More Related Content
Similar to Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies and deployment best practices (20)
More from Global Business Events (20)
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies and deployment best practices
- 1. Mobile Content Strategies and
Deployment Best Practices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 2. Enterprise Mobility Management
Mobile Security
Mobile Device Management
Mobile Email Management
Mobile Application Management
Mobile Content Management
2
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 3. IT Challenges
IT departments are faced with several challenges with managing a variety of employee-owned
and corporate liable devices.
• Securing proprietary content
• DLP
• Privacy of Employee’s Data
• Network Access
• Network Security
• Lost and stolen devices
• Supporting new and unknown equipment
3
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 4. Create A Policy
• Mobile Devices Supported
• Data Plans
• Security
• Compliance
• Privacy
• Type of Applications allowed and usage
• Services – what can employees access (email,
VPN.. )
• Agreement that outlines employee devices with
corporate data
4
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 5. Mobile Security
Key Considerations
• Enable multifactor user authentication
• Enforce consistent security policies
• Encrypt sensitive corporate data
• Support internal PKI and 3rd party certificates
• Manage user access to corporate resources
• Establish network access controls
• Enforce compliance rules and actions
• Remotely wipe enterprise data
5
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 6. Mobile Content Management
Key Considerations
• Create a corporate container for documents
• Enforce multifactor user authentication
• Manage user access rights and file privileges
• Define standard and custom file metadata
• Distribute files over encrypted connections
• Integrate with SharePoint or other file servers
• Delegate admin control across internal groups
• Track document versions, updates and usage
6
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 7. Enterprise Architecture
Configurability High Availability
Deploy the specific software to your Deploy in a highly available environment
environment and architecture with all components made to instantly
requirements fail over without downtime
Multi-tenancy Disaster Recovery
Absorb fragmentation within your Setup software in a remote data center
corporate infrastructure into a single and enable in the event of a data
instance of AirWatch center failure
Scalability Automated Monitoring
Deploy 10 to 100,000 devices through Automate monitoring through a direct
a configuration that easily scales to plug in to Microsoft’s System Center
support additional device capacity Operations Manager (SCOM)
7
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 8. Prevent Unapproved Systems and Devices from
Accessing Corporate Resources
• Device Ownership
• Device Staging
• Device Registration
• User Authentication
• End User License Agreements (EULAs)
• Restrictions
8
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 9. Protect Employee Privacy
Enable BYOD by ensuring the Employee Device Define granular privacy policies
privacy of personal data for employee-owned devices
• Set privacy policies that do
User Info • GPS location
not collect personal data • User info
GMail Exchange • Name
• Customize policies based on
• Phone number
device ownership
Personal Business
• Email account
• Corporate – Dedicated Apps Apps
• Telecom data
• Corporate – Shared • Calls
Calls
• Employee – Owned Messages • Messages
• Data usage
GPS Location • Public apps
9
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 10. Ensure Device Compliance
1 Build Policies 2 Define Escalation 3 Specify Actions
Application list Time based: Send SMS, Email, push notification
Compromised status • Minutes Request device check-in
Encryption • Hours Remove or block specific profiles
Model, OS version • Days Install compliance profile
Passcode Tiered actions Remove all profiles
Roaming Repeat actions Remove or block apps
Enterprise wipe
10
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 11. Measure ROI
• Compare partially subsidized data plan to a corporate plan
• Evaluate reduced hardware costs due to elimination of the cost of device
• Cost of a fully subsidized data plan versus a partially subsidized plan
• Cost of recycling devices every few years and IT time and labor in managing a corporate
program versus cost of a mobile management platform
11
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 13. Representative Customers
Consumer Education Government Transportation Healthcare Services
Goods/Retail
13
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
- 14. About AirWatch
Ian Evans Managing Director EMEA
ianevans@air-watch.com
14
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Editor's Notes
- We have customers who have purchased AirWatch from 47 countriesWith our multi-national customer base we’re deployed in over 150 countries