Fujitsu Says MYOD not BYOD

The People:

Mr. Craig Baty, CTO, Fujitsu APAC, Fujitsu
Ms. Suzlinda Sulaiman, VP, Managed Services, Fujitsu Malaysia, Fujitsu,
Mr. P. Saravana Kumar, Senior Consultant, Pre-Sales & Solutioning, Fujitsu
Ms. Michele Lum, Marketing Director, Fujitsu Malaysia, Fujitsu,

Kuala Lumpur, Mar 6, 2013 - BYOD (Bring Your Own Device) trend has become common even though it is associated with many issues and poses significant challenges to organizations such as threats to enterprise data security and etc.

Organizations have to embrace BYOD at all cost. In order to do that, they have to manage every aspect of challenges associated with it; in order words, organizations have to Manage Your Own Devices (MYOD).

(L-R:) Suzlinda Sulaiman, VP, Managed Services, Craig Baty, CTO APAC, P. Saravana Kumar, Senior Consultant, Fujitsu

In a typical scenario, managing mobile devices requires organizations to take care of the technology assets (hardware and software); policies & processes and users support. One may choose to adopt MDM solution to manage and help with automation of certain processes, but MDM solution is really just a software suite by itself – MDM requires to be maintained as well.

The ideal solution is to outsource all aspect of mobile device management to a third party which is what Fujitsu is offering today, the enterprise managed mobile – all in one solution.

By implementing enterprise managed mobile solution, customers just need to purchase the devices and then sit back and relax. Configuring, provisioning, securing, supporting, monitoring and decommissioning will be managed and served by Fujitsu global team. Not just that, Fujitsu brings with it many years of experience in terms of helpdesk and managed services into this context, thus providing customers with best practices in terms of mobile device management that meet industry compliance standards.

For example, subscribing to Fujitsu’s enterprise managed mobile solution, customers are eligible for 24/7 global support that is ITIL compliant. The offering is very affordable for enterprises and SMEs because it literally operates on pay-per-use basis – 30 days pay-per-use per device.

Implementing the solution, every aspect of enterprise device management can be managed 100% which inclusive of detection of jailbreak, support for remote wipe & lock and application provisioning – to allow or disallow usage of Facebook.

The benefits are going to be tremendous. It allows customers to gain business advantage, reduce costs and enhance user experiences.

According to Baty, “Mobility has a profound effect on the way people do their job and the way we will deliver ICT in the future. Fujitsu Managed Mobile is a solution that allows our customers to access their business-critical tools in an efficient, simple and secure manner.”

“Fujitsu Managed Mobile service is an industry-leading, all-in-one global cloud offering that enables our customers to efficiently deploy, manage, support, control and secure mobile devices, applications and users,” said Suzlinda Sulaiman, VP, Managed Services.

How it works is quite simple – the technology enabler resides in the power of the MDM solution which is based on Zenprise MDM platform – all devices to be commissioned will be installed with a client software; which supports all major mobile device platforms such as iOS, Android, Windows, Blackberry and Symbian; the client software will communicate with the central MDM solution for implementations of provisioning and controls.

My own opinions suggest that most users will not prefer to install the client software onto own devices; although some may not mind. This is because if I were to bring my own device to work, I need to have control of my own personal preference and data – I may want to use Facebook outside office locations. To mitigate such scenario, enterprises should look into providing employees with enterprise mobile devices and prohibit usage of personal mobile devices for enterprise usage. Nonetheless, MDM solution works both ways – it can configure an enterprise mobile device to work during office hour and sleep at night or configure a personal mobile device to access enterprise data during office hour only and personal data during non office hour only.

Get more details.


That article is fantastic. Lots of issue includes here to know about byod security, for implementation and of byod security and byod security policy that site also effective. I try to write in depth about byod security, byod security policy, to implement byod security in school and more things...