Early IT support for Apple iPads creates secure access, secure data
Software vendor MicroStrategy has realized that 2,300 corporate iPads create a time machine. Employees now have instant access, via Wi-Fi or 3G, to the company’s real-time business data and processes.
“It’s a very powerful device for business productivity, because of the way in which they now can ‘capture time’ during the day to do work,” says Dan Kerzner, senior vice president for mobile at the $454 million Tysons Corner, Va., company. MicroStrategy traditionally has sold a range of business intelligence applications linked to backend databases. Now the company is repositioning itself with tools that let customers create mobile BI apps, especially for touch devices running Apple’s iOS firmware.
“The iPad is the ultimate information consumption device,” Kerzner says. “It’s got a giant screen compared to a smartphone, and a form factor that lets you deliver software to it, and take it with you anywhere. There are specific things you can accomplish with the iPad that you wouldn’t have been able to do otherwise.”
FUTURE: iPad 3 prototypes everywhere!
The iPad’s introduction in April 2010 caught the eye of MicroStrategy CEO Michael Saylor, who saw it as an opportunity to make mobility far more productive for employees. By July of that year, MicroStrategy had released its first native iOS apps for internal use. Soon, the Windows laptops for the entire sales force were replaced with iPads, and more and more employees at all levels were finding uses for the tablet. Employees also use MicroStrategy’s new commercial iOS apps for business intelligence.
The IT group was on board early, according to Kerzner. “You accept this is a new form of device, and just get on with it,” he says. “The tools are all there.”
At MicroStrategy, iPad deployment, security and management was very similar to that used for laptops. “Our core tenants are: secure on-site network access, secure VPN access off-site, and an inventory of devices that we could plug into our existing device-management process,” Kerzner says.
The company secures the iPads — both corporate and personal — and network access via a corporate security profile, which is installed on all iPads (and iPhones). The profile enables secure network access and, via Microsoft’s Exchange ActiveSync protocol, secure, password-based access to and synchronization with Exchange email, contacts and calendar. The profile dictates policies such as requiring a passcode, and automatically locking when three to five minutes have passed without activity. Users are unable to remove the profile.
Employees use the passcode for access in the office, and the Cisco VPN implementation in iOS when outside the office.
“If you accept that profile, we can guarantee the security policies and certificates,” Kerzner says. “We have an authentication process to ensure that you are a verified user to get the profile in the first place.”
The approach lets the company classify mobile devices by type and treat them differently. “If you connect via an iPhone, you won’t get the full access to all our systems,” Kerzner says.