Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.

Similar presentations


Presentation on theme: "Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices."— Presentation transcript:

1 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

2 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Mobility Management Mobile Security Mobile Device Management Mobile Application Management Mobile Content Management Mobile Management 2

3 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 3 IT Challenges IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. Securing proprietary content DLP Privacy of Employees Data Network Access Network Security Lost and stolen devices Supporting new and unknown equipment

4 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 4 Create A Policy Mobile Devices Supported Data Plans Security Compliance Privacy Type of Applications allowed and usage Services – what can employees access ( , VPN.. ) Agreement that outlines employee devices with corporate data

5 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Security Key Considerations Enable multifactor user authentication Enforce consistent security policies Encrypt sensitive corporate data Support internal PKI and 3rd party certificates Manage user access to corporate resources Establish network access controls Enforce compliance rules and actions Remotely wipe enterprise data 5

6 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Management Key Considerations Create a corporate container for documents Enforce multifactor user authentication Manage user access rights and file privileges Define standard and custom file metadata Distribute files over encrypted connections Integrate with SharePoint or other file servers Delegate admin control across internal groups Track document versions, updates and usage 6

7 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Architecture 7 Automated Monitoring Automate monitoring through a direct plug in to Microsofts System Center Operations Manager (SCOM) Disaster Recovery Setup software in a remote data center and enable in the event of a data center failure High Availability Deploy in a highly available environment with all components made to instantly fail over without downtime Scalability Deploy 10 to 100,000 devices through a configuration that easily scales to support additional device capacity Configurability Deploy the specific software to your environment and architecture requirements Multi-tenancy Absorb fragmentation within your corporate infrastructure into a single instance of AirWatch

8 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 8 Prevent Unapproved Systems and Devices from Accessing Corporate Resources Device Ownership Device Staging Device Registration User Authentication End User License Agreements (EULAs) Restrictions

9 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Protect Employee Privacy 9 GMail Employee Device Exchange Personal Apps Business Apps Calls Messages GPS Location User Info Enable BYOD by ensuring the privacy of personal data Set privacy policies that do not collect personal data Customize policies based on device ownership Corporate – Dedicated Corporate – Shared Employee – Owned Define granular privacy policies for employee-owned devices GPS location User info Name Phone number account Telecom data Calls Messages Data usage Public apps

10 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Ensure Device Compliance 10 Build Policies Application list Compromised status Encryption Model, OS version Passcode Roaming Define Escalation Time based: Minutes Hours Days Tiered actions Repeat actions Specify Actions Send SMS, , push notification Request device check-in Remove or block specific profiles Install compliance profile Remove all profiles Remove or block apps Enterprise wipe 123

11 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 11 Measure ROI Compare partially subsidized data plan to a corporate plan Evaluate reduced hardware costs due to elimination of the cost of device Cost of a fully subsidized data plan versus a partially subsidized plan Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform

12 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch 6,500 customers 150 countries 18 languages 1200 employees 12 Our Mission: Simplify Enterprise Mobility TM

13 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Representative Customers 13 Consumer Goods/Retail EducationHealthcare Government Services Transportation

14 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch Adrian DumbletonSales Manager EMEA 14


Download ppt "Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices."

Similar presentations


Ads by Google