Thanks for joining We ll start at 10am



Similar documents
LabTech Mobile Device Management Overview

ipad in Business Mobile Device Management

Feature List for Kaspersky Security for Mobile

iphone in Business Mobile Device Management

Deploying iphone and ipad Mobile Device Management

Mobility Challenges & Trends The Financial Services Point Of View

When enterprise mobility strategies are discussed, security is usually one of the first topics

Symantec Mobile Management 7.2

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Mobile Device Management for CFAES

Symantec Mobile Management for Configuration Manager 7.2

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Systems Manager Cloud Based Mobile Device Management

Symantec Mobile Management 7.1

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

A guide to enterprise mobile device management.

Dell World Software User Forum 2013

Symantec Mobile Management 7.1

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Mobile Device Management and Security Glossary

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

The ForeScout Difference

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Cisco Mobile Collaboration Management Service

MaaS360 Mobile Device Management (MDM) Administrators Guide

Sophos Mobile Control Technical Guide. Product version: 3

Mobile Device Management Version 8. Last updated:

ForeScout MDM Enterprise

Systems Manager Cloud-Based Enterprise Mobility Management

Sophos Mobile Control Administrator guide. Product version: 3

Copyright 2013, 3CX Ltd.

McAfee Enterprise Mobility Management

Cloud Services MDM. ios User Guide

Chris Boykin VP of Professional Services

Norton Mobile Privacy Notice

Sophos Mobile Control Technical Guide. Product version: 3.5

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Good for Enterprise Good Dynamics

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

Junos Pulse for Google Android

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Athena Mobile Device Management from Symantec

MDM Mobile Device Management

IBM United States Software Announcement , dated February 3, 2015

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Sophos Mobile Control Administrator guide. Product version: 3.6

Managing and Securing the Mobile Device Invasion IBM Corporation

Advanced Configuration Steps

The Future of Mobile Device Management

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Ben Hall Technical Pre-Sales Manager

Enterprise Mobility as a Service

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

The User is Evolving. July 12, 2011

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

System Configuration and Deployment Guide

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Mobile Device Management Glossary.

Absolute Manage MDM. John Wu Systems Engineer

Total Enterprise Mobility

Bell Mobile Device Management (MDM)

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

Remote MasterMind 4.0

PMDP is simple to set up, start using, and maintain

M a as3 6 0 fo r M o bile D evice s

Fromdistance MDM. Setting the standard in device management

Kaspersky Security for Mobile

Ensuring the security of your mobile business intelligence

ManageEngine Desktop Central. Mobile Device Management User Guide

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Mobile Security Mobile Device Management Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Mobile Device Strategy

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Kaseya 2. User Guide. Version 1.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

PULSE SECURE FOR GOOGLE ANDROID

Kaspersky Lab Mobile Device Management Deployment Guide

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision , Juniper Networks, Inc.

AirWatch for Android Devices

Secure Your Mobile Workplace

AirWatch for ios Devices

Zenprise Device Manager 6.1.5

ONE Mail Direct for Mobile Devices

Transcription:

Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy

Mobile Device Management Learn the basics to build your MDM Strategy

Poll Question #1 3 of 39

Mobile Device Management Agenda Trends & Challenges Building a Mobility Device Management strategy Specific Elements of MDM Vendor Assessment Looking Forward More Information 4 of 39

Mobility Trends Device Evolution 2000 2004 2010 2002 2007??? 5 of 39

Shifting to Mobile Devices It s arguable that smartphone capability has evolved faster than any other technology over the past five years. As smartphones continue to develop, it will become possible to use them as primary work devices. Forrester s Mobility Powers The Next Growth for Unified Communications 2010 6 of 39

Poll Question #2 7 of 39

Can I connect my to the network? Mobility Trends Enterprises will buy 50x as many tablets in 2011. - Canalys Market Research Can we get for the classroom? I want one! Consumer to Enterprise Top 4 control 89% of the market: Android Apple RIM (Blackberry) Symbian 8 of 39

Mobile Device Management: Challenges 1. Costs 2. Usability 3. Maintenance Management is not centralized Don t have dedicated people or policies to manage devices Your current software does not manage mobile devices Under IT Control Data Center Bypass IT Control Laptops & Desktops Mobile Devices 9 of 39

Building your MDM Strategy A holistic mobility strategy: It must encompass both Organizational needs and IT requirements Analysis of the total cost of ownership Strategic plan for managing both the devices and their applications www.strategyanalytics.com (p4 - diagram) 10 of 39

Vendor Assessment MDM Solutions address and support each platform differently Does solution manage multiple device types? Android support is still maturing Blackberry support still needed Are Reporting tools included? What is the solution key management focus? 11 of 39

Vendor Assessment Viability and Longevity of Vendor Configuration Complexity Learning Curve 12 of 39

Elements of MDM Security Management Software Distribution Policy Management Inventory Management Service Management Classroom Management * It takes multiple types of software to address a full solution 13 of 39

Elements of MDM Security Management Software Distribution Policy Management Inventory Management Service Management Classroom Management * It takes multiple types of software to address a full solution 14 of 39

Security Management Device security, authentication and encryption. Do you need to? Real-time protection updated automatically Scans files received over all network connections Full control of alerts/logging Blacklist filtering (voice/sms) Automatic denial for unknown or unwanted calls Application inventory and removal Monitor SMS, MMS, email message content Alerts on detection Default (high/low) filtering options + customizable Remote alarm/notification and SIM change notification GPS Locate/Track and Device Backup/Restore View call log, photos, address book and contacts On-demand scans of all memory Automatic Inbound/Outbound Port+IP Filtering 15 of 39

Enterprise Risks from Smartphones 2,000,000 smartphones stolen in US in 2008 Out of smartphone users, 80% store personal information 40% do not have a basic password 25% store bank account details 10% store credit card info Source: Smartphone Security: A Modern Day Pandora s Box Burton Group, Dec 2009 16 of 39

Mobile Security Management Device Management Antivirus, Firewall & Anti-Spam Loss/Theft Protection Content Control Blocking & Filtering with reporting Supported without VPN / Cloud-based for remote users Integrates with search engines, Active Directory, LDAP and Open Directory Access Control Role-based capabilities Integration to Remote Access/VPN 17 of 39

Security Management Example: Junos Pulse Range of app access requirements Data in Transit Security Enterprise-user app portal Dynamic role-based app menu Provisioned via app stores Designed for minimal user interaction Autoboot upon device restart Junos Pulse Client SA Series SSL VPN Gateway Dedicated or Virtual Appliance Deployment Junos Pulse Mobile Security Gateway Hosted Services Deployment Corporate Applications (of any type) Datacenter 18 of 39

Elements of MDM Security Management Software Distribution Policy Management Inventory Management Service Management Classroom Management * It takes multiple types of software to address a full solution 19 of 39

Software Distribution Deploy, install, update, delete or block. Do you need to? Secure Distribution and update of in-house apps Access control for distributed in-house apps Recommended App Store apps Control unapproved apps Inventory of installed apps Reporting on software distribution and versioning Rogue app protection Internal App Store * Mandated presence of mission-critical apps Track installed apps 20 of 39

Software Distribution Example: Mobile Iron Applications: Published Installed Blocked Files: Distributed Blocked Recent Apps: Blocked Installed by User Installed by IT 21 of 39

Elements of MDM Security Management Software Distribution Policy Management Inventory Management Service Management Classroom Management * It takes multiple types of software to address a full solution 22 of 39

Policy Management Development, control and operations of enterprise mobile policy Require Passcode Maximum passcode age Do you need to? Number of failed attempts before wipe Allowable Applications enforcement Password complexity requirements Number of unique passcodes before reuse Grace period for device lock Time before auto-lock Browser security preferences Automatic sync of mail account when roaming Allow/Disallow Application installs Data Roaming setting (on/off) 23 of 39

Apps Blacklist Model Blacklist Operating System Blacklist Remove MCM Wipe Device Send SMS Disable Exchange ActiveSync Policy Management Example: Air Watch 24 of 39

Elements of MDM Security Management Software Distribution Policy Management Inventory Management Service Management Classroom Management * It takes multiple types of software to address a full solution 25 of 39

Inventory Management Tracking, Reporting, Dashboards, Analysis Do you need to? Detailed reporting of asset information Serial Numbers Model Name and Number OS Version Device Name Unique Device Identifier Capacity and Space Available Firmware Version Battery Status IP Address 26 of 39

Inventory Management Example: Symantec Mobile Management Unique Device Identifier (UDID) Device Name ios and build version Model name and number Serial number Capacity and space available Firmware version 27 of 39

Elements of MDM Software Distribution Policy Management Inventory Management Security Management Service Management Classroom Management * It takes multiple types of software to address a full solution 28 of 39

Service Management Provider Service Monitoring and Analysis Do you need to? Proactive monitoring of outages Roaming Usage Monitoring of dropped calls WiFi Speed Cell Data Speed GPS Location mapping SMS (Text) Usage Report most Active Users Report Data Used Carrier Comparison 29 of 39

Service Management Example: Mobile Iron 30 of 39

Elements of MDM Software Distribution Policy Management Inventory Management Security Management Service Management Classroom Management * It takes multiple types of software to address a full solution 31 of 39

Classroom Management Student/Teacher devices in a learning environment. Chat with Student Do you need to? Limit Web Browsing Assess Student Progress with True/False and Multiple-Choice Questions Ability for Student to vote on things Assess Student Progress with True/False and Multiple-Choice Questions Limit Applications Real-Time results and announcements Send Students a message Monitor Battery Level Monitor Students** (GitHub ios Streaminb Browser) 32 of 39

Classroom Management Example: LANSchool Send Student a Message Chat with Student True/False and Multiple Choice Questions Ability for Student to vote 33 of 39

Classroom Management Example: github ios Streaming Browser https://github.com/rubelw/ios-streaming-browser Must be comfortable with Code to install Monitor Student Browser Activity Application level filtering 34 of 39

Classroom/Meeting Management Example: Conference Pad For ipad Display a PDF with up to 15 devices Devices sync to page turning, pinch to zoom, laser pointer BlueTooth and WiFi support Send files via app or itunes File Sharing Support for external screens 35 of 39

Device Management Many Features more Generic Example: Sybase 36 of 39

Device Management Many Features more Generic Example: Symantec 37 of 39

Next Steps Figure out what you need/your purpose How do you want to use them What features you want make a list Be aware of your environment Understand pros & cons Think Big Picture 38 of 39

More Information MD, PA, DE - ED, LG MD, VA ED, LG MD - State Government Rick Fairhurst Account Executive rfairhurst@datanetworks.com 800-283-6387, ext. 3020 Dave McIntosh Account Executive dmcintosh@datanetworks.com 800-283-6387, ext. 3048 Robert White Account Executive rwhite@datanetworks.com 800-283-6387, ext. 3015 NC Named Accounts Jennifer Hillesland Account Executive jhillesland@datanetworks.com 919-270-0318 NC, SC - ED, SLG Patrick Flanagan Account Executive pflanagan@datanetworks.com 336-317-6861 QUESTIONS? Kelly Marshall Marketing Manager kmarshall@datanetworks.com 800-283-6387 x3058 39 of 39