Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt,
The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Embracing mobility is about doing more for your business CEO/organization CIO and IT staff Employees Improve productivity across the organization Improve employee satisfaction Improve talent acquisition & retention Improve data security for a mobile workforce Redirect IT s role to innovation Simplify IT deployment and management Improve IT process & policy adherence Attractive / flexible work environment Improved productivity Broader device choice and OS flexibility Improved ability to innovate & collaborate 3
A flexible enterprise technology is the inevitable outcome of current forces Rise of social media Blurring of work and home The emergence of new mobile devices Changing employee expectations of IT End users now expect: more flexibility more device choices modernized business applications enablement of personal device for business use seamless blending of work and personal lives on one device 5
The face of your new employee Emma Watson Born April 15, 1990 She grew up with the Internet and expects you to give her the access she s always had.
2012 CIO technology priorities Analytics and business intelligence Mobile technologies #2 The priority level of mobility for CIOs Cloud computing (IaaS, PaaS, SaaS) Source: Gartner, CIO priorities, 2012 7
The hype for BYOD Google searches for BYOD are at a peak now what? 8
The redefinition of the work space Moving from To Limited connectivity Always on, anywhere IT chooses the PC Devices that reflect me Primary device is fixed Primary device is mobile One device, multiple tasks Management and security inside the firewall Many devices, many tasks Security and manageability outside the firewall 9
End users will find a way Document sharing Audio/video conference IM & SN Voicemail 21% of mobile workers experienced a security issue related to their smartphone (lost, stolen, hacked, virus) last year 1 7 of 10 employees admitted to knowingly breaking IT policies on a regular basis 2 3 of 5 employees believe they are not responsible for protecting corporate information and devices 2 10 (1) IDC's Worldwide Mobile Worker Population 2009-2013 Forecast (2) Cisco Connected World Technology Report, 2011
83% of IT managers want to manage security of mobile devices What aspects of the mobile devices your employees use do you want to manage? Security (lock/wipe/enforce passwords) Policy (configure wifi, email, VPN) 77% 83% Track and inventory devices 48% App store for corporate apps Location-based security and policy management Manage expenses (calls, data) 33% 30% 30% Other 5% 2012 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 11
The journey to MDM 12
The journey to MDM started with technology Circa 2003 Voice anywhere email anywhere Started in the corporate suites Secure corporate email on smartphone Minimal app support Corporate-only device Completely controlled Closed system Limited ecosystem 13
Apple changed everything in 2007 14
Apple developed the ecosystem Consumers Music anywhere, anytime applications Email was a natural extension Developers Provided APIs and a marketplace for developers to profit Created: 10K ios APIs, 1M ios apps Enterprise Followed by adopting ios devices Caused IT to respond 15
Commoditization of MDM Mobile management is defined by the functions Apple and Google enable 16
Apple dominates the enterprise in tablets It s not yet a Windows or Android world ios/apple is becoming the corporate standard in tablets, somewhat in smartphones But, Windows tablets are brand new and offer advantages in manageability Source: Good Technology, July 2012 17
Mobile management market is maturing Over 100 mobile management companies worldwide consolidation imminent Few standards Mobile devices replacing traditional PCs in the workplace Here is why Cisco bought Meraki for $1.2 billion in cash" Citrix Buys Zenprise: What's Next in BYOD? 18
Where do we want to be and mobile security technologies? 19
Virtuous cycle of systems management 20
Security The biggest challenge Best practice: include a layered security approach Application-level security Containerization, encryption, secure app store, app-based policy enforcement Firewall Protect corporate traffic Operating system Patching, OS-level security solutions like virtualization and containerization Monitoring and reporting Monitor security alerts, periodic reporting Network Encryption over the network Network Monitoring and reporting Application Firewall Operating system 21
Virtualization Deliver virtual desktop as a thin client to all devices for seamless user experience across devices Sensitive data is safe (not on device) Seamlessly switch between devices Anytime anywhere productivity Easy to deploy Provision users in a matter of minutes No offline access Performance limited by network bandwidth Users are moving away from desktop to apps 22
Containerization One or more apps protected by an encrypted container Corporate content is protected Data access is instant (resides on device) Offline access Anytime, anywhere productivity Installation process Decryption slows down data access Point solution not integrated with MDM 23
Personas, VPN, firewalls, partitioning, etc. Multiple disconnected mobile data security technologies Guest operating System Operating system VPN Firewall 24
Other challenges Supporting non enterprise-ready devices is difficult Most popular mobile devices are not enterprise-ready Little or no ecosystem support Inconsistency causes problems Having different solutions for mobile devices and traditional systems can be confusing and difficult to manage Having many different point solutions impedes scalability MDM solutions still maturing On-premise vs. SaaS; MDM vs. MAM Security solutions are still maturing Ecosystem is still very immature 25
On-prem vs. SaaS On-prem Complete solution is local Setup time required Complete control Sensitive content is safe Faster access and better availability Upfront costs; lower TCO SaaS Solution is hosted in cloud Fast deployment No control Security concerns Access speeds and availability dependent on network bandwidth Costs spread across solution lifetime; higher TCO 26
No clear deployment preference Which deployment option do you prefer for a mobile device management solution? It doesn't matter which deployment option is chosen 30% SaaS 11% Appliance 9% Flexible to deploy using any approach 30% On-premise software 20% 27 2012
Enterprise app store: confidently distribute apps Only 14% of companies have an app store Source: Forrester 2012 The enterprise app store Secure data: separate corporate and personal apps Effortlessly manage and deploy corporate apps Mass deploy apps and easily track usage Quickly de-provision users: remove all apps from store Provide users non-it self-help 28
Which IT group will manage MDM? Telecom Many organizations still support mobile devices through telecom Systems Management This group already manages laptops, desktops, servers, and virtual machines Security Some organizations support MDM through security, which manages BES Organizations are looking for integrated solutions An integrated MDM and system management solution is key to evolve into a user-centric management model 29
84% of companies prefer to manage mobile devices through systems management Security 3% Other 5% Communications (i.e. phones) 8% System administration (i.e. desktops and laptops) 84% 2012 30
Manage all devices consistently Today: servers, thin clients, desktops, PCs, tablets, and smartphones Tomorrow s technology: 31
Thank you katie_wiederholt@dell.com