Get Tough with Mobile Device Management Franke Martinez Director, Regulated Industries SOTI Shwetank Bharati Director, OEM SOTI Doug Havemann Solutions Architect Panasonic
SOTI is the Worlds Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide. Since 1995, SOTI Inc. has been developing industry - leading technology that solves the unique challenges involved in managing, securing, supporting and tracking mobile devices.
A Pioneer in Mobile Device Management SOTI Optimizes and Grows your Mobility Strategy with an Integrated Management Approach SOTI understands that mobility is complex, and one size does not fit all. SOTI has continuously evolved and developed advanced feature sets to enable enterprises to futureproof their mobility strategy Today, SOTI provides an all-encompassing and integrated approach to device management, regardless of platform
Enterprise Mobility is Changing Fundamental shift is on the horizon new requirements for supporting workforce mobility Adapt new processes and management tools to ensure organizational goals are met and business can meet the rapidly changing market demands Hardware and software innovation are mobilizing core business processes Users are demanding unprecedented access to all business resources from any device and at any location IT is racing to stay ahead of mobile user requests for support
The Ecosystem Continues to Grow User Centric and Aligned to Business Purpose- Built Rugged Ruggedized hardware Specialized functionality Blue collar Long upgrade cycles Purpose built apps Line of Business Focused Mission Critical Corporate Liable Policy driven User experience limited (mostly email, calendar & contacts) White collar Shorter upgrade cycles BYOD Device agnostic Policy driven Consumer driven Shortest upgrade cycle App centric Access to corporate content
Evolution of Mobility Challenges With Enhanced Capability Comes Management Complexity User-Centric How do I secure the device? How do I provision email? How do I push applications to the device? How do I filter apps and the web? How do I connect to enterprise backend? How do I manage network demand? Business-Centric How do I guarantee uptime? How do I meet established SLAs? How do I maintain regulatory compliance? How do I support enterprise capabilities remotely? How do I protect against growing threat vectors? How do I empower rather than restrict?
Top Challenges for the Mobile-Enabled Enterprise INTEGRATION SECURITY MANAGEMENT OPTIMIZATION 54% of companies struggle with application integration across systems 64% of companies struggle to implement secure mobile strategies across endpoints 69% of companies struggle to equally manage all devices and platforms in their mobile environment 81% of companies feel they have not optimized their mobility investments
Today s Mobility Demands Enterprise Grade Support Real-time visibility and control across a diverse number of endpoints Single management console for all devices and operating systems Unification of security and management policies to align with enterprise mobility strategy Full compliment of IT services including Device Security, Device Provisioning, Application Management and Content Management
Best Practices to Get Tough with MDM
It s Time to Get Tough with MDM Step 1: Get Tough with Security Protect using a layered 1approach 2 Step 2: Use Innovation to your Advantage Foolproof and futureproof Step 3: Deliver First-Class End User Support Treat mobile users as first 3class citizens Step 4: Empower Your Mobile Workforce Make Mobility an integral 4part of work flow 5 Step 5: Mitigate Loss and Theft Monitor, enforce, detect, recover
Get Tough with Security Protect using a layered approach As a Best Practice: Ensure integrity and security of device when it s not in use Restrict access to authorized users Protect mobile devices from malware and other software threats Install only trusted applications Your MDM Should: Mandate a complex password policy for corporate liable devices Mandate user re-authentication at a specific interval Employ real-time malware and antivirus protection and remediation from cradle to grave Use application whitelist/blacklist to limit risk
Use Innovation to Your Advantage Foolproof and future-proof As a Best Practice: Automate device policies based on context time of day, location Automate enrollment, provisioning and configuration of new devices Use analytics to take the temperature of device utility Your MDM Should: Provide a rapid deployment and configuration framework to get out of the box faster Use Location Based Services to automate management and security policies Employ deep logging and reporting capabilities to provide real-time analytics on device fleet
Deliver First-Class User Support Treat mobile users as first class citizens As a Best Practice: Don t assume mobile users can solve their own problems Provide users with IT anywhere regardless of device, location, or application Minimize downtime through central management and support Your MDM Should: Allow IT to take the wheel in a remote session to minimize downtime Provide IT a complete toolbox of support features including remote management, application provisioning, and configuration Provide robust reporting to enable IT to be proactive
Empower your Mobile Workforce Make mobile utility an integral part of workflow As a Best Practice: Disable capabilities not necessary for the most important line of business workflows Focus on utility of the solution to maximize productivity Focus on the user put the most-used applications and services at their fingertips Your MDM Should: Be able to provision device in Kiosk mode Employ application whitelisting and blacklisting (disable social networking applications and games) Provide users with easy access to secure Enterprise Applications and Content
Mitigate Loss and Theft Monitor, detect, enforce, recover As a Best Practice: Log identifying attributes of the device and its use (Serial, Model, OS, device logs) Implement a process for timely detection and reporting of device loss or theft Disable and securely wipe devices presumed lost or stolen Your MDM Should: Provide deep asset management and logging capabilities Employ real-time location based asset management policies and enforce out-of-contact policies Use remote lock, backup and wipe to keep data secure
Demonstration
Thank You