SlideShare a Scribd company logo
1 of 14
Mobile Content Strategies and
Deployment Best Practices

                          Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Enterprise Mobility Management
     Mobile Security


     Mobile Device Management


     Mobile Email Management


     Mobile Application Management

     Mobile Content Management
                                                                                                                   2
                                     Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
IT Challenges
IT departments are faced with several challenges with managing a variety of employee-owned
and corporate liable devices.
•   Securing proprietary content
•   DLP
•   Privacy of Employee’s Data
•   Network Access
•   Network Security
•   Lost and stolen devices
•   Supporting new and unknown equipment


                                                                                                                                             3
                                                               Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Create A Policy
•    Mobile Devices Supported
•    Data Plans
•    Security
•    Compliance
•    Privacy
•    Type of Applications allowed and usage
•    Services – what can employees access (email,
     VPN.. )
•    Agreement that outlines employee devices with
     corporate data


                                                                                                                                   4
                                                     Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Mobile Security
Key Considerations
•   Enable multifactor user authentication
•   Enforce consistent security policies
•   Encrypt sensitive corporate data
•   Support internal PKI and 3rd party certificates
•   Manage user access to corporate resources
•   Establish network access controls
•   Enforce compliance rules and actions
•   Remotely wipe enterprise data

                                                                                                                                    5
                                                      Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Mobile Content Management
Key Considerations
•   Create a corporate container for documents
•   Enforce multifactor user authentication
•   Manage user access rights and file privileges
•   Define standard and custom file metadata
•   Distribute files over encrypted connections
•   Integrate with SharePoint or other file servers
•   Delegate admin control across internal groups
•   Track document versions, updates and usage

                                                                                                                                    6
                                                      Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Enterprise Architecture
Configurability                                                                          High Availability
Deploy the specific software to your               Deploy in a highly available environment
environment and architecture                         with all components made to instantly
requirements                                                     fail over without downtime


Multi-tenancy                                                                          Disaster Recovery
Absorb fragmentation within your                     Setup software in a remote data center
corporate infrastructure into a single                     and enable in the event of a data
instance of AirWatch                                                          center failure


Scalability                                                                 Automated Monitoring
Deploy 10 to 100,000 devices through                   Automate monitoring through a direct
a configuration that easily scales to                   plug in to Microsoft’s System Center
support additional device capacity                              Operations Manager (SCOM)




                                                                                                                       7
                                         Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Prevent Unapproved Systems and Devices from
Accessing Corporate Resources

                      •   Device Ownership
                      •   Device Staging
                      •   Device Registration
                      •   User Authentication
                      •   End User License Agreements (EULAs)
                      •   Restrictions



                                                                                                                         8
                                           Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Protect Employee Privacy
Enable BYOD by ensuring the        Employee Device                      Define granular privacy policies
privacy of personal data                                                for employee-owned devices
•   Set privacy policies that do
                                               User Info                • GPS location
    not collect personal data                                           • User info
                                    GMail                    Exchange              •          Name
•   Customize policies based on
                                                                                   •          Phone number
    device ownership
                                   Personal                  Business
                                                                                   •          Email account
      •   Corporate – Dedicated     Apps                      Apps
                                                                        •       Telecom data
      •   Corporate – Shared                                                       •          Calls
                                                Calls
      •   Employee – Owned                     Messages                            •          Messages
                                                                                   •          Data usage
                                              GPS Location              •       Public apps


                                                                                                                                                      9
                                                                        Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Ensure Device Compliance
1   Build Policies       2   Define Escalation     3           Specify Actions
    Application list         Time based:                       Send SMS, Email, push notification
    Compromised status       • Minutes                         Request device check-in
    Encryption               • Hours                           Remove or block specific profiles
    Model, OS version        • Days                            Install compliance profile
    Passcode                 Tiered actions                    Remove all profiles
    Roaming                  Repeat actions                    Remove or block apps
                                                               Enterprise wipe

                                                                                                                          10




                                                 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Measure ROI
•   Compare partially subsidized data plan to a corporate plan
•   Evaluate reduced hardware costs due to elimination of the cost of device
•   Cost of a fully subsidized data plan versus a partially subsidized plan
•   Cost of recycling devices every few years and IT time and labor in managing a corporate
    program versus cost of a mobile management platform




                                                                                                                                                11
                                                                    Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
About AirWatch
4,700
customers


47
countries


15
languages


950
employees   Our Mission: Simplify Enterprise MobilityTM
                                                                                                                12
                                    Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Representative Customers
 Consumer      Education   Government   Transportation          Healthcare                                      Services
Goods/Retail




                                                                                                                                 13
                                                     Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
About AirWatch
Ian Evans        Managing Director EMEA
ianevans@air-watch.com




                                                                                                             14
                                 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

More Related Content

What's hot

Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
indradipg
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
Huy Pham
 

What's hot (20)

Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
VMware Workspace ONE a synergie s Microsoftem
VMware Workspace ONE a synergie s MicrosoftemVMware Workspace ONE a synergie s Microsoftem
VMware Workspace ONE a synergie s Microsoftem
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspace
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 

Viewers also liked (6)

What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
 
Share Point 2010 Product Overview BETA
Share Point 2010 Product Overview BETAShare Point 2010 Product Overview BETA
Share Point 2010 Product Overview BETA
 
Portfólio Zebra - Produtos e Soluções. Impressoras
Portfólio Zebra - Produtos e Soluções. ImpressorasPortfólio Zebra - Produtos e Soluções. Impressoras
Portfólio Zebra - Produtos e Soluções. Impressoras
 
Zebra case study
Zebra case studyZebra case study
Zebra case study
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Arcticom's Zebra Technologies RFID Solutions
Arcticom's Zebra Technologies RFID SolutionsArcticom's Zebra Technologies RFID Solutions
Arcticom's Zebra Technologies RFID Solutions
 

Similar to Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies and deployment best practices

IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
AIP Foundation
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Jeremy Siewert
 

Similar to Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies and deployment best practices (20)

Airwatch - Mobile Content Strategies and Deployment Best Practices
Airwatch - Mobile Content Strategies and Deployment Best PracticesAirwatch - Mobile Content Strategies and Deployment Best Practices
Airwatch - Mobile Content Strategies and Deployment Best Practices
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Centrify Intellect event
Centrify   Intellect eventCentrify   Intellect event
Centrify Intellect event
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
 

More from Global Business Events

More from Global Business Events (20)

Cio Event
Cio EventCio Event
Cio Event
 
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 

Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies and deployment best practices

  • 1. Mobile Content Strategies and Deployment Best Practices Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 2. Enterprise Mobility Management Mobile Security Mobile Device Management Mobile Email Management Mobile Application Management Mobile Content Management 2 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 3. IT Challenges IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. • Securing proprietary content • DLP • Privacy of Employee’s Data • Network Access • Network Security • Lost and stolen devices • Supporting new and unknown equipment 3 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 4. Create A Policy • Mobile Devices Supported • Data Plans • Security • Compliance • Privacy • Type of Applications allowed and usage • Services – what can employees access (email, VPN.. ) • Agreement that outlines employee devices with corporate data 4 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 5. Mobile Security Key Considerations • Enable multifactor user authentication • Enforce consistent security policies • Encrypt sensitive corporate data • Support internal PKI and 3rd party certificates • Manage user access to corporate resources • Establish network access controls • Enforce compliance rules and actions • Remotely wipe enterprise data 5 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 6. Mobile Content Management Key Considerations • Create a corporate container for documents • Enforce multifactor user authentication • Manage user access rights and file privileges • Define standard and custom file metadata • Distribute files over encrypted connections • Integrate with SharePoint or other file servers • Delegate admin control across internal groups • Track document versions, updates and usage 6 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 7. Enterprise Architecture Configurability High Availability Deploy the specific software to your Deploy in a highly available environment environment and architecture with all components made to instantly requirements fail over without downtime Multi-tenancy Disaster Recovery Absorb fragmentation within your Setup software in a remote data center corporate infrastructure into a single and enable in the event of a data instance of AirWatch center failure Scalability Automated Monitoring Deploy 10 to 100,000 devices through Automate monitoring through a direct a configuration that easily scales to plug in to Microsoft’s System Center support additional device capacity Operations Manager (SCOM) 7 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 8. Prevent Unapproved Systems and Devices from Accessing Corporate Resources • Device Ownership • Device Staging • Device Registration • User Authentication • End User License Agreements (EULAs) • Restrictions 8 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 9. Protect Employee Privacy Enable BYOD by ensuring the Employee Device Define granular privacy policies privacy of personal data for employee-owned devices • Set privacy policies that do User Info • GPS location not collect personal data • User info GMail Exchange • Name • Customize policies based on • Phone number device ownership Personal Business • Email account • Corporate – Dedicated Apps Apps • Telecom data • Corporate – Shared • Calls Calls • Employee – Owned Messages • Messages • Data usage GPS Location • Public apps 9 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 10. Ensure Device Compliance 1 Build Policies 2 Define Escalation 3 Specify Actions Application list Time based: Send SMS, Email, push notification Compromised status • Minutes Request device check-in Encryption • Hours Remove or block specific profiles Model, OS version • Days Install compliance profile Passcode Tiered actions Remove all profiles Roaming Repeat actions Remove or block apps Enterprise wipe 10 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 11. Measure ROI • Compare partially subsidized data plan to a corporate plan • Evaluate reduced hardware costs due to elimination of the cost of device • Cost of a fully subsidized data plan versus a partially subsidized plan • Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform 11 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 12. About AirWatch 4,700 customers 47 countries 15 languages 950 employees Our Mission: Simplify Enterprise MobilityTM 12 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 13. Representative Customers Consumer Education Government Transportation Healthcare Services Goods/Retail 13 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  • 14. About AirWatch Ian Evans Managing Director EMEA ianevans@air-watch.com 14 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Editor's Notes

  1. We have customers who have purchased AirWatch from 47 countriesWith our multi-national customer base we’re deployed in over 150 countries