Enterprise Mobility uses App Configuration to mitigate data loss caused by shadow IT

In the early years of computing technology, corporate data and emails could only be accessed within the company network. This allowed the corporate IT team to ensure all company data was containerized within the company network and its computing devices. Now, end users can access company email and data from any mobile or computing device from within the company network or from the comfort their home. To add to the complexity, cloud services for email and data repositories have led to the growth of Shadow IT. Shadow IT is hardware or software within an enterprise that is not supported by the organization’s central IT department. With company resources now accessible via Cloud and employee-owned devices able to access company content, corporate IT professionals are struggling to ensure company email and data is secured in order to prevent a data leak from a compromised device or rogue employer.

This is where an MDM’s App Configuration can help. An App Configuration is a configuration that is applied to a specific mobile device application where the configuration can impose restrictions and Data Loss Prevention settings on an app. The configuration prevents the end user from performing specific actions to ensure company data or email does not get transferred to another unmanaged application. Think of an App Configuration as a container that is applied to a mobile app allowing the Mobile IT Administrator to impose Data Loss Prevention settings such as restricting Copy and Paste, Screenshots, Open In, and Print. The Mobile IT Administrator can also force the user to enter a passcode to access the application and prompt for re-authentication if the end user is idle for a specific timeframe.

Smartphones have changed the dynamic on how Mobile IT Administrators control company data. By implementing App Configuration, Mobile IT Administrators can regain control over how the company data is handled in a mobile device application even when they cannot control the devices connecting to their company content or control the actual company resource.