Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices
Internet of Things and Cloud Computing
Volume 2, Issue 4, August 2014, Pages: 26-31
Received: Sep. 5, 2014; Accepted: Sep. 26, 2014; Published: Oct. 30, 2014
Views 3136      Downloads 210
Valerie Garises, IT Factory, Telecom Namibia, Windhoek, Namibia
Jameson Mbale, Copperbelt University, Department of Computer Science, Kitwe, Zambia
Article Tools
Follow on us
In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and authorization, boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security. In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).
Bring Your -Own Device (BYOD), Enterprise Mobility (EM) ,TNEMA, Mobile Device Management (MDM), Integrated Architecture
To cite this article
Valerie Garises, Jameson Mbale, Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices, Internet of Things and Cloud Computing. Vol. 2, No. 4, 2014, pp. 26-31. doi: 10.11648/j.iotcc.20140204.12
Basole, R.C., (2008). Enterprise mobility: Researching a new paradigm. Information Knowledge Systems Management 7 (1). IOS Press
Basole R. C., (2007). Strategic planning for enterprise mobility: A readiness-centric approach. Keystone, CO, USA, Association for Information Systems.
Ernst and Young. (2013). Bring your own device: Security and risk considerations for your mobile device program. Retrieved on 15 January 2014 from$FILE/Bring_your_own_device.pdf
Muneer S., Sharma C. (2008). Enterprise mobile product strategy using scenario planning. Information Knowledge Systems Management 7, 211–224. IOS Press
Price Water house Coopers. 2010. Bring your own device: Agility through consistent delivery. Retrieved on November 2013 from
MTC (2013, March 27). MTC Namibia celebrates strong annual results; positions for 2012. Windhoek. Namibia
Tao, J. & Chen, X., 2010. Web Service Based Enterprise Mobile Information System. Nanjing, Jiangsu, China, IEEE Computer Society, pp. 320-323.
Kakihara, M., & Sørensen, C. (2002). Post-Modern Professionals Work and Mobile Technology. In Proceedings of the Paper presented at the New Ways of Working in IS: 25th Information Systems Research Seminar in Scandinavia (IRIS25)
Krishnan, S. (2013). Enterprise mobility putting people first. Retrieved on 3rd December 2013 from‎
World Bank (2011). World Development Indicators (WDI) database. Washington, DC: Author.
Kornak, A., Teutloff, J., Welin-Berger, M. (2004). Enterprise Guide to Gaining Business Value from Mobile Technologies. John Wiley & Sons.
Leedy, P.D., and Ormrod, J.E., (2010). Practical Research: Planning and Design, 10th Edition: New Jersey, USA.
Maree, K., (2007). First Steps in Research, Pretoria, Van Schaik Publishers.
Kietzman, J., Planggera, K., Eaton, B., Heilgenberg, K., Pitt, L., & Berthon, P., (2013). Mobility at work: A typology of mobile communities of practice and contextual ambidexterity. Journal of Strategic Information Systems. 3, 1-2
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
Tel: (001)347-983-5186