1 / 33

Mobile Device Management: Do You Know Who’s Accessing Your Network?

Mobile Device Management: Do You Know Who’s Accessing Your Network?. Umesh Shah, Dir. Channel Marketing. Agenda. Consumerization of IT Defining Mobile Device Management Numara Cloud Mobile Device Management. Mobile Device Management. Consumerization of it. In the News.

marli
Download Presentation

Mobile Device Management: Do You Know Who’s Accessing Your Network?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Device Management: Do You Know Who’s Accessing Your Network? Umesh Shah, Dir. Channel Marketing

  2. Agenda • Consumerization of IT • Defining Mobile Device Management • Numara Cloud Mobile Device Management

  3. Mobile Device Management Consumerization of it

  4. In the News

  5. 5 Trends Leading to Consumerization of IT • The rise of social media as a business application i.e. LinkedIn and Salesforce.com • The blurring of work and home Forrester Research: 43% of the American workforce will have the option to telecommute by 2016 • The emergence of new mobile devices By 2013, global smartphone shipments will exceed PC shipments for the first time. • Shifting business models Reliance on social media and ecommerce • Employee expectations of corporate IT Facebook, open source generation coming into the workforce

  6. What Challenges Are You Facing? Effective IT Security Policies and Procedures • How to manage and ensure security of data on the move • When to restrict device content and capabilities • Device and user profile management Ensuring Technical Ability to support Security Policies • Knowledge of devices and mobile OS’s • Effective perimeter security (i.e. firewalls, VPN etc…) • Effective Mobile Device Management Software Employee Resistance to Managed Personal Devices • Co-mingling of personal and corporate data on the same device • IT ability to monitor and remotely wipe the device • Geo-Location aka Big Brother

  7. What Opportunities Can You Take Advantage of? Revamp Security Policies and Procedures • In place of taking a piece-meal approach, take the opportunity for an overhaul of existing policies in support of consumerization. Revamp of Perimeter Security Hardware & Software (i.e. MDM) • Updated and tightened perimeter to support hybrid devices accessing the corporate network. Increased Employee Productivity • The top metric used to support consumerization ROI is employee productivity followed by employee moral. * * Source: CIO.com study of IT Consumerization

  8. Mobile Device Management Defining the Discipline

  9. So What is Mobile Device Management (MDM)? Mobile Device Management is managing and securing devices • Protecting Microsoft Exchange from unmanaged devices • Remotely provisioning • Remotely troubleshooting • Backing up and restoring • Policy management • Preventing theft and recovering lost devices • Managing inventory • Reporting on mobile infrastructure

  10. Gartner predicts adoption rate of MDM Conservative estimates place value of “pure” MDM model at $180m in 2011, with CAGR of 30% over next 2-3 years Gartner Market Growth Expectations 514 395 30% CAGR 304 $(M) 234 180 2011 2012 2013 2014 2015 Source: Gartner, 2011

  11. Mobile Device Management Lifecycle Identify mobile devices on network Hardware and software ID On-device file system management End-user self-registration Auto-deployment Auto-provision email configuration, pass codes and security policies Prevent unauthorized Microsoft Exchange access Restore contacts, calendar, SMS, multimedia, files Recover lost or stolen devices Geo-locate devices with Google MapsTM Lock and Wipe Prevent sharing of critical data via email Assess exposure to malicious email Remote deployment & management Executive reports

  12. Defining The Discipline • Partnering With The End User • Make it easy for the user to do “their job” in MDM • Take the Geek out of configuration • Being sensitive to privacy concerns

  13. Defining The Discipline • Making IT feel Comfortable • Securing corporate data • Ensuring limited interaction required • Providing a robust toolset

  14. Defining The Discipline • Transitioning to a Device is a Device • MDM is becoming an IT responsibility • Balancing corporate policies on personal devices • Needs to be founded in strong ITIL based best practices

  15. Numara Cloud Mobile Device Management Key Features

  16. Key Features • 100% web based cloud offering • Enjoy the full inventory of your wireless devices • Self-Service Registration and Auto Provisioning • Manage applications • Provision settings • “Over the Air” Actions • Corporate Email Protection • Integrated helpdesk • Remote Control • Geo-Location

  17. “Over the Air” Actions • Remote “detonate”/wipe • Remote auto-lock policy • Enable/disable camera or Bluetooth capabilities • Enforce device encryption • Blacklist applications • Prevent users from installing blocked third party applications • SIM card change policy • Security applications support • Backup/restore contacts, calendar, SMS, bookmarks, notes, sales, and folders (across devices)

  18. Corporate Email Protection • Numara Software Exchange DefenderTM – Prevent unmanaged mobile devices from accessing and sharing critical data and documents via email • Numara Software Exchange InvestigatorTM– Quickly assess risk and exposure to malicious email hackers with executive level reporting detailing the number of users and mobile devices connected to Exchange

  19. Self-Service Registration and Auto Provisioning • Just got that new iPhone and have no idea how to connect to Exchange or what the WiFi security key is? • Easy via company Self Service Page • User registers with their phone number and follows a text message to the App store • Once registered, the defined auto provision packages are automatically deployed. • Out of the box Exchange, Wireless, and Pass code security provisioning

  20. Mobile Device Management Feature Tour

  21. Self-Service Registration

  22. SMS Message

  23. Profiles Provisioned

  24. Lock Phone

  25. Install Client

  26. Device Activated

  27. MDM Client Installed

  28. Detect JailbrokeniOS Device

  29. GEO Locating iOS

  30. Mobile Device Management The Wrap-up

  31. Numara Cloud Mobile Device Management IT Consumerization is here to stay. Organizations need a flexible and robust MDM solution Numara Cloud MDM provides IT organizations the control they need to securely manage mobile devices throughout their entire lifecycle.

  32. Questions?

More Related