1 Get Tough with Mobile Device Management Franke Martinez Director, Regulated Industries SOTI Shwetank Bharati Director, OEM SOTI Doug Havemann Solutions Architect Panasonic
2 SOTI is the Worlds Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide. Since 1995, SOTI Inc. has been developing industry - leading technology that solves the unique challenges involved in managing, securing, supporting and tracking mobile devices.
3 A Pioneer in Mobile Device Management SOTI Optimizes and Grows your Mobility Strategy with an Integrated Management Approach SOTI understands that mobility is complex, and one size does not fit all. SOTI has continuously evolved and developed advanced feature sets to enable enterprises to futureproof their mobility strategy Today, SOTI provides an all-encompassing and integrated approach to device management, regardless of platform
4 Enterprise Mobility is Changing Fundamental shift is on the horizon new requirements for supporting workforce mobility Adapt new processes and management tools to ensure organizational goals are met and business can meet the rapidly changing market demands Hardware and software innovation are mobilizing core business processes Users are demanding unprecedented access to all business resources from any device and at any location IT is racing to stay ahead of mobile user requests for support
5 The Ecosystem Continues to Grow User Centric and Aligned to Business Purpose- Built Rugged Ruggedized hardware Specialized functionality Blue collar Long upgrade cycles Purpose built apps Line of Business Focused Mission Critical Corporate Liable Policy driven User experience limited (mostly , calendar & contacts) White collar Shorter upgrade cycles BYOD Device agnostic Policy driven Consumer driven Shortest upgrade cycle App centric Access to corporate content
6 Evolution of Mobility Challenges With Enhanced Capability Comes Management Complexity User-Centric How do I secure the device? How do I provision ? How do I push applications to the device? How do I filter apps and the web? How do I connect to enterprise backend? How do I manage network demand? Business-Centric How do I guarantee uptime? How do I meet established SLAs? How do I maintain regulatory compliance? How do I support enterprise capabilities remotely? How do I protect against growing threat vectors? How do I empower rather than restrict?
7 Top Challenges for the Mobile-Enabled Enterprise INTEGRATION SECURITY MANAGEMENT OPTIMIZATION 54% of companies struggle with application integration across systems 64% of companies struggle to implement secure mobile strategies across endpoints 69% of companies struggle to equally manage all devices and platforms in their mobile environment 81% of companies feel they have not optimized their mobility investments
8 Today s Mobility Demands Enterprise Grade Support Real-time visibility and control across a diverse number of endpoints Single management console for all devices and operating systems Unification of security and management policies to align with enterprise mobility strategy Full compliment of IT services including Device Security, Device Provisioning, Application Management and Content Management
9 Best Practices to Get Tough with MDM
10 It s Time to Get Tough with MDM Step 1: Get Tough with Security Protect using a layered 1approach 2 Step 2: Use Innovation to your Advantage Foolproof and futureproof Step 3: Deliver First-Class End User Support Treat mobile users as first 3class citizens Step 4: Empower Your Mobile Workforce Make Mobility an integral 4part of work flow 5 Step 5: Mitigate Loss and Theft Monitor, enforce, detect, recover
11 Get Tough with Security Protect using a layered approach As a Best Practice: Ensure integrity and security of device when it s not in use Restrict access to authorized users Protect mobile devices from malware and other software threats Install only trusted applications Your MDM Should: Mandate a complex password policy for corporate liable devices Mandate user re-authentication at a specific interval Employ real-time malware and antivirus protection and remediation from cradle to grave Use application whitelist/blacklist to limit risk
12 Use Innovation to Your Advantage Foolproof and future-proof As a Best Practice: Automate device policies based on context time of day, location Automate enrollment, provisioning and configuration of new devices Use analytics to take the temperature of device utility Your MDM Should: Provide a rapid deployment and configuration framework to get out of the box faster Use Location Based Services to automate management and security policies Employ deep logging and reporting capabilities to provide real-time analytics on device fleet
13 Deliver First-Class User Support Treat mobile users as first class citizens As a Best Practice: Don t assume mobile users can solve their own problems Provide users with IT anywhere regardless of device, location, or application Minimize downtime through central management and support Your MDM Should: Allow IT to take the wheel in a remote session to minimize downtime Provide IT a complete toolbox of support features including remote management, application provisioning, and configuration Provide robust reporting to enable IT to be proactive
14 Empower your Mobile Workforce Make mobile utility an integral part of workflow As a Best Practice: Disable capabilities not necessary for the most important line of business workflows Focus on utility of the solution to maximize productivity Focus on the user put the most-used applications and services at their fingertips Your MDM Should: Be able to provision device in Kiosk mode Employ application whitelisting and blacklisting (disable social networking applications and games) Provide users with easy access to secure Enterprise Applications and Content
15 Mitigate Loss and Theft Monitor, detect, enforce, recover As a Best Practice: Log identifying attributes of the device and its use (Serial, Model, OS, device logs) Implement a process for timely detection and reporting of device loss or theft Disable and securely wipe devices presumed lost or stolen Your MDM Should: Provide deep asset management and logging capabilities Employ real-time location based asset management policies and enforce out-of-contact policies Use remote lock, backup and wipe to keep data secure
Focus on your business, not your infrastructure. A buyer s guide to managed infrastructure services. What s in this guide for you? If you re considering managed services as a way of meeting your organization
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success June, 2013 Contents Executive Overview...4 Business Innovation & Transformation...5 Roadmap for Social, Mobile and Cloud Solutions...7
BEST PRACTICES WHITE PAPER A path to improving the end-user experience By David Williams, Vice President of Strategy, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
Putting the cloud to work for your organization. A buyers guide to cloud solutions. What s in this guide for you? If you re thinking about bringing the cloud into your business but aren t sure where to
Five Hosted VoIP Features WHITEPAPER: hosted exchange BUYER S GUIDE www.megapath.com executive summary The adoption of cloud-based hosted services is gaining momentum among businesses interested in reducing
OVERVIEW OPTUS MANAGED SERVICES AND DELIVERY LETTING YOU GET ON WITH YOUR BUSINESS CONTENTS WELCOME TO OPTUS MANAGED SERVICES AND DELIVERY 01 A QUICK OVERVIEW 02 OUR SERVICES 03 WHAT IS INCLUDED IN MANAGED
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
IT@Intel White Paper Intel IT IT Best Practices Cloud Computing and Information Security January 2012 Virtualizing High-Security Servers in a Private Cloud Executive Overview Our HTZ architecture and design
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
Consumerization of IT: Risk Mitigation Strategies [Deliverable 2012-12-19] Consumerization of IT: Risk Mitigation Strategies I Acknowledgements This report has been produced by ENISA using input and comments
A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives Key Takeaways Economic pressures and the new expectations of users, which are being driven by the growth
BMC Remedy IT Service Management Suite BMC Remedy ITSM enables streamlined service delivery with an amazing user experience on both sides of the service desk. Business Challenge Today s enterprises are
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
White Paper Getting ahead in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : March 2013 Users are demanding access to applications and services from wherever they are, whenever
What ios 7 Means for the Enterprise Introduction 3 1. ios 7 Mobile Application Management Enhancements 4 Enhancements to Accelerate Enterprise Application Development and Use 5 Enterprise Application Single
DATA SHEET CA Product Vision CA Product Vision helps manage project and product requirements and enables a comprehensive release planning process insuring only the features your customers really need are
White Paper: Managed Network Services Trends for Today s Enterprise Organizations Released December 2010 Spacenet Inc 1750 Old Meadow Road McLean, VA 22102 www.spacenet.com 866-480-2263 1 Table of Contents
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary