SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Enterprise Mobility Management



                       webinars.plantemoran.com
Presenters
       Marv Sauer, Consulting Manager – Plante Moran, Technology Consulting & Solutions
       Marv has more than 25 years taking clients from initial strategic planning through the successful
       implementation of a variety of proven and leading edge technologies. He is a talented facilitator of small to
       large groups working with personnel ranging from end users to executive management. Marv has given
       presentations at local and national conferences on topics such as Building the Network of Tomorrow, Today
       and With Strategic Planning First, Successful Implementation Follows. Marv holds a Master of Business
       Administration in Finance from the University of Michigan and a Bachelor of Science in Math and Computer
       Science from the University of California, Los Angeles (UCLA).


       Karl Zager, Consulting Manager- Plante Moran, Technology Consulting & Solutions
       Karl specializes in the transition of IT for mergers and acquisitions. His work with both U.S. and non U.S.
       investors has included IT due diligence prior to the acquisition and post-acquisition, the development of a
       new IT organization structure, global infrastructure design, and project management of the entire IT
       transition. Karl has spent more than 25 years designing, implementing, and supporting IT infrastructure from
       the high level global network planning to router configuration and packet analysis. His projects have included
       Michigan’s two largest counties, school districts, leading hospitals, and the U.S. Military. Karl has received a
       Network Architect certification from Pine Mountain Group. Karl has a Bachelor of Science in Electronic
       Engineering Technology from Lawrence Technological University.


       Kurt VanderWal, Senior Consultant – Plante Moran, Technology Consulting & Solutions
       Kurt has spent more than 16 years in the information technology field specializing in PCI compliance,
       network security, local area networks, and file servers. Over the past seven years, Kurt has been
       performing PCI DSS assessments and network security assessments for financial, education, and
       government institutions. Kurt holds a Bachelor of Science in Information Systems and has acquired
       multiple certifications over his tenure.



                                                                                                           webinars.plantemoran.com
Administration
 Slides are available for download from your webcast console.
   A recording of today’s webinar will be added to our website in
   a few days.
 We will allow time at the end of the presentation to respond to
   your questions, but please feel free to submit questions at any
   time.
 This is a CPE-eligible webinar. Throughout the webcast,
   participation pop-ups will appear.
 Participants must respond to at least 75% of these pop-ups in
   order to receive CPE credit.




                                                              webinars.plantemoran.com
Overview

Organizations adopting an enterprise mobility management mindset
and strategic approach to their mobile environments are
transforming the way they do business, leading to innovation and
growth. In today's competitive marketplace, achieving greater
information access, enhanced collaboration, increased productivity,
improved customer service, and lower TCO (total cost of ownership)
can put you miles ahead of your competition.
At the completion of this webinar, participants will understand:
   The mobility environment and transformational impact
   The importance of mobilization planning and strategy
   Key factors to consider in managing devices, applications, and
     services
   Security and compliance best practices

                                                               webinars.plantemoran.com
Mobility background
 Proliferation of mobile devices including tablets and smartphones
 Innovative designs, intuitive, and better access to high speed networks
 Integral to staying competitive
 Web based applications and services are moving people to the cloud
 Dealing with a younger generation of workers
 Provides a ‘role model’ for innovation
 Greater connection to and engagement with the customer
 Improves integration with social networking/media sites



                                                        5          webinars.plantemoran.com
Reasons to go mobile
 Increased information access and sharing
 Better response times
 Improved customer service
 Increased productivity and satisfaction
 Enhanced collaboration
 Increased efficiencies
 Reduced costs
 Better recruitment of top talent
 Greater innovation


                                             6   webinars.plantemoran.com
Industry applications




 Government                           Retail




  Manufacturing         Banking       Healthcare




                                  7       webinars.plantemoran.com
Strategy is key
 Key considerations
     Device ownership
     Applications
     Platforms
 Cloud is about enabling and leveraging technology, but mobility
  is about enabling and leveraging the business
 Focus on the business aspects centered around:
     Access
     Management
     Balance




                                                  8         webinars.plantemoran.com
Advantages of a sound strategy
 A sound strategy
    Increases the impact and results
    Ensures that delivery is cost effective and efficient
    Provides a means to stay competitive




                                                    9        webinars.plantemoran.com
IT concerns

 How do we support the          How do we stop data
  devices?                        leakage?
 What if the user jailbreaks    Do they want it for more
  the device?                     than email?
 Do we need to develop          Who gets them and how
  apps?                           do we pay for them?
 How do we secure the device    How do we maintain the
  and data?                       service expectation?
 Do we need to support every    What about compatibility?
  device?



                                             10          webinars.plantemoran.com
Process


          The process may take multiple iterations to resolve.



    Strategy     Policy     Architecture    Tools        Procedure




          Make nothing public until the process is complete.




                                                    11       webinars.plantemoran.com
Strategy
      Decisions are interrelated and can have a huge impact.

                              Email Apps

                   File                            Support
                Exchange

     Device                   Business –                   Plan
    Ownership                 Employee                   Coverage
                             Relationship,
                           Cost, Productivity


                                                Business
           Depth of                              Apps
           Control

                                    Device
                                    Types

                                                    12         webinars.plantemoran.com
Leading Management Concerns by Strategy
    Internal Wi-Fi                                                             + Internal
                                                      + Web
       Purpose               Email Only                                        Business
                                                    Applications
       Specific                                                               Applications

   Device                Data ownership          Data ownership           Data ownership
    Compatibility         Data leakage            Data leakage             Data leakage
   Inventory             Device ownership /      Device ownership /       Device ownership /
   Software updates       cost                     cost                      cost
   Access control        Inventory               Inventory                Inventory
                          Account                 Account                  Account
                           Management               Management                Management
                          Communications          Communications           Communications
                           Management               Management                Management
                                                   Device                   Device
                                                    Compatibility             Compatibility
                                                                             Communications
                                                                              Security
                                                                             Access Control
                                                                             Support
                                                                             Training




                                                              13             webinars.plantemoran.com
Policy
 Device ownership, service provider, coverage, communication costs
 Data ownership
 Privacy – personal data, device use, location, applications
 Device care - damage and loss
 User separation
 Security – features and user actions
 Support – depth vs. cost




                                                   14           webinars.plantemoran.com
Architecture Components
 Device type considerations – environment, capabilities
 Access to data – messages (includes calendar and contacts) only
   apps, synchronization, remote VPN, remote desktop

 Data storage and backup
 Policy enforcement – security, application restrictions, data
   leakage

 Lockdown – recovery, wipe
 Software and configuration distribution
 Support – recovery, configuration, backups, updates, applications
 Administration – inventory, IDs, rights, monitoring
 Device management depth – light, heavy, containerized
                                                    15        webinars.plantemoran.com
Management Tools
 Mail Synchronization Servers (BES, MS Sync, Notes Traveler)
 Mobile Device Management Software (Airwatch, Fiberlink, Zenprise,
  Excitor, MobileIron, Sybase, Good)

 Antivirus software (AVG, Kaspersky, ESET)
 Mobile VPN clients (most major firewall vendors)
 Remote control / Virtual PC (Citrix, VMware, Microsoft, VNC)
 Training




                                                 16        webinars.plantemoran.com
Procedures
  Request process
      Policy acceptance
  Acquisition
  Initial setup
        Apps
        Accounts
        Configuration
        Training
  Management
  Updates
  Enforcement

                           17   webinars.plantemoran.com
Security

 Why we need to secure the devices
 Types of mobile access
 Remote wipes
 Managing the security of mobile devices
 Additional security points




                                            18   webinars.plantemoran.com
Why we need to secure the devices

 It is estimated that by 2013
     There will be 1.2 billion mobile workers worldwide
     75% of all U.S. workers will be mobile at least 20% of the time
 Another estimate shows that
     36% of cell phone owners have lost a phone or had one stolen
        •   Of these, almost 90% had no way to remotely lock or wipe the data from
            them
        •   Over 50% did not use password protection on their phones

 In the U.S., 113 cell phones are lost every minute




                                                            19          webinars.plantemoran.com
Why we need to secure the devices
 While mobility is a top security concern to business, few have
   addressed these concerns. Why?
     Businesses and employees are seeing the advantages and pushing
       IT to “make it work”
     There are many different types of mobile devices
     These devices can be both business owned or employee owned
     Ability for users to install new, untested applications is too easy
 Too many variables




                                                         20          webinars.plantemoran.com
Types of mobile access
 Multiple ways mobile devices attach to the corporate network
    Internet Access Only (Internal)
    Remote Access to Email
    Remote Access to Network Resources and Data
 Regardless of the method, both the mobile device and the
  corporate network need to be protected




                                                   21        webinars.plantemoran.com
Internet access only

 Description
     Staff members bring mobile device (BYOD or Corporate owned) to the office
     Only want to access Internet

 Security Risk
     Potentially infected devices accessing your corporate network

 Solutions
     Setup a separate Internet-only connection with wireless access
       (small companies, banks)
     Segment all mobile wireless traffic from the corporate network




                                                             22        webinars.plantemoran.com
Remote access to corporate email
 Description
     Staff members accessing corporate email from remote locations

 Security Risks
     Data now resides on mobile device
         • Lost data due to stolen/lost device
         • Via OWA or other client software
       User credentials are now sent to/from the mobile device to the corporate network
         • If insecure, credentials could be stolen

 Solutions
     Restrict the download of documents to mobile devices (OWA)
     Require the use of a SECURE third party application to access the email (Good,
        Sync)
     Ensure remote locking and remote wiping is enabled and configured properly


                                                              23           webinars.plantemoran.com
Remote access to corporate network
 Description
     Staff members accessing corporate network and resources from remote locations

 Security Risks
     Devices are accessing an internal corporate resource
     Spread of viruses/malware across corporate network
     Data now resides on mobile device
          • Lost data due to stolen/lost device
       User credentials are now sent to/from the mobile device to the corporate network
          • If insecure, credentials could be stolen
       Insecure mobile devices (screen locks, passwords) lead to compromise of
        corporate network
     Ensure remote locking and wipe are enabled




                                                              24           webinars.plantemoran.com
Remote access to corporate network
 Solutions
    Require all remote devices go through a NAC prior to accessing the
      network
    Require that communications to the corporate network occur through a
      secure VPN or secure portal (i.e. Terminal Services) where data is
      Read-Only
    Ensure that the devices/removable cards are encrypted
    Ensure strong policies are established and adhered to
    Ensure remote wipe is enabled




                                                             25            webinars.plantemoran.com
Remote wipes
 What is a Remote Wipe?
     Erasing the contents of the mobile devices from a remote location (full
       or partial)

 How is it done?
     Depending on the device and OS, it typically deletes either the
       encryption key OR writes a series of 1’s over the entire phone

 Is it effective?
     Yes
 Notes
     Must be setup and configured prior to device being ‘lost’
     If device is being sent in for repairs, a backup should be performed
       and then a wipe

                                                        26         webinars.plantemoran.com
Managing the security

 Managing the security of the mobile devices
    Implement firewall/NAC technologies which support the mobile
      operating systems
    Limit the types of devices/OS versions allowed to attach
    Inventory/Manage the devices – Mobile Device Management
    Ensure that users agree to the corporate policy prior to accessing the
      network
       •   Defines ownership of data
       •   Defines required configurations
       •   Prohibits “jail-broken” devices on the network
    Security test these devices/apps
    Provide end user training



                                                            27    webinars.plantemoran.com
Additional security points
 Configuring the devices
      Enable remote wipes
      Ensure screen lock passwords are set
      Ensure screen lock passwords are strong
      Ensure key pad lock is enabled after a period of inactivity
      Require Anti-virus and Malware detection software

 Act Now!




                                                         28          webinars.plantemoran.com
Best practices

 Set a short-term and long-term direction
 Engage all business units
 Get support/buy-in
 Include total cost of ownership (TCO) and total cost impact
 Include devices, applications, services, security, support, policies,
   etc. (all facets of mobility)
 Establish central governance




                                                     29        webinars.plantemoran.com
Q&A




      Q&A

            webinars.plantemoran.com
Thank you for attending

         Marv Sauer
         248.223.3120
         Marvin.Sauer@plantemoran.com



         Karl Zager
         248.223.3241
         Karl.Zager@plantemoran.com



         Kurt VanderWal
         248.223.3119
         Kurtis.VanderWal@plantemoran.com

     To view a complete calendar of upcoming Plante Moran webinars, visit webinars.plantemoran.com


                                                                                        webinars.plantemoran.com

Contenu connexe

Tendances

Developing a Social Business approach at Standard Life
Developing a Social Business approach at Standard LifeDeveloping a Social Business approach at Standard Life
Developing a Social Business approach at Standard Life Unified Communications Online
 
Unifying Communications through Interoperability - Mark Coleman, Microsoft.
Unifying Communications through Interoperability - Mark Coleman, Microsoft.Unifying Communications through Interoperability - Mark Coleman, Microsoft.
Unifying Communications through Interoperability - Mark Coleman, Microsoft.IMTC
 
The Power Of Unified Communications Vision Confidential Version
The Power Of Unified Communications Vision Confidential VersionThe Power Of Unified Communications Vision Confidential Version
The Power Of Unified Communications Vision Confidential Versiondvalik
 
EC Unified Communications Presentation
EC Unified Communications PresentationEC Unified Communications Presentation
EC Unified Communications PresentationEmirates Computers
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Unified Communications & Collaboration: Connecting people and information
Unified Communications & Collaboration: Connecting people and informationUnified Communications & Collaboration: Connecting people and information
Unified Communications & Collaboration: Connecting people and informationComputacenter UK LTD
 
Communication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPCommunication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPVincent Perrin
 
Introducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified CommunicationsIntroducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified CommunicationsArchana Parameshwari
 
Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Jae Hak Lee
 
UC Market Overview - Cisco, Avaya, Microsoft, Shoretel
UC Market Overview - Cisco, Avaya, Microsoft, ShoretelUC Market Overview - Cisco, Avaya, Microsoft, Shoretel
UC Market Overview - Cisco, Avaya, Microsoft, ShoretelShilpa Viswambharan
 
Unified Communications and Collaboration
Unified Communications and CollaborationUnified Communications and Collaboration
Unified Communications and CollaborationCisco Canada
 
Sametime 9 - The Best Audio and Video Meetings
Sametime 9 - The Best Audio and Video MeetingsSametime 9 - The Best Audio and Video Meetings
Sametime 9 - The Best Audio and Video MeetingsDon Bunch
 
HSV - Democratization of Video Conferencing March2011
HSV - Democratization of Video Conferencing March2011HSV - Democratization of Video Conferencing March2011
HSV - Democratization of Video Conferencing March2011Jim Cantalini
 
A Look Into the Unified Communication World
A Look Into the Unified Communication WorldA Look Into the Unified Communication World
A Look Into the Unified Communication WorldRADVISION Ltd.
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Leigh Williamson
 
Pro effect investor deck 4.4.12
Pro effect investor deck 4.4.12Pro effect investor deck 4.4.12
Pro effect investor deck 4.4.12dlevell
 
The State of the Communications Industry by Blair Pleasant of COMMfusion
The State of the Communications Industry by Blair Pleasant of COMMfusionThe State of the Communications Industry by Blair Pleasant of COMMfusion
The State of the Communications Industry by Blair Pleasant of COMMfusionChristina Inge
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Microsoft Unified Communications Summit
Microsoft Unified Communications SummitMicrosoft Unified Communications Summit
Microsoft Unified Communications SummitConcurrency, Inc.
 

Tendances (20)

Developing a Social Business approach at Standard Life
Developing a Social Business approach at Standard LifeDeveloping a Social Business approach at Standard Life
Developing a Social Business approach at Standard Life
 
Unifying Communications through Interoperability - Mark Coleman, Microsoft.
Unifying Communications through Interoperability - Mark Coleman, Microsoft.Unifying Communications through Interoperability - Mark Coleman, Microsoft.
Unifying Communications through Interoperability - Mark Coleman, Microsoft.
 
The Power Of Unified Communications Vision Confidential Version
The Power Of Unified Communications Vision Confidential VersionThe Power Of Unified Communications Vision Confidential Version
The Power Of Unified Communications Vision Confidential Version
 
EC Unified Communications Presentation
EC Unified Communications PresentationEC Unified Communications Presentation
EC Unified Communications Presentation
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Unified Communications & Collaboration: Connecting people and information
Unified Communications & Collaboration: Connecting people and informationUnified Communications & Collaboration: Connecting people and information
Unified Communications & Collaboration: Connecting people and information
 
Communication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBPCommunication Enabled Business Process- CEBP
Communication Enabled Business Process- CEBP
 
Introducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified CommunicationsIntroducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified Communications
 
Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025
 
UC Market Overview - Cisco, Avaya, Microsoft, Shoretel
UC Market Overview - Cisco, Avaya, Microsoft, ShoretelUC Market Overview - Cisco, Avaya, Microsoft, Shoretel
UC Market Overview - Cisco, Avaya, Microsoft, Shoretel
 
Unified Communications and Collaboration
Unified Communications and CollaborationUnified Communications and Collaboration
Unified Communications and Collaboration
 
Sametime 9 - The Best Audio and Video Meetings
Sametime 9 - The Best Audio and Video MeetingsSametime 9 - The Best Audio and Video Meetings
Sametime 9 - The Best Audio and Video Meetings
 
HSV - Democratization of Video Conferencing March2011
HSV - Democratization of Video Conferencing March2011HSV - Democratization of Video Conferencing March2011
HSV - Democratization of Video Conferencing March2011
 
A Look Into the Unified Communication World
A Look Into the Unified Communication WorldA Look Into the Unified Communication World
A Look Into the Unified Communication World
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live!
 
What is Unified Communication & Its Importance?
What is Unified Communication & Its Importance?What is Unified Communication & Its Importance?
What is Unified Communication & Its Importance?
 
Pro effect investor deck 4.4.12
Pro effect investor deck 4.4.12Pro effect investor deck 4.4.12
Pro effect investor deck 4.4.12
 
The State of the Communications Industry by Blair Pleasant of COMMfusion
The State of the Communications Industry by Blair Pleasant of COMMfusionThe State of the Communications Industry by Blair Pleasant of COMMfusion
The State of the Communications Industry by Blair Pleasant of COMMfusion
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Microsoft Unified Communications Summit
Microsoft Unified Communications SummitMicrosoft Unified Communications Summit
Microsoft Unified Communications Summit
 

En vedette

Tax Planning To Prepare For Today and Tomorrow
Tax Planning To Prepare For Today and TomorrowTax Planning To Prepare For Today and Tomorrow
Tax Planning To Prepare For Today and TomorrowPlante & Moran
 
Tax Strategies Can Bring Real Value To Your Organization
Tax Strategies Can Bring Real Value To Your OrganizationTax Strategies Can Bring Real Value To Your Organization
Tax Strategies Can Bring Real Value To Your OrganizationPlante & Moran
 
El lenguaje del silencio en los negocios internacionales
El lenguaje del silencio en los negocios internacionalesEl lenguaje del silencio en los negocios internacionales
El lenguaje del silencio en los negocios internacionalesAlicia De la Peña
 
Nuts & Bolts of Social Media
Nuts & Bolts of Social MediaNuts & Bolts of Social Media
Nuts & Bolts of Social MediaPlante & Moran
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Ahmed Banafa
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementMichael Lemm
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedNuno Alves
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Managementeaiti
 
Future of Enterprise Mobility
Future of Enterprise MobilityFuture of Enterprise Mobility
Future of Enterprise MobilityManjunath Bhat
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager WSO2
 
Enterprise-Mobility-Management
Enterprise-Mobility-ManagementEnterprise-Mobility-Management
Enterprise-Mobility-ManagementRene Jacobs
 
Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerWSO2
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesJorge Gil Peña
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 

En vedette (18)

Tax Planning To Prepare For Today and Tomorrow
Tax Planning To Prepare For Today and TomorrowTax Planning To Prepare For Today and Tomorrow
Tax Planning To Prepare For Today and Tomorrow
 
2011 Tax Update
2011 Tax Update2011 Tax Update
2011 Tax Update
 
Tax Strategies Can Bring Real Value To Your Organization
Tax Strategies Can Bring Real Value To Your OrganizationTax Strategies Can Bring Real Value To Your Organization
Tax Strategies Can Bring Real Value To Your Organization
 
El lenguaje del silencio en los negocios internacionales
El lenguaje del silencio en los negocios internacionalesEl lenguaje del silencio en los negocios internacionales
El lenguaje del silencio en los negocios internacionales
 
Nuts & Bolts of Social Media
Nuts & Bolts of Social MediaNuts & Bolts of Social Media
Nuts & Bolts of Social Media
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle Management
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Future of Enterprise Mobility
Future of Enterprise MobilityFuture of Enterprise Mobility
Future of Enterprise Mobility
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager Introduction to Enterprise Mobility Manager
Introduction to Enterprise Mobility Manager
 
Enterprise-Mobility-Management
Enterprise-Mobility-ManagementEnterprise-Mobility-Management
Enterprise-Mobility-Management
 
Introducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility ManagerIntroducing the WSO2 Enterprise Mobility Manager
Introducing the WSO2 Enterprise Mobility Manager
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 

Similaire à Enterprise Mobility Management

IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
Mobility at a_crossroads
Mobility at a_crossroadsMobility at a_crossroads
Mobility at a_crossroadsMukesh Gupta
 
Resorcetek Presentation
Resorcetek PresentationResorcetek Presentation
Resorcetek PresentationNaitik Vyas
 
Introduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.comIntroduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.comAptly GmbH
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Omega Peripherals
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412OracleIDM
 
Application management services overview
Application management services overviewApplication management services overview
Application management services overviewtuhinp
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training programAdrian Hall
 
Healthcare Information Technology
Healthcare Information TechnologyHealthcare Information Technology
Healthcare Information TechnologyMaggieLewis
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)sonnysonare
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcDamian Hamilton
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Strongback Consulting
 

Similaire à Enterprise Mobility Management (20)

IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
Mobility at a_crossroads
Mobility at a_crossroadsMobility at a_crossroads
Mobility at a_crossroads
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Resorcetek Presentation
Resorcetek PresentationResorcetek Presentation
Resorcetek Presentation
 
Introduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.comIntroduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.com
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
SmartConnect-Mobility
SmartConnect-MobilitySmartConnect-Mobility
SmartConnect-Mobility
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Misha infotech
Misha infotechMisha infotech
Misha infotech
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412
 
Beka v2 - copy
Beka v2 - copyBeka v2 - copy
Beka v2 - copy
 
Application management services overview
Application management services overviewApplication management services overview
Application management services overview
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Healthcare Information Technology
Healthcare Information TechnologyHealthcare Information Technology
Healthcare Information Technology
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdc
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Enterprise Mobility Management

  • 1. Enterprise Mobility Management webinars.plantemoran.com
  • 2. Presenters Marv Sauer, Consulting Manager – Plante Moran, Technology Consulting & Solutions Marv has more than 25 years taking clients from initial strategic planning through the successful implementation of a variety of proven and leading edge technologies. He is a talented facilitator of small to large groups working with personnel ranging from end users to executive management. Marv has given presentations at local and national conferences on topics such as Building the Network of Tomorrow, Today and With Strategic Planning First, Successful Implementation Follows. Marv holds a Master of Business Administration in Finance from the University of Michigan and a Bachelor of Science in Math and Computer Science from the University of California, Los Angeles (UCLA). Karl Zager, Consulting Manager- Plante Moran, Technology Consulting & Solutions Karl specializes in the transition of IT for mergers and acquisitions. His work with both U.S. and non U.S. investors has included IT due diligence prior to the acquisition and post-acquisition, the development of a new IT organization structure, global infrastructure design, and project management of the entire IT transition. Karl has spent more than 25 years designing, implementing, and supporting IT infrastructure from the high level global network planning to router configuration and packet analysis. His projects have included Michigan’s two largest counties, school districts, leading hospitals, and the U.S. Military. Karl has received a Network Architect certification from Pine Mountain Group. Karl has a Bachelor of Science in Electronic Engineering Technology from Lawrence Technological University. Kurt VanderWal, Senior Consultant – Plante Moran, Technology Consulting & Solutions Kurt has spent more than 16 years in the information technology field specializing in PCI compliance, network security, local area networks, and file servers. Over the past seven years, Kurt has been performing PCI DSS assessments and network security assessments for financial, education, and government institutions. Kurt holds a Bachelor of Science in Information Systems and has acquired multiple certifications over his tenure. webinars.plantemoran.com
  • 3. Administration  Slides are available for download from your webcast console. A recording of today’s webinar will be added to our website in a few days.  We will allow time at the end of the presentation to respond to your questions, but please feel free to submit questions at any time.  This is a CPE-eligible webinar. Throughout the webcast, participation pop-ups will appear.  Participants must respond to at least 75% of these pop-ups in order to receive CPE credit. webinars.plantemoran.com
  • 4. Overview Organizations adopting an enterprise mobility management mindset and strategic approach to their mobile environments are transforming the way they do business, leading to innovation and growth. In today's competitive marketplace, achieving greater information access, enhanced collaboration, increased productivity, improved customer service, and lower TCO (total cost of ownership) can put you miles ahead of your competition. At the completion of this webinar, participants will understand:  The mobility environment and transformational impact  The importance of mobilization planning and strategy  Key factors to consider in managing devices, applications, and services  Security and compliance best practices webinars.plantemoran.com
  • 5. Mobility background  Proliferation of mobile devices including tablets and smartphones  Innovative designs, intuitive, and better access to high speed networks  Integral to staying competitive  Web based applications and services are moving people to the cloud  Dealing with a younger generation of workers  Provides a ‘role model’ for innovation  Greater connection to and engagement with the customer  Improves integration with social networking/media sites 5 webinars.plantemoran.com
  • 6. Reasons to go mobile  Increased information access and sharing  Better response times  Improved customer service  Increased productivity and satisfaction  Enhanced collaboration  Increased efficiencies  Reduced costs  Better recruitment of top talent  Greater innovation 6 webinars.plantemoran.com
  • 7. Industry applications Government Retail Manufacturing Banking Healthcare 7 webinars.plantemoran.com
  • 8. Strategy is key  Key considerations  Device ownership  Applications  Platforms  Cloud is about enabling and leveraging technology, but mobility is about enabling and leveraging the business  Focus on the business aspects centered around:  Access  Management  Balance 8 webinars.plantemoran.com
  • 9. Advantages of a sound strategy  A sound strategy  Increases the impact and results  Ensures that delivery is cost effective and efficient  Provides a means to stay competitive 9 webinars.plantemoran.com
  • 10. IT concerns  How do we support the  How do we stop data devices? leakage?  What if the user jailbreaks  Do they want it for more the device? than email?  Do we need to develop  Who gets them and how apps? do we pay for them?  How do we secure the device  How do we maintain the and data? service expectation?  Do we need to support every  What about compatibility? device? 10 webinars.plantemoran.com
  • 11. Process The process may take multiple iterations to resolve. Strategy Policy Architecture Tools Procedure Make nothing public until the process is complete. 11 webinars.plantemoran.com
  • 12. Strategy Decisions are interrelated and can have a huge impact. Email Apps File Support Exchange Device Business – Plan Ownership Employee Coverage Relationship, Cost, Productivity Business Depth of Apps Control Device Types 12 webinars.plantemoran.com
  • 13. Leading Management Concerns by Strategy Internal Wi-Fi + Internal + Web Purpose Email Only Business Applications Specific Applications  Device  Data ownership  Data ownership  Data ownership Compatibility  Data leakage  Data leakage  Data leakage  Inventory  Device ownership /  Device ownership /  Device ownership /  Software updates cost cost cost  Access control  Inventory  Inventory  Inventory  Account  Account  Account Management Management Management  Communications  Communications  Communications Management Management Management  Device  Device Compatibility Compatibility  Communications Security  Access Control  Support  Training 13 webinars.plantemoran.com
  • 14. Policy  Device ownership, service provider, coverage, communication costs  Data ownership  Privacy – personal data, device use, location, applications  Device care - damage and loss  User separation  Security – features and user actions  Support – depth vs. cost 14 webinars.plantemoran.com
  • 15. Architecture Components  Device type considerations – environment, capabilities  Access to data – messages (includes calendar and contacts) only apps, synchronization, remote VPN, remote desktop  Data storage and backup  Policy enforcement – security, application restrictions, data leakage  Lockdown – recovery, wipe  Software and configuration distribution  Support – recovery, configuration, backups, updates, applications  Administration – inventory, IDs, rights, monitoring  Device management depth – light, heavy, containerized 15 webinars.plantemoran.com
  • 16. Management Tools  Mail Synchronization Servers (BES, MS Sync, Notes Traveler)  Mobile Device Management Software (Airwatch, Fiberlink, Zenprise, Excitor, MobileIron, Sybase, Good)  Antivirus software (AVG, Kaspersky, ESET)  Mobile VPN clients (most major firewall vendors)  Remote control / Virtual PC (Citrix, VMware, Microsoft, VNC)  Training 16 webinars.plantemoran.com
  • 17. Procedures  Request process  Policy acceptance  Acquisition  Initial setup  Apps  Accounts  Configuration  Training  Management  Updates  Enforcement 17 webinars.plantemoran.com
  • 18. Security  Why we need to secure the devices  Types of mobile access  Remote wipes  Managing the security of mobile devices  Additional security points 18 webinars.plantemoran.com
  • 19. Why we need to secure the devices  It is estimated that by 2013  There will be 1.2 billion mobile workers worldwide  75% of all U.S. workers will be mobile at least 20% of the time  Another estimate shows that  36% of cell phone owners have lost a phone or had one stolen • Of these, almost 90% had no way to remotely lock or wipe the data from them • Over 50% did not use password protection on their phones  In the U.S., 113 cell phones are lost every minute 19 webinars.plantemoran.com
  • 20. Why we need to secure the devices  While mobility is a top security concern to business, few have addressed these concerns. Why?  Businesses and employees are seeing the advantages and pushing IT to “make it work”  There are many different types of mobile devices  These devices can be both business owned or employee owned  Ability for users to install new, untested applications is too easy  Too many variables 20 webinars.plantemoran.com
  • 21. Types of mobile access  Multiple ways mobile devices attach to the corporate network  Internet Access Only (Internal)  Remote Access to Email  Remote Access to Network Resources and Data  Regardless of the method, both the mobile device and the corporate network need to be protected 21 webinars.plantemoran.com
  • 22. Internet access only  Description  Staff members bring mobile device (BYOD or Corporate owned) to the office  Only want to access Internet  Security Risk  Potentially infected devices accessing your corporate network  Solutions  Setup a separate Internet-only connection with wireless access (small companies, banks)  Segment all mobile wireless traffic from the corporate network 22 webinars.plantemoran.com
  • 23. Remote access to corporate email  Description  Staff members accessing corporate email from remote locations  Security Risks  Data now resides on mobile device • Lost data due to stolen/lost device • Via OWA or other client software  User credentials are now sent to/from the mobile device to the corporate network • If insecure, credentials could be stolen  Solutions  Restrict the download of documents to mobile devices (OWA)  Require the use of a SECURE third party application to access the email (Good, Sync)  Ensure remote locking and remote wiping is enabled and configured properly 23 webinars.plantemoran.com
  • 24. Remote access to corporate network  Description  Staff members accessing corporate network and resources from remote locations  Security Risks  Devices are accessing an internal corporate resource  Spread of viruses/malware across corporate network  Data now resides on mobile device • Lost data due to stolen/lost device  User credentials are now sent to/from the mobile device to the corporate network • If insecure, credentials could be stolen  Insecure mobile devices (screen locks, passwords) lead to compromise of corporate network  Ensure remote locking and wipe are enabled 24 webinars.plantemoran.com
  • 25. Remote access to corporate network  Solutions  Require all remote devices go through a NAC prior to accessing the network  Require that communications to the corporate network occur through a secure VPN or secure portal (i.e. Terminal Services) where data is Read-Only  Ensure that the devices/removable cards are encrypted  Ensure strong policies are established and adhered to  Ensure remote wipe is enabled 25 webinars.plantemoran.com
  • 26. Remote wipes  What is a Remote Wipe?  Erasing the contents of the mobile devices from a remote location (full or partial)  How is it done?  Depending on the device and OS, it typically deletes either the encryption key OR writes a series of 1’s over the entire phone  Is it effective?  Yes  Notes  Must be setup and configured prior to device being ‘lost’  If device is being sent in for repairs, a backup should be performed and then a wipe 26 webinars.plantemoran.com
  • 27. Managing the security  Managing the security of the mobile devices  Implement firewall/NAC technologies which support the mobile operating systems  Limit the types of devices/OS versions allowed to attach  Inventory/Manage the devices – Mobile Device Management  Ensure that users agree to the corporate policy prior to accessing the network • Defines ownership of data • Defines required configurations • Prohibits “jail-broken” devices on the network  Security test these devices/apps  Provide end user training 27 webinars.plantemoran.com
  • 28. Additional security points  Configuring the devices  Enable remote wipes  Ensure screen lock passwords are set  Ensure screen lock passwords are strong  Ensure key pad lock is enabled after a period of inactivity  Require Anti-virus and Malware detection software  Act Now! 28 webinars.plantemoran.com
  • 29. Best practices  Set a short-term and long-term direction  Engage all business units  Get support/buy-in  Include total cost of ownership (TCO) and total cost impact  Include devices, applications, services, security, support, policies, etc. (all facets of mobility)  Establish central governance 29 webinars.plantemoran.com
  • 30. Q&A Q&A webinars.plantemoran.com
  • 31. Thank you for attending Marv Sauer 248.223.3120 Marvin.Sauer@plantemoran.com Karl Zager 248.223.3241 Karl.Zager@plantemoran.com Kurt VanderWal 248.223.3119 Kurtis.VanderWal@plantemoran.com To view a complete calendar of upcoming Plante Moran webinars, visit webinars.plantemoran.com webinars.plantemoran.com