SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
September 28, 2012




            BYOD & MDM


                                          BYOD & MDM
                                          How Mobile Device Management solution enable ‘Bring
                                          Your Own Device’ Strategy for your business




20 Enterprise, 4th Floor, Aliso Viejo, CA 92656                                    www.ust-global.com
BYOD & MDM
    Tipping Points Passed for
          Critical Technologies
                              2010                  2011          2012             2013               2014


                                                                                             More mobile
                                 ½ of endpoints             20% of endpoints
           Mobile                                                                             OS devices
                                   are mobile                   are BYO
                                                                                               than PCs
                                      ½ of server
                                                               ½ of server
    Virtualization                   deployments
                                                           workloads are virtual
                                      are virtual

              Video             ½ of users use video in work         Software-based VC           Business
                                                                      passes hardware          video traffic
                                                                                                surpasses
              Voice                                    ½ of business voice is mobile              voice


                                                 More connected                           Traffic from things is
            Things
                                                things than people                        ½ traffic from people
    Information supplied courtesy of Gartner
2       Confidential & Proprietary
BYOD & MDM
    Smartphones Change Indian
    Business & Consumer Strategies

                                      Blurring roles, changing expectations


  Consumers                                                                               Employees

                      Using a paper map
                                Reading books                                 Activities done less
                                                                              since having a
                                 Watching TV
                                                                              smartphone
                        Using a computer
          Taking photos on a camera
   Playing games on a PC / console

                                                0%   10%   20%   30%   40%
Information supplied courtesy of OFCOM, OFCOM copyright, Communications Market Report: UK, 2011
   Confidential & Proprietary
BYOD & MDM

    Key Mobile & Wireless Technologies

       Mobile Consumer                 4G Standard
                                                                                                                           Investment
       Application Platforms                                                                                               Wi-Fi
                                                                                               Mobile Enterprise
                                                                                            Application Platforms          MDM
                                               6LoWPAN
                                                                               Location-Aware Applications
                                                                                                                           Mobile Apps
         Context Delivery
                                                Machine-to-Machine
                                                Communication Services
                                                                                         Location-Aware                    Mobile
                                                                                             Technology
            Architecture                       Mobile Device Management                                                    Security
                                                    Software-Defined
                                                    Radio
            802.11ac                                 Hosted Virtual                   Mobile Enterprise Applications via SaaS
                                                     Desktops
        802.11ad
                                                                            802.11n
                                                                           Network Access Control
                                                                                                           As of August 2011
                            Peak of
                            Inflated        Trough of                                                     Plateau of
                                                                        Slope of Enlightenment
           Technology Trigger               Disillusionment                                               Productivity
                            Expectations
                                                         time
           Years to mainstream adoption:
                                                                                                        obsolete
             less than 2 years       2 to 5 years       5 to 10 years         more than 10 years        before plateau
Information supplied courtesy of Gartner
    Confidential & Proprietary
BYOD & MDM
   Chaos and Opportunity From Mobile Devices
   and Consumerization
                                CIOs WorldwideSay:
 • They will support more than 3 smartphone or tablet
   platforms by 2013.
 • About a quarter of mobile devices used for business
   purposes will be owned by employees.
                                     And Yet…
 • Less than 30% believe that current smartphone and
   tablet strategies will satisfy an auditor.

From "CIO Attitudes Toward Consumerization of Mobile Devices and Applications"
May 2011

   Confidential & Proprietary
BYOD & MDM
   Features & Benefits
Advanced Management                   Mobile Activity Intelligence
Multi-OS Mobile Operations Under      Cut wireless bills using real - time activity
  Control                                monitoring

   Multi-OS management                  Visibility and reporting

   Enterprise Data boundary             Real-time Roaming Control

   Application management               Exception and Abuse Control

   Access Control
                                      My Phone @ Work
   Advanced security                 Self-governance and end -user productivity

   Remote control                       Usage visibility

   Lost phone recovery                  App discovery

   Enterprise services integration      Self service


6    Confidential & Proprietary
BYOD & MDM

Reference Architecture




Confidential & Proprietary
BYOD & MDM

Gartner Magic Quadrant on MDM




Confidential & Proprietary
BYOD & MDM

         BYOD – Case Study
         For India based oil and gas exploration and production company
                               Business Issues                                        Our Solution
                                Ensure safe usage of IPAD’s                           UST Global helped our client with the in-house
                                Need a secure solution to ensure employees             deployment of MDM (Mobile Device Management)
                                 privacy they need while maintaining the required       solution through the McAfee EMM platform
                                 level of corporate protection                         UST Global team also helped our client to define the
                                Define a BYOD Strategy for the enablement of           security policies to monitor compliance for secure access
Client Profile:                  BYOD mobile devices within their enterprise and to     to corporate network with those mobile devices.
 Our client, a Nifty 50         provision mobile devices                              UST Global team executed a proof of concept to evaluate
  company, is one of            Enable highly secure corporate network access          of EMM software and to assess the IT change process to
  the biggest private           Manage the devices remotely once connected to          be in place for Server/Network setup
  sector exploration and         corporate network.                                    UST installed McAfee Enterprise Mobility Management
  production companies                                                                  EMM MDM infrastructure in their DMZ to enable iPAD’s
  in India                                                                              to connect securely to client’s corporate applications
                               Client Benefits                                          from Internet and wireless. We have done iPAD
Highlights:                                                                             provisioning through the EMM platform, but the solution
                                Improved Efficiency and productivity                   scales to accommodate other mobile OS's
 Company IT realized
                                      • Improved the overall productivity and          The BYOD Strategy for the client included the following
   that allowing people
                                         collaboration within the organization.         components:
   to bring and
   manage their own                   • Secure Access to Corporate Network to                • BYOD Deployment Options
   devices would                         access the latest corporate information             • MDM Provider
   significantly                         form anywhere, enabling senior executives
                                         to make smarter decisions that positively           • Plan management
   improve
                                         impacts client’s business                           • Reimbursement Strategy
   productivity and at
   the same time bring          Scalable mobile security architecture                 UST Global have done iPAD provisioning through the
   considerable savings         Improved TCO                                           McAfee’s EMM platform, the solution also scales to
   not having to                                                                        accommodate other mobile OS's.
   manage the devices
   for their employees


9       Confidential & Proprietary
Thank
                                        You


Copyright © 2012 UST Global Inc. All Rights Reserved   www.ust-global.com

Contenu connexe

Plus de Deepu S Nath

How machines can take decisions
How machines can take decisionsHow machines can take decisions
How machines can take decisionsDeepu S Nath
 
Artificial Intelligence: An Introduction
 Artificial Intelligence: An Introduction Artificial Intelligence: An Introduction
Artificial Intelligence: An IntroductionDeepu S Nath
 
FAYA PORT 80 Introduction
FAYA PORT 80 IntroductionFAYA PORT 80 Introduction
FAYA PORT 80 IntroductionDeepu S Nath
 
How machines can take decisions
How machines can take decisionsHow machines can take decisions
How machines can take decisionsDeepu S Nath
 
Simplified Introduction to AI
Simplified Introduction to AISimplified Introduction to AI
Simplified Introduction to AIDeepu S Nath
 
Mining Opportunities of Block Chain and BitCoin
Mining Opportunities of Block Chain and BitCoinMining Opportunities of Block Chain and BitCoin
Mining Opportunities of Block Chain and BitCoinDeepu S Nath
 
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOpsDeepu S Nath
 
Coffee@DBG - TechBites March 2016
Coffee@DBG - TechBites March 2016Coffee@DBG - TechBites March 2016
Coffee@DBG - TechBites March 2016Deepu S Nath
 
REACT.JS : Rethinking UI Development Using JavaScript
REACT.JS : Rethinking UI Development Using JavaScriptREACT.JS : Rethinking UI Development Using JavaScript
REACT.JS : Rethinking UI Development Using JavaScriptDeepu S Nath
 
SEO For Developers
SEO For DevelopersSEO For Developers
SEO For DevelopersDeepu S Nath
 
Life Cycle of an App - From Idea to Monetization
Life Cycle of an App - From Idea to Monetization  Life Cycle of an App - From Idea to Monetization
Life Cycle of an App - From Idea to Monetization Deepu S Nath
 
Uncommon Python - What is special in Python
Uncommon Python -  What is special in PythonUncommon Python -  What is special in Python
Uncommon Python - What is special in PythonDeepu S Nath
 
Coffee@DBG - TechBites Sept 2015
Coffee@DBG - TechBites Sept 2015Coffee@DBG - TechBites Sept 2015
Coffee@DBG - TechBites Sept 2015Deepu S Nath
 
Techbites July 2015
Techbites July 2015Techbites July 2015
Techbites July 2015Deepu S Nath
 
Apple Watch - Start Your Developer Engine
Apple Watch -  Start Your Developer EngineApple Watch -  Start Your Developer Engine
Apple Watch - Start Your Developer EngineDeepu S Nath
 
Greetings & Response - English Communication Training
Greetings & Response - English Communication TrainingGreetings & Response - English Communication Training
Greetings & Response - English Communication TrainingDeepu S Nath
 
Hybrid Mobile App Development - Xamarin
Hybrid Mobile App Development - XamarinHybrid Mobile App Development - Xamarin
Hybrid Mobile App Development - XamarinDeepu S Nath
 
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...Deepu S Nath
 
Internet of Things - The new Paradigmn
Internet of Things - The new ParadigmnInternet of Things - The new Paradigmn
Internet of Things - The new ParadigmnDeepu S Nath
 
Comparing Swift features with Objective C
Comparing Swift features with Objective CComparing Swift features with Objective C
Comparing Swift features with Objective CDeepu S Nath
 

Plus de Deepu S Nath (20)

How machines can take decisions
How machines can take decisionsHow machines can take decisions
How machines can take decisions
 
Artificial Intelligence: An Introduction
 Artificial Intelligence: An Introduction Artificial Intelligence: An Introduction
Artificial Intelligence: An Introduction
 
FAYA PORT 80 Introduction
FAYA PORT 80 IntroductionFAYA PORT 80 Introduction
FAYA PORT 80 Introduction
 
How machines can take decisions
How machines can take decisionsHow machines can take decisions
How machines can take decisions
 
Simplified Introduction to AI
Simplified Introduction to AISimplified Introduction to AI
Simplified Introduction to AI
 
Mining Opportunities of Block Chain and BitCoin
Mining Opportunities of Block Chain and BitCoinMining Opportunities of Block Chain and BitCoin
Mining Opportunities of Block Chain and BitCoin
 
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOps
 
Coffee@DBG - TechBites March 2016
Coffee@DBG - TechBites March 2016Coffee@DBG - TechBites March 2016
Coffee@DBG - TechBites March 2016
 
REACT.JS : Rethinking UI Development Using JavaScript
REACT.JS : Rethinking UI Development Using JavaScriptREACT.JS : Rethinking UI Development Using JavaScript
REACT.JS : Rethinking UI Development Using JavaScript
 
SEO For Developers
SEO For DevelopersSEO For Developers
SEO For Developers
 
Life Cycle of an App - From Idea to Monetization
Life Cycle of an App - From Idea to Monetization  Life Cycle of an App - From Idea to Monetization
Life Cycle of an App - From Idea to Monetization
 
Uncommon Python - What is special in Python
Uncommon Python -  What is special in PythonUncommon Python -  What is special in Python
Uncommon Python - What is special in Python
 
Coffee@DBG - TechBites Sept 2015
Coffee@DBG - TechBites Sept 2015Coffee@DBG - TechBites Sept 2015
Coffee@DBG - TechBites Sept 2015
 
Techbites July 2015
Techbites July 2015Techbites July 2015
Techbites July 2015
 
Apple Watch - Start Your Developer Engine
Apple Watch -  Start Your Developer EngineApple Watch -  Start Your Developer Engine
Apple Watch - Start Your Developer Engine
 
Greetings & Response - English Communication Training
Greetings & Response - English Communication TrainingGreetings & Response - English Communication Training
Greetings & Response - English Communication Training
 
Hybrid Mobile App Development - Xamarin
Hybrid Mobile App Development - XamarinHybrid Mobile App Development - Xamarin
Hybrid Mobile App Development - Xamarin
 
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
 
Internet of Things - The new Paradigmn
Internet of Things - The new ParadigmnInternet of Things - The new Paradigmn
Internet of Things - The new Paradigmn
 
Comparing Swift features with Objective C
Comparing Swift features with Objective CComparing Swift features with Objective C
Comparing Swift features with Objective C
 

Dernier

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 

Dernier (20)

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 

MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

  • 1. September 28, 2012 BYOD & MDM BYOD & MDM How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business 20 Enterprise, 4th Floor, Aliso Viejo, CA 92656 www.ust-global.com
  • 2. BYOD & MDM Tipping Points Passed for Critical Technologies 2010 2011 2012 2013 2014 More mobile ½ of endpoints 20% of endpoints Mobile OS devices are mobile are BYO than PCs ½ of server ½ of server Virtualization deployments workloads are virtual are virtual Video ½ of users use video in work Software-based VC Business passes hardware video traffic surpasses Voice ½ of business voice is mobile voice More connected Traffic from things is Things things than people ½ traffic from people Information supplied courtesy of Gartner 2 Confidential & Proprietary
  • 3. BYOD & MDM Smartphones Change Indian Business & Consumer Strategies Blurring roles, changing expectations Consumers Employees Using a paper map Reading books Activities done less since having a Watching TV smartphone Using a computer Taking photos on a camera Playing games on a PC / console 0% 10% 20% 30% 40% Information supplied courtesy of OFCOM, OFCOM copyright, Communications Market Report: UK, 2011 Confidential & Proprietary
  • 4. BYOD & MDM Key Mobile & Wireless Technologies Mobile Consumer 4G Standard Investment Application Platforms Wi-Fi Mobile Enterprise Application Platforms MDM 6LoWPAN Location-Aware Applications Mobile Apps Context Delivery Machine-to-Machine Communication Services Location-Aware Mobile Technology Architecture Mobile Device Management Security Software-Defined Radio 802.11ac Hosted Virtual Mobile Enterprise Applications via SaaS Desktops 802.11ad 802.11n Network Access Control As of August 2011 Peak of Inflated Trough of Plateau of Slope of Enlightenment Technology Trigger Disillusionment Productivity Expectations time Years to mainstream adoption: obsolete less than 2 years 2 to 5 years 5 to 10 years more than 10 years before plateau Information supplied courtesy of Gartner Confidential & Proprietary
  • 5. BYOD & MDM Chaos and Opportunity From Mobile Devices and Consumerization CIOs WorldwideSay: • They will support more than 3 smartphone or tablet platforms by 2013. • About a quarter of mobile devices used for business purposes will be owned by employees. And Yet… • Less than 30% believe that current smartphone and tablet strategies will satisfy an auditor. From "CIO Attitudes Toward Consumerization of Mobile Devices and Applications" May 2011 Confidential & Proprietary
  • 6. BYOD & MDM Features & Benefits Advanced Management Mobile Activity Intelligence Multi-OS Mobile Operations Under Cut wireless bills using real - time activity Control monitoring  Multi-OS management  Visibility and reporting  Enterprise Data boundary  Real-time Roaming Control  Application management  Exception and Abuse Control  Access Control My Phone @ Work  Advanced security Self-governance and end -user productivity  Remote control  Usage visibility  Lost phone recovery  App discovery  Enterprise services integration  Self service 6 Confidential & Proprietary
  • 7. BYOD & MDM Reference Architecture Confidential & Proprietary
  • 8. BYOD & MDM Gartner Magic Quadrant on MDM Confidential & Proprietary
  • 9. BYOD & MDM BYOD – Case Study For India based oil and gas exploration and production company Business Issues Our Solution  Ensure safe usage of IPAD’s  UST Global helped our client with the in-house  Need a secure solution to ensure employees deployment of MDM (Mobile Device Management) privacy they need while maintaining the required solution through the McAfee EMM platform level of corporate protection  UST Global team also helped our client to define the  Define a BYOD Strategy for the enablement of security policies to monitor compliance for secure access Client Profile: BYOD mobile devices within their enterprise and to to corporate network with those mobile devices.  Our client, a Nifty 50 provision mobile devices  UST Global team executed a proof of concept to evaluate company, is one of  Enable highly secure corporate network access of EMM software and to assess the IT change process to the biggest private  Manage the devices remotely once connected to be in place for Server/Network setup sector exploration and corporate network.  UST installed McAfee Enterprise Mobility Management production companies EMM MDM infrastructure in their DMZ to enable iPAD’s in India to connect securely to client’s corporate applications Client Benefits from Internet and wireless. We have done iPAD Highlights: provisioning through the EMM platform, but the solution  Improved Efficiency and productivity scales to accommodate other mobile OS's  Company IT realized • Improved the overall productivity and  The BYOD Strategy for the client included the following that allowing people collaboration within the organization. components: to bring and manage their own • Secure Access to Corporate Network to • BYOD Deployment Options devices would access the latest corporate information • MDM Provider significantly form anywhere, enabling senior executives to make smarter decisions that positively • Plan management improve impacts client’s business • Reimbursement Strategy productivity and at the same time bring  Scalable mobile security architecture  UST Global have done iPAD provisioning through the considerable savings  Improved TCO McAfee’s EMM platform, the solution also scales to not having to accommodate other mobile OS's. manage the devices for their employees 9 Confidential & Proprietary
  • 10. Thank You Copyright © 2012 UST Global Inc. All Rights Reserved www.ust-global.com

Notes de l'éditeur

  1. The mobile / wireless market remains confused and complex and we expect large numbers of new devices, services and applications to emerge through 2015. In mature markets smartphones in particular are driving significant behaviour changes in both consumers and employees. For example:Employees are behaving more like consumers demanding a wider choice of devices, exploiting consumer devices and applications from app stores, and adopting new strategies such as "bring your own" IT. The distinctions between a person's role as an employee and as a consumer are more blurred than ever.Consumer behaviour is changing, online activities are switching from PC and web channels to the mobile channel as smartphones become more popular and affordable. Traditional activities such as watching TV and reading newspapers are declining. The consequence will be major changes in consumer and employee-facing mobility. There are opportunities to innovate and deliver new services and experiences to consumers and to change the way in which devices and applications are supplied to employees. The social changes driven by mobility and smartphones apply particularly to teens who will be the next generation of employees and consumers. Note: survey data is taken from the UK OFCOM Communications Market Report published in August 2011 and is reproduced courtesy of OFCOM.
  2. Investments in mobile and wireless technologies are addressing these problems:Wireless networking technologies are advancing rapidly. The 802.11 family of wireless technologies is providing the highest economies of scale and the most common connection method for new devices. By 2014, 802.11ac-based systems will double the capacity of 802.11n, the current state-of-the-art in Wi-Fi. And it will double again by 2016 with the arrival of 802.11ad. The all-wireless enterprise will become a reality. In the cellular network, 4G technologies, especially LTE, are rapidly rolling out, and as Software Defined Radio matures the ability to move between generations of cellular technologies will accelerate. European organizations should embrace WiFi on the campus, with multi-radio devices and/or personal hotspots as a way to manage the disparity in publiceWiFi availability. Demand for mobile applications delivered on new devices such as tablets has exploded, raising the profile of multiplatform mobile device management, rather than restricting support to a single platform. More platforms means more complexity, and more variability in the management capabilities of the platforms. Add to this a highly splintered marketplace among rising operating systems such as Android, and the result is a new set of Mobile Device Management technologies. Multiplatform mobile app dev, including HTML5 code generation, is now becoming important to many enterprises (mobile enterprise application platforms, mobile consumer application platforms, and mobile enterprise applications via SaaS). 
  3. By year end 2012, respondents to surveys at our CIO Forums expected to support an average of 3.7 smartphone or tablet platforms (where a "platform" is defined as an OS such as Symbian, iOS or Android).They also expected that, on average, over 20% of mobile devices used for business purposes would be owned by employees — with a much higher than average 38% rate in the U.S.More than two-thirds of the respondents were planning to move to thinner client architectures to make it easier to support a wider range of endpoint devices.Respondents were asked whether they believed that their current smartphone and tablet security strategies would satisfy an auditor. Only 27% said it would, just over 40% said it wouldn't and the remainder were unsure.See "CIO Attitudes Toward Consumerization of Mobile Devices and Applications, Gartner, May 2011" (G00212597)..