SlideShare une entreprise Scribd logo
1  sur  15
Mobilizing your Enterprise:
  The Why and The How
Agenda
The Why?
 Mobilizing your Apps – The ‘In Thing’
 Do All Corporations Watch Over BYOD?
 The BYOD Effect
 Security Concern for Enterprises

The How?
 How do I Provide Mobile Access to Enterprise
  IT Apps?
 Security Best Practices
      • Encryption
      • Proxy Server
      • Authentication

                Here’s how SolarWinds Mobile Admin can help…
 Mobilizing Your Enterprise: The Why and The How   - Slide 2 -
Mobilizing your Apps – The ‘In Thing’
 The BYOD revolution has started

  Percentage of Corporations Issuing Mobile
  Devices to Access the Corporate Network




                  Source: Survey jointly conducted by SolarWinds & Network World
                        Respondents: 400 IT pros from different companies


Mobilizing Your Enterprise: The Why and The How   - Slide 3 -
Do All Corporations Watch Over BYOD?
 Employee-owned personal mobile devices peaking
         How many corporations know about personal
          mobile devices on the corporate network?



                                                                     59.3% respondents
                                                                            say
                                                                   “No device restrictions
                                                                      when it comes to
                                                                      employee-owned
                                                                       devices on the
                                                                   corporate network..!!”




                  Source: Survey jointly conducted by SolarWinds & Network World
                        Respondents: 400 IT pros from different companies


Mobilizing Your Enterprise: The Why and The How   - Slide 4 -
The BYOD Effect
                                                                        The BYOD effect:
                                                                       Certainly a boon..!!
                                                                   Increased Employee
                                                                    Productivity
                                                                   Faster response times to
                                                                    solve issues
                                                                   Flexibility to work remotely
                                                                   After-hours support can be
                                                                    offered
                                                                   Personalized work interface
                                                                    for users
                                                                   Improved employee morale
                                                                    and job satisfaction



                  Source: Survey jointly conducted by SolarWinds & Network World
                        Respondents: 400 IT pros from different companies


Mobilizing Your Enterprise: The Why and The How   - Slide 5 -
Security Concern for Enterprises
 Potential for loss of confidential information via personal
  devices
 Legal issues and regulatory compliance risks
 Introduction of malware threats
 Management burden associated with supporting diverse
  device types
 Ensuring user authentication, security, and encryption
 Policy formulation and enforcement
 Monitoring and management of Wi-Fi access points




Mobilizing Your Enterprise: The Why and The How   - Slide 6 -
How Do I Provide Mobile Access to Enterprise IT Apps?

   Does my current app support mobile access?
   Do I need to hire a developer or can I buy something off-
    the-shelf?
   What are the hardware and software requirements for
    providing mobile access to the application?
   What mobile devices does the application support?
   What kind of security do I need?
   How do I effectively monitor and manage my apps
    remotely?




  Mobilizing Your Enterprise: The Why and The How   - Slide 7 -
Security Best Practices
1. Encryption
         Depending on the type of wireless handheld devices used, mobile
         device encryption can be classified as
         » Encryption using Blackberry Enterprise Server for Blackberry
         » Encryption with VPN (iOS and Android devices)
         » Encryption with HTTPS (iOS, Android and BlackBerry devices)


2. Using proxy to secure your firewall

3. Authentication




Mobilizing Your Enterprise: The Why and The How   - Slide 8 -
1. Encryption
 Encryption Using BlackBerry Enterprise Server
         » all your data is sent over the Mobile Data Service (MDS).
         » automatically encrypted using Triple Data Encryption Standard (TDES or
           3DES).
         » While TDES provides the highest industry standard encryption, you can also
           choose additional layers of encryption.
         » All versions of the BlackBerry Enterprise Server use TDES as the default
           encryption for all data.


 The BlackBerry Enterprise Server 4.1 allows you to choose between
  using TDES and Advanced Encryption Standard (AES), or both.

 While TDES and AES are generally recognized as the most robust
  encryption methods available today, the US Government has also
  certified TDES and AES as compliant with Federal Information
  Processing Standards (FIPS).


Mobilizing Your Enterprise: The Why and The How   - Slide 9 -
1. Encryption (contd.)
 Encryption with VPN for Apple iOS & Android
         »     You can encrypt Apple iOS and Android devices with a Virtual Private
               Network (VPN).
         »     If you use a VPN, all your data is sent over the VPN, and is, by default,
               automatically encrypted.


 Encryption with Hypertext Transfer Protocol – Secured (HTTPS)
         »     Regardless of using the above 2 encryptions, you can also add a layer of
               encryption with Hypertext Transfer Protocol – Secured (HTTPS).
         »     HTTPS is HTTP encrypted with Transport Layer Security (TLS).
         »     Here all data transmitted between the application server and the wireless
               handheld is encrypted.




Mobilizing Your Enterprise: The Why and The How   - Slide 10 -
2. Using Proxy to Secure your Firewall
 If a common proxy service is not used
         » then all SSH/Telnet and RDP/VNC servers must have the appropriate
           firewall configuration.

 If you have a common server for mobile platform integration, a proxy
  service can be used.
         » This helps to lock down your firewall to have fewer openings for users’
           without permission to access servers.

 The proxy service proxies SSH/Telnet and RDP/VNC traffic.

 The mobile app clients authenticate transparently to the proxy
         » if the appropriate rights and permissions have been configured.

 The proxy service can enable access to SSH/Telnet and RDP/VNC
  servers through a central port rather than having to configure access
  to each individual server.


Mobilizing Your Enterprise: The Why and The How   - Slide 11 -
3. Authentication
 Ensure only the users with permission can access the
  company infrastructure
         » Mobile App Login
                • Windows based – user name & password
                • Application specific user name & password

         » Active Directory – only wanted users of the application can
           access it. If you have a central server for mobile application
           access, Active Directory can ensure users get access to the
           applications they need.

         » Device Level Password

         » RSA SecurID/RADIUS




Mobilizing Your Enterprise: The Why and The How   - Slide 12 -
How SolarWinds® Mobile Admin™ can help
  Solve IT issues more effectively (from your mobile device)
   through a single pane of glass

  Support and navigation across 40+ IT management tools

  Diagnose, triage & resolve IT issues in a few clicks from any
   smartphone or tablet

  Delivers real-time alerts and statuses on your Android, iOS, and
   Blackberry devices

  Remote control with SSH, Telnet, VNC, RDP, proxy via Mobile
   Admin Server or direct connect

  Easy to download & deploy, easy to use, & easy on your budget



 Mobilizing Your Enterprise: The Why and The How   - Slide 13 -
Helpful Resources
  For agentless IT management & monitoring from
   any mobile device, we invite you to learn more
         about SolarWinds Mobile Admin


          Watch Video                            See Demo




       Ask Our Community                    Download Free Trial



                  Click any of the links above


                             - Slide 14 -
Author: Jennifer Kuvlesky




    Thank You!

Contenu connexe

Tendances

Migrating workloads to OpenStack
Migrating workloads to OpenStackMigrating workloads to OpenStack
Migrating workloads to OpenStackopenstackstl
 
Mmckeown hadr that_conf
Mmckeown hadr that_confMmckeown hadr that_conf
Mmckeown hadr that_confMike McKeown
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentialssolsoft
 
Presentation managing the virtual environment
Presentation   managing the virtual environmentPresentation   managing the virtual environment
Presentation managing the virtual environmentsolarisyourep
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualizationnone
 
An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014David J Rosenthal
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update ManagementQuest
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft AzureMohamed Tawfik
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018Mercury Solutions
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryMark McHenry
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesAmit Gatenyo
 
Encontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesEncontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesSoftware Guru
 
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...eG Innovations
 
Top 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the CloudTop 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the CloudVMware
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features Cireson
 

Tendances (19)

Migrating workloads to OpenStack
Migrating workloads to OpenStackMigrating workloads to OpenStack
Migrating workloads to OpenStack
 
How to Migrate Without Downtime
How to Migrate Without DowntimeHow to Migrate Without Downtime
How to Migrate Without Downtime
 
Mmckeown hadr that_conf
Mmckeown hadr that_confMmckeown hadr that_conf
Mmckeown hadr that_conf
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentials
 
Installation
InstallationInstallation
Installation
 
Presentation managing the virtual environment
Presentation   managing the virtual environmentPresentation   managing the virtual environment
Presentation managing the virtual environment
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
 
Encontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesEncontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de Aplicaciones
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...
 
Top 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the CloudTop 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the Cloud
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features
 

Similaire à Mobilizing Your Enterprise, Why & How?

Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private CloudVertical Solutions
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceVMware
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition OverviewNatalie Hewitt
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedMotasem Al Amour
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 

Similaire à Mobilizing Your Enterprise, Why & How? (20)

Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 

Plus de SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilitySolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilitySolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsSolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceSolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 

Plus de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Dernier

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Mobilizing Your Enterprise, Why & How?

  • 1. Mobilizing your Enterprise: The Why and The How
  • 2. Agenda The Why?  Mobilizing your Apps – The ‘In Thing’  Do All Corporations Watch Over BYOD?  The BYOD Effect  Security Concern for Enterprises The How?  How do I Provide Mobile Access to Enterprise IT Apps?  Security Best Practices • Encryption • Proxy Server • Authentication Here’s how SolarWinds Mobile Admin can help… Mobilizing Your Enterprise: The Why and The How - Slide 2 -
  • 3. Mobilizing your Apps – The ‘In Thing’  The BYOD revolution has started Percentage of Corporations Issuing Mobile Devices to Access the Corporate Network Source: Survey jointly conducted by SolarWinds & Network World Respondents: 400 IT pros from different companies Mobilizing Your Enterprise: The Why and The How - Slide 3 -
  • 4. Do All Corporations Watch Over BYOD?  Employee-owned personal mobile devices peaking How many corporations know about personal mobile devices on the corporate network? 59.3% respondents say “No device restrictions when it comes to employee-owned devices on the corporate network..!!” Source: Survey jointly conducted by SolarWinds & Network World Respondents: 400 IT pros from different companies Mobilizing Your Enterprise: The Why and The How - Slide 4 -
  • 5. The BYOD Effect The BYOD effect: Certainly a boon..!!  Increased Employee Productivity  Faster response times to solve issues  Flexibility to work remotely  After-hours support can be offered  Personalized work interface for users  Improved employee morale and job satisfaction Source: Survey jointly conducted by SolarWinds & Network World Respondents: 400 IT pros from different companies Mobilizing Your Enterprise: The Why and The How - Slide 5 -
  • 6. Security Concern for Enterprises  Potential for loss of confidential information via personal devices  Legal issues and regulatory compliance risks  Introduction of malware threats  Management burden associated with supporting diverse device types  Ensuring user authentication, security, and encryption  Policy formulation and enforcement  Monitoring and management of Wi-Fi access points Mobilizing Your Enterprise: The Why and The How - Slide 6 -
  • 7. How Do I Provide Mobile Access to Enterprise IT Apps?  Does my current app support mobile access?  Do I need to hire a developer or can I buy something off- the-shelf?  What are the hardware and software requirements for providing mobile access to the application?  What mobile devices does the application support?  What kind of security do I need?  How do I effectively monitor and manage my apps remotely? Mobilizing Your Enterprise: The Why and The How - Slide 7 -
  • 8. Security Best Practices 1. Encryption Depending on the type of wireless handheld devices used, mobile device encryption can be classified as » Encryption using Blackberry Enterprise Server for Blackberry » Encryption with VPN (iOS and Android devices) » Encryption with HTTPS (iOS, Android and BlackBerry devices) 2. Using proxy to secure your firewall 3. Authentication Mobilizing Your Enterprise: The Why and The How - Slide 8 -
  • 9. 1. Encryption  Encryption Using BlackBerry Enterprise Server » all your data is sent over the Mobile Data Service (MDS). » automatically encrypted using Triple Data Encryption Standard (TDES or 3DES). » While TDES provides the highest industry standard encryption, you can also choose additional layers of encryption. » All versions of the BlackBerry Enterprise Server use TDES as the default encryption for all data.  The BlackBerry Enterprise Server 4.1 allows you to choose between using TDES and Advanced Encryption Standard (AES), or both.  While TDES and AES are generally recognized as the most robust encryption methods available today, the US Government has also certified TDES and AES as compliant with Federal Information Processing Standards (FIPS). Mobilizing Your Enterprise: The Why and The How - Slide 9 -
  • 10. 1. Encryption (contd.)  Encryption with VPN for Apple iOS & Android » You can encrypt Apple iOS and Android devices with a Virtual Private Network (VPN). » If you use a VPN, all your data is sent over the VPN, and is, by default, automatically encrypted.  Encryption with Hypertext Transfer Protocol – Secured (HTTPS) » Regardless of using the above 2 encryptions, you can also add a layer of encryption with Hypertext Transfer Protocol – Secured (HTTPS). » HTTPS is HTTP encrypted with Transport Layer Security (TLS). » Here all data transmitted between the application server and the wireless handheld is encrypted. Mobilizing Your Enterprise: The Why and The How - Slide 10 -
  • 11. 2. Using Proxy to Secure your Firewall  If a common proxy service is not used » then all SSH/Telnet and RDP/VNC servers must have the appropriate firewall configuration.  If you have a common server for mobile platform integration, a proxy service can be used. » This helps to lock down your firewall to have fewer openings for users’ without permission to access servers.  The proxy service proxies SSH/Telnet and RDP/VNC traffic.  The mobile app clients authenticate transparently to the proxy » if the appropriate rights and permissions have been configured.  The proxy service can enable access to SSH/Telnet and RDP/VNC servers through a central port rather than having to configure access to each individual server. Mobilizing Your Enterprise: The Why and The How - Slide 11 -
  • 12. 3. Authentication  Ensure only the users with permission can access the company infrastructure » Mobile App Login • Windows based – user name & password • Application specific user name & password » Active Directory – only wanted users of the application can access it. If you have a central server for mobile application access, Active Directory can ensure users get access to the applications they need. » Device Level Password » RSA SecurID/RADIUS Mobilizing Your Enterprise: The Why and The How - Slide 12 -
  • 13. How SolarWinds® Mobile Admin™ can help  Solve IT issues more effectively (from your mobile device) through a single pane of glass  Support and navigation across 40+ IT management tools  Diagnose, triage & resolve IT issues in a few clicks from any smartphone or tablet  Delivers real-time alerts and statuses on your Android, iOS, and Blackberry devices  Remote control with SSH, Telnet, VNC, RDP, proxy via Mobile Admin Server or direct connect  Easy to download & deploy, easy to use, & easy on your budget Mobilizing Your Enterprise: The Why and The How - Slide 13 -
  • 14. Helpful Resources For agentless IT management & monitoring from any mobile device, we invite you to learn more about SolarWinds Mobile Admin Watch Video See Demo Ask Our Community Download Free Trial Click any of the links above - Slide 14 -