• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Speed Versus Need In IBM i Mobile Initiatives

    February 15, 2016 Dan Burger

    As mobile access to corporate communications and data becomes more widespread in IBM midrange shops, those who are just arriving at the party can learn a great deal from those who came before them. We learn from our mistakes, but actually it’s a lot less bloody when we learn from others mistakes. And when mistakes do get made; there will be pressure to step on the accelerator before turning on the lights. Damn the darkness. Let’s go mobile!

    Security and employee education are two major issues that are being de-emphasized or ignored until something bad happens. If it wasn’t for regulatory compliance in some industries, the security downplaying would likely be worse. The IT department is supposed to be the trusted source of information. You are the one who is supposed to think of everything and cover all contingencies.

    In a study funded by IBM, conducted by the Ponemon Institute and released last year, it was determined that nearly 40 percent of large companies, including many in the Fortune 500, aren’t securing their mobile apps. Speed-to-market and user experience are the priorities. Meet those objectives and get it out the door. In other words, there are a lot of mobile strategies that are poorly conceived.

    The popularity of BYOD (bring your own device) connections to unsecured networks and applications and untrusted sources, brings malware one step closer to the enterprise.

    In the Ponemon study, 55 percent of those surveyed say their organizations are without a policy that defines the acceptable use of mobile apps in the workplace. And 67 percent say their companies allow employees to download non-vetted apps to their work devices.

    This kind of thing doesn’t fly in highly regulated environments like banking, for instance.

    Amy Hoerle, an IT administrator at a Midwestern financial institution and a speaker on the topic of managing mobile devices at the past several COMMON Annual Meeting and Exposition conferences says employee use of mobile devices is closely watched.

    “As a financial institution, we have to deal with auditors and the checklist of security rules enforced on employees using mobile devices,” Hoerle says. The subject of BYOD (bring your own device) is DOA (dead on arrival). Employees with a need for mobile access are issued corporate devices. “After users are registered, their email gets pushed to them. They cannot access their corporate email and calendar from their private devices. The auditors make sure this is our policy and the policy is being enforced. We can track our users and our devices,” she says.

    The security policy extends to passwords that must be changed every specified number of days and password strength is improved by mandating a combination of letters, numerals, and symbols, which eliminates the simple to guess familiar favorites. Users are also forbidden to upload cloud-based sharing software such as Dropbox. Mobile device management (MDM) software monitors for security infractions and warns users with a “YOU’RE IN TROUBLE” message before cutting off access to email and calendars.

    Although she considers the employee use of mobile devices in her work environment “pretty basic,” compared to large scale mobile initiatives that are not uncommon, it allows security to be a priority.

    Employees are not accessing IBM i apps and mobile devices are not connecting to the corporate network. There is no in-house development. Applications that are needed are purchased as software packages.

    “We are very security conscious. And my advice to any company that is going to have multiple mobile devices accessing anything is to implement mobile device management,” she says.

    The reality, however, is something different, particularly outside of industries that are closely audited.

    Based on her observations, BYOD is more popular than corporate mandated devices and mobile initiatives are often being deployed with speed and convenience trumping well-designed plans with security as a priority.

    It’s not that BYOD deployments must be avoided. But there are considerations that should be addressed before roll outs. For instance:

    • Whose phone is it?
    • If a phone is lost, whose data is on that phone?
    • Does a company have the right to take away your phone if it’s used for business and corporate rules are violated?
    • There will be personal information and corporate information on the phone.
    • If it’s a corporate phone, the company can say everything on this phone is ours and, if there is an issue, we can confiscate the phone. Users have to play by those rules.

    Discussions that take these points under consideration lead to answers that take into account preference and risk. That’s a different discussion than the one about how fast can you get this mobile initiative completed?

    “You have to think about mobile in a different light,” Hoerle says. “The personal versus corporate discussion can be set aside because ‘it’s just this little device that slips in your pocket or purse and it seems to transition to both personal and professional work so easily.'”

    During the planning stage, determine how much you want to manage, how much data will be available, and how much access will be provided. If access to the network is required, explain how that will be monitored and whether email monitoring will be required.

    Expect discussions and evaluations to be colored by strong biases for particular devices with users digging in their heels if device standardization threatens either Apple or Android users to adapt to the device not of their choice.

    “Define the goals. Mobile is cool. Mobile is a buzzword. But unless you know why you are doing it and what you have to gain, you will have trouble,” Hoerle advises.

    RELATED STORIES

    IBM i Mobile Apps Challenged By BYOD Management

    RPG Teams Picking Up Mobile Development Skills

    Mobile Apps And The IBM i Fear Factory

    Mobility Is The Motivator For Green-Screen Migrations

    Mobile Access To IBM i Makes The Grade

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    COMMON:  2016 Annual Meeting & Expo, May 15 - 18, in New Orleans! Great Power Systems event!
    System i Developer:  RPG & DB2 Summit - March 22-24 in Dallas. Register by Feb 12 and save $300!
    BCD:  IBM i eBook: Top 10 Reasons to Choose PHP. Download now »

    Parsing Delimited Text Data Natively In SQL, Part 2: Java To The Rescue The Job Market For The People Who Make The IBM i Go

    Leave a Reply Cancel reply

Volume 26, Number 07 -- February 15, 2016
THIS ISSUE SPONSORED BY:

Profound Logic Software
ARCAD Software
Chrono-Logic
Northeast User Groups Conference
Baseline Data Services

Table of Contents

  • IBM Wheels And Deals On Big Iron Compute And Memory
  • All Signs Point To The Cloud, But Will IBM i Crowd Follow?
  • Speed Versus Need In IBM i Mobile Initiatives
  • As I See It: Beware Of Beware
  • IBM i Shines In Academic Research Data Center

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18
  • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
  • How IBM Improved The Database With IBM i 7.6
  • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
  • 50 Acres And A Humanoid Robot With An AI Avatar
  • IBM i PTF Guide, Volume 27, Number 17

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle