The second in a series of postings on how advisors and their partners can effectively, and safely, take advantage of mobile technology.In Part One, we addressed the business issues around mobile technology, while in Part Two below, we walk through the necessary steps to building a mobile policy.
Today’s economic climate has led many financial services firms to shift technology investments to areas that reduce costs and improve overall workforce productivity. Increasingly, these investments include mobile solutions—and updating the enterprise infrastructure that is necessary to deploy and support them.
Mobile access to enterprise resources, such as CRM and client information or more sophisticated tools, can significantly improve user productivity and client satisfaction. But getting these capabilities into the hands of users requires much more than just investment in hardware and software. A successful mobile strategy starts with careful planning and consideration of your business objectives. Then, to successfully build, deploy and manage mobile solutions, the significant technology, process, cost and commercial risks involved must be properly addressed.
Comprehensive mobile policies share five key elements: security, infrastructure and technology, user mobility and use policy, support, and future-proofing.
What Your Peers Are Reading
Securing mobile devices and the corporate assets on them is a challenge for any enterprise, but especially so in financial services. Cybercriminals are increasingly turning their attention to the mobile channel, hoping to exploit security gaps that have already been closed on the Web. The first step is deciding what information and services can be accessed on a mobile device, and how securely that information must be protected. Ensuring your mobile infrastructure uses secure transport and data encryption is important, but the most effective approach to mobile security includes a combination of security at the infrastructure, communication, application and device levels, coupled with a robust policy that specifies what users can do with mobile applications and data.