We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byShania Sheron
Modified over 3 years ago
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Mobility Management Mobile Security Mobile Device Management Mobile Application Management Mobile Content Management Mobile Email Management 2
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 3 IT Challenges IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. Securing proprietary content DLP Privacy of Employees Data Network Access Network Security Lost and stolen devices Supporting new and unknown equipment
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 4 Create A Policy Mobile Devices Supported Data Plans Security Compliance Privacy Type of Applications allowed and usage Services – what can employees access (email, VPN.. ) Agreement that outlines employee devices with corporate data
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Security Key Considerations Enable multifactor user authentication Enforce consistent security policies Encrypt sensitive corporate data Support internal PKI and 3rd party certificates Manage user access to corporate resources Establish network access controls Enforce compliance rules and actions Remotely wipe enterprise data 5
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Management Key Considerations Create a corporate container for documents Enforce multifactor user authentication Manage user access rights and file privileges Define standard and custom file metadata Distribute files over encrypted connections Integrate with SharePoint or other file servers Delegate admin control across internal groups Track document versions, updates and usage 6
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Architecture 7 Automated Monitoring Automate monitoring through a direct plug in to Microsofts System Center Operations Manager (SCOM) Disaster Recovery Setup software in a remote data center and enable in the event of a data center failure High Availability Deploy in a highly available environment with all components made to instantly fail over without downtime Scalability Deploy 10 to 100,000 devices through a configuration that easily scales to support additional device capacity Configurability Deploy the specific software to your environment and architecture requirements Multi-tenancy Absorb fragmentation within your corporate infrastructure into a single instance of AirWatch
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 8 Prevent Unapproved Systems and Devices from Accessing Corporate Resources Device Ownership Device Staging Device Registration User Authentication End User License Agreements (EULAs) Restrictions
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Protect Employee Privacy 9 GMail Employee Device Exchange Personal Apps Business Apps Calls Messages GPS Location User Info Enable BYOD by ensuring the privacy of personal data Set privacy policies that do not collect personal data Customize policies based on device ownership Corporate – Dedicated Corporate – Shared Employee – Owned Define granular privacy policies for employee-owned devices GPS location User info Name Phone number Email account Telecom data Calls Messages Data usage Public apps
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Ensure Device Compliance 10 Build Policies Application list Compromised status Encryption Model, OS version Passcode Roaming Define Escalation Time based: Minutes Hours Days Tiered actions Repeat actions Specify Actions Send SMS, Email, push notification Request device check-in Remove or block specific profiles Install compliance profile Remove all profiles Remove or block apps Enterprise wipe 123
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 11 Measure ROI Compare partially subsidized data plan to a corporate plan Evaluate reduced hardware costs due to elimination of the cost of device Cost of a fully subsidized data plan versus a partially subsidized plan Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch 6,500 customers 150 countries 18 languages 1200 employees 12 Our Mission: Simplify Enterprise Mobility TM
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Representative Customers 13 Consumer Goods/Retail EducationHealthcare Government Services Transportation
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch Adrian DumbletonSales Manager EMEA firstname.lastname@example.org 14
AirWatch United Kingdom Pricing Mobile Device Management Including Mobile Application Management and Mobile Management Effective April 1, 2012.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Meraki Mobile Device Management
Chapter 2 Securing Network Server and User Workstations.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Office 365 for Enterprises ITExpo February 2, 2012.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Total Enterprise Mobility Comprehensive Management and Security
© 2017 SlidePlayer.com Inc. All rights reserved.