DATA SECURITY ANALYSIS IN EMM SYSTEMS

Authors

  • K. Nechvolod
  • О. Sievierinov
  • A. Vlasov

DOI:

https://doi.org/10.26906/SUNZ.2019.3.131

Keywords:

EMM system, BYOD system, remote control of mobile devices, protection of corporate information

Abstract

The subject of research in the article is the analysis of methods that ensure the security of corporate data and the order of access to it when using its own device management systems for corporate purposes - EMM (Enterprise Mobility Management) systems. The purpose of the work is to review and compare various existing EMM systems, to study their characteristics and capabilities. The article solves the following tasks: consideration of the tasks, structure and constituent functions of EMM systems, determination of their advantages and disadvantages, analysis of the most popular EMM systems. The following results were obtained: the structure, main subsystems, advantages and disadvantages of the systems for managing their own devices were considered, the most popular software EMM systems were analyzed. Conclusions: The analysis of the main concepts of EMM system construction as a whole and the most popular representatives of the market for mobile devices management systems has shown that the choice of one of them depends on the directions of the organization, operating system and manufacturer's devices companies used by the employees in their professional activities. The use of EMM systems for business can be called fully justified only with the correct configuration and implementation of these systems.

Downloads

Download data is not yet available.

References

Madden J., Madden B. Enterprise Mobility Management: Everything you need to know about MDM, MAM, and BYOD. – Jack Madden, 2013. 176 р.

Saravana, Balaji B,, Karthikeyan, N.K. and Raj Kumar, R.S., (2018), “Fuzzy service conceptual ontology system for cloud service recommendation”, Computers & Electrical Engineering, Vol. 69, pp. 435–446.

Saravana, Balaji B., Mohamed, Uvaze Ahamed, Eswaran C. and Kannan R., (2019), “Prediction-based Lossless Image Compression”, Lecture Notes in Computational Vision and Biomechanics (Springer), Vol. 30, No 1, pp.1749 – 17961,

Amin Salih M., Potrus M.Y. A Method for Compensation of TCP Throughput Degrading During Movement Of Mobile Node. ZANCO Journal of Pure and Applied Sciences. 2015. Vol. 27, No 6. P. 59–68.

Dhivakar B., Saravanan S.V., Sivaram M., Krishnan R.A. Statistical Score Calculation of Information Retrieval Systems using Data Fusion Technique”. Computer Science and Engineering. 2012. Vol. 2, Issue 5. pp.43-45.

Sivaram, M., Batri, K., Amin Salih, Mohammed and Porkodi V. (2019), “Exploiting the Local Optima in Genetic Algorithm using Tabu Search”, Indian Journal of Science and Technology, Volume 12, Issue 1.

Kuchuk G., Nechausov S., Kharchenko, V. Two-stage optimization of resource allocation for hybrid cloud data store. International Conference on Information and Digital Technologies. 2015. P. 266-271.

Ruban, I. Redistribution of base stations load in mobile communication networks / I. Ruban, H. Kuchuk, A. Kovalenko // Innovative technologies and scientific solutions for industries. – 2017. – No 1 (1) – P. 75-81.

Коваленко А.А. Сучасний стан та тенденції розвитку комп'ютерних систем об'єктів критичного застосування / А.А. Коваленко, Г.А. Кучук // Системи управління, навігації та зв’язку. – Полтава . ПНТУ, 2018. – Вип. 1(47). – С. 110-113. DOI : https://doi.org/10.26906/SUNZ.2018.1.110

Кучук Г. А. Модель процесса эволюции топологической структуры компьютерной сети системы управления объектом критического применения / Г.А. Кучук, А.А. Коваленко, А.А. Янковский // Системи обробки інформації. – 2014. – № 7(123). – С. 93-96.

Кучук Г.А. Метод мінімізації середньої затримки пакетів у віртуальних з’єднаннях мережі підтримки хмарного сервісу / Г.А. Кучук, А.А. Коваленко, Н.В. Лукова-Чуйко // Системи управління, навігації та зв’язку. – Полтава . ПНТУ, 2017. – Вип. 2(42). – С. 117-120.

Sivaram, M., Yuvaraj, D., Amin Salih, Mohammed, Porkodi, V. and Manikandan V. (2018), “The Real Problem Through a Selection Making an Algorithm that Minimizes the Computational Complexity”, International Journal of Engineering and Advanced Technology, Vol. 8, iss. 2, 2018, pp. 95-100.

Sivaram, M., Porkodi, V., Mohammed, A.S., Manikandan V. Detection of Accurate Facial Detection Using Hybrid Deep Convolutional Recurrent Neural Network. ICTACT Journal on Soft Computing. 2019. Vol. 09, Issue 02. pp. 1844-1850.

Mohammed, A. S. Optimal Forecast Model for Erbil Traffic Road Data. ZANCO Journal of Pure and Applied Sciences. 2017. Vol. 29, No 5. P. 137–145. DOI: https://doi.org/10.21271/ZJPAS.29.5.15

Коваленко А. А., Кучук Г. А. Методи синтезу інформаційної та технічної структур системи управління об’єктом критичного застосування. Сучасні інформаційні системи. 2018. Т. 2, № 1. С. 22–27. DOI: https://doi.org/10.20998/2522-9052.2018.1.04

Свиридов А. C., Коваленко А. А., Кучук Г. А. Метод перерозподілу пропускної здатності критичної ділянки мережі на основі удосконалення ON/OFF-моделі трафіку. Сучасні інформаційні системи. 2018. Т. 2, № 2. С. 139–144. DOI: https://doi.org/10.20998/2522-9052.2018.2.24

Kravets A. G., Bui N. D., Al-Ashval M. Mobile security solution for enterprise network //Joint Conference on KnowledgeBased Software Engineering. – Springer, Cham, 2014. – С. 371-382.

Peraković D., Husnjak S., Cvitić I. Comparative analysis of enterprise mobility management systems in BYOD environment //The 2nd Reseach Conference In Technical Disciplines, RCITD. – 2014. – С. 82-85.

Redman P., Girard J., Wallin L. O. Magic quadrant for mobile device management software //Gartner G00211101. – 2011.

Ortbach K., Brockmann T., Stieglitz S. Drivers for the adoption of mobile device management in organizations. – 2014.

Android developer[Електроний ресурс]: https://developer.android.com/about/dashboards Distribution dashboard

Android Enterprise Solutions Directory [Електроний ресурс]. -Режим доступу:

https://androidenterprisepartners.withgoogle.com/emm/ EMMs

VMWare AirWatch[Електроний ресурс]:[Веб-сайт]-Режим доступу: https://www.air-watch.com/

MobileIron[Електроний ресурс]:[Веб-сайт]-Режим доступу: https://www.mobileiron.com/

IBM MaaS360 with Watson[Електроний ресурс].–-Режим доступу: https://www.ibm.com/security/mobile/maas360

Samsung. WhitePaper: Knox Platform for Enterprise, 2018.

Published

2019-06-21