BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?



Similar documents
BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

Roadmap to Solving Enterprise Mobility

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License

Solve BYOD with! Workspace as a Service!

Brief History of Enterprise Mobility. Existing Stuff

Mobilize your Enterprise in 60 Minutes!

Top 10 Reasons why VDI is not a good solution for BYOD

Generating leads with Meraki's Systems Manager. Partner Training"

What We Do: Simplify Enterprise Mobility

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Top. Enterprise Reasons to Select kiteworks by Accellion

How To Make Your Computer System More Secure And Secure

Comprehensive Enterprise Mobile Management for ios 8

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Mobile Access Software Blade

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, Product Information Partner Name

IT Self Service and BYOD Markku A Suistola

IBM Cognos Mobile Overview

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Secure Your Mobile Device Access with Cisco BYOD Solutions

How To Protect Your Mobile Devices From Security Threats

AirWatch Solution Overview

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Bring Your Own Device Mobile Security

Systems Manager Cloud Based Mobile Device Management

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

An Overview of Samsung KNOX Active Directory and Group Policy Features

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

Embracing Complete BYOD Security with MDM and NAC

If you can't beat them - secure them

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Total Enterprise Mobility

NCSU SSO. Case Study

FortiAuthenticator. User Authentication and Identity Management. Last Updated: 17 th April Copyright Fortinet Inc. All rights reserved.

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

Mobile Device Security Is there an app for that?

The increasing popularity of mobile devices is rapidly changing how and where we

Athena Mobile Device Management from Symantec

Security Overview Enterprise-Class Secure Mobile File Sharing

When enterprise mobility strategies are discussed, security is usually one of the first topics

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

An Overview of Samsung KNOX Active Directory-based Single Sign-On

SA Series SSL VPN Virtual Appliances

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

New Features: What s new in Windows Intune?

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

ManageEngine Desktop Central. Mobile Device Management User Guide

Advanced Configuration Steps

Key Requirements of Enterprise Mobility Management Solutions

Mobile Device Management

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Kony Mobile Application Management (MAM)

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.0. Document Revision 2.0 Published:

Ben Hall Technical Pre-Sales Manager

Citrix ShareFile Enterprise technical overview

Storgrid EFS Access all of your business information securely from any device

VMware End User Computing Horizon Suite

Dell World Software User Forum 2013

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

STRONGER AUTHENTICATION for CA SiteMinder

Mobile App Containers: Product Or Feature?

Secure BYOD with Enterprise Mobile Management

An Enterprise Approach to Mobile File Access and Sharing

WatchDox Administrator's Guide. Application Version 3.7.5

Vodafone Total Managed Mobility

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

How To Make Files Share Secure (Fss) Work For Corporate Use

Ensuring the security of your mobile business intelligence

ShareFile Enterprise technical overview

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

User Manual for Version Mobile Device Management (MDM) User Manual

Symantec Mobile Management Suite

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Top. Reasons Legal Firms Select kiteworks by Accellion

What Is Cisco Mobile Workspace Solution?

Administering Jive Mobile Apps

Citrix Enterprise Mobility more than just device management (MDM)

Collaborazione a misura d uomo

Transcription:

BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD?

Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile Workspaces Workspot = Workspace as a Service (WaaS) Simplest User Experience No new boxes to install 100% Cloud Control Conclusion Solution Comparison 2"

Harness the Power of BYOD with Mobile Workspaces

We all know mobile will make us more productive Sales Rep can deliver a presentation with an ipad Field Service can access service orders in real time Executive can approve POs from the road Contractors can access SharePoint on their devices 4"

IT needs to harness the power of BYOD Corporate employees have access to 2 Billion devices phones, tablets, PCs There are already more tablets & smartphones than PCs The majority of devices are personal and unmanaged (BYOD) 5"

And Yet, 16 Years Later We Are Still Doing Email 1997 2007 2013 6"

Mobile What: Mobile Enterprise Requirements 90% apps are on-premise 80% are Web apps 15% are Windows apps 6% are Native apps CIFS SharePoint Web Apps Windows Apps 90% customers have CIFS 50%+ have SharePoint * Source: Insights on the Current State of BYOD, Intel s IT Manager Survey, October 2012

What has been solved for BYOD? ü Device Management Web Apps CIFS SharePoint Windows Apps Enterprise Software Delivery (PC Management) MDM ESD * Source: Insights on the Current State of BYOD, Intel s IT Manager Survey, October 2012

Why is MDM not sufficient? Mobile Device Management (MDM) is heavy handed End Users Own Devices IT cannot lock down and impact their experience for personal applications MDM MDM does not help you deliver core business applications and data

Neither is Mobile Application Management (MAM) Mobile Application Management (MAM) has issues similar to wrapping technologies like App-V: App Compatibility: Will the application continue to work after wrapping? Application Support Issues: Who is responsible for supporting the application you, MAM vendor, or ISV? Cross-platform Will the wrapping technology work across Android, ios, and Windows?

BYOD Success Kit How does IT aggregate apps & data? What is the equivalent of the Windows desktop for BYOD?

The Solution is a Workspace for End Users What is a Workspace? - Trusted Space for Enterprise Assets on Device ios, Android, PC, and Mac - Rest of Device Remains Personal 12"

And a Single Pane of Glass for IT One administration console to control the workspace on all end points Set different policies based on different classes of devices Gather compliance data Measure end user experience 13"

It needs to be a 100% Cloud Service Devices are being refreshed multiple times per year IT cannot control the refreshes, since devices belong to end user How do you stay up-to-date without constantly racing to update on-premise infrastructure? Only a 100% Cloud Architecture enables you to keep pace with device refresh 14"

Workspot = Workspace as a Service (WaaS)

Workspot = Workspace as a Service (WaaS) Simplest User Experience No New Boxes to Install 100% Cloud Control Terminal Server Windows Apps VPN Web Apps CIFS SharePoint Native Apps 16"

Mobile User Experience Today Today a mobile user can take minutes to access apps! Typical Mobile User Experience 1. Turn on laptop 2. Fire up VPN 3. Login into VPN 4. Use RSA Token 5. Fire up Browser 6. Login into SharePoint We don t want the same experience on an ipad or an Android phone! 17"

Simplest User Experience Inside the Workspace Applications & Data: Web Apps, CIFS, and SharePoint Offline Documents Seamless SSO into VPN and Applications 18"

Workspot makes it simple to complete workflows Touch SharePoint icon to Access (VPN connection and authentication done transparently in the background) 19"

Network File Share Application provides access to public and personal network file shares - Download documents for offline usage on device - Policies to control whether documents can be opened outside Workspot Confidential and Proprietary 20

Workspot Makes it Simple for IT No New Boxes Have you deployed VPN for remote access? If you have deployed VPN today, you don t need more new infrastructure in your data center. Your remote users already use VPN to access corporate assets from home or on the road. The VPN appliance has been integrated with your corporate authentication mechanism AD & RSA. You have also integrated the VPN appliance with a SSO mechanism like CA Siteminder. Workspot can leverage your existing VPN infrastructure Cisco, Juniper, SonicWall, and F5. 21"

Workspot is 100% Cloud There is no data center installation Workspot Leverages Existing VPN Workspot Leverages Existing Auth (AD/RSA/SSO) 22"

What is 100% Cloud Control? 100% Cloud Multi-tenant One Version of Code Customers are always on latest version Speed of Innovation Customers get new features multiple times a quarter Control Plane Workspot is in the control plane; Separate from data plane No data flows through our cloud No credentials in the cloud No impact on availability if Workspot Control is not available Best performance 23"

Solution Comparison Category Features Workspot Airwatch XenMobile Good Mobile Iron Device Management Email, Wireless, Passcode Control Camera, etc. 100% Cloud for Device Management App Delivery Web, Windows, Native SSO Kerberos, NTLM, CA Siteminder, Oracle idp, SAML 100% Cloud for Application Delivery Data Offline Documents Network File Shares, SharePoint, Video behind firewall 100% Cloud for Data Delivery Security Network, Device, Apps Risk Management Discoverability, Audit, Adaptive Auth 100% Cloud for Risk Management End Point Visibility Real Endpoint User Experience Application Performance Monitoring/Management, Network, Geo 100% Cloud for Performance and Uptime Visibility Proprietary and Confidential" 24"

Learn More About Workspot Email us at sales@workspot.com 25"