The global COVID-19 pandemic has stimulated the transformation of many industries (Gifford, 2022). As thousands of workers were unable to reach their offices due to strict lockdowns, their employers had to fully embrace the concept of remote work. It is expected to change the future of employment through further development of the gig economy and various forms of flexible arrangements. Similarly, the inability of patients to reach hospitals has led to the advancement of telemedicine (Kichloo et al., 2020). Event traditional providers such as the NHS in the UK are presently developing their Technology Enabled Care Services allowing users to get consultations in a remote format. The aforementioned advantages of remoteness and flexibility are highly beneficial for individuals and organisations. They allow both parties to minimise waste and speed up the workflow through ongoing optimisations of business processes. This essay aims to analyse such a solution called Mobility XE (NetMotionSoftware, 2023a) within the scope of the benefits of mobility xe it creates for its users and potential barriers to its deployment.
Key Implications of Remote Access to Sensitive Data
According to multiple security experts, remote access to potentially sensitive data is a major problem in a variety of settings (Borkovich and Skovira, 2020). In an organisational environment, confidentiality and integrity are ensured by proper mechanisms and procedures limiting the access of third parties to valuable information. On the contrary, clients and workers accessing such data from their homes can violate most established procedures in this sphere. Potential vulnerabilities include the use of public Wi-Fi spots, the lack of virus protection measures, the use of shared computers for accessing sensitive information, the absence of proper password management, and other similar activities (Malecki, 2020). Many persons may be violating cybersecurity rules due to a lack of knowledge and skills in this sphere. However, this still results in situations when the integrity, safety, and confidentiality of sensitive information can be compromised and such information can be accessed and used by third parties. With that being said, remote work, telemedicine, and other similar scenarios of remote access to data clearly represent popular trends that will continue their development in the 2030s (Ng et al., 2021). This substantiates the need for advanced solutions improving cybersecurity levels in these spheres.
Another problem in this sphere is the need to maintain internal company networks across a variety of devices, operating systems, and geographical locations (Temple and Sariyar, 2022). Contemporary organisations frequently operate in multiple countries with some workers belonging to the international workforce and performing their tasks from anywhere. Similarly, company clients can move freely and want to continue using their paid services while going on vacation. Effectively, the users of such products as telemedicine see this global connectivity as the key benefit due to the capability to receive quality support anywhere without language barriers or time zone limitations. This poses a challenge since many services are provided via mobile applications (Lueck, 2020). On the one hand, many developers are gradually adopting a smartphone-first mentality following the global growth of portable device users. On the other hand, such solutions frequently show poor performance in mobile environments where Internet connectivity may be far from optimal and networks may be slow. In the case of high ping rates or interruptions, remote access solutions can break sessions due to security reasons. This creates inconvenience for workforce members working from all over the world or clients trying to get paid services as soon as possible.
Mobility XE Overview
Mobility XE is a specialised product that is presently used by 670,000 users worldwide (NetMotionSoftware, 2023a). Its primary application is the creation of secure remote access networks that combined the maximum convenience of end customers with the highest possible levels of cybersecurity on the server side. This approach is different from traditional solutions distributing security protection measures between users and companies providing services. Network administrators get control of network endpoints and provide continuous delivery of services even in the case of changing network conditions (NetMotionSoftware, 2023b). From a practical standpoint, this means that users can log into their accounts from different devices and locations and stay logged in even in the case of connection interruptions. For remote workers and customers, this creates a seamless experience reducing the need for multiple sessions. Any interruptions in wireless networks’ availability do not terminate their previous connections and keep them logged in. This may be highly convenient for operating within corporate accounts and working on some shared documents or projects that will not save changes in the case of network failures on the user side.
Potential Benefits of the Mobility XE for Its Users
The analysis of the Mobility XE solution has highlighted a number of benefits offered by it that may be highly convenient for its users in the case of its deployment (NetMotionSoftware, 2023a). First, the end customers can access company networks via any device and channel including LAN connections, Wi-Fi connections, and wide area networks. This increases their convenience and reduces barriers to the adoption of remote work arrangements (Kshetri, 2021). Many users faced technological challenges when working from home during the global pandemic. Hence, these improvements can be crucial for companies willing to maximise the performance of their remote workforce and decrease the time and effort required for integrating remote workers into company workflows. Second, the established connections are renewed once per 24 hours (NetMotionSoftware, 2023b). This ensures that no data is lost due to interruptions caused by applications being unable to access the network at times. This continued log-in status is highly beneficial for remote workers connected via slow Wi-Fi spots or 2G/3G mobile providers.
Third, Mobility XE is developed with a mobile user in mind (NetMotionSoftware, 2023a). This implies that it is inherently compatible with smartphone-first customers of modern firms. From a deployment perspective, this ensures a superior user experience since clients can use their own devices in a natural way without multiple log-in prompts. A 24-hour session allows them to solve most of their needs in a convenient manner as opposed to alternative solutions requiring new complex authorisation procedures every time a connection gets interrupted. From a commercial standpoint, this poor user experience can be a deal-breaking element within the scope of the technology acceptance model (TAM) based on perceived ease of use and perceived usefulness (Shah et al., 2020). Fourth, Mobility XE provides full control over all traffic in any combination of 2G/3G/4G networks as well as any other channels used by companies and individuals. This means that any security measures, monitoring solutions, and information analysis tools can be deployed in a uniform manner. For companies, this substantially reduces the risks of data breaches, data integrity issues, and data theft or loss (Okereafor, 2021). While end users may not pay sufficient attention to proper cybersecurity measures at all times, this role is taken by Mobility XE that has the same EAL4+ certifications in this sphere as Cisco. As a result, its systems control all network traffic in an end-to-end manner excluding the need to monitor individual networks and devices.
Fifth, full control over all end-to-end traffic within the company network allows network owners to filter traffic and eliminate certain types of information from slow networks (NetMotionSoftware, 2023b). These optimisations can be custom-shaped for individual modules to prioritise some of them or control bandwidth costs for individual users or employees. This functionality is also crucial for setting up access right levels and ensuring that remote workers cannot access some critical network nodes or databases. This facilitates scalability since new users can be connected on the basis of pre-defined profiles to speed up their onboarding process (Neeley, 2021). Sixth, high levels of compliance with strict industry regulations and certifications make Mobility XE suitable for spheres where customer data anonymity and integrity must be protected at all costs. Such areas include payment systems, hospital registration systems, telemedicine platforms, and educational platforms (Clinton, 2022). In all of these cases, compromised consumer data can ruin a company’s reputation and lead to criminal prosecution. At the same time, regular users rarely observe cybersecurity procedures and are often annoyed with complex log-in processes disrupting their utilisation of products and services. The use of advanced solutions controlling all traffic within multiple networks allows the company to deploy such solutions to provide a superior user experience while also complying with strict industry standards such as HIPAA.
Finally, Mobility XE has an embedded VPN solution that can be used for security purposes (NetMotionSoftware, 2023a). On the one hand, it allows remote customers and employees to access company networks while maintaining their privacy. This can be highly useful in such countries as China where local governments attempt to control and analyse all traffic. VPN solutions also offer increased protection from hackers by making it difficult for them to track user activities (Jahankhani et al., 2021). They make it possible to use public Wi-Fi networks since all user data is encrypted, which makes fake wireless access point (WAP) attacks ineffective. On the other hand, the use of VPNs may be necessary for accessing service platforms from multiple global locations (Kuah and Dillon, 2021). Since many countries try to block certain resources, this may become a barrier to obtaining a first-grade customer experience in such spheres as telemedicine or remote education. With the VPN solution embedded within Mobility XE, clients can easily access any platform from any location. This further assists companies in developing a global reach and offering a seamless user experience in all scenarios.
Potential Barriers and Recommendations
The deployment and utilisation of Mobility XE in organisations handling sensitive consumer data may also be hindered by a number of barriers. First, the solution requires professional maintenance in order to set it up in strict accordance with applicable regulations (Dyer and Shepherd, 2021). For example, its utilisation in hospitals may require the introduction of data access rights and virtual boundaries. These measures are necessary to ensure that only a limited number of specialists can work on a certain task and access potentially sensitive information. Second, long-term log-in may increase cybersecurity risks, which requires the use of advanced monitoring and traffic analysis solutions (Daimi and Peoples, 2021). If the company deploying Mobility XE overlooks these considerations, it may suffer from higher risk profiles in this sphere. Third, end users may require additional training to fully utilise the benefits offered by this solution. This may be problematic in the case of a remote workforce or field workers.
With that being said, these potential barriers can be addressed using a number of recommendations to practitioners. First, they can use the free trial period of this software product to experience it first-hand and allow their information technology specialists to check its security and ease of use on a limited number of remote workers (Ghafoor et al., 2020). This will reduce potential resistance to its adoption and will help company managers ‘sell’ the paid subscription for this product to company owners due to tangible productivity improvements. Second, a simpler network structure may be beneficial for small and medium companies willing to standardise their operations and improve their safety. Reduced complexity makes it easier to monitor traffic patterns automatically and instantly respond to any potential threats. Third, guest networks and remote access connections from potentially problematic areas should be placed within isolated nodes facilitating their instant isolation (Patel and Doshi, 2018). While this measure may affect the workflow of some employees or the user experiences of some users, it will ensure that any potentially fraudulent activities can be promptly prevented through the separation of corresponding actors from sensitive data storage.
It can be summarised that the deployment and use of the Mobility XE solution may offer a number of benefits to practitioners working with sensitive data (NetMotionSoftware, 2023a). On the one hand, commercial organisations can use it to facilitate their cooperation with remote workers. Since this solution unifies multiple networks into a single environment, information technology specialists can continuously monitor all traffic and prevent potentially problematic activities (Clinton, 2022). At the same time, remote workers are not limited by ‘thin client’ functionality and can access their accounts and shared materials from any location, device or communication channel. On the other hand, the application of Mobility XE within client networks allows service providers to ensure a seamless user experience (NetMotionSoftware, 2023b). Consumers in such spheres as telemedicine, remote education or payment processing systems can avoid unnecessary authentication procedures and stay signed in even in the case of poor connection quality with high ping and multiple interruptions (Daimi and Peoples, 2021). They can also use such services from any location including countries banning the use of some international platforms due to government policies. Additionally, the use of the embedded VPN functionality protects remote workers and customers from hacker attacks by encrypting all traffic passing through public Wi-Fi networks or other potentially problematic channels.
Borkovich, D. and Skovira, R. (2020) “Working from home: Cybersecurity in the age of COVID-19”, Issues in Information Systems, 21 (4), pp. 1-13.
Clinton, L. (2022) Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, London: Kogan Page Publishers.
Daimi, K. and Peoples, C. (2021) Advances in Cybersecurity Management, Berlin: Springer.
Dyer, C. and Shepherd, K. (2021) Remote Work: Redesign Processes, Practices and Strategies to Engage a Remote Workforce, London: Kogan Page Publishers.
Ghafoor, K., Curran, K., Kong, L. and Sadiq, A. (2020) Security and Organization within IoT and Smart Cities, London: CRC Press.
Gifford, J. (2022) “Remote working: Unprecedented increase and a developing research agenda”, Human Resource Development International, 25 (2), pp. 105-113.
Jahankhani, H., Jamal, A. and Lawson, S. (2021) Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021, Berlin: Springer.
Kichloo, A., Albosta, M., Dettloff, K., Wani, F., El-Amir, Z., Singh, J., Aljadah, M., Chakinala, R., Kanugula, A., Solanki, S. and Chugh, S. (2020) “Telemedicine, the current COVID-19 pandemic and the future: a narrative review and perspectives moving forward in the USA”, Family Medicine and Community Health, 8 (3), pp. 1-20.
Kshetri, N. (2021) Cybersecurity Management: An Organizational and Strategic Approach, Toronto: University of Toronto Press.
Kuah, A. and Dillon, R. (2021) Digital Transformation in a Post-Covid World: Sustainable Innovation, Disruption, and Change, London: CRC Press.
Lueck, M. (2020) “GDPR in the new remote-working normal”, Computer Fraud & Security, 8 (1), pp. 14-16.
Malecki, F. (2020) “Overcoming the security risks of remote working”, Computer Fraud & Security, 2020 (7), pp. 10-12.
Neeley, T. (2021) Remote work revolution: Succeeding from anywhere, London: Harper Business.
NetMotionSoftware (2023a) “What Makes Mobility XE Different?”, [online] Available at: http://discover.netmotionwireless.com/rs/netmotionwireless/images/NetMotion-Wireless_Mobility-XE-Difference_PS.pdf [Accessed on 31 January 2023].
NetMotionSoftware (2023b) “Introduction to NetMotion Mobility XE”, [online] Available at: http://help.netmotionsoftware.com/support/docs/mobilityxe/950/help/wwhelp/wwhimpl/js/html/wwhelp.htm [Accessed on 31 January 2023].
Ng, M., Naranjo, A., Schlotzhauer, A., Shoss, M., Kartvelishvili, N., Bartek, M., Ingraham, K., Rodriguez, A., Schneider, S., Silverlieb-Seltzer, L. and Silva, C. (2021) “Has the COVID-19 pandemic accelerated the future of work or changed its course? Implications for research and practice”, International Journal of Environmental Research and Public Health, 18 (1), pp. 1-17.
Okereafor, K. (2021) Cybersecurity in the COVID-19 Pandemic, London: CRC Press.
Patel, C. and Doshi, N. (2018) Internet of Things Security: Challenges, Advances, and Analytics, London: CRC Press.
Shah, Y., Chelvachandran, N., Kendzierskyj, S., Jahankhani, H. and Janoso, R. (2020) “5G Cybersecurity Vulnerabilities with IoT and Smart Societies. Cyber Defence in the Age of AI”, Smart Societies and Augmented Humanity, 1 (1), pp. 159-176.
Temple, M. and Sariyar, M. (2022) “A systematic overview on methods to protect sensitive data provided for various analyses”, International Journal of Information Security, 21 (6), pp. 1233-1246.