Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Similar documents
Generating leads with Meraki's Systems Manager. Partner Training"

6 Things To Think About Before Implementing BYOD

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

What Is Cisco Mobile Workspace Solution?

Secure Your Mobile Device Access with Cisco BYOD Solutions

Cloud Backup and Recovery for Endpoint Devices

Mobile Device Management

AirWatch Solution Overview

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

The flexible workplace: Unlocking value in the bring your own device era

Working anytime anywhere

BYOD Networks for Kommuner

VMware End User Computing Horizon Suite

BEST PRACTICES IN BYOD

Statement of Direction

BYOD(evice) without BYOI(nsecurity)

IT Enterprise Services

Security and Compliance challenges in Mobile environment

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Mobile and BYOD Strategy

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Mobile device and application management. Speaker Name Date

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Guideline on Safe BYOD Management

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

2011 Forrester Research, Inc. Reproduction Prohibited

Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love

When Computers really become Personal

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

10 Threats to Successful. Enterprise Endpoint Backup

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Systems Manager Cloud Based Mobile Device Management

Hosted Desktop for Business

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Choosing an MDM Platform

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Embracing Complete BYOD Security with MDM and NAC

Welcome to the era of the anywhere worker

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

If you can't beat them - secure them

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Enterpise Mobility Lexicon & Terminology

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

IT Self Service and BYOD Markku A Suistola

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Productive and Secure Enterprise Mobility with Cisco and Citrix

The ForeScout Difference

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

IBM MobileFirst Managed Mobility

Mobile Madness or BYOD Security?

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Roadmap to Solving Enterprise Mobility

Ben Hall Technical Pre-Sales Manager

Readiness Assessments: Vital to Secure Mobility

Total Enterprise Mobility. Norbert Elek

Secure mobility with Citrix & Cisco

Top 10 Reasons Enterprises are Moving Security to the Cloud

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

MAM - Mobile Application Management

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Application Development Best Practices

Matthias Kuemmel, HP Imaging and Printing Group. Date: 24/05/2011

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

ForeScout MDM Enterprise

Chris Boykin VP of Professional Services

Business Case for Virtual Managed Services

The 9 Pillars of Enterprise Mobility

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

The Key Components of a Cloud-Based Unified Communications Offering

Transcription:

Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt,

The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

Embracing mobility is about doing more for your business CEO/organization CIO and IT staff Employees Improve productivity across the organization Improve employee satisfaction Improve talent acquisition & retention Improve data security for a mobile workforce Redirect IT s role to innovation Simplify IT deployment and management Improve IT process & policy adherence Attractive / flexible work environment Improved productivity Broader device choice and OS flexibility Improved ability to innovate & collaborate 3

A flexible enterprise technology is the inevitable outcome of current forces Rise of social media Blurring of work and home The emergence of new mobile devices Changing employee expectations of IT End users now expect: more flexibility more device choices modernized business applications enablement of personal device for business use seamless blending of work and personal lives on one device 5

The face of your new employee Emma Watson Born April 15, 1990 She grew up with the Internet and expects you to give her the access she s always had.

2012 CIO technology priorities Analytics and business intelligence Mobile technologies #2 The priority level of mobility for CIOs Cloud computing (IaaS, PaaS, SaaS) Source: Gartner, CIO priorities, 2012 7

The hype for BYOD Google searches for BYOD are at a peak now what? 8

The redefinition of the work space Moving from To Limited connectivity Always on, anywhere IT chooses the PC Devices that reflect me Primary device is fixed Primary device is mobile One device, multiple tasks Management and security inside the firewall Many devices, many tasks Security and manageability outside the firewall 9

End users will find a way Document sharing Audio/video conference IM & SN Voicemail 21% of mobile workers experienced a security issue related to their smartphone (lost, stolen, hacked, virus) last year 1 7 of 10 employees admitted to knowingly breaking IT policies on a regular basis 2 3 of 5 employees believe they are not responsible for protecting corporate information and devices 2 10 (1) IDC's Worldwide Mobile Worker Population 2009-2013 Forecast (2) Cisco Connected World Technology Report, 2011

83% of IT managers want to manage security of mobile devices What aspects of the mobile devices your employees use do you want to manage? Security (lock/wipe/enforce passwords) Policy (configure wifi, email, VPN) 77% 83% Track and inventory devices 48% App store for corporate apps Location-based security and policy management Manage expenses (calls, data) 33% 30% 30% Other 5% 2012 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 11

The journey to MDM 12

The journey to MDM started with technology Circa 2003 Voice anywhere email anywhere Started in the corporate suites Secure corporate email on smartphone Minimal app support Corporate-only device Completely controlled Closed system Limited ecosystem 13

Apple changed everything in 2007 14

Apple developed the ecosystem Consumers Music anywhere, anytime applications Email was a natural extension Developers Provided APIs and a marketplace for developers to profit Created: 10K ios APIs, 1M ios apps Enterprise Followed by adopting ios devices Caused IT to respond 15

Commoditization of MDM Mobile management is defined by the functions Apple and Google enable 16

Apple dominates the enterprise in tablets It s not yet a Windows or Android world ios/apple is becoming the corporate standard in tablets, somewhat in smartphones But, Windows tablets are brand new and offer advantages in manageability Source: Good Technology, July 2012 17

Mobile management market is maturing Over 100 mobile management companies worldwide consolidation imminent Few standards Mobile devices replacing traditional PCs in the workplace Here is why Cisco bought Meraki for $1.2 billion in cash" Citrix Buys Zenprise: What's Next in BYOD? 18

Where do we want to be and mobile security technologies? 19

Virtuous cycle of systems management 20

Security The biggest challenge Best practice: include a layered security approach Application-level security Containerization, encryption, secure app store, app-based policy enforcement Firewall Protect corporate traffic Operating system Patching, OS-level security solutions like virtualization and containerization Monitoring and reporting Monitor security alerts, periodic reporting Network Encryption over the network Network Monitoring and reporting Application Firewall Operating system 21

Virtualization Deliver virtual desktop as a thin client to all devices for seamless user experience across devices Sensitive data is safe (not on device) Seamlessly switch between devices Anytime anywhere productivity Easy to deploy Provision users in a matter of minutes No offline access Performance limited by network bandwidth Users are moving away from desktop to apps 22

Containerization One or more apps protected by an encrypted container Corporate content is protected Data access is instant (resides on device) Offline access Anytime, anywhere productivity Installation process Decryption slows down data access Point solution not integrated with MDM 23

Personas, VPN, firewalls, partitioning, etc. Multiple disconnected mobile data security technologies Guest operating System Operating system VPN Firewall 24

Other challenges Supporting non enterprise-ready devices is difficult Most popular mobile devices are not enterprise-ready Little or no ecosystem support Inconsistency causes problems Having different solutions for mobile devices and traditional systems can be confusing and difficult to manage Having many different point solutions impedes scalability MDM solutions still maturing On-premise vs. SaaS; MDM vs. MAM Security solutions are still maturing Ecosystem is still very immature 25

On-prem vs. SaaS On-prem Complete solution is local Setup time required Complete control Sensitive content is safe Faster access and better availability Upfront costs; lower TCO SaaS Solution is hosted in cloud Fast deployment No control Security concerns Access speeds and availability dependent on network bandwidth Costs spread across solution lifetime; higher TCO 26

No clear deployment preference Which deployment option do you prefer for a mobile device management solution? It doesn't matter which deployment option is chosen 30% SaaS 11% Appliance 9% Flexible to deploy using any approach 30% On-premise software 20% 27 2012

Enterprise app store: confidently distribute apps Only 14% of companies have an app store Source: Forrester 2012 The enterprise app store Secure data: separate corporate and personal apps Effortlessly manage and deploy corporate apps Mass deploy apps and easily track usage Quickly de-provision users: remove all apps from store Provide users non-it self-help 28

Which IT group will manage MDM? Telecom Many organizations still support mobile devices through telecom Systems Management This group already manages laptops, desktops, servers, and virtual machines Security Some organizations support MDM through security, which manages BES Organizations are looking for integrated solutions An integrated MDM and system management solution is key to evolve into a user-centric management model 29

84% of companies prefer to manage mobile devices through systems management Security 3% Other 5% Communications (i.e. phones) 8% System administration (i.e. desktops and laptops) 84% 2012 30

Manage all devices consistently Today: servers, thin clients, desktops, PCs, tablets, and smartphones Tomorrow s technology: 31

Thank you katie_wiederholt@dell.com