TEMIA and Wireless Analytics hosted a webinar on Wednesday that helped participants understand their options when choosing an MDM supplier. Attendees were able to learn more about their options for MDM providers, BYOD programs and other issues that are key to mobilizing an enterprise’s workforce. Here are five key MDM considerations Erik Eames, managing director and Fernando Oliveira, VP of client services, shared with webinar attendees.
Streamlining Python Development: A Guide to a Modern Project Setup
Temia Mobile Device Management Webinar 03 21-12
1. Thinking about an MDM
Solution…Now What?
Wednesday, March 21, 2012
11:20AM - Noon EDT
www.temia.org
The views expressed in this presentation are meant to reflect the majority of our
members, but they may not be reflective of all members.
4. Today’s Speakers
Erik M. Eames Fernando M. Oliveira
Managing Director VP of Client Services
Wireless Analytics Wireless Analytics
978-762-0900 x111 office 978-762-0900 x115 office
603-817-6300 cell 978-360-1040 cell
eeames@wirelessanalytics.com foliveira@wirelessanalytics.com
4
5. About TEMIA
n The purpose of TEMIA is to promote the value of TEM
through education and marketing
n TEMIA’s mission is to expand the size of the TEM market
globally and develop open industry standards to augment
service quality and performance
n Members work together for growth of the industry while still
competing for business
5
6. Mobile Device Management
n The explosion of mobile devices and operating systems
have changed the rules of the game for the enterprise.
q Device Management
q Device Security
q Employee Mobile Productivity
q Device Provisioning
q Ongoing Mobility Support
n Companies that offer MDM solutions have multiplied as
smartphones have flooded the enterprise.
AirWatch
Good
Technology
Mobile
Iron
Blackberry
Enterprise
Server
HP
Mobiquant
Technologies
Boxtone
IBELEM
NoDfy
Technology
Capricode
JAMF
SoIware
Pointsec
Mobile
Security
CommonTime
Kaspersky
Odyssey
SoIware
Dell
LANDesk
Smith
Micro
SoIware
Excitor
MaaS360
SOTI
F-‐Secure
Mcafee
Sophos
Mobile
Control
FancyFon
SoIware
MicrosoI
Exchange.
Sybase
Afaria
Fixmo
MformaDon
Symantec
Fromdistance
Mobile
AcDve
Defense
Zenprise
6
7. Selecting An MDM Solution
n What is Mobile Device Management?
q It is more than just a piece of software
q Enterprises need to approach an MDM Strategy from a holistic
approach:
• Mobile Visibility – beyond security
• Device Management – beyond remote wipe
• Reporting – beyond active directory
• Cost Management – beyond MDM license costs
• Help Desk Support – beyond connectivity
• Policy Management – beyond compliance
• MDM should address the complete security and oversight
of a device inside an organization from selecting new
devices, to provisioning, securing and managing existing
devices, and finally to decommissioning end-of-life
devices.
7
8. People, Process, Technology
To develop and implement a successful MDM program, one
should identify the key people, process and technology
needed within your organization.
8
9. Level of Effort with MDM Solution
Mobile IT Resource Requirements
q The resources required to run a mobile IT offering are different
from the resources traditionally required to run a desktop service.
q Mobile devices have little in common with desktop systems both
in terms of technology, features, and user experiences.
q Mobile device expertise and skills are essential to deploying a
successful MDM program.
q The roles recommended for successful enterprise-grade mobile
IT services are listed below:
• Mobile System Engineer
• Mobile Device Expert
• Mobile Security Expert
• Mobile Applications Developer
9
10. Level of Effort by Device OS
Platform/Devices Strengths Weaknesses Outlook
Slow in reaching OS parity w/ • Has suffered a dramatic loss
Offered by all US and international carriers competitors in market and mindshare.
In competition w/ Apple, Google, • Recent device and OS7
BES/Security and Microsoft release has narrowed the gap
RIM: Blackberry
QNX Migration is risky and between Apple and Android.
Device Pricing "jerky" • The upcoming migration to
QNX will be critical for the
User Friendly Keyboard, BMI Playbook has been a flop platform.
Hardware and Software Design and
Features Apple is overly controlling
Clear OS & Device Strategy Limited Device Selection
• Meets most enterprise
Apple: iOS Minimal Malware requirements.
Security Encrytion. App Security.
Offered by all US and international carriers
Hardware and Software Design and Has not met most security • Has surpassed Apple in
Features requirements innovation and time to market.
Open model has lead to • Androids openness has been
Relatively unified phone and table strategy increase in Malware it's strength (and it's
weakness (malware, OS
Google: Android Multiple Device Types, sizes, shapes, etc OS and UI Fragmentation fragmentation, no "corporate
Offered by all US and international carriers standard" device.
App availability and minimal App • At this time Google has not
requirements articulated a strategy to
overcome corporate security
4G Support concerns.
Has met most enterprise security • The slowness to market, lack
requirements of carrier support, and
Microsoft: Windows
Innovative Software Design Limited Carrier Support Microsoft's lack of enterprise
Phone 10
strategy have so far made
12. MDM Deployment Process
n A successful MDM implementation should follow a careful
device deployment process.
MDM
Deployment
Process
Build Roll-Out Sustain
Device/OS Selection Device Provisioning End-user Management
Solution Testing Device Registration and
Device Retirement
MDM Choice/Approval Configuration
q The Build and the Roll-Out phases are important, but the Sustain
phase will determine the program success
q The solution should allow IT to configure, monitor, and control data
& access on multiple OSs and devices
12
13. Stakeholders & Resources
Es;mated
Time
Stakeholder
Responsibili;es
Commitment
Execu;ve
• Secure
adequate
funding
for
the
program
Sponsor
• Free
up
organiza;onal
resources
as
necessary
• Ensure
stakeholders
stay
engaged
• Approve
business
requirements
and
proposed
solu;on
• Develop
business
plan
and
jus;fica;on
Legal
• Iden;fy
and
resolve
regulatory
compliance
gaps
and
issues
• Determine
corporate
vs.
employee
liability
for
devices
and
data
• Review
new/revised
policies
and
end
user
agreements
Human
• Create/revise
privacy,
en;tlement,
and
acceptable
use
policy
and
end
user
agreements
Resources
• Produc;vity
and
efficiency
improvements
• Recruit
staff
needed
to
develop/maintain
the
BYOD
program
• Handle
internal
communica;ons
and
marke;ng
of
the
program
Finance
• Develop
reimbursement/s;pend
policy
• Develop
plan
for
telecom
expense
management
• Nego;ate
with
carriers
on
pooled/discounted
rates,
early
termina;on
fee
waivers,
upgrade
allowances,
number
por;ng,
unlocked
devices,
interna;onal
roaming
rates,
value
added
services,
bill
on
behalf
of,
account
management
IT
Security
• Determine
device
security
requirements,
including:
§ Encryp;on
§ Password
policy
(PIN,
;meout,
allowed
failed
aXempts)
§ Remote
wipe
§ Security
policy
configura;on
and
enforcement
§ Data
protec;on
(data
loss
preven;on,
data
separa;on,
data
classifica;on,
digital
rights
management)
§ Policy
enforcement
(no;fy
user,
suspend/revoke
access,
remove
corporate
data,
disciplinary
ac;on
(with
HR))
IT
Opera;ons
• Monitor
costs
to
ensure
program
meets
cost
maintenance
or
reduc;on
goals
• Provide
;ered
service
offerings
• Determine
Help
Desk
vs.
end
user
responsibili;es
• Provide
training
for
Help
Desk
and
end
users
13
A Successful MDM Program Requires Coordinating Among Many Stakeholders
14. MDM Implementation Checklist
OrganizaDonal
Commitment
Please
place
an
'x'
in
the
appropriate
column
Strong
Moderate
Weak
Non-‐existent
Comments
Execu;ve-‐level
sponsorship
Key
stakeholder
(decision-‐makers)
commitment
to
project
Stakeholder
consensus
on
goals
Stakeholder
agreement
to
balance
security/cost
concerns
with
end
user
experience
Technical
literacy
of
workforce
IT
Readiness
Please
place
an
'x'
in
the
appropriate
column
Ready
Planned
None
N/A
Comments
IT
Resources
Device
experts
Device
tes;ng
Sufficient
Staffing
Please
place
an
'x'
in
the
appropriate
column
Ready
Planned
None
N/A
Comments
MDM
Implementa;on
Design
infrastructure:
<list
name(s)>
Implement
infrastructure:
<list
name(s)>
Exchange
Administrator:
<list
name(s)>
Network
Administrator
(FW
and
LB):
<list
name(s)>
PKI
and
Cer;ficate
Administrator:
<list
name(s)>
Design
processes:
<list
name(s)>
Documenta;on:
<list
name(s)>
Communica;ons:
<list
name(s)>
Training:
<list
name(s)>
Opera;ons
and
maintenance:
<list
name(s)>
Develop
and
implement
device
lifecycle
process
Wireless Analytics, LLC
Develop
and
implement
new
Help
Desk
processes
14
15. MDM Program Implementation
n End-user communication is critical to program success
q Welcome letter introducing the program to users.
q Copy of the End User mobile device agreement.
q Getting started instructions with a basic device tutorial and links
to online training resources.
q Registration instructions for connecting devices to corporate
resources and configuring security.
q FAQ and support guide for troubleshooting common problems
with links to support resources.
15
16. Mobile Security Policy
n It is important to review, update and communicate all
critical aspects of an enterprise security policy when
implementing an MDM solution
q Device Security Policy
q Encryption Security Policy
q PIN Lock Policy
q Application Security Policy
q End-user Policy Awareness and Training
16
17. Mobility Strategies
n Bring Your Own Device (BYOD)?
q User preferences are starting to dictate device choice
• Device capabilities, functions and applications
• Needs to be flexible and adaptable to new solutions
• High service availability
• Protect Intellectual property and litigation rights to equipment
• Minimize operating costs
q Cost of ownership is higher than expected
• Infrastructure needed
• Upgradability
• Scalability
• Single point of failure
• Device support
• MDM solution must meet the needs of the both IT and the employees
q Application management becomes more important
• App Design and Governance
• Apps not appropriate on personal devices for security reasons
• Policies will vary as will user expectations
• User prohibited from social apps on corporate device
• User will NOT accept that type of policy on personal device
17
18. Summary - Best Practices
n Best practices for creating a successful MDM program
should address a broad spectrum of challenges in order
to increase program success:
q Balance
security,
compliance,
legal
liability,
and
cost
concerns
with
a
posi;ve
user
experience
q Engage
stakeholders
early
and
keep
them
involved
throughout
the
project
so
that
decisions
can
be
made
in
a
;mely
fashion
q Acquire
and
test
all
devices
and
OSs
you
are
considering
and
only
allow
those
that
meet
your
requirements
q Build
a
team
of
experts
that
can
support
all
aspects
of
the
program
–
from
implementa;on
to
ongoing
maintenance
q Measure
and
demonstrate
the
results
and
value
of
the
MDM
program
to
the
business
and
on
the
boXom
line.
18
21. Join TEMIA for Future Webinars
n Plan Globally, Deliver Locally: Finding the Smart Balance
for Your Organization’s International Mobile and Fixed
TEM Needs Register: http://tiny.cc/9i1hbw
n Participate in our Brief survey on billing:
Enterprise: http://tiny.cc/czw3aw
Solutions Providers: http://tiny.cc/42ehbw
n Learn More About Our Webinars Online
21