Does your company have a green policy? What can be done in mobile channel businesses, from manufacturers to dealers, to promote recycling, energy saving and anything else ‘green’? Also, how can green issues be used to push sales of mobile devices?
that addresses the entire lifecycle of telecoms. At O2 that’s exactly what we’re doing. We’ve completed a carbon map of our supply chain to identify areas where we can directly improve performance, including our own network, retail and office environments. It also enables us to see where we can influence and encourage suppliers on areas such as reduced transport impacts and improvements in packaging.
Perhaps the biggest area of impact for mobile phones is associated with device usage, so we are working together with producers and trade associations, such as the GSMA, to drive improvements in the energy performance tied to use, such as charging and standby power consumption. We are also supporting the GSMA initiative to harmonise on charger technology, which is directly related to our vision of no longer having to supply a new charger with a new handset.
At O2 we have had a dedicated recycling channel open to our consumers in all our markets. We are very much aware of the importance of encouraging a move up the ‘waste hierarchy’, and our recycling service puts a very strong emphasis on reuse whenever possible. This means that if you recycle your old phone via O2, it may get a second life in a developing market. If not, we ensure that it is recycled responsibly with materials recovery and safe disposal of waste.
We believe the increased emphasis on green policies within the sector will help drive sales for the mobile channel and, as the UK’s largest operator, we are determined to push these messages through the channel.
online. For resellers that sell mobile phones or are looking to sell them, it not only provides a value added, environmentally focused service, but also drives the existing business forward. By receiving a tariff for returned handsets for example, this can help to further subsidise the cost for a prospective customer thereby increasing the likelihood of a sale. This will also make the average B2B reseller much more competitive against the networks, whilst all along helping them to promote a green message.
However, in order for protection to be useful, it is vital that there be a mechanism in place to update and control security related applications. Mobile device management technology enables IT departments and operators to implement these upgrades over the air. Furthermore, the same platform used to install and update security applications can be used to enforce enterprise policies on application usage and data access. This provides a means of controlling malware vectors.
Another hacker approach relies on human weaknesses rather than device or software flaws. Phishing and spoofing are just two examples that often involve tricking the user to give over control of the device or information, including account details or passwords. Social engineering exploits can impact users of mobile devices just as easily as PC and laptop users, and, given less sophisticated displays and often divided attention given to mobile devices, the threat is only more real. Proper ‘hygiene’ is a must when mobile browsing, sending email or using any applications that ask for personal information. Training users to never give up passwords, even to support staff, goes a long way.
Once information is on the device, it must be protected. This can be best accomplished by defence in depth, starting with control over physical access to the device, continuing with strong passwords, setting the device to lock, and ending with encryption of data.
Good practice on all these levels will leave the device fairly secure, even in the midst of user perception that certain controls are inconvenient. However, even in cases where good hygiene is followed, a device being lost or stolen is cause for concern. Security policies should be set, encryption and VPN clients can be managed, and in the worst case scenario, the device can be locked or even wiped over the air.
goal is the ability to define and enforce a common security policy, regardless of the device platform or the mobile operator used.
Brightpoint has unique expertise in this growing industry thanks to unrivalled understanding of and familiarity with the various device platforms available today, the protocols available for remote device administration, as well as the different solutions on offer.
Microsoft Exchange 2007 includes several device management features for the Windows Mobile 6.1 platform, enabling the central definition of policies enforcing password usage as well as controlling use of the camera, WiFi, Bluetooth, removable storage, modem functionality, email, web browsing and third party applications. Devices can also be remotely ‘killed’ should they be lost or stolen.
Microsoft System Centre Mobile Device Manager extends this functionality by enabling ‘enrollment’ of mobile devices into the active directory domain and managing their security settings via group policy.
BlackBerry has long enabled the control of virtually any aspect of connected devices at a very granular level, from password usage to disabling hardware functionality as well as blocking specific websites and data services.
With the release of IBM Lotus Notes Traveller 8.5, security policies can now be enforced and both Windows Mobile and Symbian devices ‘killed’ from the Lotus Domino server. For a means of automatically enforcing security policies on devices, delivering document and application packages, controlling hardware and software functionality as well as reporting on the applications installed and their usage, then Sybase’s Afaria product will almost certainly fulfil all requirements.
Leveraging OMA-CP technology, Afaria has the ability to remotely configure devices via SMS messages, requiring that that device simply have a live SIM for it to be configured with all the required security and internet connection details automatically before it is then allowed to download the Afaria client which can then perform more detailed configuration.
This is a burgeoning industry which is moving very quickly indeed. Other products that are definitely worth evaluating are Perlego and Fromdistance.