Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform



Similar documents
#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

Embracing Complete BYOD Security with MDM and NAC

IBM Cognos Mobile Overview

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Mobile and BYOD Strategy

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Cisco Mobile Collaboration Management Service

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1

Technical Note. ForeScout MDM Data Security

AirWatch Solution Overview

The Maximum Security Marriage:

BYOD (Bring Your Own Device)

Secure Your Enterprise with Usher Mobile Identity

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Ensuring the security of your mobile business intelligence

Total Enterprise Mobility

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Samsung Mobile Security

6 Things To Think About Before Implementing BYOD

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Symantec Mobile Management Suite

The Essential Security Checklist. for Enterprise Endpoint Backup

BRING YOUR OWN DEVICE

The Seven Habits of State-of-the-Art Mobile App Security

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

SysAid MDM User Guide for ios

Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy

The Future of Mobile Device Management

Ensuring the security of your mobile business intelligence

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

How to Successfully Roll Out an Android BYOD Program

SAS Mobile BI Security and the Mobile Device

Workplace-as-a-Service BYOD Management

Take BI Beyond the Desktop! with Oracle BI Mobile App Designer

BYOD: BRING YOUR OWN DEVICE.

IBM United States Software Announcement , dated February 3, 2015

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software

Compliance Management for Mobile Devices

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

The best platform for enterprise mobile apps. MOBILE WHITE PAPER

2011 Forrester Research, Inc. Reproduction Prohibited

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

IT Self Service and BYOD Markku A Suistola

Bring Your Own Device (BYOD) and Mobile Device Management

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

trends and audit considerations

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Guideline on Safe BYOD Management

Your BYOD Strategy Checklist

Secure Your Analytical Insights on the Plane, in the Café and on the Train with SAS Mobile BI

ForeScout MDM Enterprise

IBM MobileFirst Managed Mobility

If you can't beat them - secure them

The ForeScout Difference

Enterprise Mobility How the mobile world drives business

A CIO s Guide To Mobility Management

Mobility Solutions for Plant Personnel

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Enterprise mobility trends 2015 and beyond

Total Enterprise Mobility. Norbert Elek

IT Resource Management vs. User Empowerment

What We Do: Simplify Enterprise Mobility

The flexible workplace: Unlocking value in the bring your own device era

IBM Mobile Security DELIVERING CONFIDENCE. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Mobile Device Management and Security Glossary

MicroStrategy Enterprise Mobile. Increase productivity and efficiency by mobilizing your enterprise today

Mobile App Security Take Any Mobile App and Make It Secure

Transcription:

Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy bkolburn@microstrategy.com

The Mobile Service Line A commitment to Mobile excellence Worldwide perspective on Customer Successes (and failures) Over 100 years of combined Mobile Application experience Bi-directional relationship with MicroStrategy Engineering Committed to helping our customers succeed in every stage of their Mobile Strategy 2

BYOD Agenda What is it? Why do it? Facing the Challenges Implementing BYOD The MicroStrategy Platform Solution Platform Development Security Monitoring Q&A 3

What is BYOD?

What is BYOD and why adopt it? An alternative strategy that allows employees, business partners and other users to use a personally selected and purchased client device to execute enterprise applications and access data. It typically spans smartphones and tablets, but the strategy may also be used for PCs. It may or may not include a subsidy. Gartner (Bring Your Own Device: The Facts and the Future, April 2013) Image Source: rainkingonline.com 5

What is BYOD and why adopt it? Some History and Facts 2009 - Intel, IBM, and other early adopters try variations of BYOD policies 82% of organizations (2014) are making changes to their policies and IT infrastructure to support the proliferation of personal devices * 2014 - State of CA court rules that business calls made on personal devices must be reimbursed. 38% of companies expect to stop providing devices to workers by 2016** 6 * IDG, 2014 ** The 2013 CIO Agenda

Why BYOD? Driven by Users Image Source: BYOD Insights 2013: A Cisco Partner Network Study (March 2013) 62% of U.S. employees who use their own smartphone for work do so everyday 92% of U.S. employees who use their smartphones for work did so this week 7

Why BYOD? Trend towards Personal Device Support -IDG 2014 Enterprise Consumerization of IT 8

Why BYOD? Multiple Employee and Productivity Benefits -IDG 2014 Enterprise Consumerization of IT 9

BYOD Challenges

BYOD Challenges Source: Insights on the Current State of BYOD in the Enterprise, Intel s IT Manager Survey (October 2012) 11

BYOD Challenges Privacy Concerns Source: MobileIron (June 2013) 44% of employees think their companies can see information on their devices, but don t know what that means. 41% think their employers can t see any information at all. 15% are unsure about what their employers can and can t see 12

BYOD Challenges Device Protection Stuff happens and it is not always in our control. 13

BYOD Challenges Data Protection % of Users with Password-protected Phones Image Source: BYOD Insights 2013: A Cisco Partner Network Study (March 2013) Nearly 40% of BYODers don t protect their phones with a password. 52% reported accessing unsecured wi-fi networks with their devices 14

BYOD Challenges Hidden Costs 15

Implementing BYOD

Implementing BYOD 17

Implementing BYOD Approaches 18

Implementing BYOD Eight Steps to Success 1. Look for opportunities throughout the entire workforce where mobility could drive substantial innovation 2. Assess where your organization sits versus others in your industry. Even if you don't plan to embrace BYOD, you need to set expectations for your leadership 3. Decide on how many forms of BYOD you will support 4. Determine when, how, and how much you will subsidize business use of personal devices. 5. Establish clear policies for BYOD qualification, service expectations and the employee's assumed risk 6. Invest in technologies to separate enterprise and personal applications and data 7. Establish user self-support and third-party support options 8. Specify what platforms will be supported and how - Gartner 2014 19

Implementing BYOD Get it right from the start 20

Implementing BYOD MDM Integration Mobile Device Management (MDM) is software to help organizations manage devices connecting into their systems. It secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. Good comparison (also checkout Gartner MDM Magic Quadrant): http://www.enterpriseios.com/wiki/comparison_mdm_providers Be sure your Enterprise Apps can be integrated into your MDM solution The MicroStrategy App can easily be built and rebranded for distribution via MDM solutions. 21

Implementing BYOD Potential pitfalls Mobile-device management (MDM) is considered to be a heavy-handed approach More and more IT professionals have told us that they don't want to manage employee-owned devices. Technologies such as MDM diminish the user experience, which remains the single biggest barrier to adoption. Why do you decide what can I do with my device? - Forrester It s not the DEVICES that need managing; it s the APPS that hold the company s data and enable employees to be more productive 22

Implementing BYOD The MicroStrategy Platform is an ideal solution for MAM Mobile Applications Management (MAM) is a solution which provides the ability to: control the provisioning, updating and removal of mobile applications via an enterprise app store, monitor application performance and usage, and remotely wipe data from managed applications. Core features of mobile application management systems include: MicroStrategy acts as an MAM solution for platform enterprise applications, providing security and monitoring of the applications built within the platform without the need for app wrapping. 23

MicroStrategy Mobile App Platform Brief Overview

The MicroStrategy Mobile App Development Platform Code Free approach to Enterprise Mobile apps Human Resources General Mgmt Sales Force Hiring Employee info Bonuses Hot desk locator Training Mgmt Carbon emissions Time-off request Product sales Expense approval Partner sales T&E tracking Corporate events Quotas Salary Review Pipeline Facilities Services Lead tracking T&E tracking Customer info Churn rate 25

The MicroStrategy Mobile App Development Platform Rapid app deployments through reusable objects Pre-built Widgets Drag-n-Drop Canvas Beautiful Cross-platform Apps Analytics & Visualizations 1. Insert a widget 2. Set location, size, color 3. Set properties 4. Save Done Transactions Multimedia 26

The MicroStrategy Mobile App Development Platform Platform approach versus code approach 27

MicroStrategy 9s with Usher Security A complete data security solution Dematerialize traditional forms of identity into a mobile identity badge Link the mobile badge to its owner with Touch ID Extend the mobile identity to every business process and application 28

MicroStrategy Approach to BYOD Implement BYOD policy with confidence

MicroStrategy Approach to BYOD Industry leading security protocols - built in New for 9s - Usher based app or document level Security! 30

MicroStrategy Approach to BYOD MicroStrategy Certificate Server - Mutual Authentication Workflow MicroStrategy Certificate Server LDAP Server X.509 Certificate Request Firewall CRL Firewall Certificate Revocation List MD HTTPS (AES) MicroStrategy Mobile Server MicroStrategy Intelligence Server DWH 31

MicroStrategy Approach to BYOD Enterprise grade Certificate Server 32

MicroStrategy Approach to BYOD ios App Passcode feature App Passcode Password Based Key Definition AES 33

Monitoring your BYOD program Built in MicroStrategy tools for continuous improvement

Monitoring your BYOD program Data collection starts and stops within the Apps owned by your company and the time users spend on them 35

Monitoring your BYOD program Devices and Usage Profiles Device Information Do we support the the devices people bring in? Are our development targets aligned with our user base? What s the impact they have on performance and UX Usage Information Which Apps get more use? Who uses them and where? What network conditions apply to each app or user? 36

Monitoring your BYOD program What to watch users new returning activity apps view engagement location Devices OS 37

Monitoring your BYOD program A Black Box flight recorder for each app 38

Monitoring your BYOD program Enabling monitoring is easy 39

Monitoring your BYOD program The Panoptes App Monitoring our own Apps and Demos 40

Monitoring your BYOD program 41

Monitoring your BYOD program 42

Monitoring your BYOD program 43

Monitoring your BYOD program 44

Monitoring your BYOD program 45

Monitoring your BYOD program 46

Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy bkolburn@microstrategy.com