Deploying Production Systems

By | Enterprise Mobility

Deploying hardware and/or software to a production environment involves many moving parts and a lot of coordination. It’s imperative that production deployments are planned and structured in a way that maintains user productivity. Extensive preparation and testing is required to successfully execute a product deployment.

The team at BlueFletch has experience in multiple industries, allowing them to give insight into best practices during the preparation phase.  Long before it’s time to deploy, tasks such as requirements gathering and user testing should be undertaken.  Creating prototypes for user testing allows end users to have input into the preparation process. This alerts the development and implementation team to existing issues and provides real-world documentation needed to evaluate the efficiency of business processes.

Detailed planning is another important task in preparation for a product deployment.  Critical aspects such as establishing that the infrastructure is in place and tested, confirming availability of resources and contingency plans are a necessity.   Planning also includes coordinating resources after a deployment in order to establish a support structure to mitigate any issues that arise once a product is deployed.

MDMBlueFletch has worked with multiple MDM (mobile device management) platforms for software and hardware deployment. Our expansive experience allows us to prepare a strategy for using a client’s chosen MDM for deployments.  This includes organizing the MDM platform for ease of future management, developing a staging process to deploy software/hardware at scale and creating processes for updating software and hardware in production. Some examples of our large scale deployments include:

  • Designing and leading the teams that implemented the mobile technology that was the basis for all applications on 100,000 mobile devices at a leading retailer. 
  • Deployed 10,000 Zebra TC51s into 700 Grocery and Liquor stores 
  • Automatic hands-off migration of 20,000 Zebra MC40s from legacy MDM to AirWatch, including an OS Upgrade

Alongside support for a production employment, BlueFletch has also worked with analytics.  These analytics include hardware data points such as battery life, network connectivity and operating system information.  Analytics can also be used to gather information about application usage and to catch issues before they cause an outage or loss of productivity.

BlueFletch can provide know-how in all aspects of the deployment process.  We work alongside our clients to effectively guide them from conceptualization to product deployment. For more information contact

The New Reality

By | Enterprise Mobility

The gaming world seems poised to go into a new direction with the latest virtual reality advancements. This isn’t the first time the gaming community has attempted VR headsets. Sega, Apple and Nintendo attempted to introduce VR Headsets into the mainstream in the early 90s but were not successful. Fast forward to 2012 when Oculus mounted a successful Kickstarter campaign – VR headsets have been given a second chance at the spotlight.

Sega VRSega VR Headset circa 1993

There are plenty of options for VR headsets from the affordable Google Cardboard to the upcoming HTC Vive. The question is whether the VR headset will change gaming and oust traditional gaming systems and what other implications VR headset could have. Here are some of the VR Headsets out on the market:


Google Cardboard – $15

Google Cardboard is a simple affordable way to enjoy virtual reality. It’s basically a foldable piece of cardboard with specialized lenses that you insert your smartphone into. Although the experience is not the same as the high-end VR headsets, there are over 20 apps for users to try. It’s a great introductory VR option. Read More

The Arms Race – Are We Ready to Adopt the SmartWatch into the Mainstream?

By | Ideas For Your Business

Smartwatches have inundated the market in the past couple of years, and the most anticipated offering was unveiled by Apple this past week. Apple is looking to dominate the smartwatch space but it still remains to be seen whether Apple or the many other smartwatch makers can turn the smartwatch from a novelty to a necessity.

The Apple watch is entering a crowded space with formidable new offerings by Pebble, LG Urbane LTE and FitBit. Read More

BYOD MDM Considerations

By | Enterprise Mobility

Key Take Aways

  • Email security, device compromise and separation of work and personal data are the major security concerns to consider when implementing a BYOD policy
  • Survey and understand your security needs before evaluating an MDM solution

Mobile Devices



At one point in time it was common to have two devices; one for work and one for personal use.  That time has passed and many people are using one device for both obligations. This Bring Your Own Device (BYOD) trend is rapidly being adopted by organizations as both a way to cut costs and to meet the demands of their employees.  As a result, many smart phone manufacturers are increasing their feature set in order to keep up with enterprise BYOD. One of the main challenges in adopting a BYOD policy is allowing a variety of devices to access organizational resources without compromising the security of the organization.  To increase the likely success of a BYOD policy, many companies are turning to Mobile Device Management (MDM) platforms to help meet the needs of these security challenges.

In choosing the optimal MDM solution for your organization, the following are primary areas on which to focus your requirements analysis:

  1. Email Security Requirements
  2. Lost / Compromised Device Process
  3. Separation of Personal Data and Corporate Data
  4. Security vs Usability
  5. MDM Vendor Landscape

BYOD Growth

1. Email Security Requirements

Accessibility to email is one the main uses for mobile devices in the work place.  Ideally you want a user to be able to easily access their email while maintaining a certain level of security.  Although a password is required to initially set up an email client, if the device does not have any other security measures in place, such as a device passcode, anyone with physical access can view or send email on the device.

Policies such as encryption requirements, sync settings and password requirements can be implemented with an MDM solution in order to alleviate some security concerns.  IT leaders can take this even further by disabling copy and paste features, forcing email to only open in a secure application, disabling the use of third-party email applications and even remotely wiping the device upon violation of security policies.  Many MDM solutions also offer certificate management as another level of security to leverage for secure email.

BYOD Email Security Checklist:
* Enforce Encryption requirements and sync settings
* Disable third-party email applications
* Disable copy and paste features (if Appliable)

2. Lost or Compromised Devices

One of the major concerns of IT departments when implementing a BYOD policy are compromised devices. A device that is jailbroken or rooted can have an increased vulnerability to password theft, data interception or viruses.  Many MDM solutions have mechanisms for determining if a device is compromised and allow policies to be put in place once a compromised device is detected.  Actions can range from sending the user a warning message to remote wiping the device and restricting access.  Many MDM solutions offer multiple types of compromise detection.  Detection can occur upon initial MDM installation, within enterprise applications or via a scheduled check by the MDM agent.

Compromised Device Security Checklist:

* Enable mechanisms/reporting to identify rooted and compromised devices
* Have a bi-directional communication process to connect with compromised users
* Restrict access to sensitive data

* Blacklist applications known as security holes

3. Separation of Personal Data and Corporate Data

Containerization is another option in creating a secure environment for users to access corporate data via their personal phones.  Although users may access corporate resources via their personal devices there may be some concern with administrators being able to view their personal application or locations.  Many MDM solutions are implementing the ability to create an isolated environment on a device that can access corporate resources.  This can allow administrators to manage enterprise applications while alleviating privacy concerns for users.  One example of this is Samsung KNOX, which creates a secure container where enterprise applications are completely separate from personal applications.  The container contains its own home screen, launcher, applications and widgets and uses a separate encrypted file system.  Another example of the use of containerization for email is the NitroDesk Touchdown. It’s an application that uses Microsoft’s Exchange ActiveSync to create a separate container to separate personal and corporate data.

Containerization Checklist:
* Implement containerization to isolate corporate and personal data
* Manage corporate resources on devices without having to manage the device

4. Security vs Usability

Security is definitely a priority when implementing a BYOD policy. However, the usability of the device needs to remain intact as well. Allowing users to use their devices as they normally would while also allowing secure access to work resource can increase productivity. A company implementing a basic BYOD policy can generate $350 of value annually and an employee can save on average 37 minutes per week.1

5. MDM Vendor Landscape2

By some estimates there are over 100 MDM vendors in the marketplace currently. According to Gartner analysts Airwatch, MobileIron, Citrix, SAP, Good Technology and Fiberlink are considered industry leaders in the MDM space. Below is a list of the leaders in the MDM space as well as other notable MDM companies.

  • Airwatch: AirWatch is considered an industry leader with over 7000 customers currently. Airwatch offers Enterprise Mobility Management via both the cloud and on-premise. The company is rapidly expanding and has taken the lead in Tablet Content Management. Some of it’s strengths are that it’s highly scalable, has strong content management capabilities and aggressive pricing.
  • Microsoft InTune: Microsoft InTune is Microsoft’s MDM solution.  InTune includes System Center Configuration Manager (SCCM) and can manage Windows, Android and Apple devices.
  • SOTI: SOTI is an established company with a successful history managing Android and IOS devices as well as rugged devices. SOTI has over 10,000 Enterprise MDM customers. SOTI’s MobiControl allows help desk staff live remote control of Android devices and remote view for iOS applications via the MobiControl iOS SDK.
  • Symantec: Symantec launched Symantec Mobile Management Suite in 2012 and acquired Odyssey Software and Nukona to provide a more robust MDM offering. Symantec has integrated strong security features and benefits from it’s name recognition.
  • Zenprise(Citrix): Citrix acquired Zenprise in 2012 and offers both cloud and on-premise MDM solutions. Zenprise offers broad device support including BlackBerry and Kindle Fire. Citrix has a long history of supporting mobile endpoints and remote access.
  • MobileIron: MobileIron is classified as a leader in the MDM landscape and focuses on the mobile lifecycle. MobileIron offers both cloud and on-premise solutions. MobileIron provided one of the first enterprise app store and also focuses of self-service lessening the IT load.
  • SAP: SAP is a global provider of business software and invested in the MDM market to support it’s customer and partners. SAP acquired technologies from Sybase and expanded it’s MDM offering under the Afaria name. SAP focuses on scalability integration, application development and usability. SAP also offers real time Telecom Expense Manager to monitor data usage and roaming charges.
  • Good Technology: Good Technology has been one of the pioneers in containerization. Good recently acquired AppCentral in order to offer a cloud solution as well as it’s on-premise solution. Good offers a strong platform to provide secure communications between it’s own apps, enterprise applications and many third-party independent software vendor apps.
  • Fiberlink: Fiberlink’s MaaS360 is a cloud-based MDM solution and does not have an on-premise solution. MaaS360 features fast and easy deployments. Fiberlink tends to serve organizations that are contained by tight regulations.
  • IBM: IBM recently introduced IBM Mobile Foundation which incorporates a mobile app development platform with mobile app management. IBM supports iOS, Android, Blackberry, Symbian, Windows Mobile and Windows Phone. IBM can also leverage it’s global capabilities and enterprise reach.
  • BoxTone:  Boxtone assumed control of Motorola 3LM security technology for Android and has built a range of technology provider partnerships. BoxTone’s strength is it’s on-premise solution but it SaaS solution is gaining traction. BoxTone’s focus is on integrated service management with automation, service desk support, proactive monitoring and reporting tools.

1. Loucks, Jeff, et. al The Financial Impact of BYOD: A Model of BYOD’s Benefits to Global Companies Retrieved from

2. Redmond, Phillip, et. al Magic Quadrant for Mobile Device Management Software 23 May 2013 Retrieved from