We'll Need:
  • Three months of your PDF invoices from the largest carriers in your environment (domestic and/or global)
What to Expect:
  • Pre Analysis: A quick call to learn a few things about your current environment and coordinate securely sharing your invoice data with us.
  • Post Analysis: A call once the analysis is complete to review our findings.
What We Typically Review:
  • An extensive review consisting of thousands of automated audits that hunt for savings based on known billing errors, NNI/UNI/EVC correlations, filling in data from FCC databases/LERG/NECA/other industry databases, benchmark savings, service provider consolidation, and modernization savings.
How Far Back in TIme Can AMI Dispute Identified Billing Errors?
  • In most cases two years, but in some cases up to seven years.
Get Started Now: