Upwardly mobile: is your mobile fleet optimised and secured? 13 Dec. 2016


‘Mobile’ is no longer a perk or even a ‘nice-to-have’: today, it’s essential for your business. That makes managing, optimising and securing your mobile fleet critical. And it seems everyone has an opinion, leading to our highly interactive session “Upwardly mobile: is your mobile fleet optimised and secured?”, in December 2016. Over 20 companies shared their expertise, debated with each other and learned from each other’s experiences. Beltug members can see presentations from the event here (after login):


Beltug presentation

BNP Paribas presentation


Björn Kemps, Director Operations at Mobco, started the session by putting some significant ICT trends in the spotlight and explaining how they will influence your mobile environment. He began with the polarisation of networks.  Not too long ago, you were either in or you were outside the company network.  Your office desktop/laptop connected to the office LAN, while mobile devices were considered external devices that connected to the guest Wi-Fi, and your home PC connected to the internet. The intranet was highly secure, while the internet was unprotected.  Usage of your company’s (guest) Wi-Fi increased more and more due to the ever-expanding number of mobile devices within the company.  We are still moving forward, says Björn, and by 2020 he expects companies to have only 1 'external' network and 1 intranet. In fact, as Windows 10 and Mac OS X devices are considered as mobile devices, the office LAN will become obsolete. Cloud is already speeding up that process.


Another trend in the mobile world: device lifecycle.  Here, consumer and business market needs are opposite.  When the consumer unboxes a device, he needs very little support at first: most of what he needs is pre-installed.  For business users, on the other hand, content, business apps and security measures need to be pushed constantly, and action from the user is often necessary.  This can be time- and resource-consuming, leading to the creation of device enrolment programs. Here, the user logs in with a corporate ID and all necessary apps and configurations for the corporate user are automatically pushed to the device. 


Björn highlighted some other evolutions and trends for us:

  • The war for identity
  • Security evolutions: device-centric; app-centric; content-centric
  • The increasing irrelevance of the form factor
  • Single Purpose Apps (SPA)


Then we learned how to put all this into practice to achieve the ultimate goal of enabling employees to work on any device, anywhere, anytime, in a secure and user-friendly way, with email, mobile intranet, mobile documents and efficiency apps for tasks such as booking a meeting room, resetting a password, creating a contact list, etc.


Björn's conclusions:

  • Mobile service starts before the device is unboxed
  • The 'local' network is fading into the internet
  • When you build a platform, make sure the foundation is solid!


Next up was Jan Ponnet, IT Specialist Mobile Services at BNP Paribas.  Mobile security is so much more than a password, he emphasised, providing an overview of the current threats to the mobile world and how you can protect your business content.


Threats are everywhere, Jan stressed, as he shared a few facts and numbers:

  • Both iOS and Android devices are constantly under attack by hackers
  • 1.2 billion files are posted to Dropbox every 24 hours
  • Only a few months ago, 4000 apps in the Apple Appstore were infected with malware (Apple has fixed this issue)
  • Enterprise policy is not always functional
    • 90% of enterprises do not enforce device patching
    • 33% have missing devices
    • 22% have removed users
    • 5% have users with removed MDM
    • 20% have devices with outdated policies
    • Only 5% have an anti-malware solution


But after describing these threats, Jan reassured us not to panic.  Help is out there, in the form of excellent tools (new VPN software is one example), extended policies and the possibility for MDM platforms to extensively interact with external tools.


Jan also shared with us his best practices (see slide 9 of his presentation). One example: even if the infected smartphone belongs to the CEO, don’t hesitate to put it in quarantine!


Finally, for the future, Jan predicted that biometric access will be an important tool to single sign-on: we will see more and more use of iris scan and facial scan. So, keep your eyes open!






















Dear visitor,

Access to more information about this topic and/or to download the paper is easy and fast, but exclusively for Beltug members (just login to get access).

Beltug gathers a lot of information. Here you find the advantages of Beltug membership

The Beltug Team

Click here to login

>>> Back to overview