How We Deployed BYOD Using Mobile Device Management

Size: px
Start display at page:

Download "How We Deployed BYOD Using Mobile Device Management"

Transcription

1 How We Deployed BYOD Using Mobile Device Management Providing mobile access to company resources safely and securely by Frank Grogan and Robert Dalrymple

2 Table of Contents 1. Introduction 2. Understanding the Threat Landscape 3. Vendor Selection Approach 4. Bake-Off 5. Proof of Concept 6. Implementation 7. Governance 8. Lessons Learned 9. Q&A 2

3 Introductions One of the largest pediatric clinical care providers in the country 847,998 patient visits in 2012 Served 346,356 children from all 159 counties in Georgia in world-class pediatric hospitals (529 beds), 20 neighborhood locations, physician group practices, and other related facilities Children's is the pediatric physician teaching site for Emory University School of Medicine and Morehouse School of Medicine Over 8,400 employees, 1,700 pediatric physicians, and 6,500 volunteers Mission: To make kids better today and healthier tomorrow Vision: Best care... healthier kids 3

4 Introduction Robert Dalrymple, MBA, CISA, CISSP Information Security Manager with 13 years experience in Healthcare Information Security. Frank Grogan Information Security Administrator with 7 years experience in Healthcare Information Security. 4

5 Objective To provide Children s employees with flexibility in choosing their mobile device, while ensuring appropriate security protocols are and remain in place to protect Children s Resources and patient data. 5

6 Why did we do this? Provide flexibility to those who are approved to use their personal devices to access the Children s Resources Provide secure means of accessing data electronically Protect Children's from risk of a potential data breach Separate the user s personal data from Children s data Address regulations as it relates to mobile device security 6

7 Research (understanding the landscape) Things to investigate: Device types Manufacturers OS Versions Known Vulnerabilities Jailbreaking/Rooting Connection Methods Compatibility with Infrastructure 7

8 Governance Resources NIST Special Publication A Rev1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans NIST Special Publication Rev 1 (Final) Jun 2013 Guidelines for Managing the Security of Mobile Devices in the Enterprise NIST Special Publication DRAFT Oct 2012 Guidelines on Hardware-Rooted Security in Mobile Devices NIST Special Publication Rev 4 Security and Privacy Controls for Federal Information Systems and Organizations 8

9 Risk Assessment Consider scenarios outside the scope of the project Document risks no matter how obscure Evaluate connection methods Apply findings to a Risk Management Framework Continuous and Frequent Re-Assessment 9

10 Vendor Selection (approach) Vendor Identification Vendor Elimination Vendor Exclusion Vendor Evaluation Final Selection Industry Knowledge and Experience Gartner Magic Quadrant Position Gartner Critical Capabilities Forrester Report Determine Children s Requirements Combined Requirements with Critical Capabilities Developed Scoring Criteria Selected the 5 Vendors / 4 Solutions that Scored Above 85% Assembled Core IS&T Team Sent RFI Requesting Info Evaluated RFI Responses Developed Demo Scoring Sheet Held On-Site Demos Scored Demo Compiled Scoring Discussed Results and Reached Consensus Selected 2 Finalists Invited Finalists to Proof of Concept (Bake- Off) Determined Hardware Requirements Built Test Environment Installed and Configured Solutions for Testing Tested Solutions Documented Findings Held Vendor Demos for Stakeholders Sent RFQ to Finalists Assembled Sideby-Side Comparison Reviewed RFQ Responses Reviewed Sideby-Side Comparison Made Recommendation to Stakeholders Stakeholders Reached a Consensus 10

11 Defining Requirements Consider: What access will users be granted to the various available resources Permitted device types Supported operating system(s) Deadlines 11

12 Defining Requirements (cont.) Required level and type of reporting Self-Service functions Collecting device information Preservation of the Native Experience 12

13 Vendor Identification Perform vendor research based on pre-defined company requirements Ask your security colleagues for their experiences Gartner Magic Quadrant Gartner Critical Capabilities Forrester Report 13

14 Narrowing Down the Choices Assemble a core team of IT professionals Combine Company Requirements with Critical Capabilities Develop Scoring Criteria for Demos Host Vendor Demos Compile and Discuss Results 14

15 Bake-Off 15

16 Infrastructure Options / Requirements Suggestions: Request Vendor Requirements Virtual vs. Physical Servers Vendor Owned Appliances Consider Final Implementation 3 rd Party Certifications External DNS Naming Convention 16

17 Configuration and Testing First: Acquire a good variety of test devices Then: Test enrollment across all device types and allowed OS versions Test basic functionality ( , Contacts, Calendar) Configure basic security policy requirements Document everything step-by-step Note any inconsistencies 17

18 Comparisons Side-By-Side comparisons are your best friend Enrollment Comparison Example 18

19 Comparisons (cont.) Passcode/Password Comparison Example Criteria Vendor 1 Vendor 2 Device Passcode Required Optional 4 Character Passcode Supported Supported Access Not Required Required Contacts/Calendar Access Not Required Not Required Attachments Access Optional Not Required Secure Documents** Secure Web Browser Requires Children s Username & Password or Certificate to access [optional] (e.g. [username] Requires Children s Username & Password or Certificate Does not require Children s Username & Password or Certificate to access Does not require Children s Username & Password or Certificate 19

20 Comparisons (cont.) UX Comparison Vendor 1 Vendor 2 20

21 Proof of Concept 21

22 On Premise vs. SaaS Solution Decision Criteria Infrastructure Considerations Hardware Costs Support Security Considerations Confidentiality Integrity Availability Speed of Deployment Cost Considerations Cost Breakdown Costs Analysis Recommendation - Analysis 22

23 Comparisons Infrastructure Cost Comparison Example Criteria On-Premise Single Tenant Cloud Multi-Tenant Cloud Hardware Costs 4-6 VM Instances 2 x Database 2 x Application Server 2 x Gateway Optional ~$$$$$ With High Availability Up to 5000 Devices One Time Expense 2-4 VM Instances 2 x Server 2 x Gateway Optional ~$ - $$ With High Availability Up to 5000 Devices One Time Expense 23

24 Comparisons (cont.) Availability Comparison Example Criteria Children s Data Center Outage On-Premise Single Tenant Cloud Multi-Tenant Cloud Able to enroll devices? No No Able to administer accounts through MDM Tool? No Yes (Remote) Access to / Contacts / Calendar? Yes Yes Updates to / Contacts / Calendar? No No Disaster Recovery / Business Continuity Optional Yes 24

25 Comparisons (cont.) Speed of Deployment Comparison Example Criteria On-Premise Single Tenant Cloud Multi-Tenant Cloud Speed of Deployment Hardware & Software Licenses Estimated at 45 days Hardware Procurement Servers Software Procurement Hardware and Software Installations Installing MDM Solution Install and Maintain licenses for Infrastructure and MDM Solution Estimated at 10 days Hardware Procurement for up to 4 servers on-site connecters Installing MDM Software connectors Vendor will maintain licensing as part of the subscription 25

26 Implementation 26

27 Internal Testing Test, Test, Test 27

28 Pilot Limit the scope to get focused feedback Select individuals who will actively engage and provide good feedback Include representatives from key stakeholder groups 28

29 Configuration Define Compliance Requirements: Passwords Character Types Complexity Change Frequency Encryption Container Whole Device External SD Card VPN Sync Settings Device Types and OS Version Minimums 29

30 Phased Deployment MDM Enrollment by Device Type Group I Group II Group III Group IV Children s Owned BlackBerries and iphones Personal iphones Personal Windows Phones ipads Android Devices MDM Features Timeline Q1 Q2 Q3 Q4 , Contacts, and Calendars Secure Attachments Secure Text Messaging VPN Sharepoint Network Drives

31 Policies and Standards Mobile Device Acceptable Use Policy Handling of ephi on Mobile Devices Standard Approved Access Method Standard 31

32 Terms of Service What We Did Copy / Paste Mobile Device AUP as Terms or Service Things to Consider Absolve the company of any liability Document what can be done vs. what is being done Changes to be made at anytime Refer to the Mobile Device Acceptable Use Policy Be consistent with over arching InfoSec AUP Have your legal department review and update 32

33 Lessons Learned 33

34 Lessons Learned Test Test Test 34

35 Q&A 35

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information

Dell World Software User Forum 2013

Dell World Software User Forum 2013 Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your

More information

***NOTICE***: Proposed Selection Date now 12/16/13

***NOTICE***: Proposed Selection Date now 12/16/13 Hall County Schools MDM RFP Q&A ***NOTICE***: Proposed Selection Date now 12/16/13 Are bulk enrollments a criteria? Not a criteria, but would be a nice feature to have. Is the ability to push docs out

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

Cloud Services Overview

Cloud Services Overview Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture

More information

Texas Comptroller of Public Accounts

Texas Comptroller of Public Accounts Texas Comptroller of Public Accounts Susan Combs, Comptroller Request for Information for Mobile Device Management Products and Services RFI#0313VC March 20, 2013 Page 1 of 7 A. Summary 1. Type of Document:

More information

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360

More information

Clinical Trials in the Cloud: A New Paradigm?

Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand

More information

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing. What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing. What is Cloud-Based Security? Cloud computing is: IT services via the internet from an external service provider

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Mobile Security Mobile Device Management Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management Mobile Security Mobile Device Management Mobile Application Management Corporate Overview Largest MDM provider with over 300+ employees, 150 focused on R&D Provide mobility solutions to 1500+ global customers

More information

Mobile Device Security Risks and RemediaAon Approaches

Mobile Device Security Risks and RemediaAon Approaches Mobile Device Security Risks and RemediaAon Approaches Raj Chaudhary, Principal, Crowe Horwath LLP In- Depth Seminars D11 CRISC CGEIT CISM CISA Informal Poll What is your Atle/role? Internal Audit IT Audit

More information

Mobile Security Mobile Device Management Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management Mobile Security Mobile Device Management Mobile Application Management Addressing MDM Challenges in Education Proliferation of mobile devices Asset tracking and multi-os management Student- and teacher-owned

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Building a Mobile Information Management Strategy

Building a Mobile Information Management Strategy The SIMS Partnership Transforming Transforming health health care care delivery delivery Building a Mobile Information Management Strategy The Approach Taken by UHN to Balance Both Security and Practice

More information

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com Introduction to Cloud Computing Srinath Beldona srinath_beldona@yahoo.com Agenda Pre-requisites Course objectives What you will learn in this tutorial? Brief history Is cloud computing new? Why cloud computing?

More information

Mac in the Enterprise

Mac in the Enterprise Apple Pro Training Series Mac in the Enterprise Mavericks Edition An IT Decision Maker s Guide to Integrating and Deploying Mac Systems Ryan Faas, Ed. Apple Certified Executive Summary Mobility. Big Data.

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case

More information

Ben Hall Technical Pre-Sales Manager

Ben Hall Technical Pre-Sales Manager Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Securing Healthcare Data on Mobile Devices

Securing Healthcare Data on Mobile Devices Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

5 Secrets to a Successful Mobile Application Testing Strategy

5 Secrets to a Successful Mobile Application Testing Strategy 5 Secrets to a Successful Mobile Application Testing Strategy 25 th Jun 2014 Ajay Balamurugadas / Sundaresan Krishnaswami www.maas360.com Today s Agenda 5 key elements of a robust test repository Addressing

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

MOBILE DEVICE MANAGEMENT (MDM)

MOBILE DEVICE MANAGEMENT (MDM) PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Mobility Security and. Nigel Hawthorn EMEA Marketing Director

Mobility Security and. Nigel Hawthorn EMEA Marketing Director Mobility Security and Nigel Hawthorn EMEA Marketing Director Evolution of Personal Computing The PC/Web Era The The Mobile Post-PC First Era Era 2 MobileIron Confidential SOURCES: Asymco.com, Public Filings,

More information

Banking Corporation Provides Unified Communications with Cloud-Based Services

Banking Corporation Provides Unified Communications with Cloud-Based Services Microsoft Office 365 Customer Solution Case Study Banking Corporation Provides Unified Communications with Cloud-Based Services Overview Country or Region: United States Industry: Financial Customer Profile

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Is Cloud-Based WMS an Option for Complex Distribution Centers?

Is Cloud-Based WMS an Option for Complex Distribution Centers? Welcome to Session 233 Is Cloud-Based WMS an Option for Complex Distribution Centers? Presented by: Sponsored by: Chuck Fuerst 2012 Material Handling Industry. Copyright claimed as to audiovisual works

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

The Maximum Security Marriage:

The Maximum Security Marriage: The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

Management of Multi-OS Smart Devices Made Simple.

Management of Multi-OS Smart Devices Made Simple. Singtel Business Product Factsheet Managed Mobility Device Defense Manager Services Management of MultiOS Smart Devices Made Simple. A smart solution that enables companies to secure, control and manage

More information

Technology Shifts. Mainframe Windows Desktop Internet

Technology Shifts. Mainframe Windows Desktop Internet Technology Shifts Mainframe Windows Desktop Internet 1975 1980 1985 1990 1995 2000 2005 Mobile Technology Shift March 12, 2010 March 7, 2012 How Significant? Declining PC Sales In the wake of Apple s ipad

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Reshaping the enterprise for the future of work. Are you ready?

Reshaping the enterprise for the future of work. Are you ready? Reshaping the enterprise for the future of work. Are you ready? Reshaping the enterprise for Why Pomeroy? the future of work. Pomeroy is a leading independent provider of comprehensive IT infrastructure

More information

Mobile Device Management

Mobile Device Management Mobile Device Management Real World Lessons Jim Darrow Ilitch Holdings, Inc. Ilitch Holdings, Inc / Ilitch Companies Just you basic Mom and Pop Business Provide Shared services and consulting Technical

More information

Working anytime anywhere

Working anytime anywhere 1 28/11/2014 Working anytime anywhere Future Workplace 3 28/11/2014 Future Workplace 4 28/11/2014 Future Workplace 5 28/11/2014 Future Workplace 6 28/11/2014 Future Workplace 7 28/11/2014 Future Workplace

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

Glyder Mobile Doc s(for commercial business & healthcare) May, 2014

Glyder Mobile Doc s(for commercial business & healthcare) May, 2014 Glyder Mobile Doc s(for commercial business & healthcare) May, 2014 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation

More information

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report

More information

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR

TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR (BUY VS BUILD) APRIL 17, 2015 LEVERAGING TECHNOLOGY FOR AUDIT Utilizing Software to Administrate Audit Process 40% 35% 30% 37% Tools Leveraged 32% 36% Yes

More information

TechReady. Are you ready to implement IT solutions? Training and Consulting

TechReady. Are you ready to implement IT solutions? Training and Consulting TechReady Are you ready to implement IT solutions? Tech Ready provides training and consulting services for IT professionals, to enable them to successfully evaluate, plan, build, deploy and operate IT

More information

Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy

Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy PRESENTED BY: Giannis Loussidis EMM Landscape 2 Enterprise Mobility Management Landscape 77% of US and European businesses

More information

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate

36. Can you describe each user group and the use cases? A typical user will be member of one team of 7-10 people; they will need to share/collaborate 1 RFP 14-001 Addendum 1. What version of AD - Forest Functional, Domain Functional, DC OS Version(s) - is currently deployed? Domain functional level Windows Server2008 Forest functional level Windows

More information

Datacenters of the Past. Datacenter of the (New) Present Datacenter without boundaries. Devices

Datacenters of the Past. Datacenter of the (New) Present Datacenter without boundaries. Devices Start Justin President Convergent Computing http://www.cco.com randm@cco.com Devices Things Apps Big data Cloud 52% of information workers across 17 countries report using 3+ devices for work 212 Billion

More information

Moving to the Cloud: A Practical Guide Community IT

Moving to the Cloud: A Practical Guide Community IT Moving to the Cloud: A Practical Guide Community IT rev 2014 About Community IT Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges. Strategic

More information

Data Security in a Mobile, Cloud-Based World

Data Security in a Mobile, Cloud-Based World Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted

More information

Finally It All Makes Sense An online solution that fits your small business 365 days a year

Finally It All Makes Sense An online solution that fits your small business 365 days a year Microsoft Office 365 for Mid-Sized & Enterprise Businesses START Saving Finally It All Makes Sense An online solution that fits your small business 365 days a year Microsoft Office 365 delivers the power

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

LESSONS LEARNED. Agenda

LESSONS LEARNED. Agenda Implementing Mobile Device Encryption: A Case Study Bridget Aman, CISSP, CISA, CPA John Blackley, CISSP Introductions Agenda Management Support Proof Of Concept (POC) Process Important Questions to Ask

More information

On the Road with SugarCRM. SugarCRM Series by Interlinx Associates, llc

On the Road with SugarCRM. SugarCRM Series by Interlinx Associates, llc On the Road with SugarCRM SugarCRM Series by Interlinx Associates, llc Importance of Mobile By 2012, companies will gain 20% more value from sales automation initiatives by capitalizing on widespread adoption

More information

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville

More information

A Radicati Group Web Event

A Radicati Group Web Event The Radicati Group, Inc. www.radicati.com A Radicati Group Web Event ** Please dial-in by phone to listen to the audio portion of this event. The dial-in number is in your registration confirmation email

More information

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system MobileIron Hendrik Van De Velde Exclusive Mobile Eco-system Agenda MobileIron Company and Vision Mobile First and Mobile IT The MobileIron Solution Mobile Device Management Mobile Application Management

More information

LICENSTJEK OUTSOURCING

LICENSTJEK OUTSOURCING LICENSTJEK CLOUD OUTSOURCING DEPLOYMENT 1 Agenda Speaker Cloud Cloud Services DEMO Considerations Hosting EG Hosting Services DEMO Considerations Questions 2 Speaker Peter Schmidt Infrastructure Architect

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

Mobility Impact on the Enterprise

Mobility Impact on the Enterprise BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Security & Cloud Services IAN KAYNE

Security & Cloud Services IAN KAYNE Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents

More information

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

MobileIron and Samsung Value Proposition

MobileIron and Samsung Value Proposition MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global

More information

All your apps & data in the cloud, all in one place.

All your apps & data in the cloud, all in one place. The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia Taking Charge with Apps, Policy, Security and More October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia http://pinterest.com/visualoop/byod-infographics/ vs. NSFW PSFW NSFW Security & Compliance

More information

CSC E Mail. Mobile Device Configuration Settings and Setup Instructions

CSC E Mail. Mobile Device Configuration Settings and Setup Instructions CSC E Mail Mobile Device Configuration Settings and Setup Instructions Contents Overview... 3 Android (Droid, Google Android, etc.)... 4 Exchange Settings... 4... 4 RIM Blackberry... 5... 5 Apple iphone

More information

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

Managing Mobile Devices in the Enterprise. James Naftel

Managing Mobile Devices in the Enterprise. James Naftel [ Managing Mobile Devices in the Enterprise James Naftel [ Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation

More information

Mobile Device Management Buyer s Guide

Mobile Device Management Buyer s Guide Mobile Device Management Buyer s Guide An Insider s View of the MDM Market Get to the bottom line on your MDM software decision Introduction The information contained in this document is based on the experience

More information

The HIPAA Security Rule: Cloudy Skies Ahead?

The HIPAA Security Rule: Cloudy Skies Ahead? The HIPAA Security Rule: Cloudy Skies Ahead? Presented and Prepared by John Kivus and Emily Moseley Wood Jackson PLLC HIPAA and the Cloud In the past several years, the cloud has become an increasingly

More information

POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION

POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION Executive Summary Enterprise mobility has transformed the way businesses engage with customers, partners and staff while exchanging

More information