Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
The EMM Dating Scene
September 19, 2013 •Ray Potter
On Monday, I was catching up on my reading when I noticed a familiar face featured on Forbes.com in Maribel Lopez's column. It was me! What an honor to be included in the well-known analyst's series of interviews with CEOs and mobility experts.
I wanted to add a few more thoughts, specifically regarding concerns that should be addressed by buying agents. There's no way to cover all the bases with one or two articles or posts, but we have to start somewhere. Looking for an EMM vendor is like searching for a spouse. You have to weed through the hype, check references, and go through a trial period before fully making the commitment. There are no one-size-fits-all solutions, so you need to get out there and meet some candidates.
When end users ask me about questions to ask vendors, I often mention "What's your scalability?" as a consideration.
There is a great deal of connotation implied within this question.
Scalability is one key area to consider, as you want to think ahead for optimistic long term growth. Bluntly, you can be assured that vendors who are prepared to deploy to all 305,000 employees at GE immediately can handle your needs as well.
The flip side of the coin is that you may not need a truly massive support network, but you'll want a vendor that is nimble and accessible. You should be confident that they can grow with you and that your internal IT team can manage the deployment. There is a happy medium between the start-up with two guys in a garage and no dedicated support team and an outsourced technical support call center that keeps you on hold for an hour.
In that vein, don't be too quick to rush to the latest and greatest, high hype, cool vendors; those solutions may not be right for you. The needs of each customer will vary, but the ability to provide technical support and to continue innovating the product is a non-negotiable. Worse, those vendors may not be around in 9 months because this industry moves so fast. You may be their first customer… or their last.
Asking about a vendor's scalability is practically a secret code. It means "Tell me about your size, your reliability, your history, your roadmap, and your team. Tell me all the factors that will help me sleep at night and get buy-in from my superiors."
I can't stress it enough - you need to seek a high comfort level with your EMM vendor. Policies can be changed and updated, the devices will evolve, but switching EMM platforms is a nightmare. So choose wisely, and don't rush into that long term relationship without thinking carefully.
P.S. I just wanted to extend a sincere THANK YOU to Maribel, Forbes, and our friends, customers, and partners who have been so supportive and encouraging regarding this article.
Ray Potter
Ray Potter is the Founder of SafeLogic, which was spun off from his previous venture, the Apex Assurance Group consulting firm. He brings over 20 years of security and compliance experience, including leading teams at Cisco and Ernst & Young, to the operations team at SafeLogic. Ray loves playing guitar and flying airplanes.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)