• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security

Tips for BYOD Mobile Security on Campus

Nowhere is mobility more visible than on the nation's college and university campuses. Students are tethered to their smartphones 24/7, but how do we keep the network secure?

April 7, 2016 TechDecisions Staff Leave a Comment

Nowhere is mobility more visible than on the nation’s college and university campuses. Students are tethered to their smartphones 24/7.

Indeed, eighty-six percent of college students regularly use their smartphones, while 40 percent say they would like to use mobile devices more often than they do now, according to the Pearson Student Mobile Device Survey 2015, which canvassed 1,211 college students between February and March 2015.

Students prefer to use their smartphones, tablets, and other mobile devices for learning, research, communications, and collaboration. In a university setting, students prefer to use their mobile devices for a variety of activities: to add or drop classes, check on homework assignments, review grades, assess dining plans, evaluate their exam schedules, check on housing assignments, etc.

But it’s not just students who are highly mobile both on and off campus. Faculty members frequently use their mobile devices to distribute homework assignments and other content to students along with reviewing student projects, collaborating on research with their peers, and conducting other tasks. Meanwhile, university staffers rely on their mobile devices for recruiting, analyzing geographic markets for prospective students, training, and other administrative activities.

Higher Education Gets a Mobile Makeover

Advances in mobile technology have opened new avenues for learning, sharing and communicating – each important to the digital college experience and for day-to-day campus operations. Active members of the military, veterans, and other far-flung students are able to access online courses using their mobile devices. University administrators can now use their mobile devices to answer student questions about tuition, housing, and meal plans in real-time. Meanwhile, professors are beginning to complement their courses with mobile apps that are designed for specific classes.

Having the right mobile enterprise solution in place can make a huge difference in enabling faculty, staff and students to take advantage of the connectivity offered through BYOD and mobile technology.

Colleges and universities need an effective approach to secure and distribute mobile apps that are used by faculty, staff, and students. Higher education also needs a proven method for promoting the mobile apps it has available to different types of end users in order to drive high levels of adoption and deliver sufficient ROI from mobile app investments.

Chris Hazelton is a mobile evangelist with over 10 years of experience in the enterprise mobility space. At Apperian, Chris helps drive the company’s positioning, go-to-market strategy and platform evolution. Prior to joining Apperian, Chris served as Research Director for Enterprise Mobility at 451 Research and led one of the largest market research teams dedicated to enterprise mobility.

Mobile device management (MDM) has inherent limitations that aren’t conducive to a university setting. MDM is a device-centric approach to mobile security that is used to monitor, manage, and control end users’ personal devices. Many mobile users don’t like MDM as they view the ability to be tracked by an employer or a university as an invasion of their privacy. Plus, most end users are reticent about the ability of an MDM system to wipe their personal data.

Moreover, MDM isn’t designed to properly secure the apps and data that need to be protected in higher education, including personal data about students, financial records, etc. By implementing an app-centric approach, administrators can meet the wide-ranging needs of students, faculty and administrators while addressing security, distribution, and adoption requirements.

Making Mobile Apps Accessible

In order for colleges and universities to fully realize the benefits of mobile technology, it’s critical to have a scalable network that supports and empowers campus mobility and BYOD.

This is why a growing number of colleges and universities are opting to use mobile application management (MAM) since it is less intrusive than MDM, more secure, and easier to administer.

MAM offers several technical benefits to college and university administrators. A MAM platform that includes a private app store can make it easier for college and university administrators to distribute mobile apps and make these apps more visible to the target audiences they’re trying to reach (students, professors, teaching assistants, finance managers, etc.) by creating a consumer-like app store user experience. Meanwhile, network administrators can use real-time monitoring and analytics to continuously evaluate the health of their app program.

Administrators can also use MAM to “wrap” security credentials around apps based on an individual’s role and responsibilities. Policies can be applied via app wrapping without requiring a software development kit (SDK) or making changes to software code. Meanwhile, dynamic policies can be added, amended, or removed without having to redistribute an app. This way, if the credentials for a manager in the bursar’s office need to be changed in a billing app, those policies can be modified without having to take the app offline.

Best-in-class MAM platforms also include analytics tools that can be used to monitor app adoption and usage which can help administrators keep tabs on how employees are using apps and for what purposes.

Colleges and universities are aggressively competing for both students and talented faculty. Having an effective mobility strategy in place can help ensure that the apps and data used by students, faculty, and staff are secured while enabling a collaborative, mobile campus.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: BYOD, Higher Ed

Related Content:

  • iPhone security bug, Apple, Kaspersky Kaspersky Discovers New 0-Click iOS Exploit
  • C919 The Cyberattacks and Insider Threats During The Development…
  • FTC Ring FTC Accuses Ring of Watching Private Videos, Poor…
  • Threat Detection Trends, 2023 Hacking Trends, Expel New Email Rules, MFA Bypass Are Top Hacking…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

ChatGPT, generative AI, enterprise, workplace
Blueprint Series: ChatGPT and Generative AI in the Workplace

This latest release of the TechDecisions Blueprint Series explores the new phenomenon of tools such as ChatGPT and how IT leaders should go about d...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.