SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Analyst
Briefing
September, 2012
Graham Chalk
Sr. Product Manager
Managed
Mobility
Services
(MMS)
3
The Future Friendly Enterprise is our brand promise to
large businesses across Canada and highlights our
commitment to collaborate with customers to deliver
the right solutions to businesses with complex
technology needs.
4
What Guides Us: The Trends
 Trends and technological innovations that are revolutionizing
the way employees work – and the way customers expect
their services to be delivered
– Consumerization of IT
– Changing Work Styles
– Beyond the Firewall
– Changing Customer Expectations
These trends are inextricably linked to our customers’ success
and therefore drive our enterprise strategy. We MUST, therefore,
keep them top-of-mind as we evolve
5
Enterprise Trends – Linkage to Mobility
Enterprise Trends Linkage to Mobility Trends
1. Consumerization of IT  Growth of Bring-Your-Own-Device programs
2. Changing workstyles  Growth of Mobile / Work-at-home workers
3. Beyond the firewall  Minimizing risk of data loss on Mobile devices
4. Changing customer
expectations
 Growing importance of Mobile user support
6
Enterprise Mobile Trends
Tablet / New
Smartphone
growth
Bring-Your
Own-Device
BYOD
&
CYOD
Mobile
Device
Application
growth
Mobile
Device
Control &
Security
7
Trend: Tablet & New Smartphone growth
Apple (Q4 2011): More iPads were sold than any single manufacturer
sold PC’s. 65% year-over-year (‘10-’11) growth in B2B markets.
Business Impact:
 End user device choice =
Happy productive employees
 Mounting cost of IT / Help
Desk staff training / retaining
Business Issue:
 Employee satisfaction /
productivity a key priority
 Lack of IT / Help Desk
experience with new
devices like iPhone / iPad
TELUS Managed Mobility Services (MMS)
 Help Desk supports new mobile devices, including iOS, Android, Windows
 Managing the mobile platforms that support these devices
8
Trend: Consumerization & BYOD
Fact: Majority of Enterprise employees are using their own
technology for work purposes.
Business Impact:
 Executive (iPad / iPhone)
trickle down effect
 Most Enterprises still have
BYOD questions including:
 Which devices?
 Who’s responsible?
 Who pays?
 How to minimize risk?
 How to deliver support?
 How to control costs?
Business Issue:
 How to approach
BYOD/CYOD in the
Enterprise
 Which flavor of BYOD is
the best fit for a given
Enterprise
TELUS Managed Mobility Services (MMS)
 Help you build an Enterprise Mobility
Program (EMP) including:
 Current state assessment
 MDM evaluation / recommendation
 Mobile policy development
 BYOD program design
9
Trend: Bring-Your Own-Device (BYOD) con’t
Fact: IT’s workload increases significantly as employees bring their
own devices to work.
Business Impact:
 BYOD could be chaotic
 Right technologies selected?
 Integrated processes?
 People trained / retained?
 Corporate & personal liability
 Policy & Process to wipe device
 BYOD is bigger than you think,
incomplete plan = cost overruns
Business Issue:
 IT without a BYOD plan:
 Managing the technology
 Building the processes
 Hiring experienced people
 Concern with corporate &
personal data on one device
 IT / Finance require budget
certainty for new projects
TELUS Managed Mobility Services (MMS)
 Help design the technology, policy, procedures, and bus. case for BYOD
 Offload the burden and security risks to manage it from E2E.
10
Trend: Mobile Device Application Growth
Fact: Majority of IT priorities are now related to increased SmartPhone
adoption and/or mobile application support
Business Impact:
 Right apps for right users will
increase mobile productivity
 Risks, if apps not controlled
 User access to apps
 Apps data out in the wild
 Complexity of IT compounding
 More devices, platforms, apps
 Growth of BYOD.
Business Issue:
 How do we harness the
value of mobile apps?
 If we go BYOD, won’t
users have access to
personal and corporate
apps on one device?
TELUS Managed Mobility Services (MMS)
 Ensure right apps are preloaded and setup for users, right out of the box
 Ensure users can only access permitted apps by leveraging your MDM
11
Trend: Mobile Device Control & Security
TELUS / Vox Mobile research (2012): 17% of Enterprise have MDM in
place, while 83% are still budgeting / learning / evaluating MDM.
Business Impact:
 Balance: IT control & risk to
org with user productivity
 Enterprise IT / Help Desk
skills / resources to manage
MDM + support users
 Should Enterprise focus on
more strategic projects?
Business Issue:
 New IT definition
required for “control”
on multiple platforms
 New MDM platforms
are new technologies -
require significant
Enterprise investment
TELUS Managed Mobility Services (MMS)
 Monitor manage your MDM servers allowing you to focus on business
 Help Desk agents trained on latest MDMs ensuring user productivity
*Note: Basic MDM control / security includes: device password enforcement, device wipe / lock, inventory management, jailbreak detection
12
Trend: Mobile Device Control & Security con’t
TELUS Rotman study (2011): Loss of a phone containing corporate data is
the top ranked Enterprise security concern.
Business Impact:
 Enterprise must balance
technology + people + process
 More than MDM. Consider:
 Policy development / compliance /
enforcement / management
 Data loss prevention policy &
process from lost / stolen devices
 Network access policy & process
(who has access to what)
 Data privacy policy & process
(corp. data on personal devices)
Business Issue:
 More focus than ever on
securing mobile devices
 MDM = basic IT control
and mobile security*
 If we go BYOD, won’t
users have access to
personal and corporate
data on one device?
*Note: Basic MDM control / security includes: device password enforcement, device wipe / lock, inventory management, jailbreak detection
13
Enabling “IT to be the new Department of YES!”
 More end-user choice - More device choice, including iOS and Android
 Cost control – More cost-effective options for managing Mobile platforms
 Operational efficiency - More efficient processes that are fully compliant
 Risk reduction - Reduce the security risk and offload the IT burden
14 - TELUS Restricted and Confidential
TELUS Enterprise Solutions approach to Managed Mobility
Support (appropriate support levels by end-user
segment)
Security (policy management, network access
controls, data loss prevention, data privacy)
Policy development (usage agreement, legal
compliance, approved devices, TCO controls)
Technology alignment (MDM) and device choice
(device types, device quantities, services, data)
End-user segmentation (job criticality, location,
time sensitivity)
A Balanced Approach
Technology
Process + People
People
Technology + People
Process + People
15
Why TELUS partnered with Vox Mobile
Focused on IT for mobility
 TELUS’ 20 years experience as a trusted provider of Managed Services
 Complement of Vox Mobile’s 7+ years, MDM vendor agnostic approach,
and focus on IT for mobility
Enterprise mobility experience
 Vox Mobile’s proven Enterprise Mobility Program (EMP) and blueprint
 Over 1000 MDM implementations, management of over 100,000 mobile
devices and 900 mobile platform servers, and 85% FCR for helpdesk
Recognized MMS provider
 Vox Mobile ranked by Gartner as one of only 12 global experts in
managed mobility, 2nd highest rating “product viability”
Together we have the experience, facilities and systems to deliver
managed mobile solutions for enterprises with complex needs
16 - TELUS Restricted and Confidential
What are Managed Mobility Services?
 Clear answers
 Freedom to focus
 Tools you can use
MMS Advise™
Which MDM do I choose? How do we do BYOD? Is
our corporate data at risk? How will we know?
MMS Acquire™
I don’t want to be a mobile phone order shop. Isn’t
there a tool our employees could use themselves?
MMS Adapt™
How do I get the right device to the right person with
everything they need already on it?
MMS Administer™
It’s hard to maintain the Technical expertise. I wish
someone could just manage our MDM server for us.
MMS Assist™
How will we keep up if we go BYOD? There are so
many devices for our Help Desk to support.
MMS Analyze™
How do we make sense of all our mobility expenses?
Finance wants to break it down to the user level.
17 - TELUS Restricted and Confidential
TELUS MMS, powered by Vox Mobile
A complete selection of individual yet integrated modules customized to
an Enterprise client’s (500+ employees) unique needs:
 MMS Advise : Analysis of your needs & an enterprise-wide strategy
 MMS Acquire: Custom portal to funnel all purchases through a single interface
 MMS Adapt : Configuration and set-up of devices before delivery
 MMS Administer: 24/7 monitoring and management of your mobile servers
 MMS Assist : 24/7 single point of contact Help Desk for issues and requests
 MMS Analyze : Comprehensive expense management services
18 - TELUS Restricted and Confidential
TELUS MMS Overview - 3 phases
We assume all the tasks and activities
associated with managing your enterprise’s
mobile devices from procurement to payment.
6 individual yet integrated modules
delivered over 3 phases:
 Strategic Analysis - A structured fast-track
engagement analyzes your current mobile needs,
provides options and recommends solution.
 Program Implementation - A fully managed
implementation program, from identifying user
requirements to provisioning platforms.
 Ongoing Management - A 24/7 single point of
contact for all your mobile needs to optimizing
mobile server performance and managing invoices.
19 - TELUS Restricted and Confidential
TELUS MMS Overview - MMS Advise™
MODULE YOUR CHALLENGES WHAT WE DELIVER
MMS
Advise™
 Employees want more mobile
device choice, but IT isn’t sure
how to best deliver it
 IT trying to select an MDM
platform, but lack the expertise
 Enterprise lacks an end-to-end
Mobile IT strategy
 Analysis of your current
needs: user segments, policy,
process, devices, MDM
platform, applications, support.
 End-to-end mobile solution
strategy to begin the
transformation
20 - TELUS Restricted and Confidential
TELUS MMS Overview - MMS Advise™
Enterprise Mobility Workshop:
 Jump Start your Enterprise Mobility Program (EMP) with a
series of workshops designed to set your strategy and objectives.
 Choice of workshops specific to your needs: Tablets, Mobile
applications, Risk assessment, and BYOD (Bring Your Own
Device).
Transformation and Design (T&D):
 Collaboration with your operational teams to assist you in
building an Enterprise Mobility Program (EMP) including one or
more of:
 Current state assessment
 MDM platform evaluation and recommendation
 Mobile policy and policy communications plan
 Mobile risk assessment
 Mobile program blueprint & roadmap
 BYOD program design
21 - TELUS Restricted and Confidential
TELUS MMS Overview - MMS Acquire™
MODULE YOUR CHALLENGES WHAT WE DELIVER
MMS
Acquire™
 Inefficient processes for
mobile device Moves / Adds /
Changes / Deletions (MACD)
 Lack of MACD service levels
(e.g. guaranteed response
time for request completion)
 Too many points contact for
service and support
 Dedicated portal to funnel your
purchases and service requests
through a single interface
 Process to enforce corporate
policies, determine eligibilities
and provide enhanced reporting
 Coordination by TELUS across
different systems / providers
22 - TELUS Restricted and Confidential
TELUS MMS Overview - MMS Adapt™
MODULE YOUR CHALLENGES WHAT WE DELIVER
MMS
Adapt™
 New mobile devices are
not setup / ready for users
out of the box
 IT requires that certain
applications are only
available for certain users
 Lack of resources /
expertise for end-to-end
device deployments
 Policy enforcement to get right
device / apps to right employee
 Management of large scale mobile
device deployments
 End-to-end deployment expertise
including procurement, provisioning,
configuration, bundling, shipping
and support
23 - TELUS Restricted and Confidential
TELUS MMS Overview - MMS Administer™
MODULE YOUR CHALLENGES WHAT WE DELIVER
MMS
Administer™
 Lack of expertise with new
mobile platform technology
 Limited operating / capital
budgets to grow IT
 Desire for IT department to
focus on more strategic
initiatives
 24/7 monitoring / incident ticketing
for 1 of 8 leading MDMs
 MDM server management**
including proactive implementation
of updates, patches, bug fixes
 Cloud based or on-site solutions
that ensure optimal performance
and deliver the security you require
Combining TELUS MMS Administer with
TELUS Hosting capabilities provides a complete outsourced solution.
24 - TELUS Restricted and Confidential
TELUS MMS Overview - MMS Assist™
MODULE YOUR CHALLENGES WHAT WE DELIVER
MMS
Assist™
 Too many points of contact
for service and support
(both IT and users)
 Support / Operations
unable to handle the
support calls related to
expanding device and
services market
 24/7 SPOC Help Desk supporting
all your mobile users and devices
 Dedicated toll-free number that
can be integrated with your current
support desk IVR
 Agents trained on the latest
technologies and internal processes
used by your organization
Customer Policies
Resources & Processes
Diverse Knowledge
25 - TELUS Restricted and Confidential
TELUS MMS Overview - MMS Analyze™
MODULE YOUR CHALLENGES WHAT WE DELIVER
MMS
Analyze™
 Enterprise mobile usage
costs not broken down to
the user level
 Incomplete view of mobile
spending not allowing
Enterprise to make more
informed business
decisions
 Comprehensive wireless expense
management service to analyze
your mobile usage with TELUS
making changes on your behalf
 Enterprise-wide view of mobility
spending across carriers
 Analysis and reporting to reduce
costs and optimize spending
26
For more information
www.telus.com/mms
28 - TELUS Restricted and Confidential
Mobile Layers
Policy
Policy
Policy
Policy
Process
Process
Process
Process
Internet / Cloud
(external / internal requirements)
Infrastructure
(wire and wireless network, corporate and legacy systems)
Application
(web apps, APIs, certificates, interfaces with corporate systems)
Device Management
(smart phones, tablets, laptops, MDM systems)
End user
(Profiles, registration, access)
Corporate Data
Corporate Data
CorporateData
CorporateData

Contenu connexe

Tendances

Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
eBook Unified Communications
eBook Unified Communications eBook Unified Communications
eBook Unified Communications Khiara McMillin
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksLogicalis
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Enterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveEnterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveSoftweb Solutions
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Smart Information Management
Smart Information ManagementSmart Information Management
Smart Information ManagementDaryl Pereira
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 

Tendances (17)

Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
eBook Unified Communications
eBook Unified Communications eBook Unified Communications
eBook Unified Communications
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Business transformation
Business transformationBusiness transformation
Business transformation
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Enterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveEnterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the move
 
Enterprise mobility platforms
Enterprise mobility platformsEnterprise mobility platforms
Enterprise mobility platforms
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Smart Information Management
Smart Information ManagementSmart Information Management
Smart Information Management
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 

En vedette

Telus Mobility + OCAD Final Presentation Deck
Telus Mobility + OCAD Final Presentation DeckTelus Mobility + OCAD Final Presentation Deck
Telus Mobility + OCAD Final Presentation DeckCasey Wong
 
TELUS: Unleashing the power of mHealth. 9 August 2011
TELUS: Unleashing the power of mHealth. 9 August 2011TELUS: Unleashing the power of mHealth. 9 August 2011
TELUS: Unleashing the power of mHealth. 9 August 20113GDR
 
ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'
ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'
ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'Sarah Horrigan-Fullard
 
Creating social & business value for TELUS & our local communities. By Jill S...
Creating social & business value for TELUS & our local communities. By Jill S...Creating social & business value for TELUS & our local communities. By Jill S...
Creating social & business value for TELUS & our local communities. By Jill S...Volunteer Canada
 
Customer service lessons from telus final
Customer service lessons from telus finalCustomer service lessons from telus final
Customer service lessons from telus finalStephen Abram
 
Customer Presentation - Telus
Customer Presentation - TelusCustomer Presentation - Telus
Customer Presentation - TelusSplunk
 
TELUS Case Study: GIS for Telecommunications
TELUS Case Study: GIS for TelecommunicationsTELUS Case Study: GIS for Telecommunications
TELUS Case Study: GIS for Telecommunicationseventspat
 

En vedette (7)

Telus Mobility + OCAD Final Presentation Deck
Telus Mobility + OCAD Final Presentation DeckTelus Mobility + OCAD Final Presentation Deck
Telus Mobility + OCAD Final Presentation Deck
 
TELUS: Unleashing the power of mHealth. 9 August 2011
TELUS: Unleashing the power of mHealth. 9 August 2011TELUS: Unleashing the power of mHealth. 9 August 2011
TELUS: Unleashing the power of mHealth. 9 August 2011
 
ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'
ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'
ALT-C 2013 - 'TELUS About it - Collaborative approaches to staff development'
 
Creating social & business value for TELUS & our local communities. By Jill S...
Creating social & business value for TELUS & our local communities. By Jill S...Creating social & business value for TELUS & our local communities. By Jill S...
Creating social & business value for TELUS & our local communities. By Jill S...
 
Customer service lessons from telus final
Customer service lessons from telus finalCustomer service lessons from telus final
Customer service lessons from telus final
 
Customer Presentation - Telus
Customer Presentation - TelusCustomer Presentation - Telus
Customer Presentation - Telus
 
TELUS Case Study: GIS for Telecommunications
TELUS Case Study: GIS for TelecommunicationsTELUS Case Study: GIS for Telecommunications
TELUS Case Study: GIS for Telecommunications
 

Similaire à Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss

Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Happiest Minds Technologies
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Ahmed Banafa
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comPhD Assistance
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comPhD Assistance
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementMichael Lemm
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfJPLoft Solutions
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksLogicalis
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseAhmed Banafa
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 
Enterprise Mobile Strategy
Enterprise Mobile StrategyEnterprise Mobile Strategy
Enterprise Mobile StrategyDMIMarketing
 
Mobile device management
Mobile device managementMobile device management
Mobile device managementsara stanford
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1momobangalore
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsTAKE Supply Chain
 

Similaire à Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss (20)

Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle Management
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterprise
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Enterprise Mobile Strategy
Enterprise Mobile StrategyEnterprise Mobile Strategy
Enterprise Mobile Strategy
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss

  • 3. 3 The Future Friendly Enterprise is our brand promise to large businesses across Canada and highlights our commitment to collaborate with customers to deliver the right solutions to businesses with complex technology needs.
  • 4. 4 What Guides Us: The Trends  Trends and technological innovations that are revolutionizing the way employees work – and the way customers expect their services to be delivered – Consumerization of IT – Changing Work Styles – Beyond the Firewall – Changing Customer Expectations These trends are inextricably linked to our customers’ success and therefore drive our enterprise strategy. We MUST, therefore, keep them top-of-mind as we evolve
  • 5. 5 Enterprise Trends – Linkage to Mobility Enterprise Trends Linkage to Mobility Trends 1. Consumerization of IT  Growth of Bring-Your-Own-Device programs 2. Changing workstyles  Growth of Mobile / Work-at-home workers 3. Beyond the firewall  Minimizing risk of data loss on Mobile devices 4. Changing customer expectations  Growing importance of Mobile user support
  • 6. 6 Enterprise Mobile Trends Tablet / New Smartphone growth Bring-Your Own-Device BYOD & CYOD Mobile Device Application growth Mobile Device Control & Security
  • 7. 7 Trend: Tablet & New Smartphone growth Apple (Q4 2011): More iPads were sold than any single manufacturer sold PC’s. 65% year-over-year (‘10-’11) growth in B2B markets. Business Impact:  End user device choice = Happy productive employees  Mounting cost of IT / Help Desk staff training / retaining Business Issue:  Employee satisfaction / productivity a key priority  Lack of IT / Help Desk experience with new devices like iPhone / iPad TELUS Managed Mobility Services (MMS)  Help Desk supports new mobile devices, including iOS, Android, Windows  Managing the mobile platforms that support these devices
  • 8. 8 Trend: Consumerization & BYOD Fact: Majority of Enterprise employees are using their own technology for work purposes. Business Impact:  Executive (iPad / iPhone) trickle down effect  Most Enterprises still have BYOD questions including:  Which devices?  Who’s responsible?  Who pays?  How to minimize risk?  How to deliver support?  How to control costs? Business Issue:  How to approach BYOD/CYOD in the Enterprise  Which flavor of BYOD is the best fit for a given Enterprise TELUS Managed Mobility Services (MMS)  Help you build an Enterprise Mobility Program (EMP) including:  Current state assessment  MDM evaluation / recommendation  Mobile policy development  BYOD program design
  • 9. 9 Trend: Bring-Your Own-Device (BYOD) con’t Fact: IT’s workload increases significantly as employees bring their own devices to work. Business Impact:  BYOD could be chaotic  Right technologies selected?  Integrated processes?  People trained / retained?  Corporate & personal liability  Policy & Process to wipe device  BYOD is bigger than you think, incomplete plan = cost overruns Business Issue:  IT without a BYOD plan:  Managing the technology  Building the processes  Hiring experienced people  Concern with corporate & personal data on one device  IT / Finance require budget certainty for new projects TELUS Managed Mobility Services (MMS)  Help design the technology, policy, procedures, and bus. case for BYOD  Offload the burden and security risks to manage it from E2E.
  • 10. 10 Trend: Mobile Device Application Growth Fact: Majority of IT priorities are now related to increased SmartPhone adoption and/or mobile application support Business Impact:  Right apps for right users will increase mobile productivity  Risks, if apps not controlled  User access to apps  Apps data out in the wild  Complexity of IT compounding  More devices, platforms, apps  Growth of BYOD. Business Issue:  How do we harness the value of mobile apps?  If we go BYOD, won’t users have access to personal and corporate apps on one device? TELUS Managed Mobility Services (MMS)  Ensure right apps are preloaded and setup for users, right out of the box  Ensure users can only access permitted apps by leveraging your MDM
  • 11. 11 Trend: Mobile Device Control & Security TELUS / Vox Mobile research (2012): 17% of Enterprise have MDM in place, while 83% are still budgeting / learning / evaluating MDM. Business Impact:  Balance: IT control & risk to org with user productivity  Enterprise IT / Help Desk skills / resources to manage MDM + support users  Should Enterprise focus on more strategic projects? Business Issue:  New IT definition required for “control” on multiple platforms  New MDM platforms are new technologies - require significant Enterprise investment TELUS Managed Mobility Services (MMS)  Monitor manage your MDM servers allowing you to focus on business  Help Desk agents trained on latest MDMs ensuring user productivity *Note: Basic MDM control / security includes: device password enforcement, device wipe / lock, inventory management, jailbreak detection
  • 12. 12 Trend: Mobile Device Control & Security con’t TELUS Rotman study (2011): Loss of a phone containing corporate data is the top ranked Enterprise security concern. Business Impact:  Enterprise must balance technology + people + process  More than MDM. Consider:  Policy development / compliance / enforcement / management  Data loss prevention policy & process from lost / stolen devices  Network access policy & process (who has access to what)  Data privacy policy & process (corp. data on personal devices) Business Issue:  More focus than ever on securing mobile devices  MDM = basic IT control and mobile security*  If we go BYOD, won’t users have access to personal and corporate data on one device? *Note: Basic MDM control / security includes: device password enforcement, device wipe / lock, inventory management, jailbreak detection
  • 13. 13 Enabling “IT to be the new Department of YES!”  More end-user choice - More device choice, including iOS and Android  Cost control – More cost-effective options for managing Mobile platforms  Operational efficiency - More efficient processes that are fully compliant  Risk reduction - Reduce the security risk and offload the IT burden
  • 14. 14 - TELUS Restricted and Confidential TELUS Enterprise Solutions approach to Managed Mobility Support (appropriate support levels by end-user segment) Security (policy management, network access controls, data loss prevention, data privacy) Policy development (usage agreement, legal compliance, approved devices, TCO controls) Technology alignment (MDM) and device choice (device types, device quantities, services, data) End-user segmentation (job criticality, location, time sensitivity) A Balanced Approach Technology Process + People People Technology + People Process + People
  • 15. 15 Why TELUS partnered with Vox Mobile Focused on IT for mobility  TELUS’ 20 years experience as a trusted provider of Managed Services  Complement of Vox Mobile’s 7+ years, MDM vendor agnostic approach, and focus on IT for mobility Enterprise mobility experience  Vox Mobile’s proven Enterprise Mobility Program (EMP) and blueprint  Over 1000 MDM implementations, management of over 100,000 mobile devices and 900 mobile platform servers, and 85% FCR for helpdesk Recognized MMS provider  Vox Mobile ranked by Gartner as one of only 12 global experts in managed mobility, 2nd highest rating “product viability” Together we have the experience, facilities and systems to deliver managed mobile solutions for enterprises with complex needs
  • 16. 16 - TELUS Restricted and Confidential What are Managed Mobility Services?  Clear answers  Freedom to focus  Tools you can use MMS Advise™ Which MDM do I choose? How do we do BYOD? Is our corporate data at risk? How will we know? MMS Acquire™ I don’t want to be a mobile phone order shop. Isn’t there a tool our employees could use themselves? MMS Adapt™ How do I get the right device to the right person with everything they need already on it? MMS Administer™ It’s hard to maintain the Technical expertise. I wish someone could just manage our MDM server for us. MMS Assist™ How will we keep up if we go BYOD? There are so many devices for our Help Desk to support. MMS Analyze™ How do we make sense of all our mobility expenses? Finance wants to break it down to the user level.
  • 17. 17 - TELUS Restricted and Confidential TELUS MMS, powered by Vox Mobile A complete selection of individual yet integrated modules customized to an Enterprise client’s (500+ employees) unique needs:  MMS Advise : Analysis of your needs & an enterprise-wide strategy  MMS Acquire: Custom portal to funnel all purchases through a single interface  MMS Adapt : Configuration and set-up of devices before delivery  MMS Administer: 24/7 monitoring and management of your mobile servers  MMS Assist : 24/7 single point of contact Help Desk for issues and requests  MMS Analyze : Comprehensive expense management services
  • 18. 18 - TELUS Restricted and Confidential TELUS MMS Overview - 3 phases We assume all the tasks and activities associated with managing your enterprise’s mobile devices from procurement to payment. 6 individual yet integrated modules delivered over 3 phases:  Strategic Analysis - A structured fast-track engagement analyzes your current mobile needs, provides options and recommends solution.  Program Implementation - A fully managed implementation program, from identifying user requirements to provisioning platforms.  Ongoing Management - A 24/7 single point of contact for all your mobile needs to optimizing mobile server performance and managing invoices.
  • 19. 19 - TELUS Restricted and Confidential TELUS MMS Overview - MMS Advise™ MODULE YOUR CHALLENGES WHAT WE DELIVER MMS Advise™  Employees want more mobile device choice, but IT isn’t sure how to best deliver it  IT trying to select an MDM platform, but lack the expertise  Enterprise lacks an end-to-end Mobile IT strategy  Analysis of your current needs: user segments, policy, process, devices, MDM platform, applications, support.  End-to-end mobile solution strategy to begin the transformation
  • 20. 20 - TELUS Restricted and Confidential TELUS MMS Overview - MMS Advise™ Enterprise Mobility Workshop:  Jump Start your Enterprise Mobility Program (EMP) with a series of workshops designed to set your strategy and objectives.  Choice of workshops specific to your needs: Tablets, Mobile applications, Risk assessment, and BYOD (Bring Your Own Device). Transformation and Design (T&D):  Collaboration with your operational teams to assist you in building an Enterprise Mobility Program (EMP) including one or more of:  Current state assessment  MDM platform evaluation and recommendation  Mobile policy and policy communications plan  Mobile risk assessment  Mobile program blueprint & roadmap  BYOD program design
  • 21. 21 - TELUS Restricted and Confidential TELUS MMS Overview - MMS Acquire™ MODULE YOUR CHALLENGES WHAT WE DELIVER MMS Acquire™  Inefficient processes for mobile device Moves / Adds / Changes / Deletions (MACD)  Lack of MACD service levels (e.g. guaranteed response time for request completion)  Too many points contact for service and support  Dedicated portal to funnel your purchases and service requests through a single interface  Process to enforce corporate policies, determine eligibilities and provide enhanced reporting  Coordination by TELUS across different systems / providers
  • 22. 22 - TELUS Restricted and Confidential TELUS MMS Overview - MMS Adapt™ MODULE YOUR CHALLENGES WHAT WE DELIVER MMS Adapt™  New mobile devices are not setup / ready for users out of the box  IT requires that certain applications are only available for certain users  Lack of resources / expertise for end-to-end device deployments  Policy enforcement to get right device / apps to right employee  Management of large scale mobile device deployments  End-to-end deployment expertise including procurement, provisioning, configuration, bundling, shipping and support
  • 23. 23 - TELUS Restricted and Confidential TELUS MMS Overview - MMS Administer™ MODULE YOUR CHALLENGES WHAT WE DELIVER MMS Administer™  Lack of expertise with new mobile platform technology  Limited operating / capital budgets to grow IT  Desire for IT department to focus on more strategic initiatives  24/7 monitoring / incident ticketing for 1 of 8 leading MDMs  MDM server management** including proactive implementation of updates, patches, bug fixes  Cloud based or on-site solutions that ensure optimal performance and deliver the security you require Combining TELUS MMS Administer with TELUS Hosting capabilities provides a complete outsourced solution.
  • 24. 24 - TELUS Restricted and Confidential TELUS MMS Overview - MMS Assist™ MODULE YOUR CHALLENGES WHAT WE DELIVER MMS Assist™  Too many points of contact for service and support (both IT and users)  Support / Operations unable to handle the support calls related to expanding device and services market  24/7 SPOC Help Desk supporting all your mobile users and devices  Dedicated toll-free number that can be integrated with your current support desk IVR  Agents trained on the latest technologies and internal processes used by your organization Customer Policies Resources & Processes Diverse Knowledge
  • 25. 25 - TELUS Restricted and Confidential TELUS MMS Overview - MMS Analyze™ MODULE YOUR CHALLENGES WHAT WE DELIVER MMS Analyze™  Enterprise mobile usage costs not broken down to the user level  Incomplete view of mobile spending not allowing Enterprise to make more informed business decisions  Comprehensive wireless expense management service to analyze your mobile usage with TELUS making changes on your behalf  Enterprise-wide view of mobility spending across carriers  Analysis and reporting to reduce costs and optimize spending
  • 27.
  • 28. 28 - TELUS Restricted and Confidential Mobile Layers Policy Policy Policy Policy Process Process Process Process Internet / Cloud (external / internal requirements) Infrastructure (wire and wireless network, corporate and legacy systems) Application (web apps, APIs, certificates, interfaces with corporate systems) Device Management (smart phones, tablets, laptops, MDM systems) End user (Profiles, registration, access) Corporate Data Corporate Data CorporateData CorporateData