ITSM & Enterprise Mobility Management



Similar documents
AirWatch Solution Overview

IT Enterprise Services

Symantec Mobile Management Suite

Chris Boykin VP of Professional Services

Symantec Mobile Management 7.2

Athena Mobile Device Management from Symantec

A guide to enterprise mobile device management.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

MDM Mobile Device Management

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

EMPOWERING THE DYNAMIC WORKPLACE

What We Do: Simplify Enterprise Mobility

Secure Mobile Solutions

Guideline on Safe BYOD Management

Symantec Mobile Management 7.2

Mobile Device. Management-

MAM - Mobile Application Management

Bell Mobile Device Management (MDM)

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Vodafone Total Managed Mobility

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

ForeScout MDM Enterprise

The ForeScout Difference

CHOOSING AN MDM PLATFORM

A Federated Approach to Systems Management. Sr. Product Specialist Systems Engineer

ITIL Service Lifecycle Stream

Sophos Mobile Control

Service Definition Nine23 MDM

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

Systems Manager Cloud Based Mobile Device Management

Free ITIL v.3. Foundation. Exam Sample Paper 1. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

IT Enterprise Services

1 What does the 'Service V model' represent? a) A strategy for the successful completion of all service management projects

PUR1308/12 - Service Management Tool Minimum Requirements

BYOD Enabling Technologies

How End User Experience Management Adds Value to Mobile Device Management. It s All in The Name!

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Kaseya IT Automation Framework

Embracing Complete BYOD Security with MDM and NAC

The open source enterprise solution pre-configured for the IT Asset Management

Integrated processes aligned to your business The examples of the new NetEye and EriZone releases

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

ITIL V3 Foundation Certification - Sample Exam 1

A Radicati Group Web Event

Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Choosing an MDM Platform

MobileIron Product Packaging

MobileIron Product Packaging

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

IT Enterprise Services

Service Desk Technician Service Desk Team Leader None IT

BSM for IT Governance, Risk and Compliance: NERC CIP

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

SA Series SSL VPN Virtual Appliances

MOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY

Cisco Mobile Collaboration Management Service

Mobile Device Management for CFAES

IT Service Management with System Center Service Manager

mobile connect mobileconnect A complete software, hardware and managed service solution for mobile workers

The User is Evolving. July 12, 2011

Total Enterprise Mobility. Norbert Elek

Service Catalogue. 0984v1

CWSI Service Definition for Mobile Device Management and Security

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Enterprise Mobility as a Service

Enterprise Mobility Management for Financial Sector

Microsoft Windows Intune: Cloud-based solution

Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy

Dynamic Service Desk. Unified IT Management. Solution Overview

Interact Intranet Version 7. Technical Requirements. August Interact

Systems Manager Cloud-Based Enterprise Mobility Management

CDH. Microsoft System Center Configuration Manager & Mobile Device Management

Total Enterprise Mobility

allchoice We are XMA. Empowering employee device choice within the workplace

Peace of mind across all your mobile devices

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

Ubertas Cloud Services: Service Definition

Digital Marketplace - G-Cloud

Carahsoft End-User Computing Solutions Services

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Kony Mobile Application Management (MAM)

Creating a Holistic Mobility Strategy Revised Edition. Strategy Analytics Business Mobility Solutions June 2009

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

IT Service Management with System Center Service Manager

use ready 2 The open source enterprise solution pre-configured for the IT Asset Management Tecnoteca Srl

AVG Business SSO Partner Getting Started Guide

FLEXIBILITY AGILITY AVAILABILITY BOLSTER YOUR BANK S I.T.

"Service Lifecycle Management strategies for CIOs"

Guardian365. Managed IT Support Services Suite

Everything you need for your mobile enterprise

IT Self Service and BYOD Markku A Suistola

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

empower your digital transformation with Private Cloud Solutions Khaled M Khondker

Transcription:

ITSM & Enterprise Mobility Management Jason Lunghusen

Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does RMIT need and want? 5. What can EMM provide? 6. Service Strategy 7. Service Design 8. Pitching for investment 9. What the future may bring

Client Computing 2012

Client Computing 2013

Client Computing 2014

ITS -Our Service Management maturity Incident & Request management Change management Problem Management

ITSM & Strategy at RMIT

A new approach Customer Value

You now own mobile telephony

Where are we now? Overseas phone bills High Volume Service Desk Calls User Experience Mobile Devices Distributed Asset Management BYOD Students and Staff Malware Mobile Applications

What can EMM do for us? Hardware Asset and Configuration Management Software Asset and Configuration Management Data Security Management Telephony Service Management

ITIL -Service Strategy 1. Define the market 2. Develop the Offerings 3. Develop the strategic assets 4. Prepare for execution

What does RMIT need and want?

How does EMM align with our overall strategy? Our customers don t ask for EMM, they ask for access to the features that EMM makes efficient, manageable and useable. Testing and Evaluation of pedagogy driven technology Classroom interactivity using any device Collaboration using any device Financial control and information security

Device Management Across Platforms

Application Management across platforms

Application Management across platforms Students created in Active Directory should be ready overnight to connect to systems, download applications and get started on their coursework. IT should be a transparent and seamless service that works in the background to let students focus on their coursework. Multiple, but optimised, application usage options will form the future standard to enhance the overall flexibility of the end user experience. The decision should be made separately for each application.this is with consideration given to multiple deployments as a service for different platforms. For instance, some applications should be deployed locally, but may have versions for Windows 7, Mac OS X, ios and Android devices separately. It may be more efficient to deploy this as a published application and then use the Citrix receiver to deploy it to all platforms. Alternatively, the Citrix receiver may not provide the best user experience on a smaller mobile device (eg, unusable formatting), so a local deployment of the mobile version may be the most effective method for these devices. Alternatively accessing the same application from different devices in their preferred configuration allows end users to form their own work styles and approaches.

Service Strategy: Define the Market Functionality Student Device Staff BYOD Staff RMIT Owned External Collaborators Install EMMclient from RMIT website or vendor Application Catalogue (Apple AppStore, Google Play, etc) Authentication and group membership from existing RMIT Active Directory service Automated Security Compliance Checking Includes help instructions and links to resolve issues Integrated with Network Access Control (NAC) systems. Automated device enrolment to EMM service Automated deployment and management of device and application certificates Secure access to individual applications from outside RMIT networks Integrate with remote access solution RMIT Enterprise Mobility Software Catalogue access Deploy specialist learning applications, collaboration tools or RMIT built applications to be used by students and staff as required Secure network access for specialist systems Virtual Desktop Citrix Receiver Integration with device calendars to automate scheduling updates

Service Strategy: Define the Market Functionality Student Device Staff BYOD Staff RMIT Owned External Collaborators RMIT Guide Local device copy covering IT problems as well as general RMIT engagement. Searchable knowledgebase with links and FAQs Remote Assistance Set policies, move files, change access levels Remote Takeover if supported (ios devices do not support this ability) Automated access to appropriate staff systems Automated Asset Lifecycle Management Hardware configuration, tracking and reporting. Including Remote Wipe and GPS Location Software License Management for RMIT purchased applications Integrated with CMDB and general Asset Management systems Telephony logging, configuration and reporting as required. o Restrict and Disable overseas data and phone access. Automated Anti-Malware protection Configured to make RMIT owned assets trusted devices on the network.

Service Strategy: Develop the Offerings

Service Strategy: Develop the Offerings - EMM Foundation

Service Strategy: Develop the Offerings Future Capability

Develop Strategic Assets Enterprise Mobility Management Suites - Magic Quadrant for 2014

Prepare for Execution - Pitching for investment

Prepare for Execution - Pitching for investment

ITIL Service Design 1. Service Catalogue Management 2. Service Level Management 3. Capacity Management 4. Availability Management 5. Information Security Management 6. IT Service Continuity Management 7. Supplier Management

Service Catalog Service Branding Required service branding activity has not yet been undertaken and will be a part of project deployment. Since different customers will see and make use of different elements of the total EMM service features, it is necessary to divide and brand them carefully The following components could be bundled together in different ways to provide the final end user view of the services: Mobile device asset inventory Telephony activity recording and reporting Enforced enterprise policy for RMIT owned devices for software, security and telephony Unenforced policies for BYOD and student devices, applications and security Deployment of RMIT produced and configured mobile applications This may include secure data repositories on the mobile device Deployment of 3 rd Party mobile applications pre-configured for RMIT Remote assistance, including remote takeover of the device, by service desk and other support staff

Service Level Management Whilst many requirements that will guide the establishment of Service Level Agreements have been defined, the process of negotiating SLAs has been assigned for primary focus during market engagement through a Request for Proposal process.

Capacity, Availability, Security & Continuity Management: Mapping Business Requirements to Solution Criteria Business Requirement Provide complete Fleet Management solution Unified approach to standards and support for every device Asset Management Solution Criteria Capture device hardware and software inventory information that can be exported to other systems. Eg, Serial number, IMEI, make and model, application version, etc. Software license management for Android and ios devices is essential. Reporting and control of telephony functions, especially for overseas use. Export of asset and configuration data should be at least in CSV format, actual integration with SCCM or ITSM products would be better. Financial Flexibility The ability to change user volumes as required to meet changing demands without negotiating another contract. Licensing Model Pricing needs to be optimised for RMIT student and staff volumes. Licensing model options for cloud and on premise versions with upfront and maintenance charges to be considered. Support Model An end to end managed service offer is highly regarded, but it must also support delegated administration as detailed above

Capacity, Availability, Security & Continuity Management: Mapping Business Requirements to Solution Criteria Business Requirement Enhance the End User Experience. Exceed user expectations in delivering consistent quality service o Efficient management of a system with at least 99.5% uptime. o Seamless and transparent security. Provide industry leading functionality to every user Global deployment for unified user experience Device Support Solution Criteria Automatic configuration and update of network settings and other environment variables to provide easy access to all required resources without user intervention. ios and Android devices must have broad support. BlackBerry, Windows and Symbian devices useful but not essential. Remote Takeover Remote takeover of any supported device is a required element of an efficient service model that provides the highest quality support. ios and Android are critical, BlackBerry, Windows and Symbian useful but not essential Application Management Deploying and configuring applications wrapped and customised for RMIT s environment. For example Citrix Receiver, SAP GUI, custom in-house applications. Software license management for Android and ios devices is critical. Application specific VPN support is a useful feature

Capacity, Availability, Security & Continuity Management: Mapping Business Requirements to Solution Criteria Business Requirement Enhance the End User Experience (continued) Administration Delegation Solution Criteria Ability to delegate roles to different AD user groups is required. Allowing various roles to view data, change settings and provide direct end user support, distributes the support load amongst existing groups as well as potentially a 3rd party service provider. Disaster Recovery The solution must be both highly available and support disaster recovery to a separate site. Security Single Sign on using Active Directory for authentication and policy application via groups and organisational units. Automatic configuration of all supported devices for secure operations. Options for different configurations for RMIT owned, student owned or a staff BYOD computer. Integration with existing PKI system for device enrollmentand security management using certificates. Able to deploy and manage multiple certificates for separate systems as required. Support for other two factor authentication models is useful. Global Deployment Any solution must be able to cater for RMIT globally. Any technical issues or requirements in extending the service to other countries must be addressed in any proposal.

Supplier Management: Requirements for Vendors and Integrators Requirement User Experience Criteria Intuitive configuration and interface for both end users and RMIT ITS staff. Seamless and transparent operation end users should not be aware of the software, only the services delivered. The vendor should have specific capabilities and history with EMM solutions that have been deployed in production environments of a similar size to RMIT for more than two years. Maturity of Solution A vendor roadmap showing the future evolution of the product must also be presented covering the next three years at a minimum. Those environments should be referenceableand contacts available to RMIT during the selection process. Provide an option for an end to end solution including licensing, infrastructure, deployment effort, maintenance and support. Future upgrades, enhancements and other innovation must be considered. This should be priced as a monthly service charge on a per user or per device basis. Managed Service Provision Any proposal for a managed service offering must show the same or very similar offering has been maintained on multiple reference sites for more than a year in production. Those environments should be referenceableand contacts available to RMIT during the selection process. This applies to Vendors and Integrators who may propose such a solution

Supplier Management: Requirements for Vendors and Integrators Requirement Continual Service Improvement Criteria Any proposal for a managed service offering must include description of a process and engagement model for Continuous Service Improvement. It will not be acceptable to only provide maintenance level support. This applies to Vendors and Integrators who may propose such a solution By examining current use cases in other organisations, especially educational institutions, and applying them to RMIT, further innovative ideas should be proposed by integrators and vendors. Innovation ITIL Alignment This should form an ongoing engagement with presentations to RMIT quarterly on potential innovations for either the EMM solution directly, or in other services enabled by, or integrated with it. Any proposal for a managed service offering must include descriptions of Service Provision processes that align closely with ITILstandards to enable close integration with RMIT support services. This may also require direct technical ntegrationbetween the RMIT Service Desk and a 3 rd Party supplier if that is part of the proposed solution.

Summary

What the future may bring

Is this ITSM strategy approach working for me?

Action Plan Monday Morning Enter things your audience should do to implement or follow up Use this slide to summarise the key takeouts and actions for the audience over the time frame indicated Next 90 Days Enter Action 1 Enter Action 2 Next Year Enter Action 1 Enter Action 2

Recommendations Please use this Recommendations slide if the Action Plan slide does not suit. You can use both if you like.

Additional Resources <<<Enter Garner paper here>>> jason.lunghusen@rmit.edu.au