CONSUMERIZATION OF IT BYOD and Cloud-based File Storage
|
|
|
- Joan Allison
- 10 years ago
- Views:
Transcription
1 CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville Regional Airport Authority Vanessa Hickman, Vice President & CIO, Metropolitan Nashville Airport Authority John Newsome, Director IT, Greater Orlando Aviation Authority Brice Callison, Mobile Solutions Architect, Dell Services Best Practices & Business Processes
2 CONSUMERIZATION OF IT BYOD and Cloud-based File Storage
3 CONSUMERIZATION OF IT BYOD and Cloud-based File Storage First iphone released 3
4 Bring Your Own Anything (BYOA) Royce Holden, MBA-TM, CISSP Director of Information Technology Greater Asheville Regional Airport
5 The Business Problem How to obtain Always on, reliable access to airport systems and devices from Any Device? Perception of always connected staff Staff s reliance on mobile devices Ability to work from anywhere Consumerization of IT Blurred Lines (Organization Oriented) The CEO Can use whatever they want Types of Systems and Services Where should you start? State of North Carolina Bring Your Own Device Policy State of North Carolina Cloud Computing Strategy Personally Identifiable and confidential information Short Term: Protect data at device level Long Term: Protect data, no matter where it resides
6 The Business Solution Policy in Place? Training in Place? Ideas on which Systems and Services are going to be in Place? IT Staff and SLA s in Place? Now, focus on Security and Productivity VDI Virtual Desktop Interface Enterprise Mobility Management End Point & Network Security Identity Management Malware & AV Support Single Sign On Split Tunneling Graphic:
7 Cloud File Storage MNAA Presented by Vanessa Hickman VP & CIO ACI NA Business Information Technology Conference March 25,
8 The Business Problem...Automate Board Documents Allow remote access by board of directors Solution: Provide a tool to support 25 users: Board of Directors Senior Staff Easy to use with little to no training Publish to central location
9 Unintended Consequences solved with Dropbox for Business Dropbox use expanded to 75 users across organization * Initial purchase: 100 user licenses; annual subscription Security & governance of corporate assets * Single Sign-on * Remote wipe * Audit logs & sharing controls Integration with Windows Explorer or access via browser Access data on multiple platforms; both on-line and off-line Unlimited capacity for business account; also increased capacity of personal Dropbox Users can maintain personal Dropbox separately from business Dropbox account Support is responsive and readily accessible
10 Bring Your Own Device Orlando International Airport John Newsome - Director of Information Technology Greater Orlando Aviation Authority 10
11 BYOD Business Drivers 1. Business need for ever more smart mobile devices 2. Business decision to permit one combined business / personal device for personnel convenience (i.e., one versus two devices). 3. Business decision to permit personnel to select a device of their preference to improve efficiencies.and 4. Business decision to require personnel to own the device to shift support from internal IT to the carrier of preference. 5. Business need for data leak prevention and malware protection for the business partition.and ensure business (and latter text messages) are retained in accord with public record regulations and laws. 11
12 BYOD Lessons Learned 1. MDMs were immature at the time (2012): a. Could not ensure performance across multiple vendor devices and frequent OS revisions b. Could no prevent documents from being moved from one partition to another (e.g., attachments) c. Text messages could not be captured and retained except on the Android OS and even then were carrier dependent. 2. Maintenance of an Application library was a more controversial and daunting effort than first anticipated 3. Personnel continued to come to IT to solve problems instead of the vendors / carriers. IT support increased rather than decreased. 4. Personnel became concerned / suspicious about the potential for eavesdropping, location tracking, etc. 5. The amount of the stipend was even controversial due to different capabilities needed for different users 12
13 Consumerization of Corporate IT: BYOD and Cloud-base File Storage Brice Callison Mobile Product Technologist Dell
14 User Fit Assessment App Inventory Discovery Map Users to Apps App Performance Needs by User High Level App Compatibility HW Inventory CPU & Utilization RAM Installed and Used Network Connections IOPS Maps to Users and Locations Identify Performance Needs Network Test Latency Network Capacity User Data Identify Where Stored ROI Define Expected ROI Prioritized User Groups and Technology Fit 360 Integration Design Applications Prioritize Apps to Optimize Schedule Software Licensing Plan Method(s) for Providing Apps Identify Application Migration needs User Workflow Analysis Hardware Validate Server, Storage and Networking sizing Identify Endpoint Form Factors Network & QOS Latency, Bandwidth, Wireless and/or Remote Access Evaluate DNS and DHCP User Access and Single Sign On Peripherals USB Storage Card Readers and RSA Tokens User Data User Data Access Data Security on Endpoint Identify Shared Data for Multiple Users Printing Printing from Mobile Devices Determining Closest Printer Bandwidth Utilization of Printing Local Printers Active Directory AD Assessment Design AD Container for DVS GPO Control Identify Synchronization Issues Design Application Groups Communications and Exchange VOIP/Lync Video Screen Sharing DVS Image Apps User Personality Disaster Recovery Infrastructure Readiness Plan User Image(s) Define Content Map Users to Images Process Changes Help Desk Support Lifecycle Image Management App Management Performance Monitoring Implement Infrastructure Applications Compatibility Testing App Virtualization Implement App Layering Technology Design Custom Mobility Apps Build Custom Mobility Apps Application Migration Hardware Deploy Servers and Storage Network Implement Plan User State Engineer Data Migration Solution Engineer OS and App Settings Customization Active Directory Implement Plan DVS Software Hypervisor Connection Broker Load Sharing Web Access Mobile Access Functioning Client Virtualization Environment Deployment Planning Applications Track App Readiness Client Devices Replace or Refresh Peripherals and Special Requirements Deployment Schedule Migration and Deployment T-30 T-20 T-15 T-10 T-5 T-2 T0 T+5 Site Survey Printing Implement Plan User Comms T-Minus Site and User Readiness Plan Target PCs Communications Implement Plan Peripherals Implement Plan User Image(s) Build Image(s) Application Delivery Disaster Recovery App list Complete Schedule migration Final check Process Changes Develop Support Desk Changes and Train Develop and Implement Lifecycle Process Change Develop and implement Image Management Develop and Implement App Management Change Pilot Identify Pilot Users Define Pilot Success Criteria Define Pilot RollBack Deploy User Support Infrastructure Track Infrastructure Readiness DR Plan and Validation Scheduling Define T-Minus Plan Define Deployment Groups Define Settings and Apps for Each PC Change Management Communication User Training Support Desk Build Schedule Identify Tech & PM Resources Device Readiness Reports Site or User Group Schedule Schedule Rollout Replace Devices Where Needed Deploy Agents User Training Run Automated Migration Process User Switchover QA Test Post Migration Support
15 The same problem can be solved in different ways Configured device Image Container Application Container VDI receivers Browser
16 End users will only adopt tools they like Empower end users to use their evolving skills End users Productivity Privacy End users need productivity tools that work for them They want to use their personal devices Laptops/tablets Mobile devices They want privacy and data-wipe assurance IT 88% need remote access 66% use free file sharing tools
17 Agency owners will do anything to ensure productivity Agency owners Need productivity tools to deliver outcomes more quickly than IT can create them. Work around IT Agency owner IT Shadow IT Faster solutions Productivity tools BUT Security issues Integration complexity Extra cost $
18 Enterprise Mobility Management (EMM) Your devices, your users, your mobile strategy Complete, secure endpoint management Secure enterprise workspace on all devices Secure access to enterprise data Integrated console management User self-service Comprehensive mobile enablement Endpoint management Container management Smartphones Smartphones Tablets Tablets M2M Identity management Business apps and services you need Flexibility for future-proofing Laptops Desktops Laptops
19 Unified solution with common functions for all your devices EMM functions Systems, device, app and content management Secure access to corporate resources User self-service Endpoint management EMM Container management Real-time reporting and alerts
20 User experience same look and feel as an enterprise PC End users can: Run applications directly on their PC Login and start VPN and apps just like always Security controls to manage use of apps and data: Policies to protect Windows apps and data 20
21 Choose your own adventure Corporate-owned devices Personally-owned devices Corporate issued Corporate owned, personally enabled Choose your own (from enterprise-approved product list) Bring your own Most organizations have needs across these tiers
22 Future State Workspace Corporate network Corporate VPN and firewall VPN connector Secure access Public network Encrypted workspace separate from personal apps and data Corporate resources Corporate apps and data ABC Inc. Corporate Windows 7 Live PC DMZ Workspace management Application gateway Authentication, policy, player, and image updates 22 Active Directory Mgmt Platform Policies DLP controls Cut and paste Drag and drop BYOPC
23 Thank you
24 CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Resources:
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX Introducing Dell Enterprise Mobility Management Brandon Herrin and Jason Moody Agenda Mobility/BYOD needs across the workforce Introducing Dell
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
Dell Enterprise Mobility Management
Dell Enterprise Mobility Management Comprehensive mobile enablement solution enables your unique mobility/byod strategy Secure the business. Empower the user. It s no secret that employees who use mobile
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
End User Computing - Cloud Client Computing
End User Computing - Cloud Client Computing Eduoard Lorrain, VMware David Angwin, Dell The Growing Complexity of Today Diverse Apps Data Everywhere Diverse Platform Diverse Devices Mobile Corporate Devices
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD)
Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD) Presented by: Barb Goldworm Founder, President & Chief Analyst, FOCUS Taking Virtualization to the Next Level Key
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
All your apps & data in the cloud, all in one place.
The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access
BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service
BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device) Agenda Set the scene BYOD raising many questions Structured & Integrated answers Belgacom Entreprise Mobility Belgacom Mobile Device Management Sensitivity : "Unrestricted",
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies. Terry Lewis Solutions Architect
Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies Terry Lewis Solutions Architect Today s discussion Technology Drivers Desktop and Application Delivery Complexity Which
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide
Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide Table of Contents 1. DEFINITIONS... 3 2. SCOPE OF SERVICES... 3 3.1 HVD... 4 3.2 WEBHVD... 4 3.3 HVS... 4 3.4 STORAGE D3...
Symantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Simplifying Desktop Mgmt With Novell ZENworks
Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America [email protected] Ryan Radschlag Network Manager Hartford Joint #1
Optimizing the Mobile Cloud Era Through Agility and Automation
Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile
Oracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
Citrix Desktop Virtualization Fast Track
Citrix Desktop Virtualization Fast Track Description: Days: 5 Prerequisites: This fast-paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications
Microsoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
APRIL 2013. 8 Must-Have Features for Endpoint Backup
APRIL 2013 8 Must-Have Features for Endpoint Backup Ensure corporate data is secure and protected by choosing an endpoint backup solution with the eight features below. 1. Advanced deduplication Because
Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)
Citrix Training Course: Citrix Training Duration: 40 hours Mode of Training: Classroom (Instructor-Led) Virtualization has redefined the way IT resources are consumed and services are delivered. It offers
Welcome the world of Citrix - where Desktops, Apps and Data are following you, where ever you go
Welcome the world of Citrix - where Desktops, Apps and Data are following you, where ever you go Fabian Kienle Regional Manager, Baltics @ Citrix Systems Cloud Computing Definition Wikipedia Cloud Computing
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Symantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
VMware End User Computing Horizon Suite
VMware End User Computing Horizon Suite Luc Gallet [email protected] 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
Citrix XenDesktop 5.6 Providing best TCO and TVO at once. Fabian Kienle Regional Sales Manager, Baltics @ Citrix Systems
Citrix XenDesktop 5.6 Providing best TCO and TVO at once Fabian Kienle Regional Sales Manager, Baltics @ Citrix Systems Ususally IT vendors keep telling you about the how.. but did anyone ever told you
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
Top Desktop Management Pain Points
Top Desktop Management Pain Points 2010 Table of Contents Managing Desktops and Laptops is a Challenge... 3 A Proactive Approach... 3 Asset Inventory is Key... 3 Mobile Workforce Support Challenges...
How To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
Debunking the Top 10 CloudHosted Virtual Desktop Myths
Debunking the Top 10 CloudHosted Virtual Desktop Myths Page 1 Summary Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service offered by a service provider. DaaS has
Mobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Enterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
Storgrid EFS Access all of your business information securely from any device
Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Enterprise Desktop Solutions: VMware View 4.5
C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform
Mobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
CMB-207-1I Citrix Desktop Virtualization Fast Track
CMB-207-1I Citrix Desktop Virtualization Fast Track Description This fast-paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications in the
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization Barb Goldworm Founder, president & chief analyst, FOCUS, LLC [email protected] The
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch 2016 VMware Inc. All rights reserved. A Leader in Enterprise Mobility Management & Security
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Top 10 Reasons why VDI is not a good solution for BYOD
Top 10 Reasons why VDI is not a good solution for BYOD WE KNOW A LITTLE ABOUT VDI! AMITABH SINHA, CEO PUNEET CHAWLA, CTO RANA KANAAN, VP (GM XenApp/ XenDesktop, Citrix) (Founding Engineer, VMware View)
activecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
Howtomanage and protectend usersdata? Mati Raidma
Howtomanage and protectend usersdata? Mati Raidma Data Protection Has Changed Increased mobility of the workforce and business adoption of tablets are forcing organizations to face the challenge ofprotecting
605: Design and implement a desktop virtualization solution based on a mock scenario. Hands-on Lab Exercise Guide
605: Design and implement a desktop virtualization solution based on a mock scenario Hands-on Lab Exercise Guide Contents Overview... 2 Scenario... 5 Quick Design Phase...11 Lab Build Out...12 Implementing
Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist
Enterprise Content Sharing: A Data Security Checklist Executive Summary Secure file sharing, syncing, and productivity solutions enable mobile workers secure whenever, wherever access to files from any
Managing Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of
How To Make A Cloud Service Federation A Successful Business Model
A Channel Company White Paper Identity as a Service (IDaaS) Promising New Opportunity for MSPs Brought to You By: Abstract Managed service providers are increasingly finding themselves in the role of service
