Get Tough with Mobile Device Management



Similar documents
We Manage Mobility. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances

device management solutions

What We Do: Simplify Enterprise Mobility

Hands on, field experiences with BYOD. BYOD Seminar

SOTI Inc. Presents. Andrew Aldis - Presale and professional service engineer jayp@soti.net.

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

IT Resource Management & Mobile Data Protection vs. User Empowerment

A CIO s Guide To Mobility Management

Mobile Device Management for CFAES

IT Resource Management vs. User Empowerment

Microsoft Windows Intune: Cloud-based solution

Securing Enterprise Mobility for Greater Competitive Advantage

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P:

Symantec Mobile Management Suite

Bell Mobile Device Management (MDM)

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

DOBUS And SBL Cloud Services Brochure

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Security and Compliance challenges in Mobile environment

6 Things To Think About Before Implementing BYOD

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

BENEFITS OF MOBILE DEVICE MANAGEMENT

How To Manage A Mobile Device Management (Mdm) Solution

Android for Work powered by SOTI

ForeScout MDM Enterprise

PULSE SECURE FOR GOOGLE ANDROID

The ForeScout Difference

Kony Mobile Application Management (MAM)

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Cisco Mobile Collaboration Management Service

Managing Mobility in the BYOD Era:

Symantec Mobile Management for Configuration Manager 7.2

Mobile Testing Preparing for a fast-changing mobile world. Sudheer M, Practice Head - Mobility Testing and Automation

BYOD (Bring Your Own Device)

Symantec Mobile Management 7.2

Endpoint protection for physical and virtual desktops

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

Kaseya White Paper. Managing the Complexity of Today s Hybrid IT Environments

Managing Enterprise Devices and Apps using System Center Configuration Manager

IBM Endpoint Manager for Mobile Devices

Healthcare Buyers Guide: Mobile Device Management

RFI Template for Enterprise MDM Solutions

Kaspersky Security for Mobile

Company Overview. Enterprise Cloud Solutions

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Q1 Labs Corporate Overview

Samsung Mobile Security

Enterprise Mobility Management for Financial Sector

Overview of SOTI.

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Windows Phone 8.1 in the Enterprise

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Mobile Security and Management Opportunities for Telcos and Service Providers

Managing and Securing the Mobile Device Invasion IBM Corporation

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Information & Asset Protection with SIEM and DLP

Symantec Client Management Suite 7.5 powered by Altiris

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Mobile App Containers: Product Or Feature?

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Openbravo Services for Partners

Enterprise Mobility as a Service

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

CentraStage & Apple Configurator

When enterprise mobility strategies are discussed, security is usually one of the first topics

Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise PRODUCT BROCHURE.

What is Security Intelligence?

Feature List for Kaspersky Security for Mobile

Codeproof Mobile Security & SaaS MDM Platform

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Transcription:

Get Tough with Mobile Device Management Franke Martinez Director, Regulated Industries SOTI Shwetank Bharati Director, OEM SOTI Doug Havemann Solutions Architect Panasonic

SOTI is the Worlds Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide. Since 1995, SOTI Inc. has been developing industry - leading technology that solves the unique challenges involved in managing, securing, supporting and tracking mobile devices.

A Pioneer in Mobile Device Management SOTI Optimizes and Grows your Mobility Strategy with an Integrated Management Approach SOTI understands that mobility is complex, and one size does not fit all. SOTI has continuously evolved and developed advanced feature sets to enable enterprises to futureproof their mobility strategy Today, SOTI provides an all-encompassing and integrated approach to device management, regardless of platform

Enterprise Mobility is Changing Fundamental shift is on the horizon new requirements for supporting workforce mobility Adapt new processes and management tools to ensure organizational goals are met and business can meet the rapidly changing market demands Hardware and software innovation are mobilizing core business processes Users are demanding unprecedented access to all business resources from any device and at any location IT is racing to stay ahead of mobile user requests for support

The Ecosystem Continues to Grow User Centric and Aligned to Business Purpose- Built Rugged Ruggedized hardware Specialized functionality Blue collar Long upgrade cycles Purpose built apps Line of Business Focused Mission Critical Corporate Liable Policy driven User experience limited (mostly email, calendar & contacts) White collar Shorter upgrade cycles BYOD Device agnostic Policy driven Consumer driven Shortest upgrade cycle App centric Access to corporate content

Evolution of Mobility Challenges With Enhanced Capability Comes Management Complexity User-Centric How do I secure the device? How do I provision email? How do I push applications to the device? How do I filter apps and the web? How do I connect to enterprise backend? How do I manage network demand? Business-Centric How do I guarantee uptime? How do I meet established SLAs? How do I maintain regulatory compliance? How do I support enterprise capabilities remotely? How do I protect against growing threat vectors? How do I empower rather than restrict?

Top Challenges for the Mobile-Enabled Enterprise INTEGRATION SECURITY MANAGEMENT OPTIMIZATION 54% of companies struggle with application integration across systems 64% of companies struggle to implement secure mobile strategies across endpoints 69% of companies struggle to equally manage all devices and platforms in their mobile environment 81% of companies feel they have not optimized their mobility investments

Today s Mobility Demands Enterprise Grade Support Real-time visibility and control across a diverse number of endpoints Single management console for all devices and operating systems Unification of security and management policies to align with enterprise mobility strategy Full compliment of IT services including Device Security, Device Provisioning, Application Management and Content Management

Best Practices to Get Tough with MDM

It s Time to Get Tough with MDM Step 1: Get Tough with Security Protect using a layered 1approach 2 Step 2: Use Innovation to your Advantage Foolproof and futureproof Step 3: Deliver First-Class End User Support Treat mobile users as first 3class citizens Step 4: Empower Your Mobile Workforce Make Mobility an integral 4part of work flow 5 Step 5: Mitigate Loss and Theft Monitor, enforce, detect, recover

Get Tough with Security Protect using a layered approach As a Best Practice: Ensure integrity and security of device when it s not in use Restrict access to authorized users Protect mobile devices from malware and other software threats Install only trusted applications Your MDM Should: Mandate a complex password policy for corporate liable devices Mandate user re-authentication at a specific interval Employ real-time malware and antivirus protection and remediation from cradle to grave Use application whitelist/blacklist to limit risk

Use Innovation to Your Advantage Foolproof and future-proof As a Best Practice: Automate device policies based on context time of day, location Automate enrollment, provisioning and configuration of new devices Use analytics to take the temperature of device utility Your MDM Should: Provide a rapid deployment and configuration framework to get out of the box faster Use Location Based Services to automate management and security policies Employ deep logging and reporting capabilities to provide real-time analytics on device fleet

Deliver First-Class User Support Treat mobile users as first class citizens As a Best Practice: Don t assume mobile users can solve their own problems Provide users with IT anywhere regardless of device, location, or application Minimize downtime through central management and support Your MDM Should: Allow IT to take the wheel in a remote session to minimize downtime Provide IT a complete toolbox of support features including remote management, application provisioning, and configuration Provide robust reporting to enable IT to be proactive

Empower your Mobile Workforce Make mobile utility an integral part of workflow As a Best Practice: Disable capabilities not necessary for the most important line of business workflows Focus on utility of the solution to maximize productivity Focus on the user put the most-used applications and services at their fingertips Your MDM Should: Be able to provision device in Kiosk mode Employ application whitelisting and blacklisting (disable social networking applications and games) Provide users with easy access to secure Enterprise Applications and Content

Mitigate Loss and Theft Monitor, detect, enforce, recover As a Best Practice: Log identifying attributes of the device and its use (Serial, Model, OS, device logs) Implement a process for timely detection and reporting of device loss or theft Disable and securely wipe devices presumed lost or stolen Your MDM Should: Provide deep asset management and logging capabilities Employ real-time location based asset management policies and enforce out-of-contact policies Use remote lock, backup and wipe to keep data secure

Demonstration

Thank You