SlideShare uma empresa Scribd logo
1 de 30
Windows Phone 8 Enterprise
Mobile Device Management
(MDM)

Andrej Radinger
Windows Phone Development MVP
andrej@mobendo.hr

October 23rd 2013
Topics
•
•
•
•

Introduction
Windows Phone Applications 8 in the Enterprise
Windows Phone 8 Devices in the Enterprise
Building a Company Hub
Introduction
End Users are in the driver seat!
• 59% of employees use mobile devices to run LOB apps2

• 91% of employed adults use personally owned device for
business use1
• Currently 150 million employees is using their own
smartphones and tablets in the office (BYOD)3
• BYOD until 2014 >50%3

1 Survey

conducted by Harris Interactive, Feb 2012
State of Mobile Computing Survey, Jan 2012

2 Symantec,

3 Juniper

Research, 2012
2012

4 Forrester, Jan
IT department loosing control!
• 72% organizations have tablets in use without formal deployment.

• 40% of IT decision makers say they let workers access corporate information from
BYOD devices, but 70% of employees indicated they access corporate networks this
way2
• <10% of organization are fully aware of devices accessing their network3

• 50% companies experiences data breaches due to unsecure devices4
• Corporate IT policies that ban the use of employee-owned devices in the name of
security inadvertently create new security holes6

1 Dimensional Research|May

2011
2011
3 SANS Annual Mobile Security Survey, April 2012
2 IDC,

4 Ponemon and
5 Symantec,
6 Dell,

2011

WebSense sur4vey, 2012
State of Mobile Computing Survey, Jan 2012
Mobile Devices in Enterprise Today
•

The use of personally owned devices growing
By 2016 … or just 3 years from now:
– +10 billion mobile-connected devices (1.4 mobile devices per capita) – Cisco, Feb. 2012
– Smart connected devices (PCs, tablets and smartphones) shipments reach 1.84 billion units – IDC, Mar.
2012
– 1 billion consumers will have smartphones - Forrester, Feb 2012

•

BYOD usage is a reality and growing
”Currently 150 million employees is using their own smartphones and tablets in the office. This number is
predicted to rise to 350 million by 2014”

Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017 (Juniper Research, 2012)

•

IT is not in control
„40% of IT decision makers say they let workers access corporate information from employee-owned devices, but
70% of employees indicated they access corporate networks this way”
Consumerization of IT Study: Closing the “Consumerization Gap” (IDC, 2011 )

•

Restrictive policies are not the answer
„Corporate IT policies that ban the use of employee-owned devices in the name of security inadvertently create
new security holes.”
CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing (Dell, 2011)

TOP IT Mobility Challenge
Cost effectively secure and manage the multiple devices in the Enterprise
MDM Overview
•
•
•

MDM addresses TOP IT Mobility Challenges
Fairly new solution area – consolidation & major shifts still ongoing
Common elements that MDM solutions include:
– Policy Management
– Inventory Management
– Security Management
– Device Service Management
• Device Software Distribution

•

Key attributes of high quality MDM solution:
–
–
–
–

•

High level of automatization
High quality reporting
Integration with existing security and management systems
Right balance of „User Experience vs. Security”

Few things to keep in mind:
–
–
–

Some device platforms will limit manageability (due to manufacturer design)
Android platform support is difficult (due to platform fragmentation)
Most MDM solutions focused on major device platforms (WP, iOS, Andorid), limited or no support
for other platforms not uncommon
Windows Phone apps 8 in
the Enterprise
Enable companies to deploy business applications to
their employees privately and securely.
Companies control which phones may run their apps
Enterprise apps may install and run only on phones that are enrolled with the associated
enterprise

Companies control the lifecycle of their apps
No ongoing interaction from Microsoft

Companies control the deployment and distribution
It’s highly recommended to authenticate users prior to app enrollment and app deployment
Enable end users to feel in control while preserving a
company’s right to protect their data.
App installs require user confirmation
Updates of existing apps can be done silently

Companies can inventory only their own apps
Marketplace apps, user settings, and other enterprise data is not available

The phone’s unique identifier is per-publisher
Publishers cannot correlate user data with other publishers or companies
Windows Phone Applications in the Enterprise
• Windows 8 allows enterprises to configure enterprise wide
application distribution
• The enterprise can create and distribute Windows Phone
applications without requiring them to be approved by the
Microsoft Windows Store
• User phones can either be managed or unmanaged
– Very high level of control over a managed phone
– An unmanaged phone can be used in a “Bring Your Own Device” mode

• An Enterprise can create its own Application Hub which can be made
available on managed devices
Enterprise Applications
• An Enterprise Application does not have any more access to the
underlying device than a “normal” one
• It does not have to pass the Marketplace certification
– This could result in less reliable/harder to use applications being published
by an enterprise
– Enterprises are advised to use the Marketplace Test Kit to internally validate
applications before making them available

• Capabilities are enforced on the device
– For example if an application needs to use the location service the user will
be asked for permission when the application is first run
Creating Enterprise Applications
• An Enterprise can use its keys to sign applications that are then
posted in its own application store
• Devices are “enrolled” to allow them to install and run applications
from the Enterprise
• An Enterprise “token” is loaded onto the device when it is enrolled
• This allows it to allow it to validate enterprise applications
• Enterprise applications are published directly by the Enterprise, they
are not subjected to any Marketplace certification
Enterprise Client Application Example

• Microsoft have created an internal application hub that
provides corporate information alongside other information
Enterprise Registration
• An Enterprise must register with the Windows Phone Developer Center if it
wants to distribute enterprise applications to selected devices
– Microsoft provides the Enterprise with a set of tools that can be used to create
applications for deployment within the Enterprise
– Microsoft informs VeriSign that the Enterprise is registering

• Once the Enterprise has approved VeriSign will issue a certificate for the
key pair to be used by the Enterprise to sign applications
• This creates a new Enterprise Root and Certification Authority which is
trusted by the Windows Phone 8 security system
– Can be used to sign applications that can be deployed onto Windows Phones 8
devices
Overview
3

5

2

1

4

7

6
Account creation and cert acquisition

• Must be a Company account
• Publisher name displayed on phone
• Company approval required
• Private key, CSR, cert are local to PC
Enterprise certificate
App enrollment
• App enrollment token
(AET) is generated
once per year

1

• Delivered to the phone
over an authenticated
channel via email,
browser, or MDM
• Validated for signature
and expiration

2

2
3
App deployment
• App is signed using
tools in the WP SDK
8.0

1

• Delivered to the phone
over an authenticated
channel via email,
browser, MDM, or
company hub
• Validated for signature,
an associated AET, and
allowed capabilities

2

2
3
App launch
• User launches an
enterprise app via the
shell or an API
• Publisher ID is
extracted and used to
find the associated AET

• AET must be valid and
not revoked or
disabled

1

2
3
Phone home
• Phone sends device ID, publisher
IDs, and enterprise app IDs
• Phone receives status for each
enterprise
• Apps of invalid enterprises are blocked
from being installed or launched
• Scheduled daily, plus each enrollment
and app install

• After 7 consecutive failed
attempts, install of enterprise apps is
blocked, but launch of installed apps
still works

1

2
Phone home – sample protocol

• Response
Windows Phone 8 Devices
in the Enterprise
The Enterprise and Windows Phone Devices
• If the Enterprise just wants to distribute their applications to
selected phones they just need to register to do this
– They will sign the XAP files of their applications with their Enterprise
certificate

• An Enterprise can also deploy “managed” Windows Phone 8 devices
• A “managed” Windows Phone 8 device is under much more direct
control from the enterprise
• System management tools are provided that allow the phone to be
remotely managed
– Applications can be installed and revoked
– Data can be remotely deleted
Unmanaged and Managed devices
• An Enterprise can interact with “managed” and “unmanaged” Windows
Phone 8 devices
• An Unmanaged phone (which might be a Bring Your Own Device) is one
that is not integrated into the management regime in the Enterprise
– The user of an Unmanaged phone has control over which applications are
loaded onto the phone and what phone capabilities that the applications have

• An Enterprise has a high level of control over a Managed phone
– The Enterprise can automatically deploy and revoke applications on the phone
– An Enterprise can remotely delete data from a Managed phone
Managed vs Unmanaged Phones
Feature

Unmanaged Phone

Managed Phone

Device encryption

Yes

Yes

Private app distribution

Yes

Yes

Policy management

No

Yes

App Management

No

Yes

App un-enrollment

No

Yes

Remote delete of business data

No

Yes

Company Hub APIs

Yes

Yes
Device Enrolment
• The Enterprise can distribute applications to Managed and
Unmanaged Windows Phone 8 devices
– A device must be “enrolled” so that it can run Enterprise applications
– This provides it with an enrolment token that can be used to open
XAP files that have been signed by the Enterprise
– This is a “one time” action

• Managed phones are automatically enrolled to the Enterprise
• An Unmanaged phone must be enrolled before it can run the
applications
Enrolling an Unmanaged Phone
• There are a number of ways that an unmanaged phone can be enrolled:
– Send the phone the token using an email secured by IRM (Internet Rights
Management)
– Email a message containing a web link to the token – the user must authenticate
on the web site before being given the token

• Once the phone has been enrolled into the enterprise the user can
download and run enterprise applications
• Enrolment does not affect any other aspects of phone use
– It does not allow remote management of the enrolled phone

• Microsoft does not provide tools to track the number of unmanaged
phones that have been enrolled
Enrolment on Managed and Unmanaged Devices
Feature

Unmanaged Phone

Managed Phone

App enrollment

By attachment in email
Via web link

Integrated with device enrollment

Implemented by Enterprise IT

Provisioned by
System Center

By attachment in IT email or
by web download

Integrated with device enrollment

Implemented by Enterprise IT

Provisioned by
System Center

App un-enrollment

N/A

Integrated with device
un-enrollment

Containment

Low

High

Enterprise app store
Enterprise client install
App inventory

Mais conteúdo relacionado

Mais procurados

Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 

Mais procurados (20)

Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
BYOD
BYODBYOD
BYOD
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 

Destaque

Typometer danielangermann
Typometer danielangermannTypometer danielangermann
Typometer danielangermannmontmobo
 
Definiendo a la filosofia
Definiendo a la filosofiaDefiniendo a la filosofia
Definiendo a la filosofiaamisdb
 
Tr programacionrobots
Tr programacionrobotsTr programacionrobots
Tr programacionrobotsCamila Prieto
 
Contextualización sistemas virtuales de aprendizaje
Contextualización sistemas virtuales de aprendizajeContextualización sistemas virtuales de aprendizaje
Contextualización sistemas virtuales de aprendizajeelearningCANDANE
 
Sm electronics services exhbit. ppt
Sm electronics services exhbit. pptSm electronics services exhbit. ppt
Sm electronics services exhbit. pptSachin Shinde
 
Meeting Mark Turpin
Meeting Mark TurpinMeeting Mark Turpin
Meeting Mark TurpinMarkTurpin
 
Metodos de treinamento_aerobico
Metodos de treinamento_aerobicoMetodos de treinamento_aerobico
Metodos de treinamento_aerobicoDeza Ribeiro
 
Catalogo wonkandy franquicia
Catalogo wonkandy franquiciaCatalogo wonkandy franquicia
Catalogo wonkandy franquiciaWonkandy
 
Globalsoft Institucional
Globalsoft InstitucionalGlobalsoft Institucional
Globalsoft InstitucionalRuben Silva
 
2014.11.12 maklumat tarikh kemasukan pelajar
2014.11.12   maklumat tarikh kemasukan pelajar2014.11.12   maklumat tarikh kemasukan pelajar
2014.11.12 maklumat tarikh kemasukan pelajarProfil Modal Uniti
 
Tecnicas investigacion
Tecnicas investigacionTecnicas investigacion
Tecnicas investigacionJulio Esteban
 
ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...
ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...
ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...Clavei (Clave Informatica S.L.)
 
11 situaciones infantiles de angustia reflejadas en una obra de arte y en el...
11  situaciones infantiles de angustia reflejadas en una obra de arte y en el...11  situaciones infantiles de angustia reflejadas en una obra de arte y en el...
11 situaciones infantiles de angustia reflejadas en una obra de arte y en el...Developer Software
 

Destaque (20)

Typometer danielangermann
Typometer danielangermannTypometer danielangermann
Typometer danielangermann
 
Guía normas apa 1
Guía normas apa 1Guía normas apa 1
Guía normas apa 1
 
Definiendo a la filosofia
Definiendo a la filosofiaDefiniendo a la filosofia
Definiendo a la filosofia
 
Tr programacionrobots
Tr programacionrobotsTr programacionrobots
Tr programacionrobots
 
i2MApp - Dossier presentacion
i2MApp - Dossier presentacioni2MApp - Dossier presentacion
i2MApp - Dossier presentacion
 
Contextualización sistemas virtuales de aprendizaje
Contextualización sistemas virtuales de aprendizajeContextualización sistemas virtuales de aprendizaje
Contextualización sistemas virtuales de aprendizaje
 
2013 mlegal facso
2013 mlegal facso2013 mlegal facso
2013 mlegal facso
 
Lanzamiento de Marca BitPagos
Lanzamiento de Marca BitPagosLanzamiento de Marca BitPagos
Lanzamiento de Marca BitPagos
 
Sm electronics services exhbit. ppt
Sm electronics services exhbit. pptSm electronics services exhbit. ppt
Sm electronics services exhbit. ppt
 
Meeting Mark Turpin
Meeting Mark TurpinMeeting Mark Turpin
Meeting Mark Turpin
 
References
ReferencesReferences
References
 
Metodos de treinamento_aerobico
Metodos de treinamento_aerobicoMetodos de treinamento_aerobico
Metodos de treinamento_aerobico
 
Catalogo wonkandy franquicia
Catalogo wonkandy franquiciaCatalogo wonkandy franquicia
Catalogo wonkandy franquicia
 
Globalsoft Institucional
Globalsoft InstitucionalGlobalsoft Institucional
Globalsoft Institucional
 
Tecnoblog
TecnoblogTecnoblog
Tecnoblog
 
2014.11.12 maklumat tarikh kemasukan pelajar
2014.11.12   maklumat tarikh kemasukan pelajar2014.11.12   maklumat tarikh kemasukan pelajar
2014.11.12 maklumat tarikh kemasukan pelajar
 
Tecnicas investigacion
Tecnicas investigacionTecnicas investigacion
Tecnicas investigacion
 
ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...
ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...
ClaveiCRM - Solución CRM en la nube para la gestión de relaciones con los cli...
 
11 situaciones infantiles de angustia reflejadas en una obra de arte y en el...
11  situaciones infantiles de angustia reflejadas en una obra de arte y en el...11  situaciones infantiles de angustia reflejadas en una obra de arte y en el...
11 situaciones infantiles de angustia reflejadas en una obra de arte y en el...
 
Snorkelling Torrevieja
Snorkelling TorreviejaSnorkelling Torrevieja
Snorkelling Torrevieja
 

Semelhante a Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)

Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGuilherme Maia
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Intune Concept.pptx
Intune Concept.pptxIntune Concept.pptx
Intune Concept.pptxjmbrrvgzhr
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology MobileWorxs
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Enabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their PhonesEnabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their PhonesOwen Allen
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 

Semelhante a Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm) (20)

Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Intune Concept.pptx
Intune Concept.pptxIntune Concept.pptx
Intune Concept.pptx
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Enabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their PhonesEnabling Users to Save Work Files to their Phones
Enabling Users to Save Work Files to their Phones
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)

  • 1. Windows Phone 8 Enterprise Mobile Device Management (MDM) Andrej Radinger Windows Phone Development MVP andrej@mobendo.hr October 23rd 2013
  • 2. Topics • • • • Introduction Windows Phone Applications 8 in the Enterprise Windows Phone 8 Devices in the Enterprise Building a Company Hub
  • 4. End Users are in the driver seat! • 59% of employees use mobile devices to run LOB apps2 • 91% of employed adults use personally owned device for business use1 • Currently 150 million employees is using their own smartphones and tablets in the office (BYOD)3 • BYOD until 2014 >50%3 1 Survey conducted by Harris Interactive, Feb 2012 State of Mobile Computing Survey, Jan 2012 2 Symantec, 3 Juniper Research, 2012 2012 4 Forrester, Jan
  • 5. IT department loosing control! • 72% organizations have tablets in use without formal deployment. • 40% of IT decision makers say they let workers access corporate information from BYOD devices, but 70% of employees indicated they access corporate networks this way2 • <10% of organization are fully aware of devices accessing their network3 • 50% companies experiences data breaches due to unsecure devices4 • Corporate IT policies that ban the use of employee-owned devices in the name of security inadvertently create new security holes6 1 Dimensional Research|May 2011 2011 3 SANS Annual Mobile Security Survey, April 2012 2 IDC, 4 Ponemon and 5 Symantec, 6 Dell, 2011 WebSense sur4vey, 2012 State of Mobile Computing Survey, Jan 2012
  • 6. Mobile Devices in Enterprise Today • The use of personally owned devices growing By 2016 … or just 3 years from now: – +10 billion mobile-connected devices (1.4 mobile devices per capita) – Cisco, Feb. 2012 – Smart connected devices (PCs, tablets and smartphones) shipments reach 1.84 billion units – IDC, Mar. 2012 – 1 billion consumers will have smartphones - Forrester, Feb 2012 • BYOD usage is a reality and growing ”Currently 150 million employees is using their own smartphones and tablets in the office. This number is predicted to rise to 350 million by 2014” Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017 (Juniper Research, 2012) • IT is not in control „40% of IT decision makers say they let workers access corporate information from employee-owned devices, but 70% of employees indicated they access corporate networks this way” Consumerization of IT Study: Closing the “Consumerization Gap” (IDC, 2011 ) • Restrictive policies are not the answer „Corporate IT policies that ban the use of employee-owned devices in the name of security inadvertently create new security holes.” CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing (Dell, 2011) TOP IT Mobility Challenge Cost effectively secure and manage the multiple devices in the Enterprise
  • 7. MDM Overview • • • MDM addresses TOP IT Mobility Challenges Fairly new solution area – consolidation & major shifts still ongoing Common elements that MDM solutions include: – Policy Management – Inventory Management – Security Management – Device Service Management • Device Software Distribution • Key attributes of high quality MDM solution: – – – – • High level of automatization High quality reporting Integration with existing security and management systems Right balance of „User Experience vs. Security” Few things to keep in mind: – – – Some device platforms will limit manageability (due to manufacturer design) Android platform support is difficult (due to platform fragmentation) Most MDM solutions focused on major device platforms (WP, iOS, Andorid), limited or no support for other platforms not uncommon
  • 8. Windows Phone apps 8 in the Enterprise
  • 9. Enable companies to deploy business applications to their employees privately and securely. Companies control which phones may run their apps Enterprise apps may install and run only on phones that are enrolled with the associated enterprise Companies control the lifecycle of their apps No ongoing interaction from Microsoft Companies control the deployment and distribution It’s highly recommended to authenticate users prior to app enrollment and app deployment
  • 10. Enable end users to feel in control while preserving a company’s right to protect their data. App installs require user confirmation Updates of existing apps can be done silently Companies can inventory only their own apps Marketplace apps, user settings, and other enterprise data is not available The phone’s unique identifier is per-publisher Publishers cannot correlate user data with other publishers or companies
  • 11. Windows Phone Applications in the Enterprise • Windows 8 allows enterprises to configure enterprise wide application distribution • The enterprise can create and distribute Windows Phone applications without requiring them to be approved by the Microsoft Windows Store • User phones can either be managed or unmanaged – Very high level of control over a managed phone – An unmanaged phone can be used in a “Bring Your Own Device” mode • An Enterprise can create its own Application Hub which can be made available on managed devices
  • 12. Enterprise Applications • An Enterprise Application does not have any more access to the underlying device than a “normal” one • It does not have to pass the Marketplace certification – This could result in less reliable/harder to use applications being published by an enterprise – Enterprises are advised to use the Marketplace Test Kit to internally validate applications before making them available • Capabilities are enforced on the device – For example if an application needs to use the location service the user will be asked for permission when the application is first run
  • 13. Creating Enterprise Applications • An Enterprise can use its keys to sign applications that are then posted in its own application store • Devices are “enrolled” to allow them to install and run applications from the Enterprise • An Enterprise “token” is loaded onto the device when it is enrolled • This allows it to allow it to validate enterprise applications • Enterprise applications are published directly by the Enterprise, they are not subjected to any Marketplace certification
  • 14. Enterprise Client Application Example • Microsoft have created an internal application hub that provides corporate information alongside other information
  • 15. Enterprise Registration • An Enterprise must register with the Windows Phone Developer Center if it wants to distribute enterprise applications to selected devices – Microsoft provides the Enterprise with a set of tools that can be used to create applications for deployment within the Enterprise – Microsoft informs VeriSign that the Enterprise is registering • Once the Enterprise has approved VeriSign will issue a certificate for the key pair to be used by the Enterprise to sign applications • This creates a new Enterprise Root and Certification Authority which is trusted by the Windows Phone 8 security system – Can be used to sign applications that can be deployed onto Windows Phones 8 devices
  • 17. Account creation and cert acquisition • Must be a Company account • Publisher name displayed on phone • Company approval required • Private key, CSR, cert are local to PC
  • 19. App enrollment • App enrollment token (AET) is generated once per year 1 • Delivered to the phone over an authenticated channel via email, browser, or MDM • Validated for signature and expiration 2 2 3
  • 20. App deployment • App is signed using tools in the WP SDK 8.0 1 • Delivered to the phone over an authenticated channel via email, browser, MDM, or company hub • Validated for signature, an associated AET, and allowed capabilities 2 2 3
  • 21. App launch • User launches an enterprise app via the shell or an API • Publisher ID is extracted and used to find the associated AET • AET must be valid and not revoked or disabled 1 2 3
  • 22. Phone home • Phone sends device ID, publisher IDs, and enterprise app IDs • Phone receives status for each enterprise • Apps of invalid enterprises are blocked from being installed or launched • Scheduled daily, plus each enrollment and app install • After 7 consecutive failed attempts, install of enterprise apps is blocked, but launch of installed apps still works 1 2
  • 23. Phone home – sample protocol • Response
  • 24. Windows Phone 8 Devices in the Enterprise
  • 25. The Enterprise and Windows Phone Devices • If the Enterprise just wants to distribute their applications to selected phones they just need to register to do this – They will sign the XAP files of their applications with their Enterprise certificate • An Enterprise can also deploy “managed” Windows Phone 8 devices • A “managed” Windows Phone 8 device is under much more direct control from the enterprise • System management tools are provided that allow the phone to be remotely managed – Applications can be installed and revoked – Data can be remotely deleted
  • 26. Unmanaged and Managed devices • An Enterprise can interact with “managed” and “unmanaged” Windows Phone 8 devices • An Unmanaged phone (which might be a Bring Your Own Device) is one that is not integrated into the management regime in the Enterprise – The user of an Unmanaged phone has control over which applications are loaded onto the phone and what phone capabilities that the applications have • An Enterprise has a high level of control over a Managed phone – The Enterprise can automatically deploy and revoke applications on the phone – An Enterprise can remotely delete data from a Managed phone
  • 27. Managed vs Unmanaged Phones Feature Unmanaged Phone Managed Phone Device encryption Yes Yes Private app distribution Yes Yes Policy management No Yes App Management No Yes App un-enrollment No Yes Remote delete of business data No Yes Company Hub APIs Yes Yes
  • 28. Device Enrolment • The Enterprise can distribute applications to Managed and Unmanaged Windows Phone 8 devices – A device must be “enrolled” so that it can run Enterprise applications – This provides it with an enrolment token that can be used to open XAP files that have been signed by the Enterprise – This is a “one time” action • Managed phones are automatically enrolled to the Enterprise • An Unmanaged phone must be enrolled before it can run the applications
  • 29. Enrolling an Unmanaged Phone • There are a number of ways that an unmanaged phone can be enrolled: – Send the phone the token using an email secured by IRM (Internet Rights Management) – Email a message containing a web link to the token – the user must authenticate on the web site before being given the token • Once the phone has been enrolled into the enterprise the user can download and run enterprise applications • Enrolment does not affect any other aspects of phone use – It does not allow remote management of the enrolled phone • Microsoft does not provide tools to track the number of unmanaged phones that have been enrolled
  • 30. Enrolment on Managed and Unmanaged Devices Feature Unmanaged Phone Managed Phone App enrollment By attachment in email Via web link Integrated with device enrollment Implemented by Enterprise IT Provisioned by System Center By attachment in IT email or by web download Integrated with device enrollment Implemented by Enterprise IT Provisioned by System Center App un-enrollment N/A Integrated with device un-enrollment Containment Low High Enterprise app store Enterprise client install App inventory

Notas do Editor

  1. Enterprise App publishing optionsEnterprise app distribution options and techniques for user authentication
  2. &lt;read goals verbatim&gt;Companies control which phones may run their apps- Enterprise apps may install and run only on phones that are enrolled with the associated enterpriseCompanies can deploy their apps without ongoing interaction from Microsoft- Companies control the full lifecycle of their appsThe user is in control of their phone- App installs require user confirmation- Companies can query only their own apps and settings
  3. &lt;read goals verbatim&gt;Companies control which phones may run their apps- Enterprise apps may install and run only on phones that are enrolled with the associated enterpriseCompanies can deploy their apps without ongoing interaction from Microsoft- Companies control the full lifecycle of their appsThe user is in control of their phone- App installs require user confirmation- Companies can query only their own apps and settings
  4. 1. Create a Company account with Windows Phone Dev Center2. Acquire an enterprise certificate from Symantec3. Create the Application Enrollment Token (AET)4. Develop and sign applications to distribute within the enteprise5. Enroll phones with the enterprise6. Distribute and Install applications on enrolled phones7. Run applications8. Phone home
  5. Issuer must be Symantec. Only one root of trust is valid for enterprise certificates.Valid from/to dates are for a period of 12 months. The cert is invalid outside of the validity period.Subject CN (common name) is shown to the user when enrolling with an AET file or installing an enterprise app.Subject UID is the Enterprise ID (Publisher ID). The Enterprise ID ties together an app and an AET.The EKU includes a new OID for Windows Phone enterprise application deployment. This EKU must be present for the cert to be valid for WP8 enterprise functionality.