Strategies for Managing Disparate Devices in Your Mobile Fleet
|
|
- April Glenn
- 8 years ago
- Views:
Transcription
1 Strategies for Managing Disparate Devices in Your Mobile Fleet MRW1 - August 24, 2010 Kris Snyder Brian Donato Christopher Hunt
2 Agenda MANAGEMENT APPROACH MOBILE DEVICE POLICY DEVICES / TRENDS MANAGEMENT TOOLS
3 Enterprises have been reluctant to embrace the newest mobile devices because of concerns about security, not to mention the increased management burdens that the new devices would place on already strapped IT departments. Philippe Winthrop, Research Director, Strategy Analytics
4 Consumerization of Enterprise Mobility In a recent survey, nearly 80% of companies have seen increases in the number of employees wanting to use their own mobile devices to access enterprise data, due in large part to the iphone, and more recently, Android devices. Source: Vanson Bourne, The Device Dilemma, Sept. 2009
5 Approaches to Mobile Device Management Big Brother Standardize on one, and only one, platform most likely Blackberry Firm owns and controls all devices ** Users want more freedom, more choice Free-for-all Allow any device Users responsible for purchasing and maintaining ** How to manage? Hybrid Multiple devices supported, within set limitations Users or firm can purchase ** IT controls certain aspects, users retain control over device choice, everyone is happy. Or are they?
6 Determine the Right Approach WHO? End User Segmentation Executives/Management IT vs. Non IT Lines of Business: Partner vs. Non-Partner; Timekeeper vs. Staff IL vs. CL WHAT? PIM, Extended Application or Mobilized Task Mobile Operating Systems Device or form factor selection WHERE? Cellular, Wi-Fi HOW? Device, Application, Service, Security, Expense, and Asset Management MRW1 8/24/2010
7 Mobile Device Policy Device Selection Standardize on one platform, or allow variety? Form / Function (QWERTY vs. Touch Screen) Who owns the device? All about the apps Support and Inventory Implications Carriers / Plans Who pays?
8 Mobile Device Policy Security Policy Compliance Passwords Data Encryption What to do when employee leaves? Wipe whole device vs. wipe enterprise data? Office Cultural and Political Considerations Finding common ground without causing a mutiny
9 Live Example - Vorys Vorys, Sater, Seymour and Pease LLP 7 offices, 375 attorneys, 850 users About 450 mobile devices supported Management Model Hybrid Firm manages a loaner pool of blackberry Managed with BES Firm supports personal RIM, Windows and iphone devices We use Exchange Active Sync and Good User buys devices, Reimbursed for service MRW1 8/24/2010
10 Live Example - Vorys The Good Users can choose from many devices Firm not tied into a single device Attorney feel more relevant with latest devices. The Bad Much more setup and support work Cannot leverage all devices to run firm standard software.
11 Live Example - Vorys The Ugly Managing devices requires compromises Example - Good for iphone makes device much less adept at . Can be difficult to say no to a popular device Lost control of data itunes, BB Desktop backups?
12 Live Example - Vorys Lessons Learned Treat security and manageability as the primary requirements. If you view these devices as a platform, treat them as such Long term, supporting multiple devices likely isn t a win for the firm.
13 Live Example - Tarlow Tarlow, Breed, Hart & Rodgers, P.C. 1 office, 21 attorneys, 47 users 26 mobile devices 57% iphone; 31% Symbian; 8% Android; 4% Windows Mobile Management Model Hybrid Good for Enterprise Currently supports 120 devices over the 4 major OS platforms Users may select from either a Firm-provided device or buy their own APPROVED device; Firm pays for data. MRW1 8/24/2010
14 Live Example - Tarlow The Good Users are happy with device selection IT is happy with uniform delivery service Easy management of mobile device fleet Compliance with data security laws The Bad Users not always happy with limitations of the Good client IT is assumed to know everything about every phone AND app on the market When something breaks, users want IT to deal with it, even if they bought their own phone
15 Live Example - Tarlow Lessons Learned Security of data is paramount Find balance between keeping users happy and keeping IT sane Letting go of some control also requires users to assume some control if they won t, this strategy may not work
16 Future Management Considerations Evolution of Privacy laws Encryption to a higher standard. Evolution of devices as platforms How do you handle O/S upgrades for PC? Consumer v. Business devices Where to draw the line Hybrid Devices? How significant is the phone part of SmartPhone? Evolution of policy Data is mingled
17 Mobile Device Trends Global Trends US Smartphone Market Share Legal Industry
18 Millions of Units MRW1 8/24/2010 Global Smartphone Sales Source: Gartner; Forecast: Smartphones by Operating System and End User Segment, Worldwide, ; Sept. 2009
19 Smartphone Platform Market Share Share (%) of Smartphone Subscribers Feb-10 May-10 % Change RIM 42.1% 41.7% -0.4% Apple* 25.4% 24.4% -1.0% Microsoft 15.1% 13.2% -1.9% Google 9.0% 13.0% 4.0% Palm 5.4% 4.8% -0.6% Other 3.0% 2.9% -0.1% Source: comscore May 2010 U.S. Mobile Subscriber Market Share
20 Legal Industry RIM is still the King in Legal 89% of law firms in 2009 ILTA tech survey indicate RIM devices in use in their firms, an upward trend over the past three years. iphone beginning to infiltrate 50% of firms indicated the presence of the iphone Support for multiple platforms increasing 35% of firms indicate support for multiple platforms (up from 26% in 2008), with another 8% moving toward multiple platform support the year of Android? Great concern surrounding Android devices, centering on lack of policy enforcement and weak native enterprise support. Source: ILTA s 2009 Technology Survey
21 Device and Platform Standardization has been replaced by Device and Platform Heterogeneous control, security and management as the key initiative for corporate IT organizations. This, combined with the individual liable trend, is forcing cross platform acceptance. iphone Has Changed the Game BlackBerry is a Mainstay Android is Here Windows Mobile is Still Around
22 Social Engineering; Policy & People Exchange Active sync (EAS) BES via BAS Apple Tools Third Party Tools (Good, Mobile Iron, & Trust Digital)
23 BES / BES Express
24 Microsoft Exchange ActiveSync
25 Microsoft Mobile Device Manager
26 iphone Configuration Utility
27 Good for Enterprise
28 Zenprise
29 Boxtone
30 Questions?
31 Thank You! Kris Snyder, President and CEO Vox Mobile Brian Donato, IT Director Vorys, Sater, Seymour and Pease LLP Christopher Hunt, IT Director Tarlow, Breed, Hart & Rodgers, P.C.
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationExchange 2010 ActiveSync: Connection
Westlands School Exchange 2010 ActiveSync: Connection Staff mobile phone email access Exchange 2010 ActiveSync provides Westlands School Staff with external access to their school email account from a
More informationIT Best Practices: Mobile Policies and Processes for Employeeowned
IT Best Practices: Mobile Policies and Processes for Employeeowned Smartphones By: Maribel Lopez, Principal Analyst April 2010 Lopez Research 9793 S. Burberry Way Littleton, Colorado 80129 T 617-872-8631
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationExchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
More informationSmartphone Shootout: Which One Is Best? #CTPG5
Smartphone Shootout: Which One Is Best? #CTPG5 Christopher B. Hunt - Sugarman, Rogers, Barshak & Cohen, P.C. Frank Spadafino - Epstein Becker & Green, P.C. Andrew Collier - Ice Miller LLP Jon Coleman -
More informationCYA with BYOD Policies. Presented by Scott Christensen, James Darsigny and Brian R. Clayton #APP18
CYA with BYOD Policies Presented by Scott Christensen, James Darsigny and Brian R. Clayton #APP18 Panelist: Jim Darsigny Chief Information Officer Brown Rudnick LLP Jim Darsigny Thank you for being here
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationMobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
More informationConsumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011
Consumerization of IT Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 1 Agenda What is consumerization of IT? What s the hype? And why now? Media tablets in the enterprise 2 Is
More informationThe Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
More informationFive Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationOn the Road with SugarCRM. SugarCRM Series by Interlinx Associates, llc
On the Road with SugarCRM SugarCRM Series by Interlinx Associates, llc Importance of Mobile By 2012, companies will gain 20% more value from sales automation initiatives by capitalizing on widespread adoption
More informationBring Your Own Device & the Consumerisation of IT: 2 Case Studies
Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case
More informationThe Third Screen: What Email Marketers Need to Know About Mobile Rendering
BlueHornet Whitepaper The Third Screen: What Email Marketers Need to Know About Mobile Rendering Part One: Your Marketing Message on the Third Screen Executive Summary The rapid rise in adoption of so-called
More informationEnterprise Mobile Management
Enterprise Mobile Management Enterprise Mobile Management Ben Santing, HP Changing Face of Enterprise Mobility Consumerisation has transformed mobility Line between corporate and private blurring Cloud
More informationSmartphone Security Winners & Losers
Smartphone Security Winners & Losers CESARE GARLATI TREND MICRO Session ID: MBS-308 Session Classification: Intermediate Consumerization of IT Consumerization will be the most significant trend affecting
More informationSpecial Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
More informationThe New Workplace: Supporting Bring your own
IBM Global Technology Services Thought Leadership White Paper December 2011 The New Workplace: Supporting Bring your own 2 The New Workplace: Supporting Bring your own Contents 2 Consumerization takes
More informationMDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
More informationMobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda
Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic
More informationKen Delaney Technology and Management Directions for Smartphones and Tablets
Gartner Webinar 4/7/11 Ken Delaney Technology and Management Directions for Smartphones and Tablets Attempts by businesses to ban, discourage and control the use of these devices have been unenforceable.
More informationCompliance Management for Mobile Devices
Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationAndroid Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationEnterprise on the Go. How enterprises can leverage mobile apps
Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.
More informationBest practices for introducing tablets in your enterprise
E-Guide Best practices for introducing tablets in your enterprise Everyone is buzzing about tablets right now, but how can you tell if this technology makes sense for your organization? This expert e-guide
More informationIndustry Analysis of the Nigerian Mobile Technology Development
Industry Analysis of the Nigerian Mobile Technology Development Presented by Cistematix Ltd. 30 th June, 2011 www.cistematix.com WHY WE ARE HERE TODAY? To deliver a lecture on Industry Analysis of the
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationThe Bring Your Own Device Era:
The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era
More informationFrequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationTHE ENTERPRISE MOBILITY POLICY GUIDEBOOK
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK October 2010 Edition 2 About This Guidebook Research from Strategy Analytics shows that over 90% of organizations now have employees using smartphones within their
More informationHow Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1
How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1 How Do I Set Up My Office 365 Account On An iphone, ipad or ipod Touch?... 3 How Do I Remove My Office 365 Account From A
More informationWrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines
Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines May 2013 Choosing a Mobile Device Had to pass FAA Device Security Hardware
More informationLee Barnes, CTO Utopia Solutions. Utopia Solutions
Mobile Technology Testing Are You Ready? Lee Barnes, CTO Utopia Solutions Agenda 1. Mobile Testing Challenges 2. Mobile Testing Practices 3. Mobile Test Automation 4. Summary and Q & A Mobile Testing Challenges
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationMobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities
Brochure More information from http://www.researchandmarkets.com/reports/3245389/ Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities Description:
More informationPractical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationEmbracing Employee-Acquired Smartphones without Compromising Security
Embracing Employee-Acquired Smartphones without Compromising Security Best practices for managing individual-liable devices with BlackBerry Enterprise Server Express. Table of Contents Introduction 1 BlackBerry
More informationMobile Device. Management-
Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly
More informationCommunity Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager justrong@novell.com
Community Chat MDM Meets Endpoint Mgmt Justin Strong Sr. Product Marketing Manager justrong@novell.com Bryce Romney Product Manager bromney@novell.com The next 45 minutes or so Why is MDM so important
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationThe flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
More informationVodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
More informationSecurity. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationBuilding Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh
Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in
More informationZenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
More informationCreating a Holistic Mobility Strategy Revised Edition. Strategy Analytics Business Mobility Solutions June 2009
Creating a Holistic Mobility Strategy Revised Edition Strategy Analytics Business Mobility Solutions June 2009 Overview Note: This is a revised edition of a document originally produced in November 2008
More informationBlackBerry Universal Device Service. Demo Access. AUTHOR: System4u
Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More information11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
More informationPrac%cal A)acks against Mobile Device Management (MDM) Daniel Brodie Senior Security Researcher Lacoon Mobile Security
Prac%cal A)acks against Mobile Device Management (MDM) Daniel Brodie Senior Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade Focus VulnerabiliAes
More informationMobile Security: Controlling Growing Threats with Mobile Device Management
Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work
More informationDevice Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
More informationHOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS
HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS We know that choosing a cloud service provider is an important decision. Understanding the facts about your provider is essential to setting expectations on
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSmartphones and ipads: mobility blessing or technology support curse?
Smartphones and ipads: mobility blessing or technology support curse? harris.com Smartphones and ipads: mobility blessing or technology support curse? An ipad and a smartphone walk into a building and
More informationServer Settings Mobile Devices
*****This document is intended to be used by faculty and staff only***** Faculty and Staff at Booth can configure their Android, BlackBerry, iphone, Palm webos or other Active Sync device to connect to
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationData Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync
Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync Oxford University Press 2007. All rights reserved. 1 Synchronization software A synchronizer
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More informationWHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT
WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT Executive Summary The explosive growth of worker mobility is driving the rapid adoption of mobile devices
More informationCorporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
More informationMobile Device Management Glossary. www.maas360.com
Mobile Device Management Glossary www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink,
More informationWHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013
WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest
More informationCloud Computing for Education Workshop
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationMorningstar s take on mobile technology for advisors
Morningstar s take on mobile technology for advisors 2015 T3 Conference Advisor Edition February 13, 2015 Mike Barad Head of Product Components & Services Morningstar, Inc. www.linkedin.com/in/mikebarad
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationIntroducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management
Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationCell Phone Operating Systems
Cell Phone Operating Systems The first smartphone was the IBM Simon and was designed in 1992. The phone themselves have changed. The most important changes are in the Operating System (OS) Operating Systems
More informationE-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
More informationMDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
More informationM a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationAndrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationJ David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com)
MDM Solutions Strengths, Weaknesses, Obstacles, Solutions J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com) Nick McSpadden (nick.mcspadden@sacredsf.org)
More informationThe User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
More informationAchieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert
Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in
More informationMobile Checklist: Preparing for Building an Enterprise App
Mobile Checklist: Preparing for Building an Enterprise App Unlike fleeting consumer apps, enterprise mobile applications for a business are transformative. Forward-thinking organizations are eager to take
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationSOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51.
School of Medicine Information Technology Services All newly enrolled School of Medicine students are encouraged to visit the School of Medicine s IT office before orientation to obtain help configuring
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More information