Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices"

Transcription

1 Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices Survey Results and Q&A 18-December-2013 Ryan Faas Journalist and Consultant T. Reid Lewis President Enterprise Device Alliance

2 Presenters Ryan Faas technology journalist and author who has been writing about Apple, business and enterprise IT topics, and the mobile industry for over a decade. He is author and/or editor of several technology books including "The iphone for Work". Ryan is the business reporter for Cult of Mac and a prolific freelance writer whose work has been featured on Computerworld, InfoWorld, Enterprise Mobile Today, InformIT.com, Peachpit Press, About.com, and Datamation. Most recently Ryan has started covering the emerging consumerization of IT trends, including BYOD, for IDG's new CITEworld service. In addition to writing, Ryan has spent a large portion of the past fifteen years in the systems/network engineering and IT management fields as an IT director, systems administrator, trainer, and all round multi-platform and mobile device technology consultant. T. Reid Lewis president of Enterprise Device Alliance 2

3 The Enterprise Device Alliance (EDA) We are a consortium of enterprise software companies As individual companies we deliver solutions that deliver crossplatform services and address the problems that IT administrators have when integrating Macs, iphones, ipads, Android and other mobile devices. As the EDA, our goal is to provide information and resources to help enterprises integrate and manage Macs, ios and Android devices in their Windows-based IT infrastructure Organizations and users should be able to choose their productivity tools based the merits of the platform, and not issues of manageability. We enable cross-platform environments where enterprises can leverage their established Windows expertise, infrastructure, and technology to manage Macs, iphones, ipads, Android and other mobile devices as peers on the network. 3

4 Enterprise Device Alliance Member Companies MDM & Client Management Security, Control, & Compliance Policies File Access, Sharing & Backup Virtual Desktop Making it easy to deploy, integrate and manage Macs, iphones, ipads, Android and other mobile devices in a Windows environment.

5 About the survey: Goals: Identify leading management issues for IT Responses: Conducted from 20-Nov Dec 16, outreach to thousands of IT professionals Many respondents were in organizations with thousands and tens of thousands of employees This presentation also includes results from comparable surveys conducted by the EDA in fall of 2011 &

6 Topics What IT has to say about: The Platforms Computers Phones Tablets Environments and Issues OSes Applications Policies Managing Mobile State of management Preferences 6

7 The Platforms Computers Phones Tablets 7

8 Windows 7/XP Remains Dominant Please estimate the percentage of people using the following devices in your organization at the end of Percentage of Sites Where Windows 7/XP Usage Exceeds 70% 50% 41% 45% 40% 30% 20% 10% 8 0%

9 Windows 7/XP vs Windows 8 Please estimate the percentage of people using the following devices in your organization at the end of % 85% 95% 90% 80% 70% 60% 50% 40% 30% 20% 10% Windows 7/XP Windows 8 1% Windows 7/XP Windows 8 10% 9 0%

10 Macintosh Reported by 100% Responders Mac In Use at 100% Firms in % However, penetration remains in the minority as 65% report less than one third of their users use Macintosh. 10

11 Blackberry Classic Please estimate the percentage of people using the following devices in your organization at the end of In 2013, 90% respondents have less than 30% penetration of BB classic In 2012, 83% reported less than 30% BB classic has broad minority acceptance 11

12 Blackberry 10 Please estimate the percentage of people using the following devices in your organization at the end of % report no Blackberry 10 adoption The balance report less than 5% penetration 12

13 Windows 8 phones Please estimate the percentage of people using the following devices in your organization at the end of A majority report no Window 8 Phone penetration The balance report less than 5% penetration 13

14 Android Phones Please estimate the percentage of people using the following devices in your organization at the end of % 85% of Responders Report Less Than 10% Android Phone Penetration 90% 14

15 iphone Please estimate the percentage of people using the following devices in your organization at the end of % 90% 80% 70% 60% 50% 40% 30% 20% 10% 15 0% 90% have at least 10% iphones 20% have at least 90% iphones

16 Tablets In Organizations Percentage of Organizations Reporting That Some of Their Users Have a Tablet 90% 90% 80% 70% 60% 44% 50% 40% 30% 30% 20% 10% 16 0% ipads Windows tablets Android Tablets

17 Tablet Penetration Half of the organizations had 40% or more of their staff using ipads Windows tablets, 5.0% Android Tablets, 5.0%, 50% ipads, 40% 17

18 Environments and issues What are the issues that are driving IT management decisions? BYOD is pervasive, so what about alternatives like COPE? What class of apps are most important? What are people doing with mobile devices? What are the business reasons for issuing mobile devices? 18

19 Computers Are Laptops Thinking of the Macs, Windows and Linux non-server systems in your organization, please estimate what percentage are laptops. (We'll assume that all others are desktops.) 50% Across All Organizations, More than 70% of All Systems are Laptops 50% 45% 40% 30% 20% 10% 19 0% Macintosh Windows

20 COPE (Corporate Owned Personally Enabled) Some organizations are considering COPE (Corporate Owned Personally Enabled) as an alternative to BYOD. What are your organization's plans relative to COPE? Standardized on COPE 22% No plans to Use Cope 42% In Pilot now 8% 20 Planning for % Planning for 2015 or later 10% Just learned of it 15%

21 Still No Standard Apps What do you include in a standard configuration of a Smartphone or Tablet for staff? Please check all that apply. Task Manager Project Management Don't know Malware Protection Other Time and expense tracking Secure Backup SharePoint or other collaboration systems Password Manager Public Social Media (Facebook, Twitter, LinkedIn, etc) Navigation Virtual desktop/app agents (Citrix or VMWare) Internal social media (Chatter, Yammer, Jive, wikis, etc) Mobile File Management In-house Enterprise Apps Line of Business Apps Industry-specific apps Note taking and documentation Presentation Spreadsheet Word Processing Don't provide a standard configuration Mobile Device Management 21 0% 2% 4% 6% 8% 10% 12%

22 Enterprise Resources 22 Which of these enterprise resources do you currently enable or plan to enable access to from Smart Phones and Tablets? Check all that apply. Other CRM ERP Project Management Documentum Expense Reporting HR/Payroll Industry-specific resources System Administration Internal social and collaboration systems File servers to provide access to corporate documents Business/technical documentation SharePoint Remote control/access my desktop/laptop computer Help Desk 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

23 Consumer Apps compromise mobile security In % believed consumer solutions compromise security In % believed consumer solutions compromise security In % believe consumer solutions compromise security Employees are not using consumer solutions (that we know of). 2% Not sure 4% Employees are using these solutions, and we are planning to provide an alternative in or before % We are providing a secure alternative. 11% Employees are using these solutions. It's not really acceptable, but we don't have an alternative. 36% Employees are using consumer solutions, and it's acceptable. 38% 23 0% 5% 10% 15% 20% 25% 30% 35% 40%

24 Reasons for Caution Some organizations are cautious about introducing Mobile devices. If your organization has set some limitations on when employees can use a Smartphone or Tablet for company business, please select all concerns that led to these restrictions. Reasons for Caution Devices are too easy to steal/get lost. 37% Help desk and support expenses 30% Compliance with government and industry regulations. 30% Securing access to company information through the device does not meet our standards. Other 23% 26% Client management is too cumbersome. 21% 24 Securing applications is too complicated or impossible. 18% 0% 5% 10% 15% 20% 25% 30% 35% 40%

25 Managing Mobile What does it mean to manage these systems What security is preferred? What management tools are in use? Is everyone using an Mobile Device Management solution? 25

26 71% want to authenticate through Active Directory My organization wants to use the following authentication mechanisms for Smart Phones and Tablets. Check all that apply. 80% 71% 70% 60% 50% 43% 40% 30% 21% 20% 16% 10% 2% 5% 7% 26 0% SmartCards (CAC, PIV) Reverse Proxy BioMetric Other Multi-Factor Authentication (ie RSA) Certificate Active Directory Credentials

27 Mobile Device Management (MDM) In Control (2011 thru 2013) When will your organization begin using a mobile device management (MDM) solution (other than ActiveSync and Apple iphone Config Utility or Apple Configurator) to proactively manage Smartphones and Tablets? 60% 60% 50% 38% 40% 27% 29% 30% 21% 23% 18% 21% 22% 17% 20% 31% 9% 10% 27 0% Not sure No plans Plan to use MDM by end of next year Using MDM now

28 Mobile File Management (MFM) When will your organization begin using a mobile file management solution (MFM) to provide access to corporate documents from Smart Phones and Tablets? 30% 27% 30% 25% 20% 16% 18% 21% 15% 10% 5% 5% 28 0% No plans to use MFM to provide access to corporate documents Not sure about MFM plans Using a corporate procured cloud MFM solution Plan to use MFM by end of 2014 Permit employees to use their own cloud MFM solution Using MFM now for file servers, SharePoint sites and other enterprise storage

29 In Summary / Conclusion Desktop OSes now include Windows XP, 7, 8 & Mac OS X Mobile OSes dominated by Apple with Android on the move but Windows mobile OSes not moving yet. Security of devices, OSes, applications and corporate resources is still a major concern. MDM has become the dominant management application. Consumer solutions are losing their acceptability so organizations are looking for secure solutions Enterprise Apps are replacing consumer Apps for the sake of security and increased control. 29

30 About the Respondents What is the business of your organization? Construction/Field Services 3% Retail/Hospitality/Travel 4% Banking, Financial Services or Insurance 8% Government, Federal 15% Media or Advertising 13% Other Commercial Business 16% Health Care or Research 11% Non-Profit 12% 30 Government, State Or Local 21% 0% 5% 10% 15% 20% 25%

31 Q & A Use the chat to submit your questions. Contacts: Enterprise Device Alliance Ryan Faas T. Reid Lewis 31

32 The Enterprise Device Alliance

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and Its Impact on IT Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and IT D means Apple products Macs iphones ipads Android phones IT means Microsoft

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in

More information

Enterprise on the Go. How enterprises can leverage mobile apps

Enterprise on the Go. How enterprises can leverage mobile apps Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.

More information

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015 Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Technology Shifts. Mainframe Windows Desktop Internet

Technology Shifts. Mainframe Windows Desktop Internet Technology Shifts Mainframe Windows Desktop Internet 1975 1980 1985 1990 1995 2000 2005 Mobile Technology Shift March 12, 2010 March 7, 2012 How Significant? Declining PC Sales In the wake of Apple s ipad

More information

Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities

Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials

More information

Mac in the Enterprise

Mac in the Enterprise Apple Pro Training Series Mac in the Enterprise Mavericks Edition An IT Decision Maker s Guide to Integrating and Deploying Mac Systems Ryan Faas, Ed. Apple Certified Executive Summary Mobility. Big Data.

More information

Division of Information Technology Lehman College CUNY

Division of Information Technology Lehman College CUNY Division of Information Technology Lehman College CUNY Using Lehman s Secure Outgoing (SMTP) Server Updated April 16, 2013 Are you able to receive your Lehman email on your smart phone, laptop or tablet

More information

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite. White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table

More information

mobilecho: 5-Step Deployment Plan for Mobile File Management

mobilecho: 5-Step Deployment Plan for Mobile File Management mobilecho: 5-Step Deployment Plan for Mobile File Management Overview GroupLogic s mobilecho is the industry s first and only secure Mobile File Management (MFM) solution for ipads. mobilecho enables IT

More information

Getting Started with VMware Horizon View (Remote Desktop Access)

Getting Started with VMware Horizon View (Remote Desktop Access) Getting Started with VMware Horizon View (Remote Desktop Access) Use The Links Below To Navigate This Document Using VMware Horizon View with Tablet and Smartphone APP or Mobile Web Browser Walk Through

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Access Tropical Cloud Desktop from Any Device

Access Tropical Cloud Desktop from Any Device Access Tropical Cloud Desktop from Any Device Tropical Business Solutions White Paper Contents What is Tropical Cloud Desktop?... 3 Information you are going to need... 3 How to connect to the Tropical

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global

More information

Secure iphone Access to Corporate Web Applications

Secure iphone Access to Corporate Web Applications F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business

More information

ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT. uniflow canon.com.au/business

ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT. uniflow canon.com.au/business ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT uniflow canon.com.au/business INTEGRATED, PRODUCTIVE CONTROL OF PRINTING, COPYING SCANNING, AND FAXING uniflow is an integrated print

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

All your apps & data in the cloud, all in one place.

All your apps & data in the cloud, all in one place. The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015

BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015 BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015 Bomgar VS. GoToAssist LICENSING & DEPLOYMENT The proliferation of solutions has undoubtedly provided certain advantages for organizations seeking alternatives

More information

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows

More information

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines May 2013 Choosing a Mobile Device Had to pass FAA Device Security Hardware

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Deployment Guide Sept-2014 rev. a Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Table of Contents 1 Introduction... 2 1.1 Array Networks AG Series Secure Access

More information

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Anchor End-User Guide

Anchor End-User Guide Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Enterprise Security with mobilecho

Enterprise Security with mobilecho Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

Direct Control for Mobile & Supporting Mac OS X in Windows Environments Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior

More information

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic

More information

Privileged Access Management 15.3 Available Features

Privileged Access Management 15.3 Available Features Privileged Access Management 15.3 Available Features Features for Access Console Users Feature Name Multi-Platform Support Endpoint Access Console Windows Windows 2000 Pro SP4 Windows XP Pro SP3 Windows

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager justrong@novell.com

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager justrong@novell.com Community Chat MDM Meets Endpoint Mgmt Justin Strong Sr. Product Marketing Manager justrong@novell.com Bryce Romney Product Manager bromney@novell.com The next 45 minutes or so Why is MDM so important

More information

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates Cloud Collaboration: Strategies and Technologies Bud Porter-Roth Independent, vendor neutral, consulting in: Cloud Information Management (CIM) Electronic Document Management Document Imaging Records Management

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring

More information

Bring Your Own Device (BYOD) Mobile Device Management (MDM) Joshua Jacobs, Sawyers & Jacobs LLC jjacobs@sawyersjacobs.com. Presented by Joshua Jacobs

Bring Your Own Device (BYOD) Mobile Device Management (MDM) Joshua Jacobs, Sawyers & Jacobs LLC jjacobs@sawyersjacobs.com. Presented by Joshua Jacobs Welcome to Southern Financial Exchange 2013 Conference & Expo Bring Your Own Device (BYOD) & Presented by Joshua Jacobs Sawyers & Jacobs LLC Slide 1 Joshua Jacobs Joshua has thirteen years of experience

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015

Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015 How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015 Contact Information Laura Leist Eliminate Chaos laura@eliminatechaos.com 425.670.2551 877.342.8592 Author:

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus. Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley

More information

Solve BYOD with! Workspace as a Service!

Solve BYOD with! Workspace as a Service! Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

MOBILE DEVICE MANAGEMENT (MDM)

MOBILE DEVICE MANAGEMENT (MDM) PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Privileged Access Management 15.2 Available Features

Privileged Access Management 15.2 Available Features Privileged Access Management 15.2 Available Features Features for Access Console Users Feature Name Multi-Platform Support Endpoint Access Console Windows Windows 2000 Pro SP4 Windows XP Pro SP3 Windows

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

1 of 14 13-09-13 20:44

1 of 14 13-09-13 20:44 Free Download Download the latest issue of CW Europe - September 2013 Is your house in order? Download Email Address By submitting you agree to receive email from TechTarget and its partners. If you reside

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

The Maximum Security Marriage:

The Maximum Security Marriage: The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

Remote Access User Guide using Citrix NetScaler Thin Client

Remote Access User Guide using Citrix NetScaler Thin Client Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information

Mobile Device. Management-

Mobile Device. Management- Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

Five Best Practices for Secure Enterprise Content Mobility

Five Best Practices for Secure Enterprise Content Mobility A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates Cloud Collaboration: Strategies and Technologies Bud Porter-Roth Independent, vendor neutral, consulting in: Cloud Information Management (CIM) Electronic Document Management Document Imaging Records Management

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

Perceptive Enterprise Search

Perceptive Enterprise Search Perceptive Enterprise Search Matthias Weber Partner Account Manager Perceptive Enterprise Search Identify the business challenges Solve the challenges Enterprise Search demo Success Stories Benefits 2

More information

PARK UNIVERSITY. Information Technology Services. VDI In-A-Box Virtual Desktop. Version 1.1

PARK UNIVERSITY. Information Technology Services. VDI In-A-Box Virtual Desktop. Version 1.1 PARK UNIVERSITY Information Technology Services VDI In-A-Box Virtual Desktop Version 1.1 I N F O R M A T I O N T E C H N O L O G Y S E R V I C E S VIRTUAL DESKTOP USER MANUAL Park University 8700 NW River

More information

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case

More information

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication

More information

Mobile Printing for Business Made Easy

Mobile Printing for Business Made Easy Mobile Printing for Business Made Easy If users know how to send an email or go to a Web address, they can print with EveryonePrint EveryonePrint is the perfect fit for any business of any size, where

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Key Requirements of Enterprise Mobility Management Solutions

Key Requirements of Enterprise Mobility Management Solutions Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:

More information

Storgrid EFS Access all of your business information securely from any device

Storgrid EFS Access all of your business information securely from any device Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida 2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and

More information