Telecommunications organizations routinely deploy remote workers using field applications on smart local devices — a situation on the rise. Already an estimated 60% or more of telecommunications workers use personal devices and computers for business, according to Telecomm Reseller (an industry research group).
Managing the cost, support requirements, and security of these devices, however, is becoming more and more challenging. And over time, as the BYOD/PC phenomenon gains strength, these challenges are escalating. They include:
- Managing remote mobile computers and devices accessing cloud-based applications to support real-time repair crew connectivity, data accuracy and quality control.
- Securing the volume of data streaming through service points, so as to review results and make decisions in real time.
- Connecting distributed virtual teams of experts to analyze problems, determine next steps, and carry out strategies.
- Accelerating planning and forecasting, new service introductions, and supply chain/remote asset management
- Complying with stringent regulatory requirements concerning organizational data, while also ensuring the corporate network remains free from malware, intrusions, and other cyber security breaches.
The Solution: Moka5
Moka5 secures corporate access, increases user productivity, and simplifies IT management, even for the most complex scenarios in telecommunications.
Focus on protecting the data
Moka5 secures corporate access and intellectual property by focusing on protecting the corporate data, not the devices. The Moka5 solution is an encrypted, fully-managed corporate desktop running as an application on any computing device accessible from any network. Its secure container isolates the corporate OS, applications, and data from those on the host machines. Even in a BYOD/PC or contract workforce situation where IT traditionally has limited ability to manage computing devices or individual behavior, Moka5’s policy-based secure container ensures IT total control over who has access to corporate applications and data, and what they are – or are not – allowed to do with sensitive information (such as saving files on a USB or CD, or copy files from the corporate desktop to the personal host computer).
With the corporate workspace securely contained on the endpoint, Moka5 ensures multiple layers of protections and defenses around the data including:
- Scanning the host for errant processes
- Data encryption at rest and in transit
- Authentication controls for virtual desktop access, including two-factor authentication
- Remote access revocation or complete wipe of corporate workspace from a centralize console (in case of device theft or loss)
- Automated disabling of peripherals (such as USB and CD drives)
- Blocking network traffic from unauthorized devices
- Enforcement of mobile-specific policies (keycodes or passwords, timeouts, etc.)
Reap capital and operational cost savings
Telecommunications firms can realize significant CapEx savings by using Moka5. How?
- By requiring contractors and remote employees to use their own computing devices. Through a BYOD/PC initiative with Moka5 as the underlying secure container technology, firms can save on hardware cost for every contractor they hire globally.
- By reducing the budget needed to maintain a continually secure endpoint infrastructure. Secure, Moka5-driven application distribution, patch updates, OS migration, and other centralized endpoint management functionality drives security up and costs down. Critical to this efficient management approach is the Moka5 container technology that enables IT to run large updates just once on their golden image. The corporate OS and applications update automatically on every boot, so there’s no need for costly user-side visits.
Boost employee productivity
With layering to streamline image deployment, Moka5 accelerates employee on-boarding. By allowing IT or the user to “rejuvenate” an image in under a minute (in many cases), Moka5 further reduces time and productivity loss that might otherwise occur due to malware infection or other mishap. And thanks to Moka5′s offline capability, remote workers can operate within their secure enterprise workspaces anywhere, anytime.
A Global Fortune Top 20 telecommunications company was chartered with consolidating hardware, and thus reducing hardware-driven costs, such as software licenses, across multiple locations. Other goals included accelerating employee onboarding and offboarding and migrating away from a legacy Virtual Desktop Infrastructure (VDI) solution to improve productivity, simplify management, lower costs, and enhance security.
Moka5 was selected as the new endpoint management platform. With Moka5, the company has implemented both a new BYOD/PC policy and a software leasing program so as to reduce overall compliance issues and costs. Employee satisfaction has also climbed because the employee is able to select from a variety of different endpoint models and configurations including both Windows and Macs. End-users are also able to self-provision their own computers with Moka5 LivePC from a secure URL, using a corporate image designed specifically for their job roles.
Business users “lease” premium software with the approval of their managers on a monthly basis. IT now pools all the licenses and distributes them to users knowing that most will not use all the premium software all the time. If an app is not renewed by the user after 30 days, the lease expires and the app can be removed from the user’s system.
Using this model there’s minimal software inventory to manage and minimal need for systems management tools. The Moka5 LivePC container allows organizations to update the images rapidly and ensure the right software is installed and managed within 15 minutes of manager approval. And when an employee leaves, IT performs a remote wipe and all licenses revert to IT.
Finally, because the workspace is in a secure container and isolated from the host, there is no need to run an additional systems management tool beyond that provided by Moka5.