Why Advanced Search in mobile security is a must-have

Why Advanced Search in mobile security is a must-have

X-wings, B-wings, Y-wings, managing all these different kind of battle starships was not a piece of cake for the rebel alliance when they attacked the Death Star (twice!). In the same way, managing different sort of devices in a company is a challenging job because every unit has its own specifications and requirements.

xwing fleet.jpg

Now, imagine that your department has to manage 30, 50, 100 or even 500 devices. Don’t worry, you don’t have to hire an army of workers to monitor and control the usage of every single device. Current technology offers software that provide Hardware Asset Management (HAM), this is, online platforms that shows you who’s using every laptop, to which department that person belongs, what kind of software do that employee uses (in case that your company have to buy some licenses), or how old the device is.

As Techopedia says, “this begins with acquisition and continues through maintenance until the hardware’s ultimate disposal. This is often handled by a HAM that must be familiar with the different hardware used by the organization and must interface with other management disciplines.”

The lifecycle of the very device is also an important factor that companies use to maintain hardware always in good shape. According to The ITAM Review, the main stages of a hardware assets lifecycle are:

    • Hardware Request
    • Procurement
    • Installation of company image/software
    • Deployment
    • Use (Any problems? Needs upgrading? Accidental damage)
    • Storage/Not in use
    • End of warranty or maintenance
    • Retirement
  • Disposal

That’s ok, as a first step. But nowadays companies need way more than that. As every industry and firm is different and have their own needs, IT management requires customizable tools to monitor and assess specific requirements in order to provide the right solution for every single need in each department.

For example, Prey for business offers better device management with Advanced Search, an option that helps you label devices according to several categories that are critical for your management. As basic features, you can filter by name, device ID, label name, user email, status or device type. But you can also create any category you need. So for example, if you work at an educational institution (high school, college or university) you can create categories like campus, faculty, department, or type of user such as academic, researcher, employee etc.

Now, if you are in a national retail company, you can filter by city, region or state, marketing, sales, logistics or any other group of your interest. At the end of the day, possibilities are endless.

The main benefits that this customized optimization brings are related to cost savings. The ITAM Review explains that these solutions help companies to reduce “the amount of money spent on hardware during its lifecycle at the organization (…) This also helps organizations to budget for the next years IT budgets in both software and hardware assets, thus giving a justification for HAM and also giving transparency to the IT stakeholders.”

Are there any other uses your IT team would like to explore with this tool? Share your ideas.

Nicolas Poggi

Nicolas Poggi

Nicolas Poggi is the head of mobile research at Prey, Inc., provider of the open source Prey Anti-Theft software protecting eight million mobile devices. Nic’s work explores technology innovations within the mobile marketplace, and their impact upon security. Nic also serves as Prey’s communications manager, overseeing the company’s brand and content creation. Nic is a technology and contemporary culture journalist and author, and before joining Prey held positions as head of indie coverage at TheGameFanatics, and as FM radio host and interviewer at IndieAir.