By accepting you will be accessing a service provided by a third-party external to

Tip of the Week: How to Set Up Android Work Profiles

Tip of the Week: How to Set Up Android Work Profiles

How many of your employees have a personal device that they want to leverage in the workplace? There are a few ways that this can be enabled that doesn’t put your data at risk, and that don’t keep the employee from being able to use their device the way they want to as well. For today’s tip, we’ll explore how this can be accomplished - without undermining your business’ security.

When mobile devices first came on the scene, many companies would provide their employees with these devices in order to facilitate remote work. In 2011, the Pew Research Center conducted a survey of United States adults to gauge smartphone ownership. At that point, about 35 percent had one. Eight relatively short years later, and that number has increased to around 81 percent. With personal smartphones now in the majority of pockets, it’s understandable that most people don’t really relish the thought of carrying around a second one for work purposes.

Another survey came to the conclusion that, while at work, 70 percent of employees keep their phones in sight. So, why do only 59 percent of businesses - not an insignificant number, granted, but still fewer than one would expect - allow the use of personal smartphones for work purposes? There’s tension on both sides in this case: with the employee, who doesn’t want to sacrifice their freedoms with their device, and with the employer, who has their data security to consider.

Differentiating Between Data Types

The Android platform began offering work profiles to devices running Android 7.0 Nougat - something that many businesses and end users alike haven’t realized. These work profiles effectively allow a user to differentiate between work resources and data and their own work resources and data. Users would even have second copies of applications installed, annotated with a special icon. Data is kept separate, period.

However, while these work profiles are secure, some employees may still be hesitant to utilize them. One of the biggest obstacles to Bring Your Own Device implementations comes from the reluctance many employees have to hand over access to their device. Many employees are uncomfortable with the thought of their boss having the authority to access the contents of their smartphone, yet hand over the same authorizations to applications and the corporations that run them without a second thought.

Despite this skepticism (of which there will almost assuredly be some), there are considerable benefits your business can embrace by establishing work profiles, including boosts to productivity and security.

How to Set Up Android Work Profiles

The majority of work profiles are set up through Google Mobile Management for Android. The setup process also has a few additional requirements - the device in question must be running Android 5.1 or newer, and users must have whitelisted apps in the managed Play Store.

In the Settings app, go to Management > Devices > Search and select devices. From there, open a work profile installation wizard from Managed Google Play. Once you’ve made it that far, select Create managed Google account/work profile. Finally, confirm it by selecting Create.

Need some other tools and handy tricks to help your business succeed? Reach out to us! Give BNMC a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 05 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Malware Business Efficiency Communication Google Small Business Data Workplace Tips IT Services IT Support Mobile Devices Hardware Cloud Computing Tech Term Internet Managed IT Services Data Recovery Innovation Backup Ransomware Smartphone Outsourced IT Users Windows Smartphones Upgrade Android Mobile Device Saving Money Data Backup Miscellaneous Microsoft Office Business Management Disaster Recovery VoIP Server Facebook Phishing communications Information Windows 10 Business Continuity Browser Productivity Cybersecurity Office 365 Managed IT Services Social Media Network Windows 10 Passwords Data Management Internet of Things Word Vulnerability Remote Monitoring Gadgets Gmail App Infrastructure Mobile Office Encryption Apps Chrome Managed Service Artificial Intelligence Quick Tips Money IT Support BYOD Tip of the week Information Technology Save Money Networking Settings Managed Service Provider Employer-Employee Relationship Analytics Access Control Remote Workers VPN Virtual Reality Applications Router Website Company Culture Unified Threat Management Office Tips Display WiFi Avoiding Downtime Big Data Collaboration Firewall Antivirus Development Maintenance Google Drive Employee-Employer Relationship Content Filtering Robot Bandwidth HIPAA Automation BDR Apple Education IT Management Data Security Storage YouTube Paperless Office Virtual Private Network Government Hacker Data storage Risk Management Computers Data loss Computing Augmented Reality Telephone Systems Outlook Retail Alert MSP Spam Laptop Bring Your Own Device Operating System Two-factor Authentication iOS Managing Stress desktop LiFi Social Managed IT Service The Internet of Things Hosted Solution Customer Relationship Management Scam Humor Vendor Management Best Practice Monitors Conferencing Administration Document Management Mouse Chromebook Downtime Managed Services Break Fix Marketing Search Wireless Solid State Drive Going Green Mobile Security OneNote End of Support Data Breach Training Business Technology Server Management Remote Computing Windows 7 Hard Disk Drive Printing IT Touchscreen Software as a Service Business Intelligence Password Social Network SaaS Managed IT Wi-Fi Tablet Holiday Virtualization IoT Solid State Drives Remote Work VoIP Unified Threat Management Dark Data Update Buisness Mirgation Shortcuts Recycling Mobile Management Shortcut Distributed Denial of Service Monitoring Payment Card Firefox Superfish Sports Streaming K-12 Schools Processor Alt Codes Bluetooth Comparison Virtual Desktop Cookies Employee-Employer Relationships Politics Computing Infrastructure Troubleshooting Professional Services Business Analysis Digital Payment Social Networking Hybrid Cloud Logistics Address Permissions Spying Star Wars National Security Digital Budget User Error Customer Service Chatbots Security Cameras eWaste Profiles Disaster Patch Management Work/Life Balance Inventory Health Private Cloud Wearable Technology Human Error Network upgrade Memory Typing Specifications Office Samsung Analysis Nanotechnology Students Tech Support Alerts USB Virus Heating/Cooling Multi-Factor Security Motherboard Scalability Cables Current Events Asset Management Fraud Cost Management Updates Spyware Peripheral Time Management Printer Identity Continuity Utility Computing Uninterrupted Power Supply Cybercrime Shadow IT Device Smart Office Reducing Cost File Sharing Cryptocurrency Black Friday Social Engineering Screen Reader Mixed Reality Charging Computer Care IBM Emergency Websites Licensing LED Dongle Threats Google Docs Servers Google Calendar Migration Wires Consulting IT solutions Memes PowerPoint Assessment Identity Theft Network Management Laptops Solar Hacks Dark Web Corporate Profile Google Wallet Gamification Mobility Work Batteries Bitcoin Cyber Monday Safety Smart Tech Halloween Cooperation Co-Managed IT Service Level Agreement Automobile Business Growth Legislation Voice over Internet Protocol G Suite Hotspot Onboarding Internet Exlporer GDPR Legal SharePoint Network Congestion Compliance Managed Services Provider Dell Microsoft Excel WannaCry Unified Communications Drones COVID-19 Techology IT Technicians Print Toner Optimization Myths Cabling Windows 8 Smart Technology Slack Connectivity Hard Disk Drives Holidays How To Lenovo Scary Stories Staff Content Leominster Huawei Google Maps Statistics Writing Modem Messaging FinTech Running Cable Language Digital Signage Value Data Warehouse Deep Learning Downloads Regulations Entertainment Vendor Mobile Device Management Distribution Mail Merge Blockchain GPS Computer Repair Relocation IT Consultant Mobile Data Cameras Mobile Computing Tracking Recovery Meetings How To Cleaning Printers Black Market CCTV Webcam Law Enforcement Electronic Medical Records Notifications Physical Security Error Twitter Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Regulation Personal Information Botnet Financial Supercomputer CrashOverride Cortana 3D Printing Staffing Motion Sickness Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3