Mercredi 20 novembre 2013
Riviera Marriott Hôtel

« Solutions Mobiles en mode Cloud »
Le HUB : un eco-système à votre service

Avec nos partenaires : Mettre en place les conditions de
développement des entrep...
Une Principauté Hyper-Connectée

 Territoire 100% couvert en Haut
débit Mobile

 Internet et réseau privé dédié via
solu...
Vos données et applications sécurisées

Profiter de services informatiques …
sans avoir à les produirent

Bénéfices
 Opti...
Le Cloud Monaco : Vos données à Monaco
et seulement à Monaco

Développement en cours

Capacité dispo : 50 baies
Extension ...
Des partenaires impliquées dans le
développement du HUB

Expert en solutions de mobilités
Leader européen des Data Centers...
Gestion des données pour smartphones et tablettes
Hervé MANGOT
PDG SAPHELEC

MobileIron Confidential
MobileIron - Confiden...
Constat :La Tornade Mobile.

2B

Devices
/5 ans

THE PC ERA

THE WEB ERA

THE MOBILE ERA

• A PC on every desk

• A Browse...
Le marché en quelques chiffres
Shipment Tablets + Smartphone > PC in 2010
Tablets
Smartphones

Notebook PCs

Desktop PCs

...
Success Story

3300

>70

Customers

Public Reference Customers

Financial Services

Government & Education

Professional ...
MobileIron: Plate-forme complète de gestion des mobiles
1

6

Email et apps
Sécurité et identité
Wi-Fi et VPN
… par groupe...
Avantages MobileIron : le meilleur compromis

Avantage du Produit

Innovations
multi-OS architecture dès l’origine

Choix ...
Politiques par défaut

Il y a 4 politiques par défaut:
• Security: comment on gère les mots de passe, le chiffrement, les ...
Applications d’Entreprise

MobileIron Confidential

14
Contrôle des applications

Applications :
- Requises,
- recommandées,
- Interdites
=> Alertes et actions.

MobileIron Conf...
Inventaire des applications
• Identification des applications sur le terminal

MobileIron Confidential

16

16
Gestion du cycle de vie des applications
•
•
•
•

Identification des Apps présentes sur le terminal
Règles de contrôle des...
Merci pour votre attention

MobileIron Confidential

18
Prochain SlideShare
Chargement dans…5
×

Petit déjeuner du 20/11 MDM en mode Cloud Saphelec & Monaco Telecom

1 217 vues

Publié le

Présentation des Solutions Mobile Device Management en mode Cloud. EXCLUSIVITE la nouvelle solution KNOX développée par SAMSUNG, permettant de séparer les fichiers personnels de vos collaborateurs de vos données entreprises, en toute sécurité. Et grâce aux solutions MDM de Mobile Iron, compatibles avec KNOX, vous êtes assuré d'une gestion globale de tous vos outils mobiles (Smartphones et tablettes)

0 commentaire
0 j’aime
Statistiques
Remarques
  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

Aucun téléchargement
Vues
Nombre de vues
1 217
Sur SlideShare
0
Issues des intégrations
0
Intégrations
195
Actions
Partages
0
Téléchargements
10
Commentaires
0
J’aime
0
Intégrations 0
Aucune incorporation

Aucune remarque pour cette diapositive
  • WelcomeIntroductionsToday we will introduce MobileIron and discuss what it takes to build a Mobile First Enterprise.
  • Let’s look at some actual numbers.The left analysis was done by IDC and captures the total number of smartphones sold each year for business use, whether bought by the employee or the company. In the next four years, almost 1B total smartphones will be sold for business use, split over at least four operating systems. That means the majority of white collar workers in the world will be using a smartphone for business purposes. This doesn’t even include tablets.And starting in 2012, for the very first time, the number of personal devices purchased and used for work will surpass the number of corporate devices purchased and used for work.Devices are everywhere.And so are apps.Apple’s App Store launched July 10, 2008. That means 4 years ago, there were almost no mobile apps, other than Java games. And now, over 15 billion apps have already been downloaded from just Apple’s App Store, and over 10 billion from Google’s Android Market.That’s almost 50 apps per device and growing.As IT, you are responsible for the security of your corporate data:How do you keep up with this pace of change?Which of these devices do you trust?Which of these apps do you trust?How do you take advantage of mobility?Sources:IDC: Worldwide Business Use Smartphone 2011-2015 Forecast and Analysis (September 2011)App store downloads: http://tech.fortune.cnn.com/2011/07/11/apple-users-buying-61-more-apps-paying-14-more-per-app/Android Market downloads: Google released data Dec 5, 2011 # apps per phone:http://technolog.msnbc.msn.com/_news/2011/04/27/6543575-apple-android-phone-users-are-heaviest-app-downloaders
  • Mobile is a fundamental platform transition, just like the PC in the 80s, and web in the 90s. This transition is driven almost entirely by end-user demand, not IT policy.What this means for our customers:The most important endpoint in the organization will be the mobile device, not the PC. And many users will have more than one mobile device.The end-user’s preferred way to interact with the company will be through a mobile app. Mobile will be not just a better way to do email, but a means to drive true business transformation, just as the web did. Our customers call this the “Mobile First” enterpriseEmployees turn to mobile first to do their workEnterprise developers turn to mobile first to build their appsCustomers turn to mobile first to interact with their vendorsAs Forrester says, the corporate app store becomes the intranet of the future.(Source: “Mobile Management Takes a 180-Degree Turn,” Forrester (John C. McCarthy, Michele Pelino), Aug 8, 2011)And a new profession, Mobile IT, is now chartered with making it happen.
  • Customer success is the core focus of MobileIron. The top item in our corporate values statement from the founding of the company in 2007 is “We and our customers win together”There are four building blocks to customer success:Our underlying architecture, developed from scratch for multi-os mobilityOur product investment in security and apps leadershipOur global operations, including support personnel in a follow-the-sun model. 40% of MobileIron’s business is outside the U.S. and there are now MobileIron customers in over 30 countriesOur growing best practices education, toolkits, and programs focused on helping Mobile IT accelerate mobile adoptionThis investment in the foundation has resulted in MobileIron becoming Mobile IT’s platform of choice1500 new customers have picked MobileIron in just the last two years. All of these customers use MobileIron to manage iOS and 75% also use MobileIron to manage other OS, like Android or BlackBerry. No one has as much customer experience with iOS and Android as MobileIron.200 of the world’s largest companies have picked MobileIron. The largest iOS deployments in the world are secured and managed by MobileIron. Apps have become very popular with our customers – with a rapidly increasing number of customers using the MobileIron Enterprise App Storefront; we expect that number to be over 50% by end of 2012. Some analysts call Mobile Application Management “MAM” – MobileIron has more new OS MAM customers than any other vendorAnd finally the proof of success is the customer’s willingness to maintain an ongoing relationship. 99% of MobileIron’s customers renewed their support in 2011Here is a sample of our customers that have publicly talked about their MobileIron deployment. (NOTE: You can click on all these icons in presentation mode to get to the actual case study / public mention)MobileIron customers range across industriesFinancial servicesHealthcareRetailManufacturingProfessional servicesEducationTechnology… and across the worldNow we’ll dive into specific use cases.********************Note to sales team: MobileIron has 10x the public MDM references of AirWatch or Zenprise. Both those companies appear to only have 2-3 companies in print. All their case studies are from their legacy hotspot management and BES monitoring businesses, respectively. And note for Sybase that Forrester recently wrote: “Sybase wasn’t able to provide us with a customer reference that was using the solution to manage iOS or Android devices” (“Market Overview, Mobile Security” published October 2011). [Note that almost all of Zenprise’s case studies are for their legacy BES monitoring business, not MDM]
  • The MobileIron platform covers the full enterprise lifecycle and is available on-premise or in the cloud.There are several steps IT goes through when deploying mobile devices(One) The devices must be configured securely for email access, apps, encryption, password, device and user identity, and enterprise connectivityConfigurations and policies can be applied by either group or individual… and because each device is tagged as personal or corporate, different configurations and policies can be applied based on device ownership This is important for BYOD programs because customers have different policies for personal devices(Two) The devices must also integrate tightly with back-end enterprise systems. MDM is not an island. MobileIron… protects corporate email… uses the same authentication mechanisms and groups as your existing directory services… connects to your enterprise certificate authority … triggers commands through the BES for management and security… archives SMS messages with your existing archival system(Three) MobileIron provides granular privacy controls, so you can decide whether to track data like location or application inventoryCustomers find this essential, especially for BYOD setups and for geographic variances, for example a heightened awareness of privacy in Europe(Four) And of course, all these configurations, policies, integrations, and controls can be rolled out to thousands and tens of thousands of devices in an automated way(Five) This gives all our customers a single pane of glass to view all mobile devices accessing the enterprise, no matter what operating system. Each device in MobileIron is also labeled as either employee or company owned, since so many companies are allowing personal devices into their networks.Once your smartphones and tablets are rolled out, you need to make sure they continue to remain trusted … so risk mitigation and response is of primary importance(Six) You must monitor posture. Posture is the foundation of mobile security. It is the security state of the device – is it jailbroken? Is it out-of-policy? Has the user turned encryption off by mistake?(Seven) Based on the trust level of the device, MobileIron Sentry controls access to enterprise email. If a device is not trusted, email is blocked. (Eight) Our customers, especially the large enterprises, are also very focused on enforcing device and user identity with certificates, for both security and to improve the mobile user experience. This is one of the greatest strengths of the MobileIron platform – we have both our own certificate authority and the ability to integrate with a customer’s existing certificate authority.(Nine) And these actions are automated, so that IT can focus on managing exceptions, not the details of every device. This allows MobileIron to secure and manage the device fleet with limited people resources. Our customers have told us that with less than 1 FTE, they can manage the same number of devices they were managing with 8-9 FTEs on competitive productsNow let’s talk apps. Apps are the catalyst for business transformation.(Ten) The first concern many IT teams have is the keeping out rogue apps. MobileIron identifies all apps on the device so you can set up app control policies – blacklist or whitelist(Eleven & Twelve) But the real value is when companies start deploying their own apps. MobileIron provides an enterprise app store for IT to publish and distribute apps, and the end-user to discover them(Thirteen) Apps contain enterprise data, sometimes lots of it. Securing that data is the foundation of MobileIron’s multi-OS AppConnect strategy as well as our managed apps capabilities on iOSSo the cycle of apps is complete, from keeping the bad apps out, to distributing and securing the approved apps(Fourteen) One other core operational concern of many companies is the sometimes overwhelming cost of mobile devices, especially due to data consumption. MobileIron tracks roaming activity and whenever a device leaves the country, will notify the appropriate people to either influence behavior or change service plans with the operator(Fifteen) And finally, when the employee leaves or the device is lost, MobileIron allows you to wipe the entire device or selectively wipe just the enterprise workspace, which includes corporate email, VPN and WiFi settings, and business apps.This is the lifecycle of mobility within our customers.
  • From day one, we built the MobileIron product with five goals in mind:Give users choice of deviceSecure mobile dataDrive business enablement through appsIntegrate into existing enterprise systemsScale quickly and cost-effectively to global rolloutsOur core product advantages areMobileIron is the first platform purpose-built for multi-OS. We weren’t retrofitting Windows-based management to iOS. And the new models of ownership, like BYOD, were integrated into the product from day one. As a result IT can confidently support new devices Because of our extensive investment in client technology, MobileIron has the best knowledge of whether a device is secure or not and whether it can be trusted. MobileIron’s management of certificates from enrollment to renewal also lets IT easily enforce identity to prevent unauthorized access. Based on that knowledge we automate actions like notification, blocking email access and quarantine to prevent data loss. As a result, IT can secure mobile data without adding overhead. Apps are an integral part of the MobileIron product. We have the most secure distribution and management capability for mobile apps. As a result, companies can confidently deploy apps.MDM is not an island. It must connect to enterprise systems for security, identity, and communications. MobileIron has deep integration with LDAP, BES, certificate authorities, email, and archiving systems. As a result, IT can integrate mobile into overall IT operationsThe largest post-WinMo mobile deployments are managed by MobileIron. MobileIron is sold as a virtual appliance or a cloud service so the customer doesn’t have to worry about licenses, upgrades, or patching for OS, databases, or servers. As a result, deployments are fast and operations cost-effective. MobileIron has also established a track record of innovation. Jailbreak detection, certificate management, enterprise app stores, selective wipe, inline access control, and privacy policy are examples of innovations that are now essential to every mobile deployment but were first brought to market by MobileIron.
  • Default policies are the policies applied to a smartphone automatically when it is registered.Default policy values are also used as a starting point when you create a custompolicy. MobileIron provides the values for each default policy specification. Youcan then edit the default policies to your needs. If you do edit a default policy’s values,those new values become the starting point when you create a new custom policy.MobileIron provides defaults for the following policy types:• Security: how MobileIron addresses several areas of mobile security• Privacy: which files to synchronize with the MobileIron Server andwhether activity or content should be synchronized for each type of data. Privacy policiesalso specify which information the MobileIron Client should include in its log.• Lockdown: which features should be disabled in the event that smartphoneaccess must be restricted• Sync: how the MobileIron Client behaves on the smartphone and interactswith the MobileIron Server. These interactions include synchronization of profiles,configurations, and app inventory• ActiveSync
  • Notes:The User Portal displays the following informationPhone numberManufacturerDevice modelOperating systemWireless carrierRAM (free& total)Storage (free & total)Call activity (total minutes, incoming, outgoing, details)Texts activity (total texts, incoming, outgoing, details, text content)The User Portal only displays call and text activity that occursafter the smartphone is registered with MobileIron.There are three timeframe options – 1 day, 1 week, or 1 monthThe user can perform the following actionsRegister new smartphoneLocate smartphoneLock smartphoneWipe smartphone
  • Notes:The User Portal displays the following informationPhone numberManufacturerDevice modelOperating systemWireless carrierRAM (free& total)Storage (free & total)Call activity (total minutes, incoming, outgoing, details)Texts activity (total texts, incoming, outgoing, details, text content)The User Portal only displays call and text activity that occursafter the smartphone is registered with MobileIron.There are three timeframe options – 1 day, 1 week, or 1 monthThe user can perform the following actionsRegister new smartphoneLocate smartphoneLock smartphoneWipe smartphone
  • Petit déjeuner du 20/11 MDM en mode Cloud Saphelec & Monaco Telecom

    1. 1. Mercredi 20 novembre 2013 Riviera Marriott Hôtel « Solutions Mobiles en mode Cloud »
    2. 2. Le HUB : un eco-système à votre service Avec nos partenaires : Mettre en place les conditions de développement des entreprises de la région 1. Assurer la connectivité THD de la Principauté 2. Développer des capacités d’hébergement 3. Proposer des solutions innovantes pour les Entreprises
    3. 3. Une Principauté Hyper-Connectée  Territoire 100% couvert en Haut débit Mobile  Internet et réseau privé dédié via solutions performantes et adaptés disponible pour toutes les Entreprises  Connectivité Internationale via partenaires Telco/carriers mondiaux
    4. 4. Vos données et applications sécurisées Profiter de services informatiques … sans avoir à les produirent Bénéfices  Optimisation des coûts d’exploitation  Sécuriser votre infrastructure IT, ne plus gérer de salles blanches  Infrastructures et compétences de haut niveau,  Sécuriser et gérer vos applications critiques pour votre business  Agilité :Time-to-market réduit et adaptation à la demande  Implémenter le plan de continuité  Transformation du CAPEX en OPEX  Héberger vos backups en dehors de vos locaux =  Meilleures SLA  Se concentrer sur son cœur métier
    5. 5. Le Cloud Monaco : Vos données à Monaco et seulement à Monaco Développement en cours Capacité dispo : 50 baies Extension Q1 2014 : +25 baies Extension Q1 2015 : 1000m², 200 baies
    6. 6. Des partenaires impliquées dans le développement du HUB Expert en solutions de mobilités Leader européen des Data Centers Laboratoire de la sécurité à Monaco, sous l’égide du Gouvernement Une initiative régionale pour développer un eco-système d’affaires
    7. 7. Gestion des données pour smartphones et tablettes Hervé MANGOT PDG SAPHELEC MobileIron Confidential MobileIron - Confidential 7
    8. 8. Constat :La Tornade Mobile. 2B Devices /5 ans THE PC ERA THE WEB ERA THE MOBILE ERA • A PC on every desk • A Browser on any desk • Ubiquitous Access to Apps and Data from any Browser • Multiple Devices for Each User • Ubiquitous Access to Apps and Data from any Device 600M 30 PCs Years 600M 15 Users Years ? MobileIron Confidential 8 8
    9. 9. Le marché en quelques chiffres Shipment Tablets + Smartphone > PC in 2010 Tablets Smartphones Notebook PCs Desktop PCs Global shipments 1.3M Sept 2012 113 Smartphones perdus par minutes aux US 5 Million / mois MobileIron Confidential Activations Android par jour 9 9
    10. 10. Success Story 3300 >70 Customers Public Reference Customers Financial Services Government & Education Professional Services Retail & Consumer Goods Technology & Manufacturing Healthcare / Pharma Travel and Hospitality MobileIron Confidential 10 10
    11. 11. MobileIron: Plate-forme complète de gestion des mobiles 1 6 Email et apps Sécurité et identité Wi-Fi et VPN … par groupe, individuel, or propriété 2 Gestion globale Intégration complète Email AD/LDAP Certificats BES Archivage 7 Controle d’accès Gestion Certificats 9 5 Surveillance risques 8 Configuration aisée Procédures simples Console Multi-OS pour tous les terminaux Surveillance Apps Protection vie privée 11 Distribution des apps 12 Inventaire apps 13 4 10 Utilisation des terminaux Personnels “BYOD” Spécificités par pays 3 TRUST Sécurisation données Déploiement aisé Par groupe ou politique de sécurité APPS COST 15 Effacement sélectif MobileIron Confidential 14 Gestion des coûts 11
    12. 12. Avantages MobileIron : le meilleur compromis Avantage du Produit Innovations multi-OS architecture dès l’origine Choix Utilisateur Sécurité Apps Intégration Gestion du Multi-OS pour les terminaux persos Contrôle de la vie privée Effacement sélectif Sécurité optimale Contrôle d’accès simple et efficace Actions automatiques en cas de risque Annalyse en temps réel des risques Cycle de vie complet des applications entièrement géré et maîtrisé. Catalogues d’applications privées Multi-OS Intégration avec AD/LDAP, SCEP. Pas de modif de votre configuration. Détection Jailbreak/root Contrôle d’accès dépendant du contexte Gestion des certificats de sécurité Archivage des données Coûts maîtrisés Le meilleur coût de déploiement par terminal Application en tâche de fond sur iOS Gestion applications privées sur iOS Contrôle d’accès sur les applications Quarantine automatisée MobileIron Confidential 12 12
    13. 13. Politiques par défaut Il y a 4 politiques par défaut: • Security: comment on gère les mots de passe, le chiffrement, les situations de risque. • Privacy: quelles informations doivent être récupérées depuis le terminal ? Cela permet de régler les aspects pro/perso sur les terminaux personnels • Lockdown: Quelles fonctions du terminal seron autorisées ou interdites (Caméra, etc…) • Sync: Règle la façon dont les informations sont échangées entre le le client MobileIron et la console : fréquence, contenu, etc… MobileIron Confidential 13
    14. 14. Applications d’Entreprise MobileIron Confidential 14
    15. 15. Contrôle des applications Applications : - Requises, - recommandées, - Interdites => Alertes et actions. MobileIron Confidential 15
    16. 16. Inventaire des applications • Identification des applications sur le terminal MobileIron Confidential 16 16
    17. 17. Gestion du cycle de vie des applications • • • • Identification des Apps présentes sur le terminal Règles de contrôle des applications Identification des version, et MàJ disponibles, invitations, Identification des violations de politique d’Applications. MobileIron Confidential 17 17
    18. 18. Merci pour votre attention MobileIron Confidential 18

    ×