Enterprise Mobile Management



Similar documents
SECURING TODAY S MOBILE WORKFORCE

Lot 3 Service Specification MANAGED MOBILE SERVICE

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Acronis BRING YOUR OWN DEVICE

Dell Bring Your Own Device

Mobile Security: The good, the bad, the way forward

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

The ForeScout Difference

Symantec Mobile Management 7.2

Symantec Mobile Management for Configuration Manager 7.2

ForeScout MDM Enterprise

Symantec Mobile Management 7.2

Enterprise mobility: making the BYO trend work for you

Symantec Mobile Management 7.1

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

HDAA BYOD Workshops May 2013

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Symantec Mobile Management 7.1

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Keep Calm and Bring Your Own DEVICE. White paper

Hands on, field experiences with BYOD. BYOD Seminar

The User is Evolving. July 12, 2011

I D C M A R K E T S P O T L I G H T. T h e I m p a c t of the Consumerization of IT

Risk and threats everywhere, all the time

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

BYOD & Virtualization: Managing Mobile

Securing the mobile enterprise with IBM Security solutions

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage

A number of factors contribute to the diminished regard for security:

How To Secure Your Mobile Devices

Mobile and BYOD Strategy

Feature List for Kaspersky Security for Mobile

Protect Your Mobile World

How To Support Bring Your Own Device (Byod)

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo.

Productive and Secure Enterprise Mobility with Cisco and Citrix

A Guide to MAM and Planning for BYOD Security in the Enterprise

Managed Desktop Services. End-user workplace management solutions for your distributed-client computing environment. HP Services

HP ALM Masters 2014 Connected, collaborative mobile application development for the enterprise HP Anywhere

The Holistic Guide to BYOD in Your Business Jazib Frahim

Cortado Corporate Server

Securing Corporate on Personal Mobile Devices

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

A number of factors contribute to the diminished regard for security:

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

Endpoint protection for physical and virtual desktops

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

IBM MobileFirst Managed Mobility

"Secure insight, anytime, anywhere."

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Athena Mobile Device Management from Symantec

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Secure Your Mobile Workplace

CHOOSING AN MDM PLATFORM

Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

BENEFITS OF MOBILE DEVICE MANAGEMENT

EndUser Protection. Peter Skondro. Sophos

6 Things To Think About Before Implementing BYOD

Mobile Device Management and Security Glossary

MDM and beyond: Rethinking mobile security in a BYOD world

If you can't beat them - secure them

How To Protect Your Mobile Device From Attack

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

trends and audit considerations

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Ben Hall Technical Pre-Sales Manager

Bell Mobile Device Management (MDM)

How Microsoft IT manages mobile device management

Windows Phone 8 Security Overview

Total Enterprise Mobility

Guideline on Safe BYOD Management

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Security and Compliance challenges in Mobile environment

Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3

IBM United States Software Announcement , dated February 3, 2015

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

RFI Template for Enterprise MDM Solutions

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager

Internet Exchange Between IT and Business Requirements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

How Technology Executives are Managing the Shift to BYOD

Smartphones and ipads: mobility blessing or technology support curse?

Mobility Challenges & Trends The Financial Services Point Of View

Stress-free mobility A mobile framework for the extended enterprise. April 29, 2015

How To Manage A Mobile Device Management (Mdm) Solution

Transcription:

Enterprise Mobile Management

Enterprise Mobile Management Ben Santing, HP

Changing Face of Enterprise Mobility Consumerisation has transformed mobility Line between corporate and private blurring Cloud computing Pace of technology change Growing mobile workforce Requirement for multi-platform support Rising cost of providing corporate devices Multiplied attack vectors for cyber-criminals More vulnerable corporate data 3

Enterprise Mobile Management

Top 5 Mobile Security Threats 2012 Viruses, Trojans Mobile malware is big business Browser based apps You can t block the browser One Cloud to rule them All Employees sharing corporate data Lost, stolen and traded phones Poor Planning Source: InformationWeek reports 5

Enterprise Mobility Management Traditional MDM Engineered for corporate owned devices Securing devices against malicious or casual access Through policies and commands, such as PIN enforcement and OTA wipes No choice: Any color as long as it is black (H. Ford) Enterprise Mobility Management Also incorporate BYOD (for both trusted & non-managed) Also securing data against leakage to un-monitored/ non-corporate environments MDM, MAM, MSM, MUM etc. Evolve at Consumers pace Mobility Lifecycle Management 6

Example of Traditional MDM - EAS 7

Traditional MDM - EAS Exchange ActiveSync (EAS) Policies EAS Remote Wipe No Application Support Cumbersome Certificate Management No Device Inventory Devices have known to lie No answer on Where is my Data What about retired devices? Rogue devices? WiFi 8

Where is my Data? Future Trend Diverse devices chosen based on role and work mode at that moment Local device storage is authoritative for nothing Data may optionally be cached on any device Seamless secure access to all data from any device PC Backup as we know it does no longer exist Data is discoverable, available, compliant Trust model shall be in place 9

MDM Server or Service? 10

Network Architecture MDM 11

Steps towards Enterprise Mobility 1. Leverage HP Mobility Services 2. Integrate with EAS 3. Add Secure Gateway 4. Add advanced security / configuration 5. Build Enterprise App Store 6. Start building X-Platform Apps 7. Add DLP functionality 8. Add Advanced App Security 12

HP MMS Service Scope Configuration Management Security Management Application Management Inventory Management Support Management Infrastructure Management Service Management E2E Governance Cloud, Hosted or On Premise Multi-Platform End-to-end Service Smartphones, Tablets and Ruggedized devices 13

HP Mobile Workplace Services Mobile Management Services Holistic Service Integration anywhere at any time access to information On-site Support & Break-Fix Asset Management & Procurement HP Mobile Workplace Services Mobile Applications Management Mobile Messaging Telecom Expense Management 14

Recent Success Stories & Benefits KoneCranes 3000 ruggedized devices, end-to-end service, On-site Service Trucking Company 2000 Enterprise SmartPhones, Support, Dedicated Cloud Service Hospital 1000 devices (Clinical, Company owned & BYO) On-Site Install Bearing Manufacturer 8000 Devices, 24x7 support, Application Mngmt, Procurement, Hybrid Cloud Service Brewery 2000 x-platform devices, 24x7 Support, Cloud Service 15

HP leader in mobility services 2M+ mobile handheld subscribers 237K devices encrypted Global carrier relationships Mobile messaging supported in 50 countries 10+ years providing Mobile Application Services Key alliances Microsoft, RIM, SAP, Boxtone etc. Proven, global delivery methodology and tools based on best practices 16

Thank you for your attention Copyright 2012 Hewlett-Packard Development Company L.P. The information contained herein is subject to change without notice.

Why MMS - Enterprise Consumerization: BYOD Data protection and compliance practices Track, monitor and authorize data access Enterprise app stores only approved apps can be downloaded only devices with approved apps installed can access corporate resources Implement security solutions to remove problems that have already infected devices Data security is main driver, device management required layer 1

10 Steps to a multi-device Future 1 Charter a Mobility Council to drive Management and Security Strategy Segment users based on mobile requirements and associated security risks Employees, Partners, Consultants, Customers and VIPs Tier devices, implement an Enterprise Mobility Solution No One-Size-Fits-All approach Your business is mobile deliver your business applications multiplatform Prioritize and stage mobile app portfolio, build Enterprise app store 1

10 Steps to a multi-device Future 2 Master multi-platform development Native app, HTML5, cross-platform, desktop virtualization (Re)Fund mobile network, access, and security infrastructure Adopt reimbursement policies that align costs with business benefits Educate, inform, build consensus Fast-track, partner with HP 2