#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

Similar documents
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform

AirWatch Solution Overview

W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

IBM Cognos Mobile Overview

IT Self Service and BYOD Markku A Suistola

The Endpoint Evolution Mobility

Total Enterprise Mobility

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

ForeScout MDM Enterprise

Mobile Device Management for CFAES

The ForeScout Difference

Embracing Complete BYOD Security with MDM and NAC

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

If you can't beat them - secure them

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

The Maximum Security Marriage:

Protecting Corporate Data in the "BYOD" Environment

Mobile and BYOD Strategy

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM

Ensuring the security of your mobile business intelligence

BRING YOUR OWN DEVICE

What We Do: Simplify Enterprise Mobility

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Guideline on Safe BYOD Management

MAM - Mobile Application Management

Workplace-as-a-Service BYOD Management

BEST PRACTICES IN BYOD

MicroStrategy Enterprise Mobile. Increase productivity and efficiency by mobilizing your enterprise today

The Future of Mobile Device Management

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Cisco Mobile Collaboration Management Service

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

The Future of Mobile Computing

Kony Mobile Application Management (MAM)

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Chris Boykin VP of Professional Services

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

Bring Your Own Device Mobile Security

The Challenges Posed by BYOD.

Enterprise Mobility Management

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

Mobile Access Software Blade

Configure AirWatch for Your Mobile Device

allchoice We are XMA. Empowering employee device choice within the workplace

Samsung Mobile Security

Technical Note. ForeScout MDM Data Security

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

MicroStrategy Enterprise Mobile. Increase productivity and efficiency by mobilizing your enterprise today

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

WHITE PAPER. Addressing the Five Requirements of BYOD for Mobile Unified Communications

Symantec Mobile Management Suite

How To Protect Your Mobile Devices From Security Threats

Mobile Device Management. Andrius Šaveiko

The Seven Habits of State-of-the-Art Mobile App Security

Mobile Madness or BYOD Security?

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Tuesday, June 5, 12. Mobile Device Usage

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Insert Partner logo here. Financial Mobility Balancing Security and Success

The Bring Your Own Device Era:

Total Enterprise Mobility. Norbert Elek

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

How to Successfully Roll Out an Android BYOD Program

Compliance Management for Mobile Devices

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Designing Enterprise Mobility

Apple has been popularized by businesses and their employees as they continue to utilize

When enterprise mobility strategies are discussed, security is usually one of the first topics

IT Enterprise Services

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

IBM United States Software Announcement , dated February 3, 2015

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Generating leads with Meraki's Systems Manager. Partner Training"

SAS Mobile BI Security and the Mobile Device

Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love

A CIO s Guide To Mobility Management

IT Resource Management vs. User Empowerment

How To Manage A Mobile Device Management (Mdm) Solution

trends and audit considerations

BYOD (Bring Your Own Device)

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013

The best platform for enterprise mobile apps. MOBILE WHITE PAPER

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Enterprise Mobility Services

Mobile Security Mobile Device Management Mobile Application Management

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

AirWatch for ios Devices

Transcription:

#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA

BYOD Agenda What is BYOD? Why BYOD? Challenges What makes up a BYOD program? The MicroStrategy Platform Solution Platform Development Security Monitoring Value Q&A #mstrworld 2

What is BYOD? Defining the Mobile Trend

What is BYOD? One Possible Definition! An alternative strategy that allows employees, business partners and other users to use a personally selected and purchased client device to execute enterprise applications and access data. It typically spans smartphones and tablets, but the strategy may also be used for PCs. It may or may not include a subsidy.! Gartner (Bring Your Own Device: The Facts and the Future, April 2013) Image Source: rainkingonline.com #mstrworld 4

What is BYOD? A brief history References to BYOD as early at 2005! In 2009, companies like Intel began embracing the trend and establishing programs realizing benefits from cost savings to greater productivity! Since the early smartphone, BYOD has been an emerging trend due to the improvement of network and data capabilities, the consumer demand for mobile and the convenience of using personal devices at work! Primarily a consumer-driven trend, but as companies consider the benefits, the enterprise demand is growing! Predictions are that 38% of companies expect to stop providing devices to workers by 2016 (Hunting and Harvesting in a Digital World: The 2013 CIO Agenda) #mstrworld 5

Why BYOD? Option or Inevitability?

Why BYOD? Users Driving BYOD Image Source: BYOD Insights 2013: A Cisco Partner Network Study (March 2013) 62% of U.S. employees who use their own smartphone for work do so everyday 92% of U.S. employees who use their smartphones for work did so this week #mstrworld 7

Why BYOD? Benefits of Consumerization Source: Avanade Research & Insights Global Survey: Consumerization of IT (January 2012) #mstrworld 8

Why BYOD? Potential Savings #mstrworld 9

BYOD Challenges Recognising the risks

BYOD Challenges Barriers to Adoption Source: Insights on the Current State of BYOD in the Enterprise, Intel s IT Manager Survey (October 2012) #mstrworld 11

BYOD Challenges Privacy Concerns Source: MobileIron (June 2013) 44% of employees think their companies can see information on their devices, but don t know what that means.! 41% think their employers can t see any information at all.!! 15% are unsure about what their employers can and can t see #mstrworld 12

BYOD Challenges Device Protection Stuff happens and it is not always in our control. #mstrworld 13

BYOD Challenges Data Protection % of Users with Password-protected Phones Image Source: BYOD Insights 2013: A Cisco Partner Network Study (March 2013) Nearly 40% of BYODers don t protect their phones with a password. 52% reported accessing unsecured wi-fi networks with their devices #mstrworld 14

BYOD Challenges Hidden Costs #mstrworld 15

What makes up a BYOD Program? Putting together the pieces 16

What makes up a BYOD program? BYOD Policy #mstrworld 17

What makes up a BYOD program? Recommendations 1. Look for opportunities throughout the entire workforce where mobility could drive substantial innovation 2. Assess where your organization sits versus others in your industry. Even if you don't plan to embrace BYOD, you need to set expectations for your leadership 3. Decide on how many forms of BYOD you will support 4. Determine when, how, and how much you will subsidize business use of personal devices. 5. Establish clear policies for BYOD qualification, service expectations and the employee's assumed risk 6. Invest in technologies to separate enterprise and personal applications and data 7. Establish user self-support and third-party support options 8. Specify what platforms will be supported and how! Gartner #mstrworld 18

What makes up a BYOD program? What we want to avoid #mstrworld 19

What makes up a BYOD program? Establishing a strategy #mstrworld 20

What makes up a BYOD program? Integration with MDM Mobile Device Management (MDM) is software to help organizations manage devices connecting into their systems. It secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises.! Some examples of MDM providers are: Airwatch, MobiDM, MobileIron, and Tangoe, among others.! The MicroStrategy App can easily be recompiled an rebranded for distribution via MDM solutions.! MicroStrategy does not support or certify specific MDM s, but we integrate with MDM solutions. #mstrworld 21

What makes up a BYOD program? MDM Issues Mobile-device management (MDM) is considered to be a heavy-handed approach! More and more IT professionals have told us that they don't want to manage employee-owned devices.! Technologies such as MDM diminish the user experience, which remains the single biggest barrier to adoption.! Forrester It s not the DEVICES that need managing; it s the APPS that hold the company s data and enable employees to be more productive #mstrworld 22

What makes up a BYOD program? MicroStrategy as an MAM Mobile Applications Management (MAM) is a solution which provides the ability to: control the provisioning, updating and removal of mobile applications via an enterprise app store, monitor application performance and usage, and remotely wipe data from managed applications. Core features of mobile application management systems include: MicroStrategy acts as an MAM solution for platform enterprise applications, providing security and monitoring of the applications built within the platform without the need for app wrapping. #mstrworld 23

MicroStrategy Mobile Apps Enabling Your Mobile Workforce

MicroStrategy Mobile Apps Develop enterprise apps code-free to support your business Human Resources General Mgmt Sales Force Hiring Bonuses Training Mgmt Time-off request Expense approval T&E tracking Salary Review Employee info Hot desk locator Carbon emissions Product sales Partner sales Corporate events Facilities Lead tracking T&E tracking Customer info Churn rate Quotas Pipeline Services #mstrworld 25

MicroStrategy Mobile Apps Beautiful and durable mobile apps in one tenth of time, at a fraction of the cost Fast Durable Beautiful Mobile Dev Environment Mobile App Server Mobile! App Click-to-Configure No Coding Required Pre-built Infrastructure Secure Scalable Performant Native Mobile App ios & Android Phones & Tablets #mstrworld 26

MicroStrategy Mobile Apps 1000s of hours of custom code at your fingertips Pre-built Widgets Drag-n-Drop Canvas Beautiful Cross-platform Apps Analytics & Visualizations 1. Insert a widget 2. Set location, size, color 3. Set properties 4. Save Done Transactions Multimedia #mstrworld 27

MicroStrategy Mobile Security Securing Your Data End-to-End

MicroStrategy Mobile Security Industry leading integrated security #mstrworld 29

MicroStrategy Certificate Server Mutual Authentication Realized

MicroStrategy Certificate Server Mutual Authentication Workflow MicroStrategy Certificate Server LDAP Server Firewall Firewall X.509 Certificate Request CRL Certificate Revocation List MD HTTPS (AES) MicroStrategy Mobile Server MicroStrategy Intelligence Server DWH #mstrworld 31

MicroStrategy Certificate Server Invalid/Expired Certificate Prompt #mstrworld 32

MicroStrategy Certificate Server Certificate Server Authentication #mstrworld 33

MicroStrategy Certificate Server Certificate Issued and Downloaded to Device #mstrworld 34

MicroStrategy App Passcode Double Encryption Protection on ios

MicroStrategy App Passcode New ios App Passcode (Double Encryption) Feature App Passcode Password Based Key Definition AES #mstrworld 36

MicroStrategy App Passcode Define your password policy #mstrworld 37

MicroStrategy App Passcode Application Passcode Workflow #mstrworld 38

MicroStrategy App Passcode User creates compliant password Create Confirm #mstrworld 39

MicroStrategy App Passcode Password validation workflow Re-Enter Passcode Successful Passcode To App Enter Passcode Incorrect Passcode #mstrworld 40

BYOD & Monitoring Improving user Experience and Mitigating Risks

Monitoring - Why? Improving user Experience and Mitigating Risks There are many drivers for BYOD, most notably employee satisfaction. In data collected in Gartner inquiries, we have seen substantial improvement in the way the enterprise and its IT organization are perceived when BYOD is introduced! Unsurprisingly, security is the top concern for BYOD Gartner Bring Your Own Device: The Facts and the Future #mstrworld 42

Monitoring - Why? Why is it relevant for BYOD Not owning the device doesn t mean not being responsible for the experience #mstrworld 43

Monitoring - Why? Knowing about the variables that you don t control Device Information Do we support the the devices people bring in? Are our development targets aligned with our user base? What s the impact they have on performance and UX Usage Information Which Apps get more use? Who in the organisation is using them? On what network conditions? From where? #mstrworld 44

Monitoring - Why? App Centric Approach MAM means data collection starts and stops within the Apps owned by your company and the time users spend on them #mstrworld 45

Monitoring Helps you deliver better user experience Security without compromising privacy Tracking location data - but only where it pertains to your application You can even only allow Apps to be open in certain places or under certain conditions (i.e. WiFi) Ensuring the Devices that are used with your Apps to access your company s data are compliant/suitable to deliver the intended experience Keep tabs on availability and performance Gain insight on what works and what doesn t. Understanding how your user base is using their devices and your apps to create a better experience #mstrworld 46

Monitoring - How? Collection Your App's own Black Box #mstrworld 47

Monitoring - How? Configuration Steps Step 1. Enable Mobile Statistics Collection at the Project Level #mstrworld 48

Monitoring - How? Configuration Steps Step 2 #mstrworld 49

Monitoring - How? Exploitation #mstrworld 50

Monitoring - What? So what can we do with it? The best of both worlds Mobile Application Development Platform Enterprise Analytics Platform Web Documents Email Mobile Browsers Portals Apps PDF PowerPoint Excel Word One-Click Sharing Annotation ios Android Blackberry #mstrworld 51

Monitoring - What? So what did WE do with it? users new returning activity apps view engagement location Devices OS #mstrworld 52

Monitoring - Demo This is the Mobile Track We created an App #mstrworld 53

Monitoring - Demo Devices #mstrworld 54

Monitoring - Demo Country Activity #mstrworld 55

Monitoring - Demo Organization Drill #mstrworld 56

Monitoring - Demo Performance #mstrworld 57

Monitoring - Demo Users #mstrworld 58

Monitoring - Demo Location & Detail View #mstrworld 59

MicroStrategy Mobile Providing Value Through the Platform 60

MicroStrategy Mobile Invest in solutions, not app development #mstrworld 61

MicroStrategy Mobile Scaled and tested to support the enterprise Monitoring Security #mstrworld 62

Last Slide! Q&A