This post was contributed by Wasif Syed, Sr. Presales Engineer at 42Gears, a Zebra Independent Software Vendor (ISV).
We come across the term “rugged devices” quite often. That’s because our world is driven by front-line workers who rely on rugged devices to get their jobs done and keep us happy as consumers. They’re running our healthcare systems, distribution and fulfillment centers, and friendly neighborhood grocery stores. So, what does the term “rugged devices” actually mean?
According to Zebra, “a device or a tablet that is designed and built specifically for hazardous situations and strictly conforms to rigorous industry or military standards” is called a rugged device. These devices are certified to tolerate the harshest of conditions caused by water, dust, drops and shocks, which is why we see rugged devices so commonly used in today’s enterprise environments (which include those grocery stores, hospitals and even entertainment venues).
Not every “rugged” device is a “rugged device,” though. And, no, just adding protective casing to a consumer device does not make it a rugged device. To be classified as a rugged device, equipment must comply with strict international standards. One of the two available classification methods is the Ingress Protection Rating System (EN 60529 (British BS EN 60529:1992)), also known as the IP rating of a device. These ratings grade specific features of a device – for example, the level of sealing effectiveness of a device against foreign materials such as water or dust. Devices must have a minimum rating of IP54 to be considered fully rugged.
So, why should an organization use rugged devices? According to Mark Thomson, Director of Retail and Hospitality Solutions, EMEA, Zebra, “manufacturers of consumer devices have a business based on planned obsolescence.” Whereas rugged devices are designed inside and out with their longevity in mind – with more battery power, security features, inherently rugged components, longer lifespans, and extended software support.
They are durable and reliable, designed to work in extreme conditions such as arid, humid, temperate or precarious environments. They can also withstand drops and shocks on hard surfaces such as a concrete floor in a warehouse. In addition, they can easily tie to external peripherals like radio frequency identification (RFID) readers, scanners or mobile printers to give employees a true mobile office experience.
But what’s perhaps most important to understand is how companies must deploy the rugged devices to capitalize on these features and fully empower the front-line workforce.
The Circle of Life(cycle) Management
Rugged devices are usually deployed in large quantities to accomplish a dedicated purpose. That is why it is important to ensure they…
1. are dedicated to serving a work-related purpose.
2. have all the required applications and content on them, and that employees can securely access these resources.
3. conform to pre-defined and trusted network settings.
4. can be monitored from a central command console so administrators can proactively manage device health, app or operating system (OS) updates, and remotely troubleshoot when required.
So, how do you secure, monitor and manage your rugged fleet of devices? The answer is simple: you rely on a good mobile device management (MDM) tool. They can provide support throughout the entire lifecycle of rugged devices, which can be summarized as a sequence of five phases:
- Enrollment: Bringing new rugged devices into your business network.
- Provisioning: Setting up initial configuration, security settings, apps, and content for your workforce to get started.
- Deployment: Getting provisioned devices in workers’ hands.
- Management: Monitoring devices for compliance, pushing app updates, and troubleshooting applications and performance issues.
- Retirement: Removing devices from the system once they reach end of life (EOL).
Let’s dig in deeper:
Enrollment: The process of enrolling a large quantity of devices into a management framework can be a daunting task, but it is an essential first step. Some rugged device original equipment manufacturers (OEM) provide staging tools that really simplify enrollment of new devices. Operating systems on rugged devices may also come with their own mass enrollment mechanism such as Google’s Zero Touch (Android™), or Microsoft’s Windows® Autopilot. You can leverage any of these available tools to quickly enroll your fleet of devices into an MDM.
Provisioning: Now that all your devices are enrolled into an MDM, it’s time to set them up with the right apps and content users will need. You will need to block user access from irrelevant apps and content. This is tedious to do by hand for any small organization, and effectively impossible for larger ones. Here is where you can rely on an MDM tool to push apps and content on your fleet of devices and define lockdown configurations along with network and system settings.
Deployment: This is a relatively straightforward process. Once devices are provisioned, you start deploying them to your workforce. At this stage, you must ensure devices have the appropriate security certificates installed and the correct network configurations setup.
*Your devices should be properly configured so that front-line workers can almost immediately start using them as soon as they are deployed.
Management: Once devices have been properly provisioned and deployed to your workforce, it is now time to manage those devices. This is (ideally) by far the longest phase of your rugged fleet’s lifecycle, as most rugged devices have a longer lifespan of five, 10, or 15 years. This is the phase when you ensure devices continue to be compliant, secure, up-to-date, data usage efficient, and functional for several years. If devices stop working, MDM tools will help you troubleshoot devices and, in most cases, resolve issues without having to send technicians onsite.
While managing your fleet of rugged devices, you may also want to integrate your MDM with Device Intelligence Services. Such tools provide data-driven and actionable insights that help you get the most out of your devices and workforce. These tools analyze historical data for trending and predictive intelligence - that's how you catch problems and are equipped with their resolutions before they even arise. Data intelligence tools also help executives analyze, plan and direct smoother operations.
Another part of this phase is seeing what options are available to further stretch out the lifecycle of your devices. Some OEMs provide a convenient way to receive extended security support and predictable periodic security updates as add-on services. What’s neat, is that you can use your MDM tool to push such updates onto your devices. These solutions, when combined, are beneficial in extending the lifecycle of your devices. After all, the goal is to extract the most out of your investment.
Retirement: When you are at a stage when it is getting difficult to keep devices secure and compliant because they are stolen or lost, physically damaged beyond repair or the OEM stops supporting them – this is when such devices have reached EOL, and it is now time to retire them.
Retiring a device does not necessarily have to mean retiring that device’s MDM license, though. That is why it is important to choose an MDM provider that allows for this flexibility. You can potentially reuse the same licenses for replacement devices as long as your MDM subscription is still active, which will save the cost of having to purchase additional licenses for those replacement devices. You may also want to purge any data that was on the devices before these devices are retired and pulled out of service. MDM tools provide a quick and easy way to wipe data off devices.
In conclusion, to boost productivity of the front-line workforce, IT teams need to focus on one core IT practice, which is managing all the devices the workforce depends on. MDM solutions can help you both manage your fleet of rugged devices, and manage other endpoints embedded in your ecosystem, like mobile printers, barcode scanners, RFID readers, and other crucial accessories. Using the right MDM solution will also help thwart all kinds of threats by making it easy to control access to sensitive workplace data, remotely troubleshoot device issues, augment workforce productivity and, above all, capitalize fully on your investment!