SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Thinking about an MDM
               Solution…Now What?

                Wednesday, March 21, 2012
                  11:20AM - Noon EDT
                             www.temia.org


The views expressed in this presentation are meant to reflect the majority of our
           members, but they may not be reflective of all members.
TEMIA Member Companies
Today’s Speakers
n    Joe Basili
n    Managing Director, TEMIA
n    joebasili@temia.org




                                      3	
  
Today’s Speakers




Erik M. Eames                  Fernando M. Oliveira
Managing Director              VP of Client Services

Wireless Analytics             Wireless Analytics

978-762-0900 x111 office       978-762-0900 x115 office

603-817-6300 cell              978-360-1040 cell

eeames@wirelessanalytics.com   foliveira@wirelessanalytics.com

                                                                 4	
  
About TEMIA
n    The purpose of TEMIA is to promote the value of TEM
      through education and marketing
n    TEMIA’s mission is to expand the size of the TEM market
      globally and develop open industry standards to augment
      service quality and performance
n    Members work together for growth of the industry while still
      competing for business




                                                                5
Mobile Device Management
n    The explosion of mobile devices and operating systems
      have changed the rules of the game for the enterprise.
      q       Device Management
      q       Device Security
      q       Employee Mobile Productivity
      q       Device Provisioning
      q       Ongoing Mobility Support
n    Companies that offer MDM solutions have multiplied as
      smartphones have flooded the enterprise.
        AirWatch	
  	
                               Good	
  Technology	
  	
             Mobile	
  Iron	
  	
  
        Blackberry	
  Enterprise	
  Server	
  	
     HP	
  	
                             Mobiquant	
  Technologies	
  	
  
        Boxtone	
  	
                                IBELEM	
  	
                         NoDfy	
  Technology	
  	
  
        Capricode	
  	
                              JAMF	
  SoIware	
  	
                Pointsec	
  Mobile	
  Security	
  	
  
        CommonTime	
  	
                             Kaspersky	
  	
                      Odyssey	
  SoIware	
  	
  
        Dell	
  	
                                   LANDesk	
  	
                        Smith	
  Micro	
  SoIware	
  	
  
        Excitor	
  	
                                MaaS360	
  	
                        SOTI	
  	
  
        F-­‐Secure	
  	
                             Mcafee	
  	
                         Sophos	
  Mobile	
  Control	
  	
  
        FancyFon	
  SoIware	
  	
                    MicrosoI	
  Exchange.	
              Sybase	
  	
  Afaria	
  
        Fixmo	
  	
                                  MformaDon	
  	
                      Symantec	
  	
  
        Fromdistance	
  	
                           Mobile	
  AcDve	
  Defense	
  	
     Zenprise	
  
                                                                                                                                   6
Selecting An MDM Solution
n    What is Mobile Device Management?
      q    It is more than just a piece of software
      q    Enterprises need to approach an MDM Strategy from a holistic
            approach:
      •     Mobile Visibility – beyond security
      •     Device Management – beyond remote wipe
      •     Reporting – beyond active directory
      •     Cost Management – beyond MDM license costs
      •     Help Desk Support – beyond connectivity
      •     Policy Management – beyond compliance
•     MDM should address the complete security and oversight
      of a device inside an organization from selecting new
      devices, to provisioning, securing and managing existing
      devices, and finally to decommissioning end-of-life
      devices.

                                                                           7
People, Process, Technology
To develop and implement a successful MDM program, one
should identify the key people, process and technology
needed within your organization.




                                                    8
Level of Effort with MDM Solution
Mobile IT Resource Requirements
 q    The resources required to run a mobile IT offering are different
       from the resources traditionally required to run a desktop service.
 q    Mobile devices have little in common with desktop systems both
       in terms of technology, features, and user experiences.
 q    Mobile device expertise and skills are essential to deploying a
       successful MDM program.
 q    The roles recommended for successful enterprise-grade mobile
       IT services are listed below:
         •  Mobile System Engineer
         •  Mobile Device Expert
         •  Mobile Security Expert
         •  Mobile Applications Developer


                                                                         9
Level of Effort by Device OS
Platform/Devices                     Strengths                              Weaknesses                            Outlook
                                                                    Slow in reaching OS parity w/ •     Has suffered a dramatic loss
                     Offered by all US and international carriers            competitors                in market and mindshare.
                                                                  In competition w/ Apple, Google, •    Recent device and OS7
                                    BES/Security                            and Microsoft               release has narrowed the gap
  RIM: Blackberry
                                                                     QNX Migration is risky and         between Apple and Android.
                                    Device Pricing                             "jerky"             •    The upcoming migration to
                                                                                                        QNX will be critical for the
                           User Friendly Keyboard, BMI                 Playbook has been a flop         platform.
                        Hardware and Software Design and
                                     Features                          Apple is overly controlling
                            Clear OS & Device Strategy                  Limited Device Selection
                                                                                                     •  Meets most enterprise
    Apple: iOS                    Minimal Malware                                                       requirements.
                          Security Encrytion. App Security.

                     Offered by all US and international carriers

                        Hardware and Software Design and               Has not met most security     •  Has surpassed Apple in
                                   Features                                  requirements               innovation and time to market.
                                                                        Open model has lead to       •  Androids openness has been
                     Relatively unified phone and table strategy         increase in Malware            it's strength (and it's
                                                                                                        weakness (malware, OS
  Google: Android    Multiple Device Types, sizes, shapes, etc         OS and UI Fragmentation          fragmentation, no "corporate
                     Offered by all US and international carriers                                       standard" device.
                          App availability and minimal App                                           •  At this time Google has not
                                    requirements                                                        articulated a strategy to
                                                                                                        overcome corporate security
                                     4G Support                                                         concerns.
                                                                    Has met most enterprise security •  The slowness to market, lack
                                                                             requirements               of carrier support, and
Microsoft: Windows
                            Innovative Software Design                  Limited Carrier Support         Microsoft's lack of enterprise
      Phone                                                                                                                       10
                                                                                                        strategy have so far made
Live Polling Question




                        11
MDM Deployment Process
n    A successful MDM implementation should follow a careful
      device deployment process.

                       MDM	
  Deployment	
  Process	
  
               Build                 Roll-Out                 Sustain
      Device/OS Selection        Device Provisioning      End-user Management
        Solution Testing        Device Registration and
                                                           Device Retirement
      MDM Choice/Approval            Configuration

      q    The Build and the Roll-Out phases are important, but the Sustain
            phase will determine the program success

      q    The solution should allow IT to configure, monitor, and control data
            & access on multiple OSs and devices



                                                                                12
Stakeholders & Resources
	
              	
                                                                                                                                      Es;mated	
  Time	
  
Stakeholder	
   Responsibili;es	
                                                                                                                       Commitment	
  
Execu;ve	
           •     Secure	
  adequate	
  funding	
  for	
  the	
  program	
                                                                     	
  	
  
Sponsor	
            •     Free	
  up	
  organiza;onal	
  resources	
  as	
  necessary	
  
                     •     Ensure	
  stakeholders	
  stay	
  engaged	
  
                     •     Approve	
  business	
  requirements	
  and	
  proposed	
  solu;on	
  
                     •     Develop	
  business	
  plan	
  and	
  jus;fica;on	
  
Legal	
              •     Iden;fy	
  and	
  resolve	
  regulatory	
  compliance	
  gaps	
  and	
  issues	
                                             	
  	
  
                     •     Determine	
  corporate	
  vs.	
  employee	
  liability	
  for	
  devices	
  and	
  data	
  
                     •     Review	
  new/revised	
  policies	
  and	
  end	
  user	
  agreements	
  
Human	
              •     Create/revise	
  privacy,	
  en;tlement,	
  and	
  acceptable	
  use	
  policy	
  and	
  end	
  user	
  agreements	
         	
  	
  
Resources	
          •     Produc;vity	
  and	
  efficiency	
  improvements	
  
                     •     Recruit	
  staff	
  needed	
  to	
  develop/maintain	
  the	
  BYOD	
  program	
  
                     •     Handle	
  internal	
  communica;ons	
  and	
  marke;ng	
  of	
  the	
  program	
  

Finance	
            •     Develop	
  reimbursement/s;pend	
  policy	
                                                                                  	
  	
  
                     •     Develop	
  plan	
  for	
  telecom	
  expense	
  management	
  
                     •     Nego;ate	
  with	
  carriers	
  on	
  pooled/discounted	
  rates,	
  early	
  termina;on	
  fee	
  waivers,	
  upgrade	
  
                           allowances,	
  number	
  por;ng,	
  unlocked	
  devices,	
  interna;onal	
  roaming	
  rates,	
  value	
  added	
  
                           services,	
  bill	
  on	
  behalf	
  of,	
  account	
  management	
  
IT	
  Security	
     •     Determine	
  device	
  security	
  requirements,	
  including:	
                                                             	
  	
  
                     §    Encryp;on	
  
                     §    Password	
  policy	
  (PIN,	
  ;meout,	
  allowed	
  failed	
  aXempts)	
  
                     §    Remote	
  wipe	
  
                     §    Security	
  policy	
  configura;on	
  and	
  enforcement	
  
                     §    Data	
  protec;on	
  (data	
  loss	
  preven;on,	
  data	
  separa;on,	
  data	
  classifica;on,	
  digital	
  rights	
  
                           management)	
  
                     §    Policy	
  enforcement	
  (no;fy	
  user,	
  suspend/revoke	
  access,	
  remove	
  corporate	
  data,	
  disciplinary	
  
                           ac;on	
  (with	
  HR))	
  
IT	
  Opera;ons	
   •      Monitor	
  costs	
  to	
  ensure	
  program	
  meets	
  cost	
  maintenance	
  or	
  reduc;on	
  goals	
                     	
  	
  
                    •      Provide	
  ;ered	
  service	
  offerings	
  
                    •      Determine	
  Help	
  Desk	
  vs.	
  end	
  user	
  responsibili;es	
  
                    •      Provide	
  training	
  for	
  Help	
  Desk	
  and	
  end	
  users	
  

                                                                                                                                                                           13
A Successful MDM Program Requires Coordinating Among Many Stakeholders
MDM Implementation Checklist
OrganizaDonal	
  Commitment	
                                                                                   Please	
  place	
  an	
  'x'	
  in	
  the	
  appropriate	
  column	
      	
  	
  
	
  	
   	
  	
                                                                                               Strong	
       Moderate	
                      Weak	
    Non-­‐existent	
                    Comments	
  
	
  	
     Execu;ve-­‐level	
  sponsorship	
                                                       	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  

	
  	
     Key	
  stakeholder	
  (decision-­‐makers)	
  commitment	
  to	
  project	
  	
  
                                                                                   	
                                        	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
     Stakeholder	
  consensus	
  on	
  goals	
                                               	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
           Stakeholder	
  agreement	
  to	
  balance	
  security/cost	
  concerns	
  
	
  	
     with	
  end	
  user	
  experience	
                                       	
  	
                                  	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
     Technical	
  literacy	
  of	
  workforce	
                                              	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
IT	
  Readiness	
                                                                                              Please	
  place	
  an	
  'x'	
  in	
  the	
  appropriate	
  column	
             	
  	
  
	
  	
   	
  	
                                                                                               Ready	
       Planned	
                       None	
            N/A	
                        Comments	
  
	
  	
     IT	
  Resources	
                                                                       	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
        Device	
  experts	
                                                                  	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
        Device	
  tes;ng	
                                                                   	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
Sufficient	
  Staffing	
                                                                                           Please	
  place	
  an	
  'x'	
  in	
  the	
  appropriate	
  column	
             	
  	
  
	
  	
   	
  	
                                                                                               Ready	
       Planned	
                       None	
            N/A	
                        Comments	
  
	
  	
        MDM	
  Implementa;on	
                                                               	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Design	
  infrastructure:	
  	
  <list	
  name(s)>	
                              	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Implement	
  infrastructure:	
  	
  <list	
  name(s)>	
                           	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Exchange	
  Administrator:	
  <list	
  name(s)>	
                                 	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Network	
  Administrator	
  (FW	
  and	
  LB):	
  	
  <list	
  name(s)>	
   	
  	
                          	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           PKI	
  and	
  Cer;ficate	
  Administrator:	
  	
  <list	
  name(s)>	
              	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Design	
  processes:	
  	
  <list	
  name(s)>	
                                   	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Documenta;on:	
  	
  <list	
  name(s)>	
                                          	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Communica;ons:	
  	
  <list	
  name(s)>	
                                         	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Training:	
  	
  <list	
  name(s)>	
                                              	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
           Opera;ons	
  and	
  maintenance:	
  	
  <list	
  name(s)>	
                       	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  
	
  	
        Develop	
  and	
  implement	
  device	
  lifecycle	
  process	
                      	
  	
                    	
  	
                	
  	
     Wireless Analytics, LLC
                                                                                                                                                                  	
  	
   	
  	
  
	
  	
        Develop	
  and	
  implement	
  new	
  Help	
  Desk	
  processes	
                    	
  	
                    	
  	
                	
  	
               	
  	
                  	
  	
  


                                                                                                                                                                                                                          14
MDM Program Implementation
n    End-user communication is critical to program success
      q    Welcome letter introducing the program to users.
      q    Copy of the End User mobile device agreement.
      q    Getting started instructions with a basic device tutorial and links
            to online training resources.
      q    Registration instructions for connecting devices to corporate
            resources and configuring security.
      q    FAQ and support guide for troubleshooting common problems
            with links to support resources.




                                                                                  15
Mobile Security Policy
n    It is important to review, update and communicate all
      critical aspects of an enterprise security policy when
      implementing an MDM solution
      q    Device Security Policy
      q    Encryption Security Policy
      q    PIN Lock Policy
      q    Application Security Policy
      q    End-user Policy Awareness and Training




                                                               16
Mobility Strategies
n     Bring Your Own Device (BYOD)?
      q    User preferences are starting to dictate device choice
            •     Device capabilities, functions and applications
            •     Needs to be flexible and adaptable to new solutions
            •     High service availability
            •     Protect Intellectual property and litigation rights to equipment
            •     Minimize operating costs
      q    Cost of ownership is higher than expected
            •     Infrastructure needed
            •     Upgradability
            •     Scalability
            •     Single point of failure
            •     Device support
            •     MDM solution must meet the needs of the both IT and the employees
      q    Application management becomes more important
            •     App Design and Governance
                 •    Apps not appropriate on personal devices for security reasons
            •     Policies will vary as will user expectations
                 •    User prohibited from social apps on corporate device
                 •    User will NOT accept that type of policy on personal device


                                                                                      17
Summary - Best Practices
n    Best practices for creating a successful MDM program
      should address a broad spectrum of challenges in order
      to increase program success:
        q    Balance	
  security,	
  compliance,	
  legal	
  liability,	
  and	
  cost	
  concerns	
  
              with	
  a	
  posi;ve	
  user	
  experience	
  
        q    Engage	
  stakeholders	
  early	
  and	
  keep	
  them	
  involved	
  throughout	
  
              the	
  project	
  so	
  that	
  decisions	
  can	
  be	
  made	
  in	
  a	
  ;mely	
  fashion	
  
        q    Acquire	
  and	
  test	
  all	
  devices	
  and	
  OSs	
  you	
  are	
  considering	
  and	
  only	
  
              allow	
  those	
  that	
  meet	
  your	
  requirements	
  
        q    Build	
  a	
  team	
  of	
  experts	
  that	
  can	
  support	
  all	
  aspects	
  of	
  the	
  
              program	
  –	
  from	
  implementa;on	
  to	
  ongoing	
  maintenance	
  
        q    Measure	
  and	
  demonstrate	
  the	
  results	
  and	
  value	
  of	
  the	
  MDM	
  
              program	
  to	
  the	
  business	
  and	
  on	
  the	
  boXom	
  line.	
  




                                                                                                                  18
Complete Solution
Mobility Management for Enterprises




           Carrier Lifecycle Expense Analysis




                                                19
Live Polling Question




                        20
Join TEMIA for Future Webinars
n    Plan Globally, Deliver Locally: Finding the Smart Balance
      for Your Organization’s International Mobile and Fixed
      TEM Needs Register: http://tiny.cc/9i1hbw
n    Participate in our Brief survey on billing:
      Enterprise: http://tiny.cc/czw3aw
      Solutions Providers: http://tiny.cc/42ehbw
n    Learn More About Our Webinars Online




                                                                  21	
  

Mais conteúdo relacionado

Mais procurados

Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platformsDeepu S Nath
 
Infrastructure Fitness and Design Simplicity for IBM Mobile Connect
Infrastructure Fitness and Design Simplicity for IBM Mobile ConnectInfrastructure Fitness and Design Simplicity for IBM Mobile Connect
Infrastructure Fitness and Design Simplicity for IBM Mobile ConnectBill Malchisky Jr.
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end reviewLeigh Williamson
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
Considering The Cloud? Thinking Beyond The Readme File
Considering The Cloud? Thinking Beyond The Readme FileConsidering The Cloud? Thinking Beyond The Readme File
Considering The Cloud? Thinking Beyond The Readme FileBill Malchisky Jr.
 
1st day 3 - agility vs risk
1st day   3 - agility vs risk1st day   3 - agility vs risk
1st day 3 - agility vs riskLilian Schaffer
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
HTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level DesignHTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level DesignThanh Nguyen
 
Ibm cognos mobile now with android support
Ibm cognos mobile now with android supportIbm cognos mobile now with android support
Ibm cognos mobile now with android supportFriedel Jonker
 
Developing Custom iOs Applications for Enterprise
Developing Custom iOs Applications for EnterpriseDeveloping Custom iOs Applications for Enterprise
Developing Custom iOs Applications for EnterpriseMobile March
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissIBMSERBIA
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSAdvanced Logic Industries
 
SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09rosaranger
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Applicationbgalusha
 
Company Report - Intel OpenLab
Company Report - Intel OpenLabCompany Report - Intel OpenLab
Company Report - Intel OpenLabCarrie Martinelli
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
HP, the gloabl leader in Thin Clients
HP, the gloabl leader in Thin ClientsHP, the gloabl leader in Thin Clients
HP, the gloabl leader in Thin ClientsHP Thin Clients
 

Mais procurados (20)

Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platforms
 
Infrastructure Fitness and Design Simplicity for IBM Mobile Connect
Infrastructure Fitness and Design Simplicity for IBM Mobile ConnectInfrastructure Fitness and Design Simplicity for IBM Mobile Connect
Infrastructure Fitness and Design Simplicity for IBM Mobile Connect
 
Ceedo Sales training
Ceedo Sales trainingCeedo Sales training
Ceedo Sales training
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
Considering The Cloud? Thinking Beyond The Readme File
Considering The Cloud? Thinking Beyond The Readme FileConsidering The Cloud? Thinking Beyond The Readme File
Considering The Cloud? Thinking Beyond The Readme File
 
1st day 3 - agility vs risk
1st day   3 - agility vs risk1st day   3 - agility vs risk
1st day 3 - agility vs risk
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
HTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level DesignHTML5 Mobile Web Framework - High Level Design
HTML5 Mobile Web Framework - High Level Design
 
Ibm cognos mobile now with android support
Ibm cognos mobile now with android supportIbm cognos mobile now with android support
Ibm cognos mobile now with android support
 
Developing Custom iOs Applications for Enterprise
Developing Custom iOs Applications for EnterpriseDeveloping Custom iOs Applications for Enterprise
Developing Custom iOs Applications for Enterprise
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond Kiss
 
Mc50
Mc50Mc50
Mc50
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
 
SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
 
Company Report - Intel OpenLab
Company Report - Intel OpenLabCompany Report - Intel OpenLab
Company Report - Intel OpenLab
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
HP, the gloabl leader in Thin Clients
HP, the gloabl leader in Thin ClientsHP, the gloabl leader in Thin Clients
HP, the gloabl leader in Thin Clients
 

Destaque

Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld
 
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case StudyChoosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study3Sixty Insights
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 

Destaque (6)

Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case StudyChoosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 

Semelhante a Temia Mobile Device Management Webinar 03 21-12

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityLumension
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012CorSource
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nmNitin Gaur
 
Frozen digit Company Profile
Frozen digit Company ProfileFrozen digit Company Profile
Frozen digit Company ProfileHardy Thomas
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter EibakPCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter EibakIBM Danmark
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Dirk Nicol
 
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupPCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupIBM Danmark
 
Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Source Conference
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaLeigh Williamson
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 

Semelhante a Temia Mobile Device Management Webinar 03 21-12 (20)

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nm
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Frozen digit Company Profile
Frozen digit Company ProfileFrozen digit Company Profile
Frozen digit Company Profile
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter EibakPCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
PCTY 2012, Developing for Mobile Enterprise Application Platform v. Peter Eibak
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2
 
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupPCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
 
Mdm solutions comparison
Mdm solutions comparisonMdm solutions comparison
Mdm solutions comparison
 
Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
IBM Worklight-Overview
IBM Worklight-OverviewIBM Worklight-Overview
IBM Worklight-Overview
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Temia Mobile Device Management Webinar 03 21-12

  • 1. Thinking about an MDM Solution…Now What? Wednesday, March 21, 2012 11:20AM - Noon EDT www.temia.org The views expressed in this presentation are meant to reflect the majority of our members, but they may not be reflective of all members.
  • 3. Today’s Speakers n  Joe Basili n  Managing Director, TEMIA n  joebasili@temia.org 3  
  • 4. Today’s Speakers Erik M. Eames Fernando M. Oliveira Managing Director VP of Client Services Wireless Analytics Wireless Analytics 978-762-0900 x111 office 978-762-0900 x115 office 603-817-6300 cell 978-360-1040 cell eeames@wirelessanalytics.com foliveira@wirelessanalytics.com 4  
  • 5. About TEMIA n  The purpose of TEMIA is to promote the value of TEM through education and marketing n  TEMIA’s mission is to expand the size of the TEM market globally and develop open industry standards to augment service quality and performance n  Members work together for growth of the industry while still competing for business 5
  • 6. Mobile Device Management n  The explosion of mobile devices and operating systems have changed the rules of the game for the enterprise. q  Device Management q  Device Security q  Employee Mobile Productivity q  Device Provisioning q  Ongoing Mobility Support n  Companies that offer MDM solutions have multiplied as smartphones have flooded the enterprise. AirWatch     Good  Technology     Mobile  Iron     Blackberry  Enterprise  Server     HP     Mobiquant  Technologies     Boxtone     IBELEM     NoDfy  Technology     Capricode     JAMF  SoIware     Pointsec  Mobile  Security     CommonTime     Kaspersky     Odyssey  SoIware     Dell     LANDesk     Smith  Micro  SoIware     Excitor     MaaS360     SOTI     F-­‐Secure     Mcafee     Sophos  Mobile  Control     FancyFon  SoIware     MicrosoI  Exchange.   Sybase    Afaria   Fixmo     MformaDon     Symantec     Fromdistance     Mobile  AcDve  Defense     Zenprise   6
  • 7. Selecting An MDM Solution n  What is Mobile Device Management? q  It is more than just a piece of software q  Enterprises need to approach an MDM Strategy from a holistic approach: •  Mobile Visibility – beyond security •  Device Management – beyond remote wipe •  Reporting – beyond active directory •  Cost Management – beyond MDM license costs •  Help Desk Support – beyond connectivity •  Policy Management – beyond compliance •  MDM should address the complete security and oversight of a device inside an organization from selecting new devices, to provisioning, securing and managing existing devices, and finally to decommissioning end-of-life devices. 7
  • 8. People, Process, Technology To develop and implement a successful MDM program, one should identify the key people, process and technology needed within your organization. 8
  • 9. Level of Effort with MDM Solution Mobile IT Resource Requirements q  The resources required to run a mobile IT offering are different from the resources traditionally required to run a desktop service. q  Mobile devices have little in common with desktop systems both in terms of technology, features, and user experiences. q  Mobile device expertise and skills are essential to deploying a successful MDM program. q  The roles recommended for successful enterprise-grade mobile IT services are listed below: •  Mobile System Engineer •  Mobile Device Expert •  Mobile Security Expert •  Mobile Applications Developer 9
  • 10. Level of Effort by Device OS Platform/Devices Strengths Weaknesses Outlook Slow in reaching OS parity w/ •  Has suffered a dramatic loss Offered by all US and international carriers competitors in market and mindshare. In competition w/ Apple, Google, •  Recent device and OS7 BES/Security and Microsoft release has narrowed the gap RIM: Blackberry QNX Migration is risky and between Apple and Android. Device Pricing "jerky" •  The upcoming migration to QNX will be critical for the User Friendly Keyboard, BMI Playbook has been a flop platform. Hardware and Software Design and Features Apple is overly controlling Clear OS & Device Strategy Limited Device Selection •  Meets most enterprise Apple: iOS Minimal Malware requirements. Security Encrytion. App Security. Offered by all US and international carriers Hardware and Software Design and Has not met most security •  Has surpassed Apple in Features requirements innovation and time to market. Open model has lead to •  Androids openness has been Relatively unified phone and table strategy increase in Malware it's strength (and it's weakness (malware, OS Google: Android Multiple Device Types, sizes, shapes, etc OS and UI Fragmentation fragmentation, no "corporate Offered by all US and international carriers standard" device. App availability and minimal App •  At this time Google has not requirements articulated a strategy to overcome corporate security 4G Support concerns. Has met most enterprise security •  The slowness to market, lack requirements of carrier support, and Microsoft: Windows Innovative Software Design Limited Carrier Support Microsoft's lack of enterprise Phone 10 strategy have so far made
  • 12. MDM Deployment Process n  A successful MDM implementation should follow a careful device deployment process. MDM  Deployment  Process   Build Roll-Out Sustain Device/OS Selection Device Provisioning End-user Management Solution Testing Device Registration and Device Retirement MDM Choice/Approval Configuration q  The Build and the Roll-Out phases are important, but the Sustain phase will determine the program success q  The solution should allow IT to configure, monitor, and control data & access on multiple OSs and devices 12
  • 13. Stakeholders & Resources     Es;mated  Time   Stakeholder   Responsibili;es   Commitment   Execu;ve   •  Secure  adequate  funding  for  the  program       Sponsor   •  Free  up  organiza;onal  resources  as  necessary   •  Ensure  stakeholders  stay  engaged   •  Approve  business  requirements  and  proposed  solu;on   •  Develop  business  plan  and  jus;fica;on   Legal   •  Iden;fy  and  resolve  regulatory  compliance  gaps  and  issues       •  Determine  corporate  vs.  employee  liability  for  devices  and  data   •  Review  new/revised  policies  and  end  user  agreements   Human   •  Create/revise  privacy,  en;tlement,  and  acceptable  use  policy  and  end  user  agreements       Resources   •  Produc;vity  and  efficiency  improvements   •  Recruit  staff  needed  to  develop/maintain  the  BYOD  program   •  Handle  internal  communica;ons  and  marke;ng  of  the  program   Finance   •  Develop  reimbursement/s;pend  policy       •  Develop  plan  for  telecom  expense  management   •  Nego;ate  with  carriers  on  pooled/discounted  rates,  early  termina;on  fee  waivers,  upgrade   allowances,  number  por;ng,  unlocked  devices,  interna;onal  roaming  rates,  value  added   services,  bill  on  behalf  of,  account  management   IT  Security   •  Determine  device  security  requirements,  including:       §  Encryp;on   §  Password  policy  (PIN,  ;meout,  allowed  failed  aXempts)   §  Remote  wipe   §  Security  policy  configura;on  and  enforcement   §  Data  protec;on  (data  loss  preven;on,  data  separa;on,  data  classifica;on,  digital  rights   management)   §  Policy  enforcement  (no;fy  user,  suspend/revoke  access,  remove  corporate  data,  disciplinary   ac;on  (with  HR))   IT  Opera;ons   •  Monitor  costs  to  ensure  program  meets  cost  maintenance  or  reduc;on  goals       •  Provide  ;ered  service  offerings   •  Determine  Help  Desk  vs.  end  user  responsibili;es   •  Provide  training  for  Help  Desk  and  end  users   13 A Successful MDM Program Requires Coordinating Among Many Stakeholders
  • 14. MDM Implementation Checklist OrganizaDonal  Commitment   Please  place  an  'x'  in  the  appropriate  column               Strong   Moderate   Weak   Non-­‐existent   Comments       Execu;ve-­‐level  sponsorship                           Key  stakeholder  (decision-­‐makers)  commitment  to  project                           Stakeholder  consensus  on  goals                       Stakeholder  agreement  to  balance  security/cost  concerns       with  end  user  experience                           Technical  literacy  of  workforce                       IT  Readiness   Please  place  an  'x'  in  the  appropriate  column               Ready   Planned   None   N/A   Comments       IT  Resources                           Device  experts                           Device  tes;ng                       Sufficient  Staffing   Please  place  an  'x'  in  the  appropriate  column               Ready   Planned   None   N/A   Comments       MDM  Implementa;on                           Design  infrastructure:    <list  name(s)>                           Implement  infrastructure:    <list  name(s)>                           Exchange  Administrator:  <list  name(s)>                           Network  Administrator  (FW  and  LB):    <list  name(s)>                           PKI  and  Cer;ficate  Administrator:    <list  name(s)>                           Design  processes:    <list  name(s)>                           Documenta;on:    <list  name(s)>                           Communica;ons:    <list  name(s)>                           Training:    <list  name(s)>                           Opera;ons  and  maintenance:    <list  name(s)>                           Develop  and  implement  device  lifecycle  process               Wireless Analytics, LLC             Develop  and  implement  new  Help  Desk  processes                       14
  • 15. MDM Program Implementation n  End-user communication is critical to program success q  Welcome letter introducing the program to users. q  Copy of the End User mobile device agreement. q  Getting started instructions with a basic device tutorial and links to online training resources. q  Registration instructions for connecting devices to corporate resources and configuring security. q  FAQ and support guide for troubleshooting common problems with links to support resources. 15
  • 16. Mobile Security Policy n  It is important to review, update and communicate all critical aspects of an enterprise security policy when implementing an MDM solution q  Device Security Policy q  Encryption Security Policy q  PIN Lock Policy q  Application Security Policy q  End-user Policy Awareness and Training 16
  • 17. Mobility Strategies n  Bring Your Own Device (BYOD)? q  User preferences are starting to dictate device choice •  Device capabilities, functions and applications •  Needs to be flexible and adaptable to new solutions •  High service availability •  Protect Intellectual property and litigation rights to equipment •  Minimize operating costs q  Cost of ownership is higher than expected •  Infrastructure needed •  Upgradability •  Scalability •  Single point of failure •  Device support •  MDM solution must meet the needs of the both IT and the employees q  Application management becomes more important •  App Design and Governance •  Apps not appropriate on personal devices for security reasons •  Policies will vary as will user expectations •  User prohibited from social apps on corporate device •  User will NOT accept that type of policy on personal device 17
  • 18. Summary - Best Practices n  Best practices for creating a successful MDM program should address a broad spectrum of challenges in order to increase program success: q  Balance  security,  compliance,  legal  liability,  and  cost  concerns   with  a  posi;ve  user  experience   q  Engage  stakeholders  early  and  keep  them  involved  throughout   the  project  so  that  decisions  can  be  made  in  a  ;mely  fashion   q  Acquire  and  test  all  devices  and  OSs  you  are  considering  and  only   allow  those  that  meet  your  requirements   q  Build  a  team  of  experts  that  can  support  all  aspects  of  the   program  –  from  implementa;on  to  ongoing  maintenance   q  Measure  and  demonstrate  the  results  and  value  of  the  MDM   program  to  the  business  and  on  the  boXom  line.   18
  • 19. Complete Solution Mobility Management for Enterprises Carrier Lifecycle Expense Analysis 19
  • 21. Join TEMIA for Future Webinars n  Plan Globally, Deliver Locally: Finding the Smart Balance for Your Organization’s International Mobile and Fixed TEM Needs Register: http://tiny.cc/9i1hbw n  Participate in our Brief survey on billing: Enterprise: http://tiny.cc/czw3aw Solutions Providers: http://tiny.cc/42ehbw n  Learn More About Our Webinars Online 21