Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unified Endpoint Management and Security Mobile Device Management.

Similar presentations


Presentation on theme: "Unified Endpoint Management and Security Mobile Device Management."— Presentation transcript:

1 Unified Endpoint Management and Security Mobile Device Management

2 Typical Business Challenges How can I easily manage and enforce our polices when employees are using mobile devices? How do I capitalize on the productivity gains of enabling a BYOD strategy without losing control of security policies or exposing our systems to increased security threats? How do I minimize IT operating expenses, without sacrificing productivity or security? How can I effectively inventory and manage all the corporate and personal devices that have access to our business systems? How do keep my mobile workers better connected to our applications and systems? How do I manage endpoints and mobile devices and provide end-user support without diverting my IT staff from more strategic revenue generating initiatives?

3 Gartner Endpoint Security Predictions Predicts 2013: Endpoint Security Becomes Even More Important for Infrastructure Protection as the number and types of devices accessing enterprise resources explode. Key Findings Malware authors typically attack the easiest and most prevalent targets. Mobile devices offer a range of possibilities along these two scales. Most organizations are removing URL blocks and permitting most employees to access external social media from corporate-owned and managed endpoints and networks. Published: 29 November 2012

4 Gartner MDM Recommendations What to look for in Mobile Device Management Software Recommendations Use MDM technologies, including containers, for securing enterprise data and enabling support for mobile content and users. Evaluate providers on technical critical capabilities and business factors, such as geographic reach, customer support and financial viability. Define and create mobile policies, continue to segment mobile users, and add support based on security, data, app, location and cost requirements.. Critical Capabilities for Mobile Device Management Software Published: 23 May 2013

5 Unified Endpoint Management and Security Simplifies the management, improves performance, and protects all endpoints on your network – desktop, laptop and mobile Minimize disruptions in your day-to-day business operation Delivers a service with security features woven throughout every aspect of our offering. Managed by Industry-certified professionals, utilizing best-in-class tools, and the latest technology

6 Endpoint Management Core Components Endpoint Security for all PCs/Macs in your environment EarthLink Core Protection Suite (CPS) helps ensure your PCs/Macs are kept current with virus and spyware definition updates and critical security patches for faster, smarter endpoint protection. View the health of all managed endpoints on your network from a single pane of glass. As threats emerge, EarthLink CPS enables rapid remediation Automating time-intensive tasks across complex networks, lets you can control costs while reducing risk and supporting your compliance requirements.

7 Unified Endpoint Management & Security Offerings Endpoint Offerings for Mac & PC EP Security EP M&S SaaS Anti-Malware (Anti-Virus/Spyware) Protection  SaaS Patch Management  SaaS Tools Self-healing for CenterBeam  SaaS Asset Tracking (Dashboard)  Event Notification (Notify Only)  Event Management (Receive, Log, Classify & Track)  Incident Management & Remediation  SaaS Software Distribution  SaaS Automated Hard Drive Defragmentation  CenterBeam Continuous Configuration (C3) Management  24x7 Staffed Monitoring as a Service (MaaS)  24x7 Staffed Helpdesk w/Case Tracking & Reporting  Data Protection (Streaming Offsite Backup & Recovery)  Web Content Filtering  Legend  Included  Optional  N/A

8 Benefits Unified Endpoint Management & Security Control all policies and security uniformly across all desktop and mobile devices Cost certainty (scale up/down to meet your business needs) Always current capabilities (ability to add new users, support diverse new operating systems, leverage best-in-breed tools) Enhance security posture 24x7 monitoring & remediation Asset tracking & reporting via an online dashboard Around the clock access to subject matter experts for your staff Performance optimization (keep all endpoints working at optimal speed) Easily distribute software applications

9 Mobile Device Management The “bring your own device” (BYOD) revolution, makes it more important than ever to integrate device management into your enterprise management structure. Taking a holistic approach and managing, on a single pane of glass, mobile devices alongside your servers, desktops and laptops ensures consistent application of your corporate security policies across all endpoints that access your network.

10 Mobile Device Management Protect your mobile devices as they access more and more sensitive applications and data. Protect your organization from unauthorized or corrupted devices. Detect security threats such as rooted or jail-broken devices and automatically take countermeasures. Automatically identify non-compliant devices. Configure and enforce password policies, encryption, virtual private network (VPN) access and camera use. Selectively wipe only corporate data such as calendar, email, contacts and enterprise-managed applications when a device is lost or stolen. Control non-compliance by disabling access to enterprise resources such as email and applications, or by issuing user notifications until corrective actions are implemented. Discover and understand which mobile devices employees and others connected to the network are using. 10

11 11 Mobile Device Management Services Mobile Device Management iOS Android Windows 24x7 Staffed Monitoring as a Service (MaaS)  Helpdesk w/Case Tracking & Reporting  Incident Management  Password policies, full device wipe  Deny email access, user notification  Remote lock/unlock, jailbreak & root detection  Application inventory, whitelisting, blacklisting  Enterprise app store  Track devices and locate on map  Selective wipe  Device encryption  Configuration of Email, VPN, WiFi  SaaS Asset Tracking (Dashboard)  ** Functionality varies by Manufacturer and Device OS, and is limited by the MDM APIs of the Manufacturer **

12 Mobile Device Management Benefits Provide visibility and policy management via a single pane of glass Address business and technology issues of security, complexity and bring your own device (BYOD) in mobile environments Manage enterprise and personal data separately with capabilities such as selective wipe Leverage a single infrastructure to manage all enterprise devices— smartphones, tablets, desktops, laptops and servers Support devices on Apple iOS, Google Android, and Microsoft Windows Phone platforms 12

13 End-user Helpdesk Support Options 24x7 Live IT Support for Unified Endpoint Management and Security or Mobile Device Management North American-based single point-of-contact for all of your users IT-related issues Staffed by highly trained customer care specialists, who would generally be considered Level 2 support agents Certifications in Microsoft®, Apple® and mobile device technologies Available in 13 different languages to support global work force Very first person you talk to will likely be able to resolve your issue And if not, subject matter experts are standing by

14 14 Enterprise Class Solutions Integrating desktop/laptop and mobile device endpoint management into a unified environment with consistent policies and controls Visibility, control and management of all your endpoints via one console Fully managed by certified experts who maintain and manage the solutions implemented Helpdesk support to keep your end-users productive No CAPEX or internal IT support required Award winning service EarthLink Advantages Support Team of the Year – Computer Software & Services Category Outstanding achievement in customer satisfaction 2013 IBM Tivoli Award: Excellence in delivering exceptional business value 14


Download ppt "Unified Endpoint Management and Security Mobile Device Management."

Similar presentations


Ads by Google