Présentation des Solutions Mobile Device Management en mode Cloud. EXCLUSIVITE la nouvelle solution KNOX développée par SAMSUNG, permettant de séparer les fichiers personnels de vos collaborateurs de vos données entreprises, en toute sécurité. Et grâce aux solutions MDM de Mobile Iron, compatibles avec KNOX, vous êtes assuré d'une gestion globale de tous vos outils mobiles (Smartphones et tablettes)
Mega trends afterwork Frost&Sullivan, JCE Monaco, MSBH 13th march 2014
Petit déjeuner du 20/11 MDM en mode Cloud Saphelec & Monaco Telecom
1. Mercredi 20 novembre 2013
Riviera Marriott Hôtel
« Solutions Mobiles en mode Cloud »
2. Le HUB : un eco-système à votre service
Avec nos partenaires : Mettre en place les conditions de
développement des entreprises de la région
1. Assurer la connectivité THD de la Principauté
2. Développer des capacités d’hébergement
3. Proposer des solutions innovantes pour les Entreprises
3. Une Principauté Hyper-Connectée
Territoire 100% couvert en Haut
débit Mobile
Internet et réseau privé dédié via
solutions performantes et adaptés
disponible pour toutes les Entreprises
Connectivité Internationale via
partenaires Telco/carriers mondiaux
4. Vos données et applications sécurisées
Profiter de services informatiques …
sans avoir à les produirent
Bénéfices
Optimisation des coûts d’exploitation
Sécuriser votre infrastructure IT, ne plus gérer de
salles blanches
Infrastructures et compétences de haut niveau,
Sécuriser et gérer vos applications critiques pour
votre business
Agilité :Time-to-market réduit et adaptation à la
demande
Implémenter le plan de continuité
Transformation du CAPEX en OPEX
Héberger vos backups en dehors de vos locaux
=
Meilleures SLA
Se concentrer sur son cœur métier
5. Le Cloud Monaco : Vos données à Monaco
et seulement à Monaco
Développement en cours
Capacité dispo : 50 baies
Extension Q1 2014 : +25 baies
Extension Q1 2015 : 1000m², 200 baies
6. Des partenaires impliquées dans le
développement du HUB
Expert en solutions de mobilités
Leader européen des Data Centers
Laboratoire de la sécurité à Monaco, sous
l’égide du Gouvernement
Une initiative régionale pour développer
un eco-système d’affaires
7. Gestion des données pour smartphones et tablettes
Hervé MANGOT
PDG SAPHELEC
MobileIron Confidential
MobileIron - Confidential
7
8. Constat :La Tornade Mobile.
2B
Devices
/5 ans
THE PC ERA
THE WEB ERA
THE MOBILE ERA
• A PC on every desk
• A Browser on any desk
• Ubiquitous Access to Apps and
Data from any Browser
• Multiple Devices for Each User
• Ubiquitous Access to Apps and
Data from any Device
600M
30
PCs
Years
600M
15
Users
Years
?
MobileIron Confidential
8
8
9. Le marché en quelques chiffres
Shipment Tablets + Smartphone > PC in 2010
Tablets
Smartphones
Notebook PCs
Desktop PCs
Global shipments
1.3M
Sept 2012
113
Smartphones perdus
par minutes aux US
5 Million / mois
MobileIron Confidential
Activations Android par jour
9
9
10. Success Story
3300
>70
Customers
Public Reference Customers
Financial Services
Government & Education
Professional Services
Retail & Consumer Goods
Technology & Manufacturing
Healthcare / Pharma
Travel and Hospitality
MobileIron Confidential
10
10
11. MobileIron: Plate-forme complète de gestion des mobiles
1
6
Email et apps
Sécurité et identité
Wi-Fi et VPN
… par groupe, individuel, or propriété
2
Gestion globale
Intégration complète
Email
AD/LDAP
Certificats
BES
Archivage
7
Controle d’accès
Gestion Certificats
9
5
Surveillance risques
8
Configuration aisée
Procédures simples
Console Multi-OS
pour tous les terminaux
Surveillance Apps
Protection vie privée
11
Distribution des apps
12
Inventaire apps
13
4
10
Utilisation des terminaux
Personnels “BYOD”
Spécificités par pays
3
TRUST
Sécurisation données
Déploiement aisé
Par groupe ou politique de sécurité
APPS
COST
15
Effacement sélectif
MobileIron Confidential
14
Gestion des coûts
11
12. Avantages MobileIron : le meilleur compromis
Avantage du Produit
Innovations
multi-OS architecture dès l’origine
Choix Utilisateur
Sécurité
Apps
Intégration
Gestion du Multi-OS pour les terminaux persos
Contrôle de la vie privée
Effacement sélectif
Sécurité optimale
Contrôle d’accès simple et efficace
Actions automatiques en cas de risque
Annalyse en temps réel des risques
Cycle de vie complet des applications
entièrement géré et maîtrisé.
Catalogues d’applications
privées Multi-OS
Intégration avec AD/LDAP, SCEP.
Pas de modif de votre configuration.
Détection Jailbreak/root
Contrôle d’accès dépendant du
contexte
Gestion des certificats de sécurité
Archivage des données
Coûts maîtrisés
Le meilleur coût de déploiement par terminal
Application en tâche de fond sur iOS
Gestion applications privées sur iOS
Contrôle d’accès sur les applications
Quarantine automatisée
MobileIron Confidential
12
12
13. Politiques par défaut
Il y a 4 politiques par défaut:
• Security: comment on gère les mots de passe, le chiffrement, les situations de risque.
• Privacy: quelles informations doivent être récupérées depuis le terminal ?
Cela permet de régler les aspects pro/perso sur les terminaux personnels
• Lockdown: Quelles fonctions du terminal seron autorisées ou interdites (Caméra, etc…)
• Sync: Règle la façon dont les informations sont échangées entre le le client MobileIron
et la console : fréquence, contenu, etc…
MobileIron Confidential
13
17. Gestion du cycle de vie des applications
•
•
•
•
Identification des Apps présentes sur le terminal
Règles de contrôle des applications
Identification des version, et MàJ disponibles, invitations,
Identification des violations de politique d’Applications.
MobileIron Confidential
17
17
WelcomeIntroductionsToday we will introduce MobileIron and discuss what it takes to build a Mobile First Enterprise.
Let’s look at some actual numbers.The left analysis was done by IDC and captures the total number of smartphones sold each year for business use, whether bought by the employee or the company. In the next four years, almost 1B total smartphones will be sold for business use, split over at least four operating systems. That means the majority of white collar workers in the world will be using a smartphone for business purposes. This doesn’t even include tablets.And starting in 2012, for the very first time, the number of personal devices purchased and used for work will surpass the number of corporate devices purchased and used for work.Devices are everywhere.And so are apps.Apple’s App Store launched July 10, 2008. That means 4 years ago, there were almost no mobile apps, other than Java games. And now, over 15 billion apps have already been downloaded from just Apple’s App Store, and over 10 billion from Google’s Android Market.That’s almost 50 apps per device and growing.As IT, you are responsible for the security of your corporate data:How do you keep up with this pace of change?Which of these devices do you trust?Which of these apps do you trust?How do you take advantage of mobility?Sources:IDC: Worldwide Business Use Smartphone 2011-2015 Forecast and Analysis (September 2011)App store downloads: http://tech.fortune.cnn.com/2011/07/11/apple-users-buying-61-more-apps-paying-14-more-per-app/Android Market downloads: Google released data Dec 5, 2011 # apps per phone:http://technolog.msnbc.msn.com/_news/2011/04/27/6543575-apple-android-phone-users-are-heaviest-app-downloaders
Mobile is a fundamental platform transition, just like the PC in the 80s, and web in the 90s. This transition is driven almost entirely by end-user demand, not IT policy.What this means for our customers:The most important endpoint in the organization will be the mobile device, not the PC. And many users will have more than one mobile device.The end-user’s preferred way to interact with the company will be through a mobile app. Mobile will be not just a better way to do email, but a means to drive true business transformation, just as the web did. Our customers call this the “Mobile First” enterpriseEmployees turn to mobile first to do their workEnterprise developers turn to mobile first to build their appsCustomers turn to mobile first to interact with their vendorsAs Forrester says, the corporate app store becomes the intranet of the future.(Source: “Mobile Management Takes a 180-Degree Turn,” Forrester (John C. McCarthy, Michele Pelino), Aug 8, 2011)And a new profession, Mobile IT, is now chartered with making it happen.
Customer success is the core focus of MobileIron. The top item in our corporate values statement from the founding of the company in 2007 is “We and our customers win together”There are four building blocks to customer success:Our underlying architecture, developed from scratch for multi-os mobilityOur product investment in security and apps leadershipOur global operations, including support personnel in a follow-the-sun model. 40% of MobileIron’s business is outside the U.S. and there are now MobileIron customers in over 30 countriesOur growing best practices education, toolkits, and programs focused on helping Mobile IT accelerate mobile adoptionThis investment in the foundation has resulted in MobileIron becoming Mobile IT’s platform of choice1500 new customers have picked MobileIron in just the last two years. All of these customers use MobileIron to manage iOS and 75% also use MobileIron to manage other OS, like Android or BlackBerry. No one has as much customer experience with iOS and Android as MobileIron.200 of the world’s largest companies have picked MobileIron. The largest iOS deployments in the world are secured and managed by MobileIron. Apps have become very popular with our customers – with a rapidly increasing number of customers using the MobileIron Enterprise App Storefront; we expect that number to be over 50% by end of 2012. Some analysts call Mobile Application Management “MAM” – MobileIron has more new OS MAM customers than any other vendorAnd finally the proof of success is the customer’s willingness to maintain an ongoing relationship. 99% of MobileIron’s customers renewed their support in 2011Here is a sample of our customers that have publicly talked about their MobileIron deployment. (NOTE: You can click on all these icons in presentation mode to get to the actual case study / public mention)MobileIron customers range across industriesFinancial servicesHealthcareRetailManufacturingProfessional servicesEducationTechnology… and across the worldNow we’ll dive into specific use cases.********************Note to sales team: MobileIron has 10x the public MDM references of AirWatch or Zenprise. Both those companies appear to only have 2-3 companies in print. All their case studies are from their legacy hotspot management and BES monitoring businesses, respectively. And note for Sybase that Forrester recently wrote: “Sybase wasn’t able to provide us with a customer reference that was using the solution to manage iOS or Android devices” (“Market Overview, Mobile Security” published October 2011). [Note that almost all of Zenprise’s case studies are for their legacy BES monitoring business, not MDM]
The MobileIron platform covers the full enterprise lifecycle and is available on-premise or in the cloud.There are several steps IT goes through when deploying mobile devices(One) The devices must be configured securely for email access, apps, encryption, password, device and user identity, and enterprise connectivityConfigurations and policies can be applied by either group or individual… and because each device is tagged as personal or corporate, different configurations and policies can be applied based on device ownership This is important for BYOD programs because customers have different policies for personal devices(Two) The devices must also integrate tightly with back-end enterprise systems. MDM is not an island. MobileIron… protects corporate email… uses the same authentication mechanisms and groups as your existing directory services… connects to your enterprise certificate authority … triggers commands through the BES for management and security… archives SMS messages with your existing archival system(Three) MobileIron provides granular privacy controls, so you can decide whether to track data like location or application inventoryCustomers find this essential, especially for BYOD setups and for geographic variances, for example a heightened awareness of privacy in Europe(Four) And of course, all these configurations, policies, integrations, and controls can be rolled out to thousands and tens of thousands of devices in an automated way(Five) This gives all our customers a single pane of glass to view all mobile devices accessing the enterprise, no matter what operating system. Each device in MobileIron is also labeled as either employee or company owned, since so many companies are allowing personal devices into their networks.Once your smartphones and tablets are rolled out, you need to make sure they continue to remain trusted … so risk mitigation and response is of primary importance(Six) You must monitor posture. Posture is the foundation of mobile security. It is the security state of the device – is it jailbroken? Is it out-of-policy? Has the user turned encryption off by mistake?(Seven) Based on the trust level of the device, MobileIron Sentry controls access to enterprise email. If a device is not trusted, email is blocked. (Eight) Our customers, especially the large enterprises, are also very focused on enforcing device and user identity with certificates, for both security and to improve the mobile user experience. This is one of the greatest strengths of the MobileIron platform – we have both our own certificate authority and the ability to integrate with a customer’s existing certificate authority.(Nine) And these actions are automated, so that IT can focus on managing exceptions, not the details of every device. This allows MobileIron to secure and manage the device fleet with limited people resources. Our customers have told us that with less than 1 FTE, they can manage the same number of devices they were managing with 8-9 FTEs on competitive productsNow let’s talk apps. Apps are the catalyst for business transformation.(Ten) The first concern many IT teams have is the keeping out rogue apps. MobileIron identifies all apps on the device so you can set up app control policies – blacklist or whitelist(Eleven & Twelve) But the real value is when companies start deploying their own apps. MobileIron provides an enterprise app store for IT to publish and distribute apps, and the end-user to discover them(Thirteen) Apps contain enterprise data, sometimes lots of it. Securing that data is the foundation of MobileIron’s multi-OS AppConnect strategy as well as our managed apps capabilities on iOSSo the cycle of apps is complete, from keeping the bad apps out, to distributing and securing the approved apps(Fourteen) One other core operational concern of many companies is the sometimes overwhelming cost of mobile devices, especially due to data consumption. MobileIron tracks roaming activity and whenever a device leaves the country, will notify the appropriate people to either influence behavior or change service plans with the operator(Fifteen) And finally, when the employee leaves or the device is lost, MobileIron allows you to wipe the entire device or selectively wipe just the enterprise workspace, which includes corporate email, VPN and WiFi settings, and business apps.This is the lifecycle of mobility within our customers.
From day one, we built the MobileIron product with five goals in mind:Give users choice of deviceSecure mobile dataDrive business enablement through appsIntegrate into existing enterprise systemsScale quickly and cost-effectively to global rolloutsOur core product advantages areMobileIron is the first platform purpose-built for multi-OS. We weren’t retrofitting Windows-based management to iOS. And the new models of ownership, like BYOD, were integrated into the product from day one. As a result IT can confidently support new devices Because of our extensive investment in client technology, MobileIron has the best knowledge of whether a device is secure or not and whether it can be trusted. MobileIron’s management of certificates from enrollment to renewal also lets IT easily enforce identity to prevent unauthorized access. Based on that knowledge we automate actions like notification, blocking email access and quarantine to prevent data loss. As a result, IT can secure mobile data without adding overhead. Apps are an integral part of the MobileIron product. We have the most secure distribution and management capability for mobile apps. As a result, companies can confidently deploy apps.MDM is not an island. It must connect to enterprise systems for security, identity, and communications. MobileIron has deep integration with LDAP, BES, certificate authorities, email, and archiving systems. As a result, IT can integrate mobile into overall IT operationsThe largest post-WinMo mobile deployments are managed by MobileIron. MobileIron is sold as a virtual appliance or a cloud service so the customer doesn’t have to worry about licenses, upgrades, or patching for OS, databases, or servers. As a result, deployments are fast and operations cost-effective. MobileIron has also established a track record of innovation. Jailbreak detection, certificate management, enterprise app stores, selective wipe, inline access control, and privacy policy are examples of innovations that are now essential to every mobile deployment but were first brought to market by MobileIron.
Default policies are the policies applied to a smartphone automatically when it is registered.Default policy values are also used as a starting point when you create a custompolicy. MobileIron provides the values for each default policy specification. Youcan then edit the default policies to your needs. If you do edit a default policy’s values,those new values become the starting point when you create a new custom policy.MobileIron provides defaults for the following policy types:• Security: how MobileIron addresses several areas of mobile security• Privacy: which files to synchronize with the MobileIron Server andwhether activity or content should be synchronized for each type of data. Privacy policiesalso specify which information the MobileIron Client should include in its log.• Lockdown: which features should be disabled in the event that smartphoneaccess must be restricted• Sync: how the MobileIron Client behaves on the smartphone and interactswith the MobileIron Server. These interactions include synchronization of profiles,configurations, and app inventory• ActiveSync
Notes:The User Portal displays the following informationPhone numberManufacturerDevice modelOperating systemWireless carrierRAM (free& total)Storage (free & total)Call activity (total minutes, incoming, outgoing, details)Texts activity (total texts, incoming, outgoing, details, text content)The User Portal only displays call and text activity that occursafter the smartphone is registered with MobileIron.There are three timeframe options – 1 day, 1 week, or 1 monthThe user can perform the following actionsRegister new smartphoneLocate smartphoneLock smartphoneWipe smartphone
Notes:The User Portal displays the following informationPhone numberManufacturerDevice modelOperating systemWireless carrierRAM (free& total)Storage (free & total)Call activity (total minutes, incoming, outgoing, details)Texts activity (total texts, incoming, outgoing, details, text content)The User Portal only displays call and text activity that occursafter the smartphone is registered with MobileIron.There are three timeframe options – 1 day, 1 week, or 1 monthThe user can perform the following actionsRegister new smartphoneLocate smartphoneLock smartphoneWipe smartphone