The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group"

Transcription

1 The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group 1

2 Today s Agenda State of Enterprise Mobility Management (EMM) The Rise of Bring Your Own Device (BYOD) Cloud-Enabled Social Mobile Enterprise Leveraging the Cloud for Mobility Intelligence EMM Strategy Recommendations 2

3 Andrew Borg Research Director Mobility Center of Excellence AberdeenGroup 2011

4 Research Review Intersection of Two Self-Assessment Research Methods PACE Model: behavioral assessment Pressures pain-points and drivers Actions strategies and tactics Capabilities processes and skill sets Enablers technologies and services Maturity Class: performance metrics: Top 20% - Best-in-Class Middle 50% - Industry Average Trailing 30% - Laggard Results are Verified: Survey follow-ups, end-user interviews 4 AberdeenGroup 2012 Not For Distribution

5 Mobility Pain Points Executive and employee demands to leverage mobility s productivity gains to broader organization 46% Need to become more operationally efficient 30% Increasing capabilities and complexities of new devices 24% 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

6 Mobility Strategies Ensure all mobile devices with enterprise access are compliant with corporate standards 44% Support a heterogeneous (vs. homogeneous) mix of mobile device platforms 29% Control the mobile software applications ('apps') that have corporate data access 19% 0% 10% 20% 30% 40% 50% Percent of Respondents, n=431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

7 The EMM Lifecycle Provisioning Performance management Operations and support Compliance and security Expense management Decommissioning Device Refresh Cycle Effort Time 7 AberdeenGroup 2012 Not For Distribution

8 Best-in-Class Defined Employees with Secure Mobile Access to Company Network 10% 41% 94% 7% Lost or Stolen Devices Never Recovered 9% 13% Best-in-Class Industry Average Laggard 10% 1-Year Change in Speed of Decision-Making 4% - 4% -20% 0% 20% 40% 60% 80% 100% Percentage, n=431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

9 Best-in-Class Point the Way Process Decommission process for lost, stolen, or outmoded devices Security policy for full lifecycle of all compliant devices BYOD policy established for corporate use of Organization Organization IT controls all mobile access to company assets Heteregeneous mobile device support DLP procedures protect corporate data on employee devices Corporate profiles on employee devices secure corporate assets 9 AberdeenGroup 2012 Not For Distribution

10 Best-in-Class Point the Way Knowledge Internal expertise developed on targeted mobile platforms Regular assessment of security risks Mobile collaboration tools utilized Performance Track number of lost or stolen devices successfully decomissioned Track uptime of organization s Wi-Fi network Track level of mobile access to network and data provided to each employee 10 AberdeenGroup 2012 Not For Distribution

11 Key Technologies Remote mobile device lock and wipe (erase all data) 40% 55% 60% Employee-selected mobile applications ('apps') 40% 38% 52% In-house developed mobile applications ('apps') 29% 45% 42% Self-service web portal for support and procurement 13% 26% 45% Mobile versions of enterprise software (ERP, CRM, SFA, etc) 22% 35% 31% Best-in-Class Industry Average Enterprise mobile application store ('app store') 11% 25% 31% Laggard 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

12 Smartphone Vs. Tablet Security Security Capabilities Smartphones Best-in- Class All Others Best-in- Class Tablets All Others Δ Bestin-Class Tablets Mobile user authentication 75% 65% 59% 52% 25% Policies for user logon password strength enforced 74% 60% 56% 44% 30% Data encryption over wireless connections 65% 56% 44% 39% 38% VPN for mobile devices 64% 51% 48% 43% 31% Mobile device remote lock and wipe 64% 53% 38% 35% 49% Secure and compliant mobile file sharing via cloud 45% 27% 36% 22% 33% Data Loss Prevention (DLP) 41% 29% 28% 25% 45% Application version control (e.g. blacklist / whitelist) 38% 30% 26% 25% 40% N = 431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

13 Performance Gains Rate their workforce as "extremely productive" 15% 28% 12% 12 mo. change in employee adherence to mobile policies - 2% 5% 10% Best-in-Class Industry Average Laggard 12 mo. change in workforce productivity 4% 8% - 3% -5% 0% 5% 10% 15% 20% 25% 30% Percent of Respondents, n=237 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

14 BYOD is a Global Phenom 100% 90% 18% 15% 24% 15% 80% 70% 60% 32% 33% 27% 41% No 50% 40% 30% 20% 50% 53% 49% 44% Yes, but from an approved company list only Yes, any device 10% 0% GLOBAL USA EMEA APAC n = 472 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

15 Poll Question Why has your organization chosen to implement a Bring Your Own Device (BYOD) Program? a) To accommodate the demand of employees b) Employees gain additional productivity c) The business reduces costs by not paying for devices 15

16 Why BYOD? To accommodate the demands of employees 52% 56% 65% Employees gain additional productivity The business reduces costs by not paying for devices 46% 48% 46% 49% 62% 56% Best-in-Class Industry Average Laggard 0% 20% 40% 60% Percent of Respondents, n=431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

17 Industry Point of View Device/OS platform diversity Core MDM best practices continue to drive adoption Apps & Docs are key requirements for evolving mobile strategy Large enterprises need scalable solutions after initial pilots 17

18 Hashtags: #SoMoClo #MaaS360Webinar 18 AberdeenGroup 2012 Not For Distribution

19 Social Mobile Cloud Social business Have Initiatives or Intend to Adopt 65% 82% Mobility 80% 77% Cloud 69% 64% None of the above 3% 11% Best-in-Class All Others 0% 20% 40% 60% 80% Percent of Respondents, n=431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

20 Mobile is Social 1% 5% Use Social Networks 54% 41% Yes, frequently Yes, occasionally Not yet, but planning to No Percent of Respondents, n=431 Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

21 Percent of respondents, n=431 Social Business Strategy 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 21% 7% 72% Best-in-Class 26% 21% 52% Industry Average 43% 15% 43% Laggard An ad hoc approach - at each employee's discretion Part of a planned social media strategy, not necessarily compliant with company IT policy Part of a planned social media strategy, secure and compliant with company IT policy Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

22 Poll Question EMM Hosting Plans for Next 12 Months: a) A solution provider hosts our EMM in the cloud b) A solution provider hosts our EMM on their premises c) A solution provider hosts our EMM on their premises and manages it for us d) We host our EMM on our premises, and a solution provider manages it for us e) We host and manage our EMM on our premises 22

23 Where is the Growth? A solution provider hosts our EMM solution in the public cloud (cloud SaaS), and we manage it remotely ourselves 12% 19% GROWTH RATE: 155% A solution provider hosts our EMM solution on their premises, and we manage it remotely ourselves (hosted Software-as-a-Service - SaaS) 13% 16% 122% A solution provider hosts and manages our EMM solution remotely on their premises (as a remote managed service) or in the cloud 16% 14% 90% We host and a solution provider manages our EMM solution behind our firewall (as an on-premise managed service) 16% 11% 69% We host and manage our own EMM solution behind our firewall 46% 18% 40% Current Planned 0% 20% 40% 60% 80% Source: Aberdeen Group, May AberdeenGroup 2012 Not For Distribution

24 Device-Centric Post-Device APPS USER ACCESS MANAGEMENT DEVICE DATA STORAGE FIREWALL DATA TRANSMISSION MOBILE ECOSYSTEM MANAGEMENT DATA CONTEXT DATA CENTER DATA STORAGE APPS 24 AberdeenGroup 2012 Not For Distribution

25 Instant Enterprise Mobility Management Agility of the cloud for the pace of change in mobility Fast deployment Simple provisioning processes Intuitive user interface Effortless scalability Instantly turn up devices, users, apps Start small and easily expand up Automatic upgrades Continuous updates available instantly No ongoing maintenance Unmatched affordability Zero infrastructure needed Pay as you go subscription model Enterprise Mobility Management Platform 25

26 Social Mobile Intelligence Moving beyond the delivery model Create value differently than just speed and ease of use Leveraging the network effect of data collection Devices Each new user adds data to the engine Improves the service for all customers Benchmark against peers based on data across the platform Actions Mobile Cloud Apps Policy Docs Big Data Analytics for Enterprise Mobility 26

27 EMM Community Analytics Best practices and benchmarking 27

28 Key Takeaways: Dive into EMM Start with MDM If your organization can't recover the contents, or lock or wipe the data from a lost, stolen, or compromised device, then it better be entirely certain that there's no confidential or protected data on it first. Track them before you lose them Lost or stolen mobile devices that cannot be recovered are your organization's single largest mobile security and compliance vulnerability. Use MDM to take control of all rogue devices. Mobile Application Management (MAM) A MAM solution enables the organization to deploy, monitor, and enforce policy for both corporate-developed and publicly available apps. Tablets have an insecurity complex Apply to tablets the same rigor and IT service management principles that are used to support netbooks and smartphones. 28 AberdeenGroup 2012 Not For Distribution

29 AberdeenGroup 2011

30 Wrap Up Questions or follow-up? Upcoming Webinars (Registration Link in Chat Window) Embracing BYOD with MDM and NAC Thursday, June 7 2:00 PM Eastern Past Webinars ( Android in the Enterprise: Piecing Together Fragmentation BYOD: Striking a Balance Employee Privacy and IT Governance Best Practices for Implementing a BYOD Program Plus lots of How-To content on our website Mobile Device Management Best Practices Mobile Device Management Glossary 30

31 MaaS360: Comprehensive EMM from the Cloud Get Started Now! Visualize the entire mobile computing environment Manage users, devices, apps, and expenses across the enterprise Secure corporate data and enforce compliance Free 30-day Trial: 31

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception

More information

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market

More information

Enterprise Mobility Management 2012

Enterprise Mobility Management 2012 Enterprise Mobility Management 2012 The SoMoClo Edge April 2012 Andrew Borg ~ Underwritten, in Part, by ~ Page 2 Executive Summary IT must consider enterprise mobility, like public and private cloud deployments,

More information

Bring Your Own Device (BYOD) Best Practices. Presented by Vineeth Narasimhan

Bring Your Own Device (BYOD) Best Practices. Presented by Vineeth Narasimhan Bring Your Own Device (BYOD) Best Practices Presented by Vineeth Narasimhan 1 2 Source: http://www.evolven.com/blog/byod-infographics.html Poll Question 1 Does your organization have a BYOD policy? a)

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

Enterprise Mobility Best Practices 2017 Analysts Predictions

Enterprise Mobility Best Practices 2017 Analysts Predictions Enterprise Mobility Best Practices 2017 Analysts Predictions Sponsored by Fiberlink John Jackson February, 2014 Agenda 1. Enterprise Mobility, the Third Platform, and a 2-3 Year Outlook 2. Mobile Enterprise

More information

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Karthik Ramgopal/Paras Segal kramgopal@fiberlink.com psegal@fiberlink.com www.maas360.com Why Mobile Applications are a Must? Rising

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Managing Mobility in the BYOD Era:

Managing Mobility in the BYOD Era: Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in

More information

Unified Windows Device Management in the Enterprise

Unified Windows Device Management in the Enterprise Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global

More information

Securing Enterprise Mobility for Greater Competitive Advantage

Securing Enterprise Mobility for Greater Competitive Advantage SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise

More information

Mobile Encrypted Messaging: A Perfect Complement to MDM

Mobile Encrypted Messaging: A Perfect Complement to MDM Mobile Encrypted Messaging: A Perfect Complement to MDM Robby Gulri Echoworx Chris Corbet - Fiberlink Agenda > Today s mobile landscape and challenges > Encrypted messaging and MDM as a complete solution

More information

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT GETTING CONTROL OF MOBILITY IN THE MARKET In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business

More information

BYOD Management : Geo-fence

BYOD Management : Geo-fence Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system MobileIron Hendrik Van De Velde Exclusive Mobile Eco-system Agenda MobileIron Company and Vision Mobile First and Mobile IT The MobileIron Solution Mobile Device Management Mobile Application Management

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT DATASHEET 1 EXECUTIVE SUMMARY Problem: Along with many potential benefits, Bring Your Own Device (BYOD) brings new challenges for the IT department. As

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Exploiting the business potential of BYOD (bring your own device)

Exploiting the business potential of BYOD (bring your own device) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

UNB s Mobility Strategy 2016 2017

UNB s Mobility Strategy 2016 2017 UNB s Mobility Strategy 2016 2017 The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative mobile technologies that

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Securing Healthcare Data on Mobile Devices

Securing Healthcare Data on Mobile Devices Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed

More information

9-4-2014 W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

9-4-2014 W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT W M U G NL WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT 1 Agenda Who am I Apps and deployment Focus on Symantec s App Center Who am I? Arie de Haan Owner Pandinus -> System Center solutions

More information

MDM Mobile Device Management

MDM Mobile Device Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale. Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving

More information

Mobile Security Market Trends and Best Practices. 24 May 2013

Mobile Security Market Trends and Best Practices. 24 May 2013 Mobile Security Market Trends and Best Practices 24 May 2013 Agenda Mobile Market Trends Mobile Security Challenges Mobile Security Options Mobile Security Best Practices BYOD Growing Rapidly 40% Personal

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Apps to the Future: Predicting Enterprise Mobility in 2015

Apps to the Future: Predicting Enterprise Mobility in 2015 Apps to the Future: Predicting Enterprise Mobility in 2015 Jonathan Dale Director of Marketing @JonathanMDale John Jackson Research Vice President @hellojackson Outlook 2015: Predictions and Prescriptions

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile

More information

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of

More information

A Comprehensive Review of Self-Service Data Visualization in MicroStrategy. Vijay Anand January 28, 2014

A Comprehensive Review of Self-Service Data Visualization in MicroStrategy. Vijay Anand January 28, 2014 A Comprehensive Review of Self-Service Data Visualization in MicroStrategy Vijay Anand January 28, 2014 Speaker Bio Vijay Anand Product Manager Vijay Anand is a Product Manager for Self-Service and High

More information

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining

More information

Mobile and BYOD Strategy

Mobile and BYOD Strategy Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected

More information

MDM and beyond: Rethinking mobile security in a BYOD world

MDM and beyond: Rethinking mobile security in a BYOD world MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

BYOD Policy Implementation Guide. BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment

BYOD Policy Implementation Guide. BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

ipass Unlimited 1. Introduction 2. Challenges and Trends

ipass Unlimited 1. Introduction 2. Challenges and Trends ipass Unlimited 1. Introduction ipass delivers global, mobile connectivity as a hosted cloud service, connecting its customers with the people and information that matter the most on all of the devices

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Mobility Solutions for Plant Personnel

Mobility Solutions for Plant Personnel Mobility Solutions for Plant Personnel ARC Forum Orlando, February 2014 Greg Gorbach Vice President ARC Advisory Group ggorbach@arcweb.com Introduction Mobile Devices play a key role in industrial operations

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360

More information

Enterprise Mobility Management 2011

Enterprise Mobility Management 2011 Enterprise Mobility Management 2011 Mobility Becomes Core IT March 2011 Andrew Borg Page 2 Executive Summary Enterprise mobility has matured past the point of early market penetration and the prototypical

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Mobile Madness or BYOD Security?

Mobile Madness or BYOD Security? Mobile Madness or BYOD Security? How to take control of your mobile devices By Barbara Hudson, Senior Product Marketing Manager The Bring Your Own Device paradigm has rapidly moved from novelty to near

More information

allchoice We are XMA. Empowering employee device choice within the workplace

allchoice We are XMA. Empowering employee device choice within the workplace allchoice Empowering employee device choice within the workplace We are XMA. We are XMA. We deliver innovative IT solutions that enhance how people learn, teach, govern, deliver healthcare and do business.

More information

Design, Develop and Deploy Mobile Apps

Design, Develop and Deploy Mobile Apps Design, Develop and Deploy Mobile Apps Best Practices for Enterprise Mobile App Management Yael Alkalay Judy Robb Kaushik Srinivas Presenters Yael Alkalay Design Change Leader with IBM Judy Robb Business

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

IBM MobileFirst Protect: Secure & Manage your mobile enterprise IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making

More information

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact

More information

Why Digital Certificates Are Essential for Managing Mobile Devices

Why Digital Certificates Are Essential for Managing Mobile Devices WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Latest IT Trends For Secure Mobile Collaboration

Latest IT Trends For Secure Mobile Collaboration A Custom Technology Adoption Profile Commissioned By Cisco Systems September 2013 Corporate Mobility Momentum Accelerates Among Enterprises The pace of enterprises deploying corporate mobility initiatives

More information

Moving Beyond the Basics: Key Considerations for Successful Adoption of a Mobile Platform

Moving Beyond the Basics: Key Considerations for Successful Adoption of a Mobile Platform By Jorge García, TEC Research Analyst Executive Brief Technology Evaluation Centers Why a Corporate Mobile Approach? Organizations worldwide have come to rely on mobile devices, such as smartphones, tablets,

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Deep Dive BYOD, COPE & MDM

Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Protect Your Enterprise by Securing All Entry and Exit Points

Protect Your Enterprise by Securing All Entry and Exit Points SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two

More information

Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security

Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security An Opportunity To Revolutionize Business Wireless Systems Significant cost savings, enhanced security, streamlined

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are marks, brands, logos, and symbols may be trademarks or

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

Productive and Secure Enterprise Mobility with Cisco and Citrix

Productive and Secure Enterprise Mobility with Cisco and Citrix Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers

More information

A guide to enterprise mobile device management.

A guide to enterprise mobile device management. WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an

More information

Mobile Device Management Opening the Genie Bottle instead of Pandora s Box. mobile security mobile device management mobile application management

Mobile Device Management Opening the Genie Bottle instead of Pandora s Box. mobile security mobile device management mobile application management Mobile Device Opening the Genie Bottle instead of Pandora s Box mobile security mobile device management mobile application management Escaping Controlling Governing Vs Proliferation of devices The market,

More information

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet 5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet Sr. Sales Engineer 1 What we ll talk about What is BYOD? Mobile Revolution, the Post PC era? BYOD: What to consider 1. Users 2. Devices

More information

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions DRIVING ENTERPRISE MOBILITY Enterprise Mobility Solutions from Computacenter CONTENTS 03 04 05 06 09 10 The Growth of Mobility Seizing Opportunities Overcoming Adversity Computacenter Mobility Solutions

More information

The Holistic Guide to BYOD in Your Business Jazib Frahim

The Holistic Guide to BYOD in Your Business Jazib Frahim The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020

More information

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags) perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise

More information

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s #mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges

More information

SOFTWARE ASSET MANAGEMENT

SOFTWARE ASSET MANAGEMENT SOFTWARE ASSET MANAGEMENT Why wouldn t it include mobile devices? Alan Giles BCS SAM/InfoSec Event, Manchester 14 th April 2016 AGENDA Introduction Software Asset Management evolves driven by users Not

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Lot 3 Service Specification MANAGED MOBILE SERVICE

Lot 3 Service Specification MANAGED MOBILE SERVICE Lot 3 Service Specification MANAGED MOBILE SERVICE Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED MOBILE SERVICE Fujitsu Managed Mobile is a global service providing lifecycle management services

More information