Mobile Strategy Takeaways from HIMSS

Ultimately, mobile device management goals will ensure that every device on the network gets scanned and inventoried. That was goal outlined in a presentation, “Beyond the Device—Comprehensive Mobility Strategy,” given by CDW chief marketing officer Neal Campbell at HIMSS last Tuesday, March 5.

Campbell cited a recent HIMSS survey which revealed that 80 percent of doctors use mobile devices, of which 40-50 percent of providers report using tablets. Campbell also noted from the HIMSS survey that the number of mobile healthcare applications has grown to 13,619 as of April 2012. From the system administrators’ perspective, the rapid growth in the number of mobile devices has created a capacity challenge as mobile devices dramatically increase network usage. System administrators must begin to think in terms of peak vs. average usage by component; the management of choke points and access to key elements of the infrastructure becomes mission-critical. As system administrators seek to manage network data traffic by device, the final answer is not to just keep buying more capacity.

The right policies, processes, and security tools are paramount to mobile device management (MDM) and security. An effective mobile strategy must focus on:

  • Theft and loss prevention
  • Detecting compromised devices
  • Inventory management
  • Compliance management
  • Monitoring cloud services


In order to comply with HIPAA model mobile device policies, procedures requirements must be developed to address:

  • Enterprise-wide infrastructure for continuous mobility monitoring
  • Encryption solutions for mobile data in transit, in use, at rest, and disposed
  • Establishment of centralized configuration management solutions for both networked and mobile devices
  • The application of dynamic policy controls across the enterprise
  • Implementation of comprehensive anti-malware and anti-virus solutions that include methodologies for detecting and quarantining compromised devices
  • Establishment of a staff mobile device education and training program
  • Creation of a consistent and comprehensive enterprise-wide risk assessment
  • Establishment of regularly scheduled comprehensive security reporting process

Submit a Comment

Your email address will not be published. Required fields are marked *

Share This

Share This

Share this post with your friends!