We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byShania Sheron
Modified over 2 years ago
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Mobility Management Mobile Security Mobile Device Management Mobile Application Management Mobile Content Management Mobile Management 2
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 3 IT Challenges IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. Securing proprietary content DLP Privacy of Employees Data Network Access Network Security Lost and stolen devices Supporting new and unknown equipment
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 4 Create A Policy Mobile Devices Supported Data Plans Security Compliance Privacy Type of Applications allowed and usage Services – what can employees access ( , VPN.. ) Agreement that outlines employee devices with corporate data
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Security Key Considerations Enable multifactor user authentication Enforce consistent security policies Encrypt sensitive corporate data Support internal PKI and 3rd party certificates Manage user access to corporate resources Establish network access controls Enforce compliance rules and actions Remotely wipe enterprise data 5
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Management Key Considerations Create a corporate container for documents Enforce multifactor user authentication Manage user access rights and file privileges Define standard and custom file metadata Distribute files over encrypted connections Integrate with SharePoint or other file servers Delegate admin control across internal groups Track document versions, updates and usage 6
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Architecture 7 Automated Monitoring Automate monitoring through a direct plug in to Microsofts System Center Operations Manager (SCOM) Disaster Recovery Setup software in a remote data center and enable in the event of a data center failure High Availability Deploy in a highly available environment with all components made to instantly fail over without downtime Scalability Deploy 10 to 100,000 devices through a configuration that easily scales to support additional device capacity Configurability Deploy the specific software to your environment and architecture requirements Multi-tenancy Absorb fragmentation within your corporate infrastructure into a single instance of AirWatch
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 8 Prevent Unapproved Systems and Devices from Accessing Corporate Resources Device Ownership Device Staging Device Registration User Authentication End User License Agreements (EULAs) Restrictions
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Protect Employee Privacy 9 GMail Employee Device Exchange Personal Apps Business Apps Calls Messages GPS Location User Info Enable BYOD by ensuring the privacy of personal data Set privacy policies that do not collect personal data Customize policies based on device ownership Corporate – Dedicated Corporate – Shared Employee – Owned Define granular privacy policies for employee-owned devices GPS location User info Name Phone number account Telecom data Calls Messages Data usage Public apps
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Ensure Device Compliance 10 Build Policies Application list Compromised status Encryption Model, OS version Passcode Roaming Define Escalation Time based: Minutes Hours Days Tiered actions Repeat actions Specify Actions Send SMS, , push notification Request device check-in Remove or block specific profiles Install compliance profile Remove all profiles Remove or block apps Enterprise wipe 123
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 11 Measure ROI Compare partially subsidized data plan to a corporate plan Evaluate reduced hardware costs due to elimination of the cost of device Cost of a fully subsidized data plan versus a partially subsidized plan Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch 6,500 customers 150 countries 18 languages 1200 employees 12 Our Mission: Simplify Enterprise Mobility TM
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Representative Customers 13 Consumer Goods/Retail EducationHealthcare Government Services Transportation
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch Adrian DumbletonSales Manager EMEA 14
© 2012 VMware Inc. All rights reserved Confidential VMware Sales Byte Virtualization Expansion for Simplified Desktop Management.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology.
1 A Cloud Reference Framework … for discussion only … Please send comments and suggestions to Bhumip Khasnabish Friday,
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
SharePoint Governance Questions January 2014 ©2014 SUSAN HANLEY LLC.
SMS 2003 R2 and System Center Configuration Manager 2007 Technical Drilldown Martin Dey Director, Product Marketing Windows and Enterprise Management Division.
Venkatesh Gopalakrishnan Group Program Manager Microsoft Corporation WSV305 Lambert Green Development Lead Microsoft Corporation.
January 17, 2014 Aaron Stuart Product Manager Research In Motion Wireless Applications for the Enterprise: Taking Your BlackBerry Deployment.
Office 365 for education Customer Deck. | Copyright© 2010 Microsoft Corporation MEET STUDENT AND EDUCATOR NEEDS LEARNING FROM ANYWHERE LOWER COSTS ENTERPRISE.
1 Services. 2 Agenda Overview –Managing the Transitions of The Networked Learning Environment Blackboard Consulting –Who We Are and What We Do Blackboard.
How Microsoft does end-to-end IT Security Bruce Cowper Senior Program Manager, Security Initiative Microsoft Canada.
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses.
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
Websense Confidential web security | data security | security © 2009 Websense, Inc. All rights reserved. Websense Confidential Websense Hosted Web.
| © 2013 Axway | All rights reserved. 1 Govern the Flow of Data: Moving from Chaos to Control Steve Jordan Director, Industry Marketing.
Microsoft ® Exchange Online Overview. Notes (hidden) The default view of this deck is a short (6-slide) presentation, targeted to mid-sized customers.
Mobile Security, Everything you NEED to know about Endpoint Security but were afraid to ask ! Matthew Johnson – Senior Technical Staff Member Mobility.
1 Unified Communications and Collaboration Campaign MM TI-BDM Deck User Guidance Purpose of this deck: –Show how Microsoft ® Unified Communications and.
Ed Duguid with subject: MACE Cloud
© 2011 Verdasys, Inc. All Rights Reserved. CONFIDENTIAL AND PROPRIETARY - DO NOT REPRODUCE. Enterprise Information Protection When DLP is Not Enough? Graham.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Enabling Cloud with SDN/Virtual.
Kunal Kodkani Senior Consultant Microsoft Corporation.
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Live Communications Server 2005 Overview Eileen Brown IT Evangelist Microsoft UK INF 251.
All Rights Reserved © Alcatel-Lucent 2006, | NMS OmniVista 2500 and 2700| December 2006 Alcatel-Lucent NMS OmniVista 2500 and 2700 Delivering the.
1 Blackboard Sales Presentation. 2 Agenda Introduction –The Company and the Community Why Blackboard –Product Strategy What Blackboard Provides –Product.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Joey Snow Technical Evangelist Microsoft Corporation Session Code: WSV207.
© 2016 SlidePlayer.com Inc. All rights reserved.