Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare SolarWinds RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Mobile Mobile Device Management Best Practices
Mobile

Mobile Device Management Best Practices

By SolarWinds MSP
28 October, 2019

It seems like every day there are more and more devices, especially mobile devices, being used for business. Between desktops, laptops, tablets, and smartphones, maintaining security can feel overwhelming. While it might seem nice to ban all personal devices from the workplace, it’s important that businesses embrace today’s reality and instead work to make the best of the current landscape. That’s why it’s critical managed services providers (MSPs) keep up-to-date on the best practices for securing mobile devices. 

As more devices gain access to your sensitive data, the risk of a data breach increases as well. Luckily, there’s an easy solution for MSPs managing all these devices: mobile device management (MDM). With MDM, not only can you keep track of all the devices on your customers’ networks, you can also monitor and control access to the sensitive data on those devices. Read on to learn the best practices for MDM and how to select the right tool for you.

What is mobile device management?

Mobile device management is the process by which you can protect the sensitive data on mobile devices being used for business. MDM allows employers to oversee and secure employees’ personal devices when accessing their corporate network, regardless of their location. 

MDM involves both policies and requirements for employees, as well as the use of a third-party tool that allows you to monitor, manage, and secure the devices used by your employees—or, in the case of MSPs, your customers’ employees. When implemented properly, MDM will reduce the risk of a data breach to protect sensitive data in an era of BYOD offices and remote work. 

Why is mobile device management important?

Mobile device management is key to keeping your business and your customers’ businesses safe. Without it, your sensitive data is left vulnerable to hackers on personal devices, and you run the risk of a potentially devastating data breach. 

Today’s reality is that personal mobile devices have become a constant in the modern workforce. While people are often quick to think of the risks associated with this increase in devices, there are actually great advantages as well. Personal devices like tablets and smartphones offer employees increased mobility, constant connectivity, and the potential for increased productivity. 

In order to maximize the benefits associated with mobile devices without opening yourself up to all of the associated risks, you need to practice good mobile device management. MDM lets you see and control who has access to your sensitive data, allowing you to remove or limit access as needed. It also lets you remotely wipe sensitive information in case a device is lost or stolen.

CTA Image

SolarWinds Remote Monitoring and Management

Get the tools you need to manage, secure, and improve all things IT—all within a single web-based dashboard.

Try It Free Learn More

Choosing the right MDM tool

There are a lot of things for an MSP to consider when picking the right MDM tool to protect their customers. While there are numerous tools on the market, not all of them can provide the breadth of coverage and quality of support that is necessary for good MDM. Here are some MDM best practices for MSPs to keep in mind when choosing software:

  • Know your needs. Make sure you know what types of devices are on your network to ensure you get a tool that will support the different manufacturers and operating systems your customers use. Ideally, you should pick a tool that can support multiple platforms, which will prepare you for the future as your customers’ companies grow and new devices enter the network.
  • Check the support services. While setting up your MDM tool should be straightforward and intuitive, that doesn’t mean that you won’t encounter problems with your MDM security features further down the line. When choosing the right tool for your MSP, you should make sure the product comes with support for any pain points in the MDM process. The product you choose should have a strong partner network and should provide support both before and after installation to maximize the security capabilities of your MDM product for your customers.
  • Find out about integration capabilities. Mobile device manufacturers provide their own security solutions with their products. While these solutions are not robust enough on their own, these solutions can help save you time, money, and stress when it comes to mobile device management. Where possible, it’s best to get a tool that can integrate with the existing solutions on your customers’ devices. 
  • Make sure there are unlimited customizable policies. A key part of monitoring and controlling access to mobile devices on your customers’ networks is implementing policies. It’s important that the tool you choose supports unlimited customizable policies so you can meet various requirements for individual devices, groups, or time frames. Ideally, the tool should also allow you to build upon previous iterations of MDM policies so you don’t have to start from scratch when you move to a new tool. 
  • Ask what security capabilities you need and what is available. When picking an MDM tool for your MSP, it’s important to be realistic about what security policies you actually need to implement. Ask yourself: would I employ this on a desktop? If the answer is no, then you probably don’t need to apply that specific security measure to your mobile devices. 

On the other hand, there are certain security measures that your customers will most likely want, and you’ll need to ensure the tool you choose offers those capabilities to provide the best possible protection. Common desired capabilities include mobile data encryption, anti-malware installation requirements, and the ability to locate, lock, and wipe a device that is lost or stolen to protect sensitive information.

Given that many employees worry about how such policies could result in their personal information being stolen, it is also best to choose a tool that allows for the creation of separate environments or a partition between personal data and corporate data. This will ensure that in the event of a device being stolen or lost only the corporate data will be wiped and the personal data can remain. 

  • Check for single screen viewing. With MDM, you are keeping tabs on a large number of endpoints and end users, many of which will have different policies dictating their levels of access. In order to be able to monitor them effectively, you need an MDM tool that will let you easily see all of them from a single, intuitive screen.
  • Get a free trial. Not every product comes with a free trial, and of those that do, many provide only a “lite” or limited version of the product for free. This won’t give you a good sense of whether or not the product can meet your needs. Instead, pick a tool that offers you a full version of the product as a trial so you can test out the process of enrolling devices and implementing policies before you commit. 

Implementing MDM policies and requirements

In addition to choosing the right tool, there are some key best practices to keep in mind for good mobile device management. These include:

  • Educating your employees. For maximum network security, make sure your customers and their employees understand the policies that are implemented on their mobile devices. Staff security awareness training is recommended to teach customers and their employees how to protect corporate data in areas where the human element is a major factor. This includes educating them about the dangers of phishing, downloading unauthorized apps, and using public Wi-Fi to access sensitive information—all of which puts data at risk of being stolen. 
  • Setting security requirements. Require that all mobile devices used for work have anti-malware software installed. Corporate data on those mobile devices—especially communications, which can easily be intercepted—should always be encrypted. MSPs should also require strong passwords or passphrases, as well as biometrics where possible.

Interested in learning more about mobile device management? Explore our product suite to see how you can properly manage your mobile device network.

 

Additional reading

Mobile access: Why it's as important for you as it is for your customers
Mobile Device Management—A threat to employee privacy?
Using Mobile Device Management to Manage High Risk Apps
You might also like...
MSP Business

Mobile Device Management—A threat to employee privacy?

Mobile

Top Six Benefits of Mobile Device Management

MSP Business

Mobile access: Why it's as important for you as it is for your customers

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • Three things I learned working for an MSP
  • Earning word-of-mouth referrals for your IT business
  • Backup automation part 1: Deploying backup devices
  • Ultimate Guide: MySQL Backup
  • Most common automation requests and how to solve them: Ep 2
Categories:
  • Security (240)
  • Tips & Advice (130)
  • Best Practices (97)
  • Backup & Disaster Recovery (96)
  • Managed Services (89)
  • The Head Nerds (82)
  • Business Growth (79)
  • IT Support (43)
  • Business (41)
  • Automation (40)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (33)
  • Remote Management (30)
  • ITSM (26)
  • Networking (22)
  • Cloud Computing (21)
  • Data (21)
  • Marketing (15)
  • PSA (13)
  • Product (11)
  • Service Desk (6)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • GDPR (3)
  • Internet of Things (3)
  • Customer Service (3)
  • Research & Trends (2)
  • Training (2)
  • Business Risk (1)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
Show moreless
SolarWinds MSP

Products
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.