Enterprise Mobility Management (EMM)

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
MOBILE DEVICE MANAGEMENT IN THE REAL WORLD! JOE ATNIP, CONCEPT TECHNOLOGY INCORPORATED JAMES BOCK, COMMUNITY BANK & TRUST JUDY LONG, FIRST CITIZENS NATIONAL.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
By: Melissa Varghese Nikhil Madhusudhana Stella Stephens Yang Shi BYOD: Device Management.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Mobile device management
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
User and Device Management
The Claromentis Digital Workplace An Introduction
Mobile Device Management ZEST4. Features of Zest4 MDM  Security  Device Management  Control  Support.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Mobile Devices in the Corporate World
Phase 4: Manage Deployment
The time to address enterprise mobility is now
Deployment Planning Services
Mobilize your Enterprise Today Enterprise Mobile Device Management
How to Define a Successful Mobility Strategy
Mobilize your Enterprise Today Enterprise Mobile Device Management
Deployment Planning Services
Mobile Data Solutions Inc
Styr på filopbevaring og fildeling
Cloud-First, Modern Windows Management and Security
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Mobilize your Enterprise Today Enterprise Mobile Device Management
BYOD Enterprise Mobile Security for IOS Devices
Introduction to Soonr by ….
Call AVG Antivirus Support | Fix Your PC
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Introduction to BYOD EIT, Author Gay Robertson, 2017.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
16. Account Monitoring and Control
COMPLETE BUSINESS TEXTING SOLUTION
Microsoft 365 Business Technical Fundamentals Series
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Enterprise Mobility Management (EMM) Rishabh Sinha MDM Team 51610766

Content What is EMM? History/ How it came to picture Uses/ mobility Stategy. Why is it becoming popular? MDM is not enough! MDM BYOD EMM other features(MAM, MCM, MEM) AIRWATCH vs other Venders.

What is meant by enterprise mobility? What is an EMM? Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing the increasing array of mobile devices, wireless networks, and related services to enable broad use of mobile computing in a business context.   What is meant by enterprise mobility? Enterprise mobility is the trend toward a shift in work habits, with more employees working out of the office and using mobile devices and cloud services to perform business tasks. The term refers not only to mobile workers and mobile devices, but also to the mobility of corporate data.

History/ How it came to picture? Five years ago the enterprise was dominated by Blackberry, formerly known as RIM. In 2010 Blackberry had 43% U.S. smartphone market share. The popularity of Blackberry in the business world created a pressing need for mobile device management (MDM), which was created to enable IT full access and control to manage employee mobile devices. MDM was broadly accepted in the early days of enterprise mobility when companies bought Blackberry phones for their employees en masse.

Overview. Enterprise mobility management (EMM) is an all-encompassing approach to securing and enabling employee use of smartphones and tablets. In addition to addressing security concerns, a strong EMM strategy also helps employees be more productive by providing them with the tools they need to perform work-related tasks on mobile devices. EMM typically involves some combination of mobile device management (MDM), mobile application management (MAM) and mobile content management (MCM). MDM focuses on locking down mobile devices, while MAM focuses on controlling which users can access which applications and MIM focuses on allowing only approved applications to access corporate data or transmit it.

Security Email Devices Workspace Apps Browsing Content BYOD Uses/ Mobility Stategy Security Email Devices Workspace Apps Browsing Content BYOD

Why?

Why is it becoming popular?

Why EMM, Why not just MDM?? MDM alone isn’t enough!!!

EMM vs MDM When Bring Your Own Device (BYOD) was making a dramatic entrance with enterprises a few years ago, Mobile Device Management (MDM) seemed an effective counterbalance to the security concerns posed by the influx of new devices. But just a few short years later, it’s clear that MDM alone isn’t enough to address all the concerns in an enterprise mobility program. In response, the market has moved to a new acronym du jour, Enterprise Mobility Management (EMM).   Where MDM limited admins to managing at a device level, EMM solutions expand the capabilities of IT to set up policies on an application and information level. And because it wouldn’t be business software if there weren’t an acronymed accompanying every single software feature, the terms describing EMM features are best divided into these categories:

Mobile Application Management (MAM) management of devices from application level, like putting a wrapper around an app or configuring how applications access information, both from the business network and from other apps on the device Mobile Identity Management (MIM) functions like role-based access that apply context such as geo-fencing to determine not only who’s using the device, but also where they’re using it from Mobile Content Management (MCM) oversight and control at a content level, which can include copy and paste restriction and access to business content repositories like Sharepoint

Along with MDM, these three categories help articulate the broad reach of EMM for managing mobility. However, this multi-layered approach isn’t a concession to additional complexity, but rather a method for centralizing the management of mobile devices for IT admins.

Now, lets come to a very important aspect of EMM that is Mobile Device Management(MDM)

Mobile device management (MDM) is the administrative area dealing with deploying, securing, monitoring, integrating and managing mobile devices, such as smartphones,tablets and laptops, in the workplace. The intent of MDM is to optimize the functionality and security of mobile devices within the enterprise, while simultaneously protecting the corporate network.

Definition: Mobile device management software allows distribution of applications, software allows administrators to oversee mobile devices as easily as desktop computers and provides optimal performance for users. MDM tools should include application management, file synchronization and sharing, data security tools, and support for either a corporate-owned or personally owned device.data and configuration settings and patches for such devices.

Ideal, MDM

The ideal mobile device management tool: Is compatible with all common hand held device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary. Can deploy next-generation hardware, operating platforms and applications quickly. Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.

MDM Challenges

MDM Challenges: Security & Compliance enforcement Reduce support cost of mobile assets Provide application & performance management Provide better business continuity Make employees more productive & more satisfied

From a Technology Perspective:

MDM from a Technology Perspective: Solutions that provide coordinated visibility & control over ALL devices & operating systems. Enforce Passcode Protection, Encryption, & Security Updates Control Network & Application settings Remotely locate, block, or wipe (full & selective) devices that have been lost, stolen, or are no longer authorized. Secure Email, Messaging, & Browsing Whitelisting & Blacklisting Be easy to use, centrally managed, and quick to deploy

Vendors

MDM Vendors in Market: MDM Considerations. CA Technologies MDM. AirWatch by VMware. Citrix XenMobile. Amtel MDM. Dell EMM. BlackBerry BES10. Good Technology MDM.

BYOD, is new cost effective feature of EMM

What is the BYOD? Bring your own device (BYOD) is an IT policy where employees are allowed or encouraged to use their personal mobile devices—and, increasingly, notebook PCs—to access enterprise data and systems. There are four basic options, which allow: Unlimited access for personal devices.

Why Organizations prefer BYOD.

BYOD has the potential for big cost savings because organizations don't waste money on corporate phones. Plus, when an employee can work from and use a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. 

Risks involved.

What are the Concerns? The sensitive data present on a device that is lost, stolen or in the possession of someone who leaves the company. An infected personal device connecting to the corporate network. Malicious apps downloaded by an user. Theft of data via uploading to a personal device.

Other features of EMM MAM MCM MEM

 Mobile application management (MAM).

Mobile application management (MAM) describes software and services responsible for provisioning and controlling access to internally developed and commercially available mobile apps used in business settings on both company-provided and “bring your own” smartphones and tablet computers. Mobile application management provides granular controls at the application level that enable administrators to manage and secure app data. MAM differs from mobile device management(MDM), which focuses on controlling the entire device and requires that users enroll their device and install a service agent. While some enterprise mobility management(EMM) suites include a MAM function, their capabilities may be limited in comparison to stand-alone MAM solutions because EMM suites require a device management profile in order to enable app management capabilities.  

 Mobile content management (MCM).

Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices. The main component of a mobile content management system is a file storage and filesharing service. Some services are entirely based in the cloud; others take a middleware approach that connects existing data repositories, such as network file shares, to a mobile-friendly front end.

MCM should also incorporate identity management, giving IT and/or business leaders control over end user access to specific sets of data.  MCM products offer additional security features for endpoint devices. An example is AirWatch's Secure Content Locker, which uses secure storage containers to protect data downloaded to a mobile device.

Mobile Email management (MEM).

Mobile email management (MEM) ensures your corporate emails are containerized using advanced proprietary/free encryption algorithms. MEM ensures all emails remain inside the secure container, so that attackers get encrypted data even if they try to compromise the device data using USB cable on a system. Heavy restrictions on clipboard, attachments and trusted domains can be enforced. Nothing can move in-out of the secure container as clipboard is disabled. Even the attachments are downloaded and saved inside the secure container. To view the attachments there is secure document reader as well as secure document editor available in MDM solutions. Adding trusted domains will ensure that data from corporate email is not leaked to malicious/suspicious domains.

AirWatch is an Atlanta-based provider of enterprise mobility management (EMM) software and standalone management systems for content, applications and email.

Why vmware?

Why vmware is better than others:

Gartner reviews on Airwatch Gartner recognizes AirWatch as a Leader positioned HIGHEST in ability to EXECUTE and furthest in completeness of VISION for Enterprise Mobility Management. This is the sixth consecutive year AirWatch is recognized as a LEADER.

Thank you