As part of today’s rapidly evolving mobile mindset, robust mobile applications in virtually all areas of life are providing us with an efficient combination of convenience, flexibility, and functionality.
Pivotal Mobile CRM on iPad & iPhone
In the case of CRM applications, we at Tokara Solutions are seeing more and more clients taking their powerful Pivotal CRM systems and going mobile, with quick and simple deployment to devices they already use and rely on. At the end of the day, the decision to ‘go mobile’ has been straightforward for most of them — eliminating the hassle of a laptop in the field means sales and customer service teams can travel light with mobile devices and achieve their goals (and the goals of the company) more quickly and easily.
For the past several blogs, we’ve looked at some of the benefits Pivotal for iPad and iPhone offers to users in the field. But we know one area that can pose a particular concern for companies offering this type of mobile access to their teams is security. Because corporate and customer data are invaluable in any organization, ensuring that data is only available to the individuals who need it (and have been granted access) is of paramount importance.
Pivotal Mobile CRM Devices, Safe & Secure
To address these concerns, we’ll start at the top. At a high level, Apple’s iOS natively prevents other applications from accessing information stored or cached by the Pivotal Mobile App. User credentials are encrypted using industry standard algorithms, and the iPad provides passcode policies that are able to be enforced and delivered over the air. In the event an iPad is lost or stolen, IT administrators are able to initiate a remote wipe command to ensure that data is erased and not accessible to anyone who should not have access to it.
On a more granular level, Pivotal has also included robust security controls within the Mobile App itself. Within the Customization System in the Pivotal CRM Mobile App, there are security groups; when any of these are expanded, they display ‘connection types’ for the security group in question. The connection type is critical because it determines whether and how users are able to connect to corporate/enterprise data.
Each connection type has permissions that define the level of access a user should have for various application components. While custom connection types can also be configured, each security group comes standard with connection types that include LAN, Client, Mobile, Web, Active Access, Extranet, Customer, Thin Client, and Device Client.
Using the Device Client as an example, permissions can be easily set up for application items such as tables, business objects, queries, search result lists, task pad, server tasks, device forms, graphs, portal items, and record linking. Within each of these groups, various forms of permissions are able to be granted or denied. For example, the security settings for tables include Create, Read, Modify, Delete, View Filter, Quick Search, and Full-text Search.
This high-level overview just skims the surface of security features Pivotal has implemented to make sure your data are safe and secure. If you’d like additional details about a specific area of security or a particular security feature within the Pivotal Mobile App, please don’t hesitate to contact us — we’re happy to help.
If mobile CRM is something your business might benefit from, or if you’d just like to know more about how our consultants can deliver any of this functionality to your business, please contact any member of our consulting team at email@example.com. We also encourage you to contact Tokara’s VP of Business Development, Mark Fillingim, directly at +1 972-719-0213.