Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.

Slides:



Advertisements
Similar presentations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Advertisements

Paul Roberts – Enterprise Mobility Specialist
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Device Evolution Greg Pelton Chief Technology Officer
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
1 Marc Randall #AvayaATF © 2014 Avaya Inc. All rights reserved. Sr Vice President & General Manager Avaya Networking.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
By: Melissa Varghese Nikhil Madhusudhana Stella Stephens Yang Shi BYOD: Device Management.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL.
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
November 2012 | Cancun, Mexico. Avaya - Proprietary. Use pursuant to your signed agreement or Avaya policy. 2 Networking Innovation Lounge Virtual.
©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Your storage on the ground; Your files in the cloud.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
July, 2012 Citrix CloudGateway™ Technical Overview.
Chapter 2 Securing Network Server and User Workstations.
Gary Gruba Systems Engineer Absolute Manage MDM Managing iPhones, iPads, iPod Touches and Android Dougald MacNaughton Account Executive.
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
User and Device Management
Craig Pringle & Derek Moir
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
Office 365 Upsell Paths.
MaaS360 MDM for iOS, Android & Windows Phone 7
Unit 3 Virtualization.
Barracuda Mobile Device Manager
The time to address enterprise mobility is now
Mobile Data Solutions Inc
Cloud-First, Modern Windows Management and Security
Exam Prep : Section 2: Design for Device Access and Protection
Mobile Device Management
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
Enabling the hybrid cloud with remote access appliances
Microsoft Virtual Academy
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management for Pacific Northwest IAUG Date: August 14th 2014 Presenter: Avaya and Cerium Networks Avaya Identity Engines

#AvayaATF © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 2 The Acronym Soup! Network Access Control NAC Mobile Device Management MDM Session Boarder Control SBC Single-Sign-On SSO Authenticates & Authorizes network access of users and ANY network attached device. Dynamically provisions the network to contain the access of users and the network attached devices Example of Solutions Avaya Identity Engines MDM manages mobile devices data, applications, passcode, wipe out, dual-persona etc. MDM manages mobile device data and apps but does NOT control nor provisions the network Example of Solutions AirWatch, Citrix Provides network security for UC applications without the need for a VPN client on the accessing device. Controls access of UC applications (NOT network access of users / devices) Example of Solutions Avaya Enterprise Session Boarder Control Authenticates & Authorizes Application access of users. Authenticates Web- based and Think Clients Applications against Federated Directories Example of Solutions Avaya Identity Engines

© 2010 Avaya Inc. All rights reserved. 3 - BP Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. Avaya idEngines ® When this came…

© 2010 Avaya Inc. All rights reserved. 4 - BP Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. Avaya idEngines ® Everything changed… Time Magazine, Aug 18th Bill Gates invests $150M to save Apple On-Time Departures Apple App Store Google Play Store Tablets in 2012 Tablets in 2013 Smartphones in 2011 Smartphones in 2012 Smartphones in 2016 Social Media Users Google Apps Downloads   Delayed/Cancelled Departures Windows Phone Apps Blackberry Z10 Apps  

© 2010 Avaya Inc. All rights reserved. 5 - BP Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. Avaya idEngines ® YES pls do bring your own iPad YES pls do you are welcome to use Wifi VOIP YES pls do you are welcome to use virtual desktop YES pls do you are welcome to do mobile collaboration NO sorry you cannot bring your iPad NO sorry you cannot connect outdoor NO sorry you cannot do video conferencing NO sorry you cannot bring your fancy laptop It is not About Saying No!! It is About Staying in Control!!

© 2010 Avaya Inc. All rights reserved. 6 - BP Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. Avaya idEngines ® It is about a solution that combines control and flexibility!!

© 2010 Avaya Inc. All rights reserved. 7 - BP Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. Avaya idEngines ® It is about a solution that combines control and flexibility!!

#AvayaATF © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 8 ©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Typical MDM Solution Server & Client Components Server component sends out management commands to devices Client component runs on device to receive and implement commands Must have an agent installed and maintained Constant 24x7 race after device and OS updates Deployment -- On-premise and Cloud based solutions 8

#AvayaATF © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 9 ©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL MDM Capabilities Basic Features Inventory Management & Real Time Reporting Setting Passcode Policies Remote Lock and Full Wipe Remote Selective Wipe Configuration of , Wi-Fi, VPN, Certs. Access Controls Jail-broken / Rooted Device Detection Advanced Features Enterprise App Catalog App Blacklisting / Whitelisting Secure Document Sharing Geo Location Event-based Security and Compliance Rules Engine Roaming Usage Dual Persona  separate Personal vs. Corporate content Monitor access to App Store Data encryption 9

#AvayaATF © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 10 ©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL MDM Market Landscape 100+ vendors who claim some level of MDM functionality 20 vendors in Gartner MDM MQ None of the Networking vendors provide true MDM capabilities Requires to keep-up with intense pace of mobile device market updates and innovation 10

#AvayaATF © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 11 ©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL MDM Capabilities and the Use Cases Cross platform device support Configuration management Device monitoring License control Software distribution Inventory & asset control 11 MDM requirements vary depending on use case

#AvayaATF © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 12 ©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL MDM Capabilities and the Use Cases 12 MDM requirements vary depending on use case organizations w/ very large number of mobile users small number of mobile users non-regulated organizations (e.g. retail) strongly regulated e.g. Finance, defense data encryption, dual persona, selective wipe detect OS & version, installed apps, roaming usage, content, device wipe

#AvayaATF © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 13 MDM = Mobile Device Management MDM Features Inventory Management & Real Time Reporting Setting Passcode Policies Remote Lock and Full Wipe Remote Selective Wipe Configuration of , Wi-Fi, VPN, Certificats Access Controls Jail-broken / Rooted Device Detection Roaming Usage Dual Persona MDM Architecture Server & Client Components  Server component sends out management commands to devices  Client component runs on device to receive and implement commands Must have an agent installed and maintained Constant 24x7 race after device and OS updates Deployment  On-premise and Cloud based solutions