Solved

Manage Employee Cell Phones / Mifi Usage and whats taking up the Data

Posted on 2014-02-04
2
1,134 Views
1 Endorsement
Last Modified: 2014-03-10
I currently have about 200+ phones that I'm managing through the Company. We are with Verizon and have a great plan.

However the reports and current usage monitor on there site isn't really detailed out. Like I can see the Date and Time and Usage for a single Phone or Mifi device but it doesn't tell me what chewed up that Data.

So I'm wondering if any other IT guys/gals out there know of a great solution to actually track what these devices are doing to chew up all this data. I've had one employee around 12 - 15GB of data a month but when asked why, the response is that he is only using it for company things. I can't believe that because I average around 2 - 4GB of data and I do tons on my phone but I don't stream netflix or listen to pandora, etc.... But I still use my phone a ton for Data things.

I've looked into Stealth Genie and that might work but is there anything else that can track websites visted or apps that chew up data that I can monitor from the cloud or website so the employee doesn't know they are being tracked? I want to call them out as liars but I cannot do that if I don't have proof.

Thank you
1
Comment
Question by:Neogeo147
2 Comments
 
LVL 2

Accepted Solution

by:
Computer Egghead earned 250 total points
ID: 39845723
Require all employees to install software such as Onavo Count and to submit their reports to you on a monthly basis.  Put in writing as a company policy that all personal usage is not allowed and a monthly report is required.  If they do not comply, formally write them up with a warning stating that if it happens again, they are fired.
0
 
LVL 14

Assisted Solution

by:Geisrud
Geisrud earned 250 total points
ID: 39903792
Not an automated solution, but under Settings > Cellular you can see the cellular data usage on a per app basis.

But, as Computer Egghead mentioned, you should have an acceptable use policy in place, which details in the standard what acceptable use is, penalties for non-compliance, etc.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

With mobile becoming increasingly important to the business world, it is in your best interest to make sure that your email signature looks great across all types of devices. Find out how to create a mobile email signature with this guide.
If your app took Google’s lash recently, here are the 5 most likely reasons.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now