IT Self Service and BYOD Markku A Suistola



Similar documents
Mobile App Management:

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Symantec Mobile Management Suite

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Embracing Complete BYOD Security with MDM and NAC

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

AirWatch Solution Overview

Athena Mobile Device Management from Symantec

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.2

How To Manage A Mobile Device Management (Mdm) Solution

Choosing an MDM Platform

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

Risk and threats everywhere, all the time

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

MAM - Mobile Application Management

Symantec Mobile Management 7.1

Secure Your Mobile Workplace

IT Resource Management & Mobile Data Protection vs. User Empowerment

Best Practices for a BYOD World

What We Do: Simplify Enterprise Mobility

Secure, Centralized, Simple

Symantec Mobile Management 7.1

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

IBM Cognos Mobile Overview

CHOOSING AN MDM PLATFORM

Mobile Security and Management Opportunities for Telcos and Service Providers

Cisco Mobile Collaboration Management Service

When enterprise mobility strategies are discussed, security is usually one of the first topics

Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

ForeScout MDM Enterprise

If you can't beat them - secure them

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

The ForeScout Difference

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

IT Resource Management vs. User Empowerment

Solve BYOD with! Workspace as a Service!

Managing and Securing the Mobile Device Invasion IBM Corporation

Enterprise Mobility Services

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Healthcare Buyers Guide: Mobile Device Management

Advanced Configuration Steps

IBM MobileFirst Managed Mobility

#ITtrends #ITTRENDS SYMANTEC VISION

How To Support Bring Your Own Device (Byod)

Ben Hall Technical Pre-Sales Manager

Kony Mobile Application Management (MAM)

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Sophos Mobile Control

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

The Maximum Security Marriage:

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

BYOD Guidance: BlackBerry Secure Work Space

Architecture of Enterprise Mobile Apps

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Okta Mobility Management

Mobile device and application management. Speaker Name Date

Chris Boykin VP of Professional Services

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

MobileIron and Samsung Value Proposition

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Total Enterprise Mobility

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Technical Note. ForeScout MDM Data Security

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

Secure mobility with Citrix & Cisco

Securing Enterprise Mobility for Greater Competitive Advantage

Managing Mobility in the BYOD Era:

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Unified Windows Device Management in the Enterprise

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

RFI Template for Enterprise MDM Solutions

Mobile First Government

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

BENEFITS OF MOBILE DEVICE MANAGEMENT

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Transcription:

IT Self Service and BYOD Markku A Suistola Principal Presales Consultant

Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling and empowering end users to solve their own IT problems, thereby allowing support organizations to gain efficiencies through a reduced incident and request workload. However, building a best-in-class IT self-service portal does not guarantee that end users will utilize it. The 4 Myths: IT self-service reduces costs IT self-service is a one-time investment End users will flock to self-service IT self-service is easy to implement ** "Addressing IT Self-Service Myths and Realities for Successful Implementations." The report is available on Gartner's website at http://www.gartner.com/resid=1409913.

Four Myths Surrounding IT Self-Service 1. IT self-service reduces costs Reality: IT self-service will reduce Level 1 support. Self-service works well only for specific record types (mainly how-to requests, FAQs and password resets) Implementing self-service will reduce volume for these call types 2. IT self-service is a one-time investment Reality: IT self-service requires constant care and feeding. End users perceived value from the offering is critical Maintenance of the knowledge base where articles need continuous updating is very important

Four Myths Surrounding IT Self-Service 3. End users will flock to self-service Reality: End-user acceptance varies greatly Organizations are likely to find that the first-year adoption rate can be very low. Factors that can include an organization's demographics (groups like engineers vs. end users who are not sophisticated computer users) 4. IT self-service is easy to implement Reality: The right "companion" tools and processes are prerequisites for a successful implementation. Incorrect handling of knowledge, process problems or other technical roadblock issues prevent support organization from keeping the site easy to use. The two most frequent call types are how-to requests (how to access or operate IT resources) and password reset (establishing or regaining the privilege to access IT resources)

The Evolution of the Workspace Our Vision Cloud Services Device User Location Securely manage and deliver any service to any user in any location Data Virtual Desktops Apps Mobile Devices Our Mission Lead the way from device centric to user centric management 5

Revolution in Systems Management Device Centric User Centric Software Device Cloud Services User Device Device User User Location Patches Location Data Virtual Desktops Apps Mobile Devices Standardization IT Delivered Services Stationary On-Premise Consumerization Self Service Mobility Cloud Services 6

Full Control Info/App Access Only Managed Unmanaged Consumerization is Driving disruption Sources: IDC: 227941 and 227367) Gartner: G00212068, Apr 2011 Data Sources: Gartner, & IDC Evolving Focus 246M Corp PCs 293M Personal PCs 819M Smartphones 116M Tablets Relevent Devices Today Future Devices 177M Corp PCs 300M Smartphones 15M Tablets Traditional Focus Corporate-Owned Personally-Owned Devices 7

Capability Evolution of Mobility at corporates Mobile Information Management (MIM) Security and management of corporate apps, data & content Mobile Application Management (MAM) App distribution and user access management Mobile Device Management (MDM) Add Blackberry-like controls for other mobile devices Legacy Mobile Management Corporate lockdown for Blackberry & Windows devices Time Technology Days 2013 8

Managed Unmanaged BYOD is all about enabling IT Self Service Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Device Company Controls Personal Device Company-owned Personally-owned 9

Symantec Mobile Management ENABLE SECURE MANAGE Activate enterprise access easily and automatically Protect enterprise data and infrastructure Control inventory and configuration 10

Comprehensive Device Management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute Apps In-house apps or public-store apps Docs, videos any active content Group based management Manage Assets Centralized visibility and control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe and Full wipe 11

Mobile Application Management (MAM) Comprehensive App Wrapping Tech App Store Repository for internal and external mobile applications App Policy Protect app against data loss through encryption, removal control and separation of corporate data Content Center DLP policy to control confidential data access 12

Symantec App Center Mobile App & Data Protection SYMANTEC APP CENTER App deployment & provisioning User authentication across apps Copy & paste prevention Per app file encryption Remote data/app wipe ios & Android support 13

Comprehensive Mobile App Management Deploy Apps Enterprise app store for internal apps Recommendations from public appstore Group based targeting Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Manage Lifecycle Revoke and update apps selectively Centralized visibility & control MDM features for policy management Protect Data Security & Management layer around data, Passwords, encryption, offline access, rooting detection Separate corporate and personal data 14

Same security as Sandboxing, But more flexible.ipa or.apk file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 15

Business and Personal Apps and Data Co-exist 16

Appcenter Version 4.1 Est Availability: Q1CY13** Simpler, secured end user experience: Single sign on across apps Expand authentication source to O3 and Siteminder Secure connectivity: Enforce a secure SSL connection Block apps from going to unauthorized sites Secure email: Secure corporate email with NitroDesk integration Extend MDM capabilities ** This is roadmap information may change without prior notice. 17

App-Centric World END USERS ENTERPRISES NATIVE APPS Percentage of time spent on native apps vs. web apps LINE OF BUSINESS APPS Percentage of enterprises running line of business apps NUMBER OF APPS On a end-users s device on average ENTERPRISE APPS Percentage of enterprises developing custom apps Your users and your competitors are ready. Are you? 18

Demo

App Secure Connect: Ensure apps comply w/ secure connectivity requirements** New per app wrap policy: Blocks apps from going to unauthorized sites (whitelist) Require SSL / Trusted Certs Connect to O3 and generic internet facing proxies Scope: ios only Does not terminate to VPNs Not a Symantec provided proxy Internet Wrapped App O3/Proxy App Server 1 www.takemydata.com App Server 2 ** This is roadmap information may change without prior notice. 20

Benefit Feature Secure corporate email with secure client: Nitrodesk Touchdown integration for ios and Android** Configure multiple policies to tailor NDTD settings to needs of each group (MDM not required) EAS server and user name Passcode requirements Require SSL Email copy and paste restrictions Contact copy prevention Widget controls Synchronization and attachment size limits Licensing Note: Not Symantec branded, not wrapped. ios version not resold via Symantec. Safeguards email, calendar, address book, to-do list in a secure client Simplifies deployment and ease of use by not requiring MDM ** This is roadmap information may change without prior notice. 21

Enterprise Mobility 6 Month Roadmap** 1 Consolidating Device Management and App Security 2 Expansion Through Our Ecosystem 3 Advancing Mobile App & Data Protection MAM and MDM in one solution First phase of providing an integrated Mobile Management Suite solution Simpler, secured end user experience Single sign on O3 and Siteminder integration Secure app connectivity for ios Enforce a secure SSL connection Block apps from going to unauthorized sites Secure email NitroDesk integration Wrapping and distribution for commercial apps ios wrap kit for commercial app vendors Tier one productivity apps: email, browser, office/pdf, file sharing Inter-App Data sharing Secure sharing of data between wrapped apps Secure Cut, Copy, and Paste Secure Open With Secure app connectivity Symantec proxy Termination with VPNs Native email protection Control access to email Protect information delivered to mobile devices App Center as a platform rebranding and UI Refresh Continued MDM Advancements and App Suites ** This is roadmap information may change without prior notice. 22

IT Self Service / Peter Giesa from Telecity

Presentation Identifie Goes Here

Thank you! Markku A Suistola Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.