If your company has experienced a rapid growth in mobile data usage, you are not alone. In the last two years, there has been a 300% industry-wide increase in mobile data and is projected to quadruple by the year 2021. Normally, a rise in data usage of this magnitude would signal an increase in productivity which would be welcomed by any company. The truth is most of this increase is part of a disturbing trend of personal and entertainment usage not only during work hours but after hours as well. The good news is MobilSense can tell you exactly what your employees are doing with their mobile devices.
Companies today are grappling with how to manage this growing data problem with rudimentary tools and analytics. Carrier invoices provide insufficient direction when it comes to understanding the nature of this rapidly expanding data usage problem. Sure, they can highlight the magnitude of the problem and can even point out the top users of data in a given month, but it only tells you there is a problem. This leaves companies powerless to assert any level of control to reign in data usage. You need much more to cope with today’s challenges of exploding data usage.
The data detail provided by the carriers include amount and time of usage but most 3rd party reporting tools today lack the sophisitication to do little more than display the transaction data. What is needed is the ability to display daily patterns of use broken out by business and off business data usage because it focuses attention on areas where abuse may be occurring. Below is a standard view provided by our mobile expense management tool, MobilSentry. In a recent study of over 200M data transactions for business liable devices, we learned that 52% of data usage occurred after hours between 7:00 PM and 6:00 AM or on weekends. While it is comforting to know that employees are dedicated to the point of doing work while away from the office, it should raise suspicion when that usage is equal to or greater than usage during work hours. Have you ever wondered why your employees need 2GBs of data on a Sunday afternoon? Could they be streaming a video on your dime?
While a timestamp can be revealing, an even more powerful view of the data would be to know how an employee is using their mobile device. What if you could actually know the following:
Sometimes you need to see deeper into the usage to confirm the real intent of the employee:
The most revealing look at data is represented by views of the actual sites visited from a device. Not just how much and when but the actual type of data usage. Don’t expect to ask your carrier for this information, it is not available; ask MobilSense. We not only possess the ability to capture data on the carrier network, including the destination site, but provide information on actual sites visited with usage amounts and percentages.
These powerful category of usage views and actual sites visited finally provide the forensic information needed to pinpoint how employees are using their devices and confront them with the evidence. Real-time brings the following unique advantages:
Gone are the days of viewing data retroactively when the money has already been spent. Welcome to the evolution of mobile expense management where you can now see data in real-time!
Knowing that an employee is out of control mid-month is useful but it is costing you to rely on manual intervention processes to stop data waste. Managing usage rules monthly, coupled with real-time enforcement is the only answer.
These new mobile device data controls aren’t just aimed at putting a ceiling on overall data usage for company employees, but can be used to prevent access to entertainment sites, video streaming, or sites deemed unacceptable or at-risk. Mobile technology has finally caught up with corporate network website access control capabilities.
When it comes to preventing the installation of an application, don’t be fooled into thinking that your MDM solution is equivalent to blocking employee access to unacceptable website. A web browser on a smartphone is all it takes to find the backdoor to blocked applications.