Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enterprise Mobility Management:, Taking MDM to the Next Level

Similar presentations


Presentation on theme: "Enterprise Mobility Management:, Taking MDM to the Next Level"— Presentation transcript:

1 Enterprise Mobility Management:, Taking MDM to the Next Level
Bob De Armond, Sales Engineer, T-Mobile

2 An Evolution of Mobile Device Management
Mobile Device Management (MDM) has been evolving over time based on the needs of the organizational environment to secure mobile devices and the information accessed by them. BlackBerry and Good Technologies started things off, and now, today there a number of EMM suite products from which to choose. Core Functions Included in Today’s EMM Products and Services: Hardware management and inventory OS configuration management Remote control for security and troubleshooting Execute remote actions, such as remote wipe An Evolution of Mobile Device Management Mobile Device Management (MDM) has been evolving over time, based on the needs of the organizational environment, to secure mobile devices and the information accessed by them. BlackBerry and Good Technologies started things off, and now, today there a number of EMM suite products from which to choose. Core Functions Included in MDM Products and Services: Hardware inventory OS configuration management Remote view and control for troubleshooting Execute remote actions, such as remote wipe Executing these core functions through MDM represented the early implementation of these functions. MDM tools have evolved to incorporate advanced mobile application management and mobile content management. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

3 EMM vs. MDM – What’s the scoop?
As it turns out, managing the device hardware and operating system with security policies and asset management is just the tip of the ice berg. Intellectual property and proprietary applications and content cannot be neglected. So MDM only took us so far and Enterprise Mobility Management takes us further. Core Functions Included in Today’s EMM Products and Services: Hardware inventory OS configuration management Remote view and control for troubleshooting Execute remote actions, such as remote wipe Application inventory Mobile app deployment, updating and removal Mobile app configuration and policy management Mobile content management EMM vs. MDM – What’s the scoop? As it turns out, managing the device hardware and operating system with security policies and asset management is just the tip of the ice berg. Intellectual property and proprietary applications and content cannot be neglected. So MDM only took us so far and Enterprise Mobility Management takes us further. Enterprise mobility management (EMM) suites consist of policy and configuration management tools and a management overlay for applications and content. EMM is intended for mobile devices based on smartphone OSs. They are an evolution from previous-generation mobile device management (MDM) products that lacked application and content management. IT organizations and service providers use EMM suites to deliver IT support to mobile end users and to maintain security policies. EMM suites provide the following core functions: Hardware inventory Application inventory OS configuration management Mobile app deployment, updating and removal Mobile app configuration and policy management Remote view and control for troubleshooting Execute remote actions, such as remote wipe Mobile content management Executing these core functions through MDM represented the early implementation of these functions. MDM tools have evolved to incorporate advanced mobile application management and mobile content management. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

4 Mobile Application Management
Access to applications from the mobile devices has made the transition from a simple personal and organizational information manager to a full-fledged operational workflow solution with the functionality of a computer. Mobile application management applies management and policy control functionality to individual applications. Preconfigured applications: A secure personal information manager (PIM) for , calendaring and contact management, and A secure browser provided by the EMM provider or a third party. App store and 3rd party app management. Application extensions: These apply policies to applications by use of a software development kit (SDK) or by wrapping. This capability is necessary when the OS does not provide the required management capability or when organizations elect not to install an MDM agent on the device. MOBILE APPLICATION MANAGEMENT Access to applications from the mobile devices has made the transition from a simple personal and organizational information manager to a full-fledged operational workflow solution with the functionality of a computer. Mobile application management applies management and policy control functionality to individual applications. Preconfigured applications: a secure personal information manager (PIM) for , calendaring and contact management, as well as a secure browser provided by the EMM provider or a third party. Application extensions: These apply policies to applications by use of a software development kit (SDK) or by wrapping. This capability is necessary when the OS does not provide the required management capability or when organizations elect not to install an MDM agent on the device. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

5 Mobile Content Management
Secure Container — A client-side app that enables a user to store content securely on a mobile device. The EMM can enforce policies such as authentication, file sharing and copy and paste restriction. Content comes from three primary sources: (attachments) Content pushed by the administrator or another internal person Content accessed from a back-end repository Content Push — Push-based document delivery. Some specific functions are: Control document versions Alert a user of new files Flag content expiration date Content Access — A connection to a back-end repository where users can pull content to their devices. Specific capabilities are: Support for specific back-end repositories (SharePoint, Documentum, etc.) Restrict downloads while roaming Audit logging to track who accesses or downloads files Mobile content management enables users to access content from their mobile devices. The mobile content management function has three fundamental roles: MOBILE CONTENT MANAGEMENT Mobile content management enables users to access content from their mobile devices. The mobile content management function has three fundamental roles: Secure Container - A client-side app that enables a user to store content securely on a mobile device. The EMM can enforce policies such as authentication, file sharing and copy and paste restriction. Content comes from three primary sources: (attachments) Content pushed by the administrator or another internal person Content accessed from a back-end repository Content Push - Push-based document delivery. Some specific functions are: Control document versions Alert a user of new files Flag content expiration date Content Access - A connection to a back-end repository where users can pull content to their devices. Specific capabilities are: Support for specific back-end repositories (SharePoint, Documentum, etc.) Restrict downloads while roaming Audit logging to track who accesses or downloads files THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

6 EMM Best Practices Overview
The EMM environment is in rapid change from the innovation of the OS providers, the hardware OEMs, and the EMM application developers all collaborating to expand, enhance, and integrate the policies, management functions, and advanced features that are the change agents for new capabilities. Best Practices in Today’s EMM Products and Services: Innovation Security Integration Support EMM Best Practices Overview The EMM environment is in rapid change from the innovation of the OS providers, the hardware OEMs, and the EMM application developers all collaborating to expand, enhance, and integrate the policies, management functions, and advanced features that are the change agents for new capabilities. Innovation Security Integration Support THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

7 Best Practices in INNOVATION
Ease of use at the end-user and administrator levels offering integrated EMM, service desk, self-service procurement, asset management, and activation capabilities. Demonstrates remote support capabilities, with full remote control for Android devices and real-time remote-view capabilities. Location services capabilities including geo-tracking and geo-fencing. Kiosk mode to customize the user interface to allow and/or deny the access to various functions, features, and applications. Developed applications in their Apps suite and related third-party applications in their App Store. A complete, feature-rich mobile content management capabilities with broad back-end content repository support, including SharePoint, Documentum and other connections. Mature shared-processing multi-tenant architecture providing best-in-class cloud can support up to thousands of installations per day for large accounts. Best Practices in Innovation Reference customers consistently praise ease of use at the end-user and administrator levels offering integrated EMM, service desk, self-service procurement, asset management, and activation capabilities. Demonstrates remote support capabilities, with full remote control for Android devices and real-time remote-view capabilities on iOS including remote viewing for SDK-enabled iOS apps. Location services capabilities including geo-tracking and geo-fencing. Kiosk mode for customizing the user interface to allow the access or denial of access to various functions, features, and applications. A management console with strong role-based access control (RBAC) and language support. Developed strong point applications in their Apps suite and related third-party applications in their App Store. These integrations improve the experience of using multiple enterprise mobile apps. Offering an EMM suite with supplemental app development tools. A complete and feature-rich mobile content management capabilities with broad back-end content repository support, including SharePoint, Documentum and IBM connections. Mature shared-processing multitenant architecture providing best-in-class cloud can support up to thousands of installations per day for large accounts. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

8 Best Practices in SECURITY
Secure containers for separating personal and organizational application and content access to allow BYOD management to protect the intellectual property of the organization and the privacy of the end user’s personal content. Integrated strong security features for mobile data loss prevention (DLP) and Identity & Access Management (IAM) for location and theft tracking. Secure PIM applications, such as , calendar, contacts and messaging, as well as a secure content management application in its core offering. Application management SDK provides comprehensive security for public and private app store apps. Mobile content management transparently encrypts files leaving a PC or mobile device to prevent data leakage. This integrates with third-party file storage providers and enables companies to securely use low-cost third-party storage. Federal Information Processing Standard (FIPS) compliant mobile application management, server gateway and client apps have received third-party validation of its appropriate implementation and function. Best Practices in Security Secure containers for separating personal and organizational application and content access and allowing BYOD management to protect the intellectual property of the organization and the privacy of the end user’s personal content. Integrated strong security features for mobile data loss prevention (DLP) and Identity & Access Management (IAM) with the option for persistence technology, which embeds an agent in the firmware of certain devices (e.g., Samsung Galaxy tablets and smartphones) for location and theft tracking. Secure PIM applications, such as , calendar, contacts and messaging, as well as a secure content management application in its core offering. Application management SDK provides comprehensive security capabilities for public and private app store apps in the EMM market. Provides app wrapping capabilities that allow apps to be dynamically updated without rewrapping. Mobile content management transparently encrypts files leaving a PC or mobile device to prevent data leakage. This integrates with third-party file storage providers and enables companies to securely use low-cost third-party storage. Federal Information Processing Standard (FIPS) compliant mobile application management, server gateway and client apps have received third-party validation of its appropriate implementation and function. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

9 Best Practices in INTEGRATION
Depth of platform support across all major mobile platforms, including BlackBerry, making it appropriate for diverse environments. Laptop management functionality providing basic MDM policy management for Windows 8.1 devices and Mac OS X from a single tool. Converged endpoint management from servers to mobile devices to find and fix problems quickly. A scalable architecture and specific product capabilities, such as allowing components to be spread across multiple servers. Endpoint protection platform (EPP) vendors allowing customers to leverage their relationship for support, and potentially improve its user-based pricing by combing multiple solutions. Directly integrates with Unified Threat Management (UTM) gateways (e.g. Sophos and Check Point) for easier enablement of remote access. Best Practices in Integration Depth of platform support across all major mobile platforms, including BlackBerry, making it appropriate for diverse environments. Laptop management functionality providing basic MDM policy management for Windows 8.1 devices and Mac OS X. Converged endpoint management from servers to mobile devices to find and fix problems quickly. Provides a compelling offering for organizations seeking to manage Macs, PCs and mobile devices from a single tool. A scalable architecture and specific product capabilities, such as allowing components to be spread across multiple servers. Endpoint protection platform (EPP) vendors allowing customers to leverage their relationship for support, and potentially improve its user-based pricing by combing multiple solutions. Directly integrates with Unified Threat Management (UTM) gateways (e.g. Sophos and Check Point) for easier enablement of remote access. Enables users to customize the End User License Agreement (License) presented at enrollment time through policies that can key off any combination of specific Lightweight Directory Access Protocol (LDAP) and Active Directory attributes, allowing companies to automate the presentation of different Licenses to different types of users, rather than presenting a cumbersome, monolithic document. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

10 Best Practices in SUPPORT
Offers the responsiveness and dialogue on product roadmap and product enhancements. A management console with strong role-based access control (RBAC) and language support. Mature, global, 24x7x365 coverage, customer support program, with several tiers of support subscriptions – depending on customer preference – including support and on-site consultative assistance offering a more rigorous support model. Offers consulting and advisory services for mobile and bring your own device (BYOD) strategy development. Installations and support can be readily personalized to meet a company's needs, and extensive self-help is available for individual users. Other partners to help with sales and implementation to enhance overall viability. Best Practices in Support Offers the responsiveness and dialogue on product roadmap and product enhancements. Mature customer support program, with several tiers of support subscriptions, depending on customer preference. A management console with strong role-based access control (RBAC) and language support. Known for support and on-site consultative assistance offering a more rigorous support model. Offer global 24 by 7 support coverage. Offers consulting and advisory services for mobile and bring your own device (BYOD) strategy development. Installations can be readily personalized to meet a company's needs, and extensive self-help is available for individual users. Partners to help with sales and implementation to enhance overall viability. BES10's MDM support for BlackBerry devices is the strongest in the market, including the ability to audit and log SMS messages. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

11 EMM Considerations Overview
The EMM environment is in rapid change from the innovation of the OS providers, the hardware OEMs, and the EMM application developers all collaborating to expand, enhance, and integrate the policies, management functions, and advanced features that are the change agents for new capabilities. Core Functions Included in Today’s EMM Products and Services: Complexity of the EMM Platform to use securely and efficiently. Multi-Platform Support: Android, Apple, Microsoft, and BlackBerry. Consistency in accommodating new OS releases in a timely manner. Content and application containment and encryption requirements. Scalable deployment alternatives to comply with long-term goals. BYOD support for disparate hardware, OS’s, and applications. EMM Considerations Overview The EMM environment is in rapid change from the innovation of the OS providers, the hardware OEMs, and the EMM application developers all collaborating to expand, enhance, and integrate the policies, management functions, and advanced features that are the change agents for new capabilities. Complexity of the EMM Platform to use securely and efficiently. Multi-Platform Support: Android, Apple, Microsoft, and BlackBerry. Consistency in accommodating new OS releases in a timely manner. Content and application containment and encryption requirements. Scalable deployment alternatives to comply with long-term goals. BYOD support for disparate hardware, OS’s, and applications. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

12 Who are the Main Industry Players?
One place to look for information about information technology topics is the Gartner Magic Quadrant Report. The July report provided the current leaders in the enterprise mobility management industry provide the top-ten list of the companies in the leaders quadrant. It requires a rigorous review to qualify your options. Top-Ten Leaderboard of Gartner’s EMM Magic Quadrant Report: AirWatch BlackBerry Citrix (XenMobile) Good Technology IBM (Maas360) MobileIron SAP (Afaria) Soti (Mobicontrol) Symantec Tangoe Knowing which one works best for you takes effort. Who are the Main Industry Players? One place to look for information about information technology topics is the Gartner Magic Quadrant Report. The July 2014 report provided the current leaders in the enterprise mobility management industry provide the top-ten list of the companies in the leaders quadrant. It requires a rigorous review to qualify your options. Top-Ten Leaderboard of Gartner’s EMM Magic Quadrant Report: AirWatch BlackBerry Citrix (XenMobile) Good Technology IBM (Maas360) MobileIron SAP (Afaria) Soti (Mobicontrol) Symantec Tangoe Knowing which one works best for you takes effort. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

13 Preparing for EMM and Implementation
Before you choose and implement your EMM, you need to understand your options and ensure you have the best option for your solution, but also take into consideration the long-term effort in implementing and maintain your EMM program so that you identify and meet your goals and objectives. Core Functions Included in Today’s EMM Products and Services: Project Initialization Environment Assessment Service Design Document Pre-Deployment Checklist Hardware Installation Work Breakdown Post-installation support Knowledge Transfer Insource or Outsource Service PREPARING FOR EMM AND IMPLEMENTATION. Before you choose and implement your EMM, you need to understand your options and ensure you have the best option for your solution, but also take into consideration the long-term effort in implementing and maintain your EMM program so that you identify and meet your goals and objectives. Core Functions Included in Today’s EMM Products and Services: Project Initialization Environment Assessment Service Design Document Pre-Deployment Checklist Hardware Installation Work Breakdown Post-installation support Knowledge Transfer Insource or Outsource Service THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

14 Program Initialization & Environmental Assessment
Getting the program started correctly will make a significant difference in how the project goes over time. The more diligent you are at the outset, the more likely you will meet your objectives in a timely manner with fewer mistakes. Project risk mitigation starts with understanding the roles, responsibilities, and milestones. Determine and document the stakeholder project goals Review of project phases and action items and expected duration of each phase. Analyze current environment for integration with EMM Service requirements. Analyze current MDM Server domain policies and settings Project Initialization & Environment Assessment. Getting the program started correctly will make a significant difference in how the project goes over time. The more diligent you are at the outset, the more likely you will meet your objectives in a timely manner with fewer mistakes. Project risk mitigation starts with understanding the roles, responsibilities, and milestones. Determine and document the stakeholder project goals. Review of project phases and action items including: EMM assessment and documentation; pre-deployment; installation; post-installation; and knowledge Transfer; and the expected duration of each phase. Review of customer environment (e.g. messaging platform, network layout, etc.) EMM Environment Assessment. Analyze Customer’s environment for integration with new EMM service. If an existing MDM Server domain exists, analyze current MDM Server domain policies and settings THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

15 Service Design and Document Creation
Your EMM service design document is based on an assessment of the environment. The detailed assessment needs to take into consideration current and future hardware; software and applications; and network components and their integration. Recommended EMM device service architecture. Detail integration with stakeholder infrastructure. Recommended IT policy rules based on security requirements and current MDM-related IT policies. Identify best practice recommendations. Service Design and Document Creation Your EMM service design document is based on an assessment of the environment. The detailed assessment needs to take into consideration current and future hardware; software and applications; and network components and their integration. The EMM service design document includes, but is not limited to, the following information. Recommended EMM device service architecture. EMM integration with Customer infrastructure. Mail Server, Firewall and DMZ and Proxy, Microsoft SQL Server, or other server integration requirements, Active Directory, SMTP, Certificate Infrastructure, VPN Infrastructure, Recommended IT policy rules based on Customer security requirements current. Best practice recommendations. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

16 Pre-Deployment Checklist
Now that you have gone through the assessment process and have documented the new EMM requirements, it is imperative that the pre- deployment checklist be created for an objective implementation of the new system components and the integration thereof. Using a checklist will keep you focused. Review EMM design document and determined implementation requirements: Minimum hardware requirements Operating system and third-party software Network and firewall requirements Permissions (e.g. local server(s), database, etc.) Pre-deployment Checklist. Now that you have gone through the assessment process and have documented the new EMM requirements, it is imperative that the pre-deployment checklist be created for an objective implementation of the new system components and the integration thereof. Using a checklist will keep you focused. Be Ready to Go Before You Begin Deployment by Reviewing: Review EMM design document and determined implementation requirements: Minimum hardware requirements Operating system and third-party software Network and firewall requirements Permissions (e.g. local server(s), database, etc.) With pre-deployment tasks completed, the next step is the Hardware Installation Checklist. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

17 Hardware Installation Checklist
EMM services can be cloud- based, on-premises, and hybrid platform services. The type of service you choose varies based on your security policies and the integration requirements to existing hardware relating to your computing and application environment and the composition of your network. Verify all requirements are completed. Install on-site core EMM service server. Identify and install additional database and application servers as required. Install remote server access as needed and configure access to EMM domain(s) Hardware Installation Checklist. EMM services can be cloud-based, on-premises, and hybrid platform services. The type of service you choose varies based on your security policies and the integration requirements to existing hardware relating to your: computing and application environment; and the composition of your network. Using the Hardware Checklist Helps Project Task Completion: Verify all requirements are completed. Install on-site core EMM service server. Identify and install additional database and application servers as required. Install remote server access as needed and configure access to EMM domain(s) THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

18 Post-installation Support
Now that the components are set up and connected, there are the final tasks required to initialize the EMM system associated with getting the platform configured for your user profiles and access to secure applications and content as needed in their mobile communications and workflow for operations. Validate EMM service installation Configure the settings in EMM admin service Activate devices on EMM service Test configured settings and verify functionality Post-installation Support. Now that the components are set up and connected, there are the final tasks required to initialize the EMM system associated with getting the platform configured for your user profiles and access to secure applications and content as needed in their mobile communications and workflow for operations. Validate EMM service installation. Configure the following settings in EMM Administration Service: Enter additional Client Access Licenses. Configure log retention in BlackBerry Administration Service and BlackBerry Server Configuration utility. Create up to two (2) custom roles. Create up to two (2) administrator accounts. Configure device activation settings, SMTP settings, and template. Review IT policy best practices and create up to two (2) custom IT policies. Create up to two (2) each of the following profiles: Wi-Fi® VPN Proxy SCEP Configure application repository and create up to two (2) software configurations. Create up to two (2) groups and associate profiles with group(s). Configure deployment job default delay. Activate devices on EMM service. Test configured settings and verify functionality. Verify devices are able to receive and send messages and synchronize PIM information (e.g. calendar and contacts). Verify profiles and settings associated with EMM devices are applied (e.g. Wi-Fi, IT policy, software configuration, etc.). Log into EMM and verify access to MDM domain(s). THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

19 THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT
Knowledge Transfer For a smoother transition to the EMM platform and its functions and features, post- installation training is an important final step. The EMM provider or associated mobility management services will need to work with your personnel to train them on they daily use of the system and provide future assistance as required. Review platform functions and features. Administration service overview. Review common administrator and user issues. Answer questions relating to operational setup for profiles and security parameters. Knowledge Transfer. For a smoother transition to the EMM platform and its functions and features, post-installation training is an important final step. The EMM provider - or associated mobility management services - will need to work with your personnel to train them on they daily use of the system and provide future assistance as required. Platform training Overview for Conclusion of the Implementation: Review platform functions and features. Administration service overview. Review common issues encountered by administrators and users. Answer questions relating to operational setup for profiles and security parameters. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

20 Insource or Outsource? That is the Question
Presently, most organizations that are using MDM or EMM platforms to manage their mobile devices, applications, and content, do it them selves. More and more, we are seeing managed services providers picking up more of this business as outsourcing becomes an option to offload work to skilled workers. Insourcing Issues: Provides higher-level control and security for organizational resources and information property from the EMM and local proximity to the entire environment. Can promote an atmosphere where more personal, in-person attention can be provided for routine support. Outsourcing Issues: Present the options and bring in the subject-matter experts to answer your questions for consideration Can provide an atmosphere where current staff can provide for complex support leaving routine support outsourced. Insource or Outsource? That is the Question. Presently, most organizations that are using MDM or EMM platforms to manage their mobile devices, applications, and content, do it them selves. More and more, we are seeing managed services providers picking up more of this business as outsourcing becomes an option to offload work to skilled workers. Insourcing Issues: Provides higher-level control and security for organizational resources and information property from the EMM and local proximity to the entire environment. Can promote an atmosphere where more personal, in-person attention can be provided for routine support. Outsourcing Issues: Present the options and bring in the subject-matter experts to answer your questions for consideration. Can provide an atmosphere where current staff can provide for complex support leaving routine support outsourced. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

21 Hosted Mobility Management Service
Hosted Mobility Management Service (HMMS) provides a turnkey enterprise managed mobility (EMM) solution that manages licensing, installation, mobile-policy configuration, and ongoing administration and end user support as an extension of client IT departments. T-Mobile HMMS is available via a cloud- based, hybrid, or on-premises (virtual cloud) platform. Reasons why Hosted Mobile Managed Services at Taking Hold: Reduce up-front costs Remove the technology risks Outsource clients’ IT bottleneck Easy to scale and extensible Hosted Mobility Management Service. MANAGING YOUR MOBILE DEVICES AND SECURING YOUR INTELLECTUAL PROPERTY IS OUR CONCERN. T-Mobile provides a turnkey MDM solution that can manage licensing, installation, mobile-policy configuration, and ongoing user support as an extension of enterprise IT departments. T-Mobile Hosted Mobility Management Services (HMMS) is available via a cloud-based or on-premises (virtual cloud) platform. With end-to-end HMMS, you can: Reduce up-front costs.  By moving to a cloud-based subscription model, up-front hardware and licensing costs are eliminated, and licensing is moved to a cost-friendly operating expenses model spread out over a long-term deployment. Remove the technology risk.  With a subscription, companies are not locked in to a long-term commitment for any one MDM vendor solution. If at any time there is a better or more appropriate solution, they can simply decide to subscribe to a different vendor. Outsource your IT bottleneck.  T-Mobile provides 24 by 7 support to manage all aspects of the MDM solution so you don’t have to, from provisioning new employees to enforcing access policies; tracking lost devices; troubleshooting applications, devices, and networks; and more. Easily scale your subscription.  Companies only pay for the devices under management each month.  T-Mobile brings you industry-grade solutions for hosted mobile device management and managed support. We in combination with our partner, DMI, provide you with the levels of support you need to make sure your systems are running as needed and that you have the support you need for your IT department, help desk, and mobile users. We license and support MobileIron, SOTI, and Airwatch. If you are happy with your current mobile device management solution, we can help you with our managed services for the platform of your choice. We care about your business and want to help you operate more efficiently and save money. We will support devices on any carrier’s network and our involvement is solution and carrier agnostic. Now that your company information is traveling all over the world, you need to ensure that you have control of your mobile assets and the information that is resident on them. Mobile device management is what you need. THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B

22 T-Mobile is here to Help You Succeed
You have to make an informed decision and need the resources and support to get the information to determine your needs, qualify your options, and validate and respond to your concerns. Without this support, it is easy to make an expensive mistake. T-Mobile has the expertise and consultative support to help. Core Functions Included in Today’s EMM Products and Services: Review current environment and determine likely best candidates for your EMM platform options Present the options and bring in the subject-matter experts to answer your questions for consideration Ultimately provide an optimal HMMS & EMM answer T-Mobile is here to Help You Succeed You have to make an informed decision and need the resources and support to get the information to determine your needs, qualify your options, and validate and respond to your concerns. Without this support, it is easy to make an expensive mistake. T-Mobile has the expertise and consultative support to help. Core Functions Included in Today’s EMM Products and Services: Review current environment and determine likely best candidates for your EMM platform options Present the options and bring in the subject-matter experts to answer your questions for consideration Ultimately provide an optimal HMMS & EMM answer THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT TO ACTIVATE READING: SHIFT+CTRL+Y TO READ THIS PAGE: SHIFT+CTRL+V TO READ TO END OF DOCUMENT: SHIFT+CTRL+B


Download ppt "Enterprise Mobility Management:, Taking MDM to the Next Level"

Similar presentations


Ads by Google