WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013
|
|
- Mary Cunningham
- 8 years ago
- Views:
Transcription
1 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest in solutions that provide mobile workers with the freedom to choose their device while maintaining secure access to corporate information. When it comes to combining corporate and personal use of devices, securing corporate data becomes more important than control of the device. A bring your own device policy is necessary for enterprises that want to support mobile working on multiple mobile operating systems without restricting the personal device characteristics. IDC Sweden Upplandsgatan Stockholm +46-(0) (0) Virtualization technologies have made it possible to use different ways to access enterprise data on devices not completely in the control of IT organizations. Client virtualization technologies create a range of benefits among which one of the major improvements is extending client virtualization accessibility to mobile devices. Containerization is a perfect blend of securing application data and allowing users to own and control their private device. Consumerization of IT and the BYOD trend is not supported fully when using other types of virtualization solutions. Security can be improved by using client virtualization technologies on mobile devices, for example by creating a virtual partition between the corporate and personal data on a mobile device. Companies are looking to simplify matters for users by supporting a single sign-in to the corporate infrastructure on their device including , corporate applications, and intranet all from one corporate front end. Containerization appeals to all sizes of enterprises that allow employees to bring their own device and use it for work. The growing convergence between mobile device management (MDM) and mobile application management (MAM) is creating a new market called mobile enterprise management (MEM). Globally, the MEM market is growing at a CAGR of 31.8% between 2011 and IN THIS WHITE PAPER Enterprises using client virtualization technologies on their computers have found several benefits of supporting desktop workloads. These benefits include improved IT management efficiencies, improved price efficiencies, and improved capabilities. One of the improved capabilities is extending accessibility to mobile devices, giving workers the ability to have a viable network connection wherever they are, making them much more productive regardless of their physical location. Security on these devices is also improved because the data is not downloaded to the local access
2 devices and IT organizations can rest assured that in the event of loss or theft, sensitive information is not compromised. Mobile Container Mobile container solutions come with their own set of benefits and potential challenges for the enterprise. One of the most important characteristics of a container solution is that typically the container is an application that can be downloaded to a device. The fact that they can typically be downloaded to the majority of BYOD devices in the enterprise today is a big benefit for enterprises that do not want to deal with the challenges of maintaining an approved device list. As more and more enterprises adopted BYOD as a standard practice, a new type of solution began to emerge that focused on managing the corporate footprint of information on the device as opposed to being able to manage the entire device platform. Called mobile application management (MAM), this segment of the market has brought with it a slew of new companies focused on this space. However, many of the companies that got started in the MDM space have also added MAM capabilities to their products. There are multiple models for managing corporate data on mobile devices. At first, solutions controlled the entire platform, but with consumerization of IT and the growing number of alternative devices, the model has evolved into device control through configuration using mobile device management. The BYOD trend has made it more critical to focus on securing corporate data rather than controlling the whole device, hence calling it a containerized approach. A third way is to provide online access only, but this solution has both access and performance limitations. Containerized solutions already have traction in the market. For example, Excitor's DME solution combines device management, , and PIM with secure access to corporate applications, corporate app stores, and intranets, within a single secure container. It is accessible through a single sign on, with granular control of access where only authorized applications are accessible by individuals. DME gives users the right access to the right applications. Although containers offer the benefits of device choice and easy deployment, they also have some limitations. From a security perspective, if the device OS is compromised, the container app may also be compromised, but by monitoring usage against mobile device management (MDM) policies, maintained with, for example, Excitor DME, enterprises would be able to recognize this breach and remove access to the enterprise information or wipe the app if necessary and thereby minimize the risk that inherently insecure operating systems can present. SITUATION OVERVIEW The mobile enterprise management software market will include products that offer standalone MDM, standalone MAM, or combined MDM-MAM functionality. The benefit of a combined MDM and MAM solution, such as Excitor's DME, is that they provide a secure solution. A mobile device management solution includes many of the standard features included in PC management solutions in addition to functionality that addresses the unique needs of mobile devices. 2 #IDCWP01V 2013 IDC
3 Some of the key features of a mobile device management solution are: Device provisioning and managing configuration settings Inventory/asset management Software distribution (applications, operating systems [OSs], firmware updates) Remote wipe/lock, remote control for systems diagnostics Policy/compliance management (encryption management, device posture, etc.) Authentication and certificate management Real-time device monitoring, location information, GPS breadcrumbing Reporting and analytics on devices Mobile application management (MAM) refers to a solution by which specific mobile applications can be managed, secured, and distributed by IT organizations and typically allow for enhanced policies to be applied to individual applications. Mobile application management solutions can either supplement MDM functionality or stand alone and typically include some combination of the following features: Management of the application life cycle: Granular application distribution capabilities by group or policy (often through a mobile enterprise application store) Granular security management and corporate policy control of applications and content A Brief History of the MEM Market Over the past several years, the mobile enterprise management market has quickly become a very crowded space in which to play. Today's MEM vendor ecosystem is diverse, with participation from myriad companies across the IT spectrum. The following is a brief history of how the market has evolved: In the early days, the MDM market was dominated by large systems management companies such as IBM, Microsoft, BMC, HP, and a few companies that focused specifically on the management of rugged devices, such as Wavelink and SOTI. These companies primarily provided management of Windows Mobile and perhaps some Palm devices. The other mobile devices in the enterprise were typically BlackBerrys (BBs), managed by the BlackBerry Enterprise Service (BES). Excitor was founded in 2001 as an early innovator in the market. As ios devices entered into the enterprise in , they realized that they were going to need additional solutions to manage a multiplatform enterprise. These solutions needed to be able to manage corporate-owned devices as well as their BYOD devices. Besides remote wipe/lock, security took a backseat to things like inventory management, configuration management, and other typical management functionality that was normal in a solution for PC device 2013 IDC #IDCWP01V 3
4 management. But once the BYOD device flooded the enterprise, security became much more important and a new type of MDM solution was needed. In , the market was flooded with new entrants. Pureplay MDM vendors such as AirWatch and MobileIron became well-known entities. Companies that had previously been focused on adjacent mobility spaces such as Fiberlink, BoxTone, and Zenprise turned their focus to this market. Security vendors such as Symantec, Trend Micro, and McAfee began to offer standalone MDM offerings in addition to their other mobile security products. Systems management players began to reengage and offer new cross-platform management solutions. By 2012, the demand was becoming prevalent to have more than MDM and , such as access to corporate app stores and Intranets within a secure container. In April, Excitor acquired Giritech A/S to further enhance its technology by leveraging Giritech's secure browser and secure connectivity solutions in order to add enterprise applications and portals to its secure container, enabling customers to create their own, secure, corporate appstore. ESSENTIAL GUIDANCE IDC believes that the idea of containerization is one that appeals to companies of all sizes with BYOD strategies in place. Many companies have already deployed mobile containers for access and are now looking for solutions that allow them to extend that secure environment to other applications as well. There is no one-size-fits-all, so here follows a list of considerations that IT should reflect on when it comes to choosing a mobile container/virtualization solution: Pay attention to the end-user experience. If the users don't like it, they will be less likely to leverage the solution you've invested in, thus lowering ROI. Enduser experience includes everything from performance of the app to single sign in, to the entire 'Corporate Container' and all the apps inside it, including swipe functions, to increase acceptability. What kind of devices do you need a solution for? Make sure the solution you choose is applicable to your whole BYOD device population. How do you want to deploy the solution? Does the provider you are evaluating offer both on-premises and cloud solutions? Again, consider integration plans when evaluating deployment methods. Who do you want to buy this from? These solutions are available from software companies, mobile operators, and other key mobile ecosystem providers such as mobile SIs. In addition to being able to offer broad enterprise mobility suites, these providers may also have the ability to host the solution for you. They can also typically provide consulting services around which type of solution is the right one for you and help you develop broader enterprise mobility strategies. 4 #IDCWP01V 2013 IDC
5 CONCLUSION Mobile devices are most commonly utilized to access content, not create it, and so presenting a creation-centric virtual desktop solution is likely to be inefficient and redundant. However, media tablets and new hybrid PCs are becoming more standard all the time and leading to new ways of becoming productivity devices. The importance of user experience in mobile solutions cannot be overstated. At the same time, IT needs to deploy a solution that will meet the needs of the entire BYOD population and provide access to all the applications and data that those users need to do their jobs in a secure manner. Mobile container solutions can be an important piece of this puzzle, but will often be used in conjunction with other mobility products as well. About Excitor Excitor is a Denmark-based enterprise mobility company with approximately 40 employees. The company is privately held and was founded in It has a global reach through a partner network comprising of security resellers, systems integrators, and telecom operators. Excitor offers a product called DME, which is comprised of three components: DME Mobile & PIM, which enables mobile synchronization of ; DME Mobile Device Manager, a solution that offers security of corporate data and DME AppBox, which allows enterprises to deliver corporate app stores to their users and provision mobile intranet access to corporate portals. With G/On from its Giritech acquisition it is possible to expand the solution to any type of remote connection from any device, from anywhere across any network giving users secure access to their applications, computer, virtual desktop, or servers. Excitor's DME offers a secure container approach, meaning security and control policies for personal and corporate data are separated. This feature also allows a company to wipe only the corporate data of a device if it has been lost or stolen. Excitor's April 2012 acquisition of Giritech A/S allowed Excitor to further enhance its technology by leveraging Giritech's secure browser and secure connectivity solutions to the enterprise. DME AppBox is an enterprise application mobilization framework that allows business to manage and deploy business Web-based applications, using DME Secure Browser technology. All corporate data is encrypted within the DME secure container, which prevents data from leaking to third-party private applications on the device. By providing two-factor authentication and 256-bit AES-encrypted communication between the client and the server, DME allows access to multiple Web applications each in a single discrete browser instance. DME AppBox isolates applications and data from a non-appbox browser (e.g., Excitor advocates the cross platform benefits of HTML5 to deliver native-like applications in its secure container on the device) IDC #IDCWP01V 5
6 Copyright Notice External Publication of IDC Information and Data Any IDC information that is to be used in advertising, press releases, or promotional materials requires prior written approval from the appropriate IDC Vice President or Country Manager. A draft of the proposed document should accompany any such request. IDC reserves the right to deny approval of external usage for any reason. Copyright 2013 IDC. Reproduction without written permission is completely forbidden. 6 #IDCWP01V 2013 IDC
I D C M A R K E T S P O T L I G H T. T h e I m p a c t of the Consumerization of IT
I D C M A R K E T S P O T L I G H T M o bile Enterprise Management and Security: T h e I m p a c t of the Consumerization of IT January 2013 Adapted from Worldwide Mobile Enterprise Management Software
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com M A R K E T A N A L Y S I S W o r l d w i d e M o b i l e E n t e r p r i s e M a n a g e m e n t
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationW H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationImplement Mobile Device Management to Deploy HCSS Mobile Apps
Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo Femi@hcss.com Our Goal Understand mobile device management and its benefits Examine different
More informationW o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y 2 0 1 3 2 0 1 7 F o r e c a s t : U n i t e d S t a t e s L e a d s i n A d o p t i o n
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com M A R K E T A N A L Y S I S W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y 2 0 1 3 2
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationMobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt
Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,
More informationIDC MarketScape: Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment Stacy K. Crook THIS IDC MARKETSCAPE EXCERPT FEATURES: GOOD TECHNOLOGY IDC MARKETSCAPE FIGURE FIGURE
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationMulti-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationIDC MarketScape: Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment Stacy K. Crook THIS IDC MARKETSCAPE EXCERPT FEATURES: CITRIX IDC MARKETSCAPE FIGURE FIGURE 1 IDC
More informationEnterprise Mobile Management
Enterprise Mobile Management Enterprise Mobile Management Ben Santing, HP Changing Face of Enterprise Mobility Consumerisation has transformed mobility Line between corporate and private blurring Cloud
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationConsumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011
Consumerization of IT Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 1 Agenda What is consumerization of IT? What s the hype? And why now? Media tablets in the enterprise 2 Is
More informationMOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY
PORTTFOLIO BROCHURE MOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationCA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
More informationMulti-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
More informationAs worldwide growth in the mobility market surges among both business and personal users,
February 2012 Galvin Consulting, LLC EXECUTIVE SUMMARY As worldwide growth in the mobility market surges among both business and personal users, organizations are seeking ways to monitor, manage and secure
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationMulti-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
More informationCritical Capabilities for Mobile Device
Page 1 of 16 for Mobile Device 8 August 2012 ID:G00230106 Analyst(s): Monica Basso, Phillip Redman VIEW SUMMARY Mobile device management offerings are expanding from traditional configurations, policy
More informationThe Future of Mobile Computing
2 The Future of Mobile Computing when you re at a desk Our vision: We see a world where Mobile Computing unleashes boundless opportunity. We believe in a world where you only need one computer The Opportunity:
More informationGlobal Mobile Device Management (MDM) Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3238411/ Global Mobile Device Management (MDM) Market 2015-2019 Description: About MDM MDM (mobile device management) is a tool
More informationThe top five enterprise mobility management vendors: product focus and financials
The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationHow To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationInternet Exchange Between IT and Business Requirements
Mobile Content Becomes a Key Chris Marsh, Principal Analyst, cmarsh@yankeegroup.com Highlights Mobility has reached a critical mass in the workplace. Fifty- seven percent of all employees are using a smartphone
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationI D C M A R K E T S P O T L I G H T. T h e E vo l u t i o n of Enterprise Mobility
I D C M A R K E T S P O T L I G H T T h e E vo l u t i o n of Enterprise Mobility M a nagement: Protection Enables Productivi t y October 2014 Adapted from Worldwide Mobile Enterprise Management Software
More informationCDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT
CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT GETTING CONTROL OF MOBILITY IN THE MARKET In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business
More informationCritical Capabilities for Mobile Device Management
G00230106 Critical Capabilities for Mobile Device Management Published: 8 August 2012 Analyst(s): Monica Basso, Phillip Redman Mobile device management offerings are expanding from traditional configurations,
More informationI D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment
I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise
More informationDell Bring Your Own Device
Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most
More informationIBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
More informationAirWatch by VMware Enables Secure, Flexible SMB BYOD Mobile Device Deployments for Legal Firm Dowling Aaron Inc.
Buyer Case Study AirWatch by VMware Enables Secure, Flexible SMB BYOD Mobile Device Deployments for Legal Firm Dowling Aaron Inc. Christopher Chute IDC OPINION This IDC Buyer Case Study is based on a conversation
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationSPAN. White Paper. Enabling Enterprise Mobility. SPAN Solution Engineering Approach. Introduction
SPAN White Paper SPAN Solution Engineering Approach Introduction The days of being tied to one s desk for long hours to access information and do productive work are gradually decreasing for many as smartphones
More informationAgenda. The Mobile Tornado The Birth of Mobile IT MobileIron Company and Vision The MobileIron Solution Partnering for Success
MobileIron Overview Sid Lazizi. Regional Director South EMEA. slazizi@mobileiron.com Gabriel Vernot. Systems Engineer South EMEA. gvernot@mobileiron.com Agenda The Mobile Tornado The Birth of Mobile IT
More informationEnterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
More informationEnterprise Solution & Business Revolution Enterprise Mobility Management Strategy
Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy PRESENTED BY: Giannis Loussidis EMM Landscape 2 Enterprise Mobility Management Landscape 77% of US and European businesses
More informationPage 1 of 16 for Mobile Device 8 August 2012 ID:G00230106 Analyst(s): Monica Basso, Phillip Redman VIEW SUMMARY Mobile device management offerings are expanding from traditional configurations, policy
More information#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s
#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges
More informationHow to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
More informationEnterprise mobile management a need or an option?
perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile
More informationMobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options
Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationHow End User Experience Management Adds Value to Mobile Device Management. It s All in The Name!
How End User Experience Management Adds Value to Mobile Device Management It s All in The Name! Excellent mobile end user experience drives gains in customer satisfaction and mobile workforce productivity
More informationMobility Solutions for Plant Personnel
Mobility Solutions for Plant Personnel ARC Forum Orlando, February 2014 Greg Gorbach Vice President ARC Advisory Group ggorbach@arcweb.com Introduction Mobile Devices play a key role in industrial operations
More informationF i g u r e 1. Worldwide Business Use of Smartphones 2012-2016
S O L U T I O N S P O T L I G H T Securing Android for the Enterprise December 2013 By Ian Song and Charles Reed Anderson Sponsored by Samsung This Solution Spotlight focuses on providing clarity to confusion
More informationCritical Capabilities for Mobile Device Management
Critical Capabilities for Mobile Device 8 August 2012 ID:G00230106 Analyst(s): Monica Basso, Phillip Redman VIEW SUMMARY Mobile device management offerings are expanding from traditional configurations,
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More informationMOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM
MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM PREPARED BY DANIEL MAYCOCK AND FRED CLARKE SLALOM CONSULTING INTRODUCTION The use of mobile devices in enterprises is
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationSimplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3
Simplifying Mobility Management WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management New solutions for the wireless world If you don t already have a mobility management strategy in
More informationBlank Slide. For additional content
Blank Slide For additional content 1 Merck Boosts Mobile Development and BYOD Flexibility with AirWatch by VMware Michelle Burnett, Enterprise Account Executive, AirWatch by VMware Explosive Growth of
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationIDC ExpertROI SPOTLIGHT
IDC ExpertROI SPOTLIGHT New Relic Yields 314% ROI for Global Technology Manufacturer Sponsored by New Relic Randy Perry September 2013 Overview As this global technology manufacturer has aggressively embraced
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationAirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013
AirWatch Pricing EUR Effective May 15 th, 2013 Expires September 30 th, 2013 Included Included Mobile Device Management Mobile Device Management (MDM) Manage corporate or employee-owned devices, configure
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationEnterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER
Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationExecutive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
More informationSPAN. White Paper. Key Elements of Enterprise Mobility Strategy. Elements of Enterprise Mobility Strategy
SPAN White Paper Key Introduction The rapid adoption of mobile devices coupled with the undeniable benefits of Enterprise Mobility - the use of mobile devices for business, is creating complexity for many
More informationKey Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
More informationEasy, interoperable, high-definition video collaboration in the cloud
BSF AV Consulting Services 27 Burger Road, Midrand, South Africa barry@bsfav.co.za +27 71 423 4444 BSF AV Consulting Services are the leading Consultancy and Managed Services firm in Africa. Currently
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationEnterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationManaging Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
More informationAndroid for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
More informationMobile Device and Application Trends Are Mobile Applications Moving to the Cloud?
White Paper Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud? Sponsored by: Cisco Denise Lund April 2014 IDC OPINION The use of mobile devices across job levels and functions
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
V E N D O R P R O F I L E M o b i l e I r o n P r i v a t e V e n d o r W a t c h l i s t P r o f i l e : A N e w P a r a d i g m f o r M o b i l e D e v i c e M a n a g e m e n t Sean Ryan Stacy K. Crook
More information