Andrea Danti - Fotolia
As organizations deploy more and more mobile devices, they also create the potential for data loss.
In the past, many IT pros put each employee device under complete corporate management, but many users aren't fond of this approach. This approach gives IT complete control over the entire device for both personal and corporate apps and data, and this lack of privacy is a problem.
The best way to address users' privacy concerns while also keeping corporate data secure is to deploy devices from the Android Enterprise Recommended list.
How can Android Enterprise help with privacy and security?
Google's Android Enterprise Recommended program certifies smartphone devices that fit well into Android Enterprise management practices. If an IT department uses Android Enterprise to manage these preapproved devices, it has the ability to essentially have two devices in one: a personal area that the end user completely controls and a secured, vaulted work profile that IT controls.
This management technique allows organizations to install the necessary mobile applications through a special provisioning feature that only allows end users to access them when they use the work profile. This device partition also creates a unique identity for the work profile that is separate and distinct from the user-controlled side. The separate identity helps IT to protect sensitive data with a fully encrypted storage area that is separate from personal data.
Android Enterprise Recommended provides a set of enterprise-level APIs to manage all of these partitions. To use them, IT will need an enterprise mobility management (EMM) or unified endpoint management (UEM) tool from vendors such as BlackBerry, Citrix, MobileIron and VMware. Google and some of the device OEMs also have EMM capabilities, but they are not as feature-rich as UEMs from other vendors.
Organizations should select a device from the preapproved list to ensure their devices are secure. The Android Enterprise Recommended list is even attractive to organizations with BYOD users, because it includes a large number of popular devices from leading OEMs, such as Samsung, LG, BlackBerry, Google Pixel and Huawei, from which users can choose. Organizations must specify to BYOD users which devices they can purchase to ensure they have access to the proper enterprise apps, data and services.
Dig Deeper on Google Android operating system and devices
Related Q&A from Jack Gold
IT should learn the benefits of Apple Business Manager to decide if the program's configuration and monitoring services are a worthwhile supplement ... Continue Reading
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the ... Continue Reading
Zero-touch enrollment can simplify the logistics of Android device provisioning for IT. This option has some restrictions, but some organizations can... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.