Adapting to a Mobile World
|
|
- Geoffrey Richards
- 8 years ago
- Views:
Transcription
1 Adapting to a Mobile World Kimberly Hancher Chief Information Officer U.S. Equal Employment Opportunity Commission March 2014
2 STATUS OF MOBILITY IN GOVERNMENT According to Mobile Work Exchange research: 90% government employees use at least one mobile device for work purposes 64% use a smartphone for work purposes 19% use a tablet for work purposes Additionally: More than 80% of Feds say mobile devices are critical to their jobs Source: 2
3 FACING THE CHALLENGES What is slowing us down? 1. Implementing mobility management policies 2. Addressing mobile security 3. Handling the budget Source: 3
4 CHALLENGE #1 MOBILE MANAGEMENT POLICIES Research finds that just 1 in 10 Feds say their agency has a BYOD policy Yet 90% of Feds use a personal mobile device for work Success Story: Within three months of implementing a BYOD policy, EEOC decreased their monthly recurring costs by 20-30% by optimizing rate plans. EEOC managed to cut its $800,000 mobile device budget down to size nicely it s now just $448,000. The current BYOD program requires employees to pay for all voice and data usage, including those for official work purposes.** Source: 4
5 CHALLENGE #2: MOBILE SECURITY One out of four employees (25%) do not use a password on the mobile device they use for work-related tasks* Take Fundamental Mobile Security Steps 1. Regulate Training 2. Require employees to register mobile devices with the IT department 3. Apply a remote wipe function on mobile devices 4. Track phones if lost 5. Utilize multi-factor authentication or data encryption on mobile devices Source: 5
6 CHALLENGE #3: HANDLING THE BUDGET What are your key challenges as you implement mobile technology? 3 Step Process 1. Reduce the cost of issuing mobile devices 2. Enterprise wide inventory 3. Evaluate government wide contract vehicles Source: 6
7 BENEFITS OF MOBILITY Today, 76% of the Federal government is using mobile devices for workrelated tasks; they say they gain 9 Hours a Week in estimated productivity,* equating to $28B in productivity gains** Source: 7
8 GETTING STARTED Agencies must develop a vision for how: 1. Mobile tools will help the agency's workforce 2. To serve citizens and businesses who have mobile needs How will mobility tools help the workforce? Speed Data Collection Reduce Cycle Time Enrich Virtual Collaboration Increase Public Access to Agency Information Expand Customer Service Channels Source: 8
9 INCORPORATE "VISION" INTO AGENCY PLANS Agency/Department level strategic plan Program/Business plans Information technology strategic and tactical plans 9
10 AGENCY LEVEL STRATEGIC PLAN Set enterprise level performance targets Lay out the future state Deploy Mobile Tools Implement BYOD Internal Federal Apps Customer Facing Apps Source: 10
11 BUSINESS UNIT PLANS Describes New Operational Model for Workforce Field examiners with tablets and mobile apps will collect pictures Field examiner data will transmit in real-time to system of record Examiners receive prompts from system if more photos are needed Information access professionals use automated scheduling, video, text messaging Describes New Customer Services Research advice with Agency Info Services Professional can be scheduled by phone or online using a smartphone, tablet or PC Customers choose whether they prefer face-to-face, by phone, by televideo, or by videophone for hearing impaired 11
12 IT STRATEGIC PLAN Align IT plans to agency and business goals Implement a new Field Examiner Toolkit comprised of hand held tablet, internet connection, voice/data services. Using agile methods, develop a mobile app for field data collection and submission. Require regular mobile security training Information Services staff get outfitted with video teleconferencing, instant audio conferencing, and automated online scheduling software 12
13 DEVELOP A TIME FRAME Adopt a 3 year tactical planning horizon Year 1 = focus on tangible deliverables Year 2 = implement critical services Year 3 = set up desirable services 13
14 TACTICAL IT PLAN Identify infrastructure and IT competencies Identify initial mobility deliverables and services Develop budget estimates for current and out years Use rough order of magnitude cost (ROM) At the end of Year 1, identify actual deliverables, services, and costs 14
15 Infrastructure Activities Mobile Device Management (MDM) Service Wireless voice and Data service plans Mobile app development resources App Store Online, secure collaboration and file sharing Online customer portal for Intake process Online scheduling COTS software TACTICAL PLAN YEAR 1 Competency Development Agile trained programmers and Project Manager Consumer video teleconferencing - Skype, Facetime, Google Hangout Security Risk Assessment Policies for GFE, BYOD, and Rules of Behavior 15
16 TACTICAL PLAN YEARS 2 AND 3 Year Two - Critical Service Field Examiner Toolkit Download to Database and Confirmation Online Scheduling of appointments Customer Portal for Information Research Year Three Next Most Important Services Customer ability to schedule online appointments Scheduled video conference appointment 16
17 BRIDGING THE GAP Do your agency users have what they need? Policy and Rules of Behavior Devices Mobile Apps Training and Job Aids Data and Information IT support Appropriate Security Measures Feedback loop for constructive criticism 17
18 BRIDGING THE GAP Do external customers have what they need? Instructions, Self Directed Training, FAQs Mobile Apps Data and Information Helpdesk for IT support Appropriate Security Measures 18
19 SUMMARY There are tremendous benefits to establishing and incorporating a mobility plan Agencies still face challenges with policies, security, and budget There are major benefits to incorporating mobility within your agency Agencies must develop a vision and get started! Develop agency level strategic plan Map out a strategic IT plan Establish a time-frame Execute and Evaluate! 19
20 REFERENCES Mobile Work Exchange Reports The Telework/Mobile IT Almanac 2013 Digital Dilemma Report 2013 Digital Government Strategy The 2014 Mobilometer Tracker GSA Managing Mobility Pages - links to new Federal Strategic Sourcing Initiative Wireless Voice and Data contracts links to new GSA contracts for Mobile Device Management(MDM) tools and services links to all NIST guidance on security of managing mobility Federal BYOD Guidance and Toolkit 20
21 Questions? 21
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationFit for Future Back Office. Project Board Meeting 18 May 2012 Agenda Item 2.1. Mobile Device Strategy
Fit for Future Back Office Project Board Meeting 18 May 2012 Agenda Item 2.1 Mobile Device Strategy 1 Purpose 1.1 The purpose of this report is to; present for discussion and approval the proposed key
More informationMobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
More informationipecs UCS Unified Communications Solution Easy to access and activate Highlights Single server solution
ipecs UCS Unified Communications Solution In today s world of remote and dispersed workers, the ipecs UCS application provides tools to enhance productivity and mobility while improving employee collaboration
More informationUNB s Mobility Strategy 2016 2017
UNB s Mobility Strategy 2016 2017 The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative mobile technologies that
More informationBtech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are marks, brands, logos, and symbols may be trademarks or
More informationLatest IT Trends For Secure Mobile Collaboration
A Custom Technology Adoption Profile Commissioned By Cisco Systems September 2013 Corporate Mobility Momentum Accelerates Among Enterprises The pace of enterprises deploying corporate mobility initiatives
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More informationBYOD: What s Your Strategy?
: What s Your Strategy? Eric Panknin IT Manager epanknin@dmj.com What is BYOD? Building a Strategy Policy Considerations Mobile Security Solution Implementation and Training Maintain Discussion and Experiences?
More informationRCS for Business: Leveraging Enhanced Reliability, Security, and Monetization Opportunities October 2012
RCS for Business: Leveraging Enhanced Reliability, Security, and Monetization Opportunities October 2012 13500 Powers Court Fort Myers, Florida 33912 Phone: +1-239-425-3000 Fax: +1-239-425-6845 www.interoptechnologies.com
More informationMobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
More informationBring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com
Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationHarnessing the Mobile Evolution. Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions
Harnessing the Mobile Evolution Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions Discussion Points Continued disrupting growth in the Mobile world. Role of IT Approach Things
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationBring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationBring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationOUTLINE AND OBJECTIVES
BYOD in the Federal Workplace: Privacy Considerations and Case Studies Moderator: Alex Tang, Attorney, Office of General Counsel, Federal Trade Commission (FTC) Panelists: Kimberly Hancher, Chief Information
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationUnderstanding the Benefits of Unified Communications
Understanding the Benefits of Unified Communications Overview Increasing operating efficiencies is more important than ever in today s business. Competitive pressures force organizations to improve processes
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationNATIONAL ASSOCIATION OF ELECTRICAL DISTRIBUTORS. Executive Guide #11 The Changing Roles of Information Technology and Marketing
NATIONAL ASSOCIATION OF ELECTRICAL DISTRIBUTORS Executive Guide #11 The Changing Roles of Information Technology and Marketing Developed by the NAED Strategic Technology Committee Published November 2014
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationwww.fedtechmagazine.com/article/2012/05/locking-down-byod
CASE STUDIES TACTICAL ADVICE RESOURCES Infrastructure Optimization Security Storage Networking Mobile & Wireless Hardware & Software Management CURRENT ISSUE Subscribe 1/8 5 Next Level Data Consolidation
More informationANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX
ANY TIME ANY PLACE ANY WHERE JOEL SWEENEY and SHAUN BENNETTS XPERTEX ABOUT XPERTEX Joel Sweeney Director and Co Owner Shaun Bennetts Managed Services Director Based in Hertfordshire; Opening a new office
More informationSophos Mobile Control User guide for Android
Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationDell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations
Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining
More informationSimplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3
Simplifying Mobility Management WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management New solutions for the wireless world If you don t already have a mobility management strategy in
More informationThree Best Practices to Help Government Agencies Overcome BYOD Challenges
WHITE PAPER This paper discusses how IT managers in government can address the challenges of the new Bring-Your-Own-Device (BYOD) environment as well as best practices for ensuring security and productivity.
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationDeveloping a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology
Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology
More informationIs Your Company Mobile Ready?
Is Your Company Mobile Ready? A CAPRIZA WHITEPAPER JANUARY 2014 Summary There s more to going mobile than appointing a mobility task force and developing an enterprise mobility strategy. Those are two
More informationConducting Virtual Meetings
Page 1 oovoo Chat & Video Conferencing Information gathered by, International Faculty 2013 Faculty Training General Information What can I do with oovoo? oovoo offers free high quality video chat and instant
More informationThree Best Practices to Help Enterprises Overcome BYOD Challenges
WHITE PAPER Three Best Practices to Help Enterprises Overcome BYOD Challenges Nearly 80% of white-collar workers in the United States use a mobile device for work and approximately 95% of IT organizations
More informationCloud Video Conferencing. A Comprehensive Guide
Cloud Video Conferencing Reference Paper May 2016 How we communicate in the business world is changing. Businesses increasingly have more remote workers. Whether working remote fulltime, part-time or just
More information7 Questions to Ask Video Conferencing Providers
7 Questions to Ask Video Conferencing Providers CONTENTS Introduction...3 1. How many people can participate in your video conferences?...3 2. What kind of endpoints does the solution support or require?...4
More informationONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
More informationMobile Medical Devices and BYOD: Latest Legal Threat for Providers
Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationCloud Video Conferencing. A comprehensive guide
A comprehensive guide Reference Paper September 2015 How we communicate in the business world is changing. Businesses increasingly have more remote workers. Whether working remote fulltime, part-time or
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationBYOD (Bring Your Own Device)
BYOD (Bring Your Own Device) Agenda Set the scene BYOD raising many questions Structured & Integrated answers Belgacom Entreprise Mobility Belgacom Mobile Device Management Sensitivity : "Unrestricted",
More informationBring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationTablets: Will They Replace PCs?
Tablets: Will They Replace PCs? By Phil Clarke Research Analyst, Nemertes Research Executive Summary As mobility becomes more prevalent within the enterprise, tablets are becoming crucial tools with specific
More informationJim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida
2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and
More informationManagement of Multi-OS Smart Devices Made Simple.
Singtel Business Product Factsheet Managed Mobility Device Defense Manager Services Management of MultiOS Smart Devices Made Simple. A smart solution that enables companies to secure, control and manage
More informationWHITE PAPER BYOD AND GROUP COLLABORATION
WHITE PAPER BYOD AND GROUP COLLABORATION How to Collaborate with Ease on Any Device INTRODUCTION With 65% of white-collar workers requiring mobile connectivity to do their jobs i and 81% of employed adults
More informationHIPAA Requirements and Mobile Apps
HIPAA Requirements and Mobile Apps OCR/NIST 2013 Annual Conference Adam H. Greene, JD, MPH Partner, Washington, DC Use of Smartphones and Tablets Is Growing 2 How Info Sec Sees Smartphones Easily Lost,
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More informationEight Challenges Solved by Cloud Video Conferencing
Eight Challenges Solved by Cloud Video Conferencing Why Cloud Video Conferencing? Your company is growing. Offices are popping up across the state, country the world even. Employees are now asking for
More informationWorkplace-as-a-Service BYOD Management
For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service
More informationThe Guide to Implementing a BYOD Policy at Your Company An ebook by Your Friends at UTG
The Guide to Implementing a BYOD Policy at Your Company An ebook by Your Friends at UTG Did you know that 70% of smartphone users have accessed corporate data using a personal device, and 21% of those
More informationThe BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014
The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate
More informationMobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
More information03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement
Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationSeparation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices
Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception
More informationSecuring Health Data in a BYOD World
BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security
More informationMDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More informationFuture Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.
1 FUTURE FOCUS What s Coming in Enterprise Mobility Management Whitepaper 2 Future Focus: What s Coming in Enterprise Mobility Management (EMM) There s far more power in modern smartphones and tablets
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationBYOD and Mobile Device Management
April 25, 2013 BYOD and Mobile Device Management Scott Bream Office of the CIO scott.bream@ofm.wa.gov Topics to be covered What is Bring Your Own Device?(BYOD) What is Mobile Device Management?(MDM) Policy
More informationBring Your Own Device and Expense Management
Bring Your Own Device and Expense Management A Telesoft Whitepaper Table of Contents About this Whitepaper... 3 Essential Elements for BYOD Policy... 4 Capabilities Needed to Manage BYOD and Expense Management...
More information6 Pillars for Building a Successful BYOD Program. Protecting corporate assets while increasing employee productivity
6 Pillars for Building a Successful BYOD Program Protecting corporate assets while increasing employee productivity Executive Overview As the Bring Your Own Device (BYOD) movement continues to gain traction
More informationIf you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
More informationSophos Mobile Control User guide for Android. Product version: 4
Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationQuick Guide: Selecting ICT Tools for your Business
Quick Guide: Selecting ICT Tools for your Business This Quick Guide is one of a series of information products targeted at small to medium sized businesses. It is designed to help businesses better understand,
More informationOptus Future of Business 2013. Mobility Insights Paper Maximise the potential of your mobile workforce
Optus Future of Business 2013 Mobility Insights Paper Maximise the potential of your mobile workforce Contents CONTENTS 01 Methodology 01 Executive summary 02 4G mobility enables new ways of working 03
More informationTop Five Reasons to Implement Unified Communications Now
Top Five Reasons to Implement Unified Communications Now August 2013 Prepared by: Zeus Kerravala Top Five Reasons to Implement Unified Communications Now by Zeus Kerravala August 2013 º º º º º º º º º
More informationHow Nokia deployed AirWatch MDM for Nokia Lumia
How Nokia deployed AirWatch MDM for Nokia Lumia Case Study 2 Contents 1 Challenge...3 1.1 AirWatch MDM pilot...3 1.2 Challenge of full MDM deployment...4 2 Preparing for deployment...6 2.1 Lessons learned
More informationVIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece
VIDEOCONFERENCE 1 Introduction Videoconferencing is interactive remote communication between two or more participants, transmitted by voice or image. Participants see and listen to each other and can present
More informationConnected and Complete: Enterprise Unified Communications Strategies Tyler Bryson Microsoft Corporation
Connected and Complete: Enterprise Unified Communications Strategies Tyler Bryson Microsoft Corporation This year By 2013. which is more than the a third world s of the mobile world s worker workforce
More informationA Mobile Architecture, Not Just a Mobile App
A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationEnterprise on the Go. How enterprises can leverage mobile apps
Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.
More informationElectronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
More informationEnterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing
Enterprise Mobility Security Solution Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing WHAT IS ENTERPRISE MOBILITY MANAGEMENT Enterprise Mobility Management
More informationConnected. 25 Ways to Create a Connected Culture The How-To-Guide for Video Conferencing
Connected 25 Ways to Create a Connected Culture The How-To-Guide for Video Conferencing When we change the way we communicate, we change society. Clay Shirkey 1. CEO 2. Managers 3. Sales 4. Marketing 5.
More informationPolycom RealPresence Desktop v3.1
Customer FAQ Polycom RealPresence Desktop v3.1 Frequently Asked Questions Purpose This document describes Polycom RealPresence Desktop v3.1 features and answers many common product questions. In addition,
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More information1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6
Contents 1 Executive Summary... 3 2 Document Structure... 5 3 Business Context... 6 4 Strategic Response... 8 4.1 Platform... 8 4.2 Network... 10 4.3 Unified Communications... 11 5 Implementation status...
More informationGTS VIDEOCONFERENCE. Powered by: Valid from: 1 June 2014
GTS VIDEOCONFERENCE Valid from: 1 June 2014 Powered by: 1/13 1 Introduction Videoconferencing is interactive remote communication between two or more participants, transmitted by voice or image. Participants
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More information***NOTICE***: Proposed Selection Date now 12/16/13
Hall County Schools MDM RFP Q&A ***NOTICE***: Proposed Selection Date now 12/16/13 Are bulk enrollments a criteria? Not a criteria, but would be a nice feature to have. Is the ability to push docs out
More informationSysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
More informationOnline Meetings and Video Collaboration
Online Meetings and Video Collaboration Skype http://www.skype.com The World s Most Popular Video Calling Software. If at least one person on the call has a Premium account, it is possible to arrange a
More informationEnterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationTechnology Requirements for Using Video Conferencing with Victims
Videoconferencing can offer survivors an alternative way to meet with a provider or counselor. For survivors who lack transportation or live too far from a program or counselor, videoconferencing may be
More informationAPHSA s National Workgroup on Integration 2012 Webinar Series on Health and Human Services Interoperability and Integration
APHSA s National Workgroup on Integration 2012 Webinar Series on Health and Human Services Interoperability and Integration Mobile IT Solutions: Implications on Health And Human Service Integration Thursday,
More information