Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices
|
|
- Sharleen Baker
- 8 years ago
- Views:
Transcription
1 Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices Survey Results and Q&A 18-December-2013 Ryan Faas Journalist and Consultant T. Reid Lewis President Enterprise Device Alliance
2 Presenters Ryan Faas technology journalist and author who has been writing about Apple, business and enterprise IT topics, and the mobile industry for over a decade. He is author and/or editor of several technology books including "The iphone for Work". Ryan is the business reporter for Cult of Mac and a prolific freelance writer whose work has been featured on Computerworld, InfoWorld, Enterprise Mobile Today, InformIT.com, Peachpit Press, About.com, and Datamation. Most recently Ryan has started covering the emerging consumerization of IT trends, including BYOD, for IDG's new CITEworld service. In addition to writing, Ryan has spent a large portion of the past fifteen years in the systems/network engineering and IT management fields as an IT director, systems administrator, trainer, and all round multi-platform and mobile device technology consultant. T. Reid Lewis president of Enterprise Device Alliance 2
3 The Enterprise Device Alliance (EDA) We are a consortium of enterprise software companies As individual companies we deliver solutions that deliver crossplatform services and address the problems that IT administrators have when integrating Macs, iphones, ipads, Android and other mobile devices. As the EDA, our goal is to provide information and resources to help enterprises integrate and manage Macs, ios and Android devices in their Windows-based IT infrastructure Organizations and users should be able to choose their productivity tools based the merits of the platform, and not issues of manageability. We enable cross-platform environments where enterprises can leverage their established Windows expertise, infrastructure, and technology to manage Macs, iphones, ipads, Android and other mobile devices as peers on the network. 3
4 Enterprise Device Alliance Member Companies MDM & Client Management Security, Control, & Compliance Policies File Access, Sharing & Backup Virtual Desktop Making it easy to deploy, integrate and manage Macs, iphones, ipads, Android and other mobile devices in a Windows environment.
5 About the survey: Goals: Identify leading management issues for IT Responses: Conducted from 20-Nov Dec 16, outreach to thousands of IT professionals Many respondents were in organizations with thousands and tens of thousands of employees This presentation also includes results from comparable surveys conducted by the EDA in fall of 2011 &
6 Topics What IT has to say about: The Platforms Computers Phones Tablets Environments and Issues OSes Applications Policies Managing Mobile State of management Preferences 6
7 The Platforms Computers Phones Tablets 7
8 Windows 7/XP Remains Dominant Please estimate the percentage of people using the following devices in your organization at the end of Percentage of Sites Where Windows 7/XP Usage Exceeds 70% 50% 41% 45% 40% 30% 20% 10% 8 0%
9 Windows 7/XP vs Windows 8 Please estimate the percentage of people using the following devices in your organization at the end of % 85% 95% 90% 80% 70% 60% 50% 40% 30% 20% 10% Windows 7/XP Windows 8 1% Windows 7/XP Windows 8 10% 9 0%
10 Macintosh Reported by 100% Responders Mac In Use at 100% Firms in % However, penetration remains in the minority as 65% report less than one third of their users use Macintosh. 10
11 Blackberry Classic Please estimate the percentage of people using the following devices in your organization at the end of In 2013, 90% respondents have less than 30% penetration of BB classic In 2012, 83% reported less than 30% BB classic has broad minority acceptance 11
12 Blackberry 10 Please estimate the percentage of people using the following devices in your organization at the end of % report no Blackberry 10 adoption The balance report less than 5% penetration 12
13 Windows 8 phones Please estimate the percentage of people using the following devices in your organization at the end of A majority report no Window 8 Phone penetration The balance report less than 5% penetration 13
14 Android Phones Please estimate the percentage of people using the following devices in your organization at the end of % 85% of Responders Report Less Than 10% Android Phone Penetration 90% 14
15 iphone Please estimate the percentage of people using the following devices in your organization at the end of % 90% 80% 70% 60% 50% 40% 30% 20% 10% 15 0% 90% have at least 10% iphones 20% have at least 90% iphones
16 Tablets In Organizations Percentage of Organizations Reporting That Some of Their Users Have a Tablet 90% 90% 80% 70% 60% 44% 50% 40% 30% 30% 20% 10% 16 0% ipads Windows tablets Android Tablets
17 Tablet Penetration Half of the organizations had 40% or more of their staff using ipads Windows tablets, 5.0% Android Tablets, 5.0%, 50% ipads, 40% 17
18 Environments and issues What are the issues that are driving IT management decisions? BYOD is pervasive, so what about alternatives like COPE? What class of apps are most important? What are people doing with mobile devices? What are the business reasons for issuing mobile devices? 18
19 Computers Are Laptops Thinking of the Macs, Windows and Linux non-server systems in your organization, please estimate what percentage are laptops. (We'll assume that all others are desktops.) 50% Across All Organizations, More than 70% of All Systems are Laptops 50% 45% 40% 30% 20% 10% 19 0% Macintosh Windows
20 COPE (Corporate Owned Personally Enabled) Some organizations are considering COPE (Corporate Owned Personally Enabled) as an alternative to BYOD. What are your organization's plans relative to COPE? Standardized on COPE 22% No plans to Use Cope 42% In Pilot now 8% 20 Planning for % Planning for 2015 or later 10% Just learned of it 15%
21 Still No Standard Apps What do you include in a standard configuration of a Smartphone or Tablet for staff? Please check all that apply. Task Manager Project Management Don't know Malware Protection Other Time and expense tracking Secure Backup SharePoint or other collaboration systems Password Manager Public Social Media (Facebook, Twitter, LinkedIn, etc) Navigation Virtual desktop/app agents (Citrix or VMWare) Internal social media (Chatter, Yammer, Jive, wikis, etc) Mobile File Management In-house Enterprise Apps Line of Business Apps Industry-specific apps Note taking and documentation Presentation Spreadsheet Word Processing Don't provide a standard configuration Mobile Device Management 21 0% 2% 4% 6% 8% 10% 12%
22 Enterprise Resources 22 Which of these enterprise resources do you currently enable or plan to enable access to from Smart Phones and Tablets? Check all that apply. Other CRM ERP Project Management Documentum Expense Reporting HR/Payroll Industry-specific resources System Administration Internal social and collaboration systems File servers to provide access to corporate documents Business/technical documentation SharePoint Remote control/access my desktop/laptop computer Help Desk 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
23 Consumer Apps compromise mobile security In % believed consumer solutions compromise security In % believed consumer solutions compromise security In % believe consumer solutions compromise security Employees are not using consumer solutions (that we know of). 2% Not sure 4% Employees are using these solutions, and we are planning to provide an alternative in or before % We are providing a secure alternative. 11% Employees are using these solutions. It's not really acceptable, but we don't have an alternative. 36% Employees are using consumer solutions, and it's acceptable. 38% 23 0% 5% 10% 15% 20% 25% 30% 35% 40%
24 Reasons for Caution Some organizations are cautious about introducing Mobile devices. If your organization has set some limitations on when employees can use a Smartphone or Tablet for company business, please select all concerns that led to these restrictions. Reasons for Caution Devices are too easy to steal/get lost. 37% Help desk and support expenses 30% Compliance with government and industry regulations. 30% Securing access to company information through the device does not meet our standards. Other 23% 26% Client management is too cumbersome. 21% 24 Securing applications is too complicated or impossible. 18% 0% 5% 10% 15% 20% 25% 30% 35% 40%
25 Managing Mobile What does it mean to manage these systems What security is preferred? What management tools are in use? Is everyone using an Mobile Device Management solution? 25
26 71% want to authenticate through Active Directory My organization wants to use the following authentication mechanisms for Smart Phones and Tablets. Check all that apply. 80% 71% 70% 60% 50% 43% 40% 30% 21% 20% 16% 10% 2% 5% 7% 26 0% SmartCards (CAC, PIV) Reverse Proxy BioMetric Other Multi-Factor Authentication (ie RSA) Certificate Active Directory Credentials
27 Mobile Device Management (MDM) In Control (2011 thru 2013) When will your organization begin using a mobile device management (MDM) solution (other than ActiveSync and Apple iphone Config Utility or Apple Configurator) to proactively manage Smartphones and Tablets? 60% 60% 50% 38% 40% 27% 29% 30% 21% 23% 18% 21% 22% 17% 20% 31% 9% 10% 27 0% Not sure No plans Plan to use MDM by end of next year Using MDM now
28 Mobile File Management (MFM) When will your organization begin using a mobile file management solution (MFM) to provide access to corporate documents from Smart Phones and Tablets? 30% 27% 30% 25% 20% 16% 18% 21% 15% 10% 5% 5% 28 0% No plans to use MFM to provide access to corporate documents Not sure about MFM plans Using a corporate procured cloud MFM solution Plan to use MFM by end of 2014 Permit employees to use their own cloud MFM solution Using MFM now for file servers, SharePoint sites and other enterprise storage
29 In Summary / Conclusion Desktop OSes now include Windows XP, 7, 8 & Mac OS X Mobile OSes dominated by Apple with Android on the move but Windows mobile OSes not moving yet. Security of devices, OSes, applications and corporate resources is still a major concern. MDM has become the dominant management application. Consumer solutions are losing their acceptability so organizations are looking for secure solutions Enterprise Apps are replacing consumer Apps for the sake of security and increased control. 29
30 About the Respondents What is the business of your organization? Construction/Field Services 3% Retail/Hospitality/Travel 4% Banking, Financial Services or Insurance 8% Government, Federal 15% Media or Advertising 13% Other Commercial Business 16% Health Care or Research 11% Non-Profit 12% 30 Government, State Or Local 21% 0% 5% 10% 15% 20% 25%
31 Q & A Use the chat to submit your questions. Contacts: Enterprise Device Alliance info@enterprisedevicealliance.org Ryan Faas ryan@ryanfaas.com T. Reid Lewis reid.lewis@enterprisedevicealliance.org 31
32 The Enterprise Device Alliance
BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment
BYOD and Its Impact on IT Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and IT D means Apple products Macs iphones ipads Android phones IT means Microsoft
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationSamsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics
Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in
More informationEnterprise on the Go. How enterprises can leverage mobile apps
Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.
More informationBring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com
Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in
More informationTechnology Shifts. Mainframe Windows Desktop Internet
Technology Shifts Mainframe Windows Desktop Internet 1975 1980 1985 1990 1995 2000 2005 Mobile Technology Shift March 12, 2010 March 7, 2012 How Significant? Declining PC Sales In the wake of Apple s ipad
More informationDepartment of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015
Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationSmart Devices @ Givaudan. From BYOD experience to new mobile opportunities
Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials
More informationDevice Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
More informationDivision of Information Technology Lehman College CUNY
Division of Information Technology Lehman College CUNY Using Lehman s Secure Outgoing (SMTP) Server Updated April 16, 2013 Are you able to receive your Lehman email on your smart phone, laptop or tablet
More informationmobilecho: 5-Step Deployment Plan for Mobile File Management
mobilecho: 5-Step Deployment Plan for Mobile File Management Overview GroupLogic s mobilecho is the industry s first and only secure Mobile File Management (MFM) solution for ipads. mobilecho enables IT
More informationMac in the Enterprise
Apple Pro Training Series Mac in the Enterprise Mavericks Edition An IT Decision Maker s Guide to Integrating and Deploying Mac Systems Ryan Faas, Ed. Apple Certified Executive Summary Mobility. Big Data.
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationAccess Tropical Cloud Desktop from Any Device
Access Tropical Cloud Desktop from Any Device Tropical Business Solutions White Paper Contents What is Tropical Cloud Desktop?... 3 Information you are going to need... 3 How to connect to the Tropical
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationSecure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
More informationGetting Started with VMware Horizon View (Remote Desktop Access)
Getting Started with VMware Horizon View (Remote Desktop Access) Use The Links Below To Navigate This Document Using VMware Horizon View with Tablet and Smartphone APP or Mobile Web Browser Walk Through
More informationVMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationDirect Control for Mobile & Supporting Mac OS X in Windows Environments
Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior
More informationBOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015
BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015 Bomgar VS. GoToAssist LICENSING & DEPLOYMENT The proliferation of solutions has undoubtedly provided certain advantages for organizations seeking alternatives
More informationWrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines
Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines May 2013 Choosing a Mobile Device Had to pass FAA Device Security Hardware
More informationONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT. uniflow canon.com.au/business
ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT uniflow canon.com.au/business INTEGRATED, PRODUCTIVE CONTROL OF PRINTING, COPYING SCANNING, AND FAXING uniflow is an integrated print
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationHow to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationMy CEO wants an ipad now what? Mobile Security for the Enterprise
My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager
More informationAll your apps & data in the cloud, all in one place.
The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationPrivileged Access Management 15.3 Available Features
Privileged Access Management 15.3 Available Features Features for Access Console Users Feature Name Multi-Platform Support Endpoint Access Console Windows Windows 2000 Pro SP4 Windows XP Pro SP3 Windows
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationMobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationThe Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
More informationCloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates
Cloud Collaboration: Strategies and Technologies Bud Porter-Roth Independent, vendor neutral, consulting in: Cloud Information Management (CIM) Electronic Document Management Document Imaging Records Management
More informationDeployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2
Deployment Guide Sept-2014 rev. a Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Table of Contents 1 Introduction... 2 1.1 Array Networks AG Series Secure Access
More informationIntroducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management
Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More informationSANS Mobility/BYOD Security Survey
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationFileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationPrivileged Access Management 15.2 Available Features
Privileged Access Management 15.2 Available Features Features for Access Console Users Feature Name Multi-Platform Support Endpoint Access Console Windows Windows 2000 Pro SP4 Windows XP Pro SP3 Windows
More information1 of 14 13-09-13 20:44
Free Download Download the latest issue of CW Europe - September 2013 Is your house in order? Download Email Address By submitting you agree to receive email from TechTarget and its partners. If you reside
More informationMobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda
Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationAnchor End-User Guide
Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share
More informationSolve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationCommunity Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager justrong@novell.com
Community Chat MDM Meets Endpoint Mgmt Justin Strong Sr. Product Marketing Manager justrong@novell.com Bryce Romney Product Manager bromney@novell.com The next 45 minutes or so Why is MDM so important
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationHow To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn
Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationPerceptive Enterprise Search
Perceptive Enterprise Search Matthias Weber Partner Account Manager Perceptive Enterprise Search Identify the business challenges Solve the challenges Enterprise Search demo Success Stories Benefits 2
More informationExchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
More informationWhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
More informationBring Your Own Device & the Consumerisation of IT: 2 Case Studies
Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case
More informationTwo-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
More informationEliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015
How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015 Contact Information Laura Leist Eliminate Chaos laura@eliminatechaos.com 425.670.2551 877.342.8592 Author:
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationBring Your Own Device (BYOD) Mobile Device Management (MDM) Joshua Jacobs, Sawyers & Jacobs LLC jjacobs@sawyersjacobs.com. Presented by Joshua Jacobs
Welcome to Southern Financial Exchange 2013 Conference & Expo Bring Your Own Device (BYOD) & Presented by Joshua Jacobs Sawyers & Jacobs LLC Slide 1 Joshua Jacobs Joshua has thirteen years of experience
More informationSecurity. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
More informationTom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell
Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü
More information11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
More information4 Steps to Creating a Mobile Development Strategy
4 Steps to Creating a Mobile Development Strategy How many times have you wondered "What did I ever do before the web?" Soon you ll be asking the same thing about mobile. At Appcelerator, we help the world
More informationBYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service
BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationIDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
More informationAccess Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
More informationEasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
More informationMobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options
Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationCompliance Management for Mobile Devices
Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationDeploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
More informationFive Best Practices for Secure Enterprise Content Mobility
A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
More informationMobile Device Security and Privacy. Discussion - Planning Considerations for a Successful Mobile Device Program
Mobile Device Security and Privacy Discussion - Planning Considerations for a Successful Mobile Device Program August 2012 Discussion Topics Mobile Device Definition and Characteristics Mobile Device Access
More informationCloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates
Cloud Collaboration: Strategies and Technologies Bud Porter-Roth Independent, vendor neutral, consulting in: Cloud Information Management (CIM) Electronic Document Management Document Imaging Records Management
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationSecure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
More informationMobile Device. Management-
Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationThe Truth About Enterprise Mobile Security Products
The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing
More informationHealthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
More informationHosted Desktop for Business
Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy
More information10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
More informationSAP White Paper Enterprise Mobility
SAP White Paper Enterprise Mobility Mobile Content and Document Management Best Practices and Decision Checklist Enterprise-Grade Solutions Give IT Much-Needed Security and Control Over Company Content
More information