July 22, 2019 By Ryan Schwartz 3 min read

According to IDC, Google Android is expected to capture 86.7 percent of the worldwide operating system market by the end of 2019, continuing to show growth from the already eye-popping 85.1 percent reported last year.

The popularity of Android lends itself to not only consumer usage, but also its massive adoption in the enterprise. Now more than ever, the secure and convenient management of devices running this operating system is of global importance.

With this trend mind, let’s explore the evolution of Android management from the early days of Gingerbread to Lollipop to today, right at the doorstep of Q — while discussing what steps need to be taken by IT and security leaders to ensure a successful rollout of the latest management techniques for Android.

Join IBM and Google for a webinar on August 29th at 2pm ET

Do Androids Dream of Endpoint Management?

The first thing to note about managing Android is that historically, it was (and still is) a highly customizable operating system for manufacturers due to Google providing Android as an open source operating system —  allowing manufacturers could build atop the platform. Although an organization with a unified endpoint management (UEM) tool can manage all of its devices in one console through traditional Device Administrator API’s (introduced in Android 2.2) — from Samsung, to Motorola, to LG, to OnePlus, to Google’s own Pixel and beyond — each different piece of hardware came with its own take on the Android OS and introduced its own set of considerations.

As enterprises began adopting Android, each manufacturer created custom application programming interfaces (APIs) for their platform that could be managed, creating a less-than-cohesive overall user experience — especially for companies that had adopted a bring-your-own-device (BYOD) policy or provided employees multiple flavors of corporate Android devices.

This all changed in 2014, when Google decided it was time to consolidate Android management. With the release of Android 5.0 Lollipop, manufacturers were given the option — originally called Android for Work, now Android Enterprise — to include additional APIs from Google that would provide a level of uniformity across devices.

Some manufacturers did not immediately integrate this new functionality. In 2016, Android made its enterprise-ready capabilities a standard addition to OS versions, beginning with 6.0 Marshmallow. Android’s breadth of enterprise-grade functionality included and still includes:

  • A self-contained work profile (Profile Owner) to isolate corporate applications from personal and BYOD devices;
  • A company-owned managed device (Device Owner) mode that can be set up exclusively for work use, only allowing for corporate applications and content;
  • A fully managed device with a work profile mode, also known as corporate-owned personally-enabled (COPE), intended for company-owned devices that are used for both work and personal purposes (available from Android 8.0+);
  • A dedicated device mode, also known as corporate-owned, single-use (COSU), to lock down devices to a limited set of apps for dedicated kiosk purposes;
  • Enterprise-only app approval and distribution mechanism to managed devices and managed profiles through Managed Google Play;
  • Out-of-the-box, zero-touch enrollment for any device running Android 8.0 and above; and
  • Automatic, mandatory device-level encryption.

The Future of Android Device Management

Android has aligned its platform to modern-day security best practices, so why haven’t all organizations adopted the cutting-edge configuration? Most organizations that adopt Android give users the flexibility of the container-like work profile, but transitioning into Profile Owner (PO) mode has typically been a time-consuming endeavor.

Historically, UEM platforms, while able to support all types of Android management, could not easily migrate an already-enrolled device from traditional Device Admin management and enroll into modern Android Enterprise management. The process included unenrolling then re-enrolling with a code specific to the management platform — all done one device at a time, unless previously provisioned by a carrier or managed service provider.

Many organizations simply do not know the shortcuts that now exist to move hundreds or thousands of devices to the new format. And with Google recently announcing the deprecation of several APIs in the legacy Device Admin mode upon release of Android Q, now’s the time to get in the know.

The goal of an effective UEM platform must be to strike a balance between security and productivity. Android strikes that balance with its work profile, challenging management vendors to follow suit and provide a secure, convenient way for a business to quickly provision large fleets of devices in PO mode — out of the box and with minimal admin involvement.

An Android Enterprise Recommended solution, IBM MaaS360 with Watson, announced a new migration tool aimed at smoothly transitioning Android devices in Device Admin mode to PO mode to get ahead of Android Q. Check out the migration tool for yourself in the MaaS360 Knowledge Center and join IBM and Google on August 29 at 2 p.m. to learn from the experts about Android Q and how MaaS360 addresses modern Android management.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today