SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.

Slides:



Advertisements
Similar presentations
Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
2 Agenda Introductions – Kathleen Wetherell Introduction of the Enterprise Mobility Suite– Kathleen Wetherell Overview of Microsoft’s Intune with Product.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Mobility is the new normal 52% of information workers across 17 countries report using three or more devices for work* 52% 90% of enterprises will have.
SAM for Non-production Environments Presenter Name.
SAM for Cloud Readiness
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Empowering Your Users-Security & Mobility Bil Martin 1.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Application Management
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
SAM for SQL Workloads Presenter Name.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
User and Device Management
13% of information workers say they use tablets at work… … but IT is aware of only 6% 13% of information workers say they use tablets at work… … but.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Craig Pringle & Derek Moir
PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved Aruba Networks.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Compete strategically in the enterprise—sell Microsoft Application Platform. Help grow revenue and accelerate adoption and Software Assurance attach. Microsoft.
Moving to BYOD Gary Audin 1.
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
SAM Baseline Review Engagement
Barracuda Mobile Device Manager
SAM for Mobile Device Management
The time to address enterprise mobility is now
Transforming business
Customer Guide to Limited-Time Offer
Styr på filopbevaring og fildeling
Impact of IT Consumerisation on Enterprise Security
Microsoft SAM for Hosting (SPLA)
How to prepare for the End of License of Windows Server 2012/R2
SAM Cloud Productivity Engagement
SAM Server Optimization Engagement
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
SAM Infrastructure Optimization Engagement
SAM GDPR Assessment <Insert partner logo here>
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Battle Card: Why Cloud Partner go do’s
In the attack index…what number is your Company?
Continuous Services and Connected Devices
Microsoft 365 Business Technical Fundamentals Series
Contract Optimization Assessment
Microsoft Virtual Academy
Workplace Modernization Assessment
Presentation transcript:

SAM for Mobile Device Management Presenter Name

of employees spend at least some portion of their time working outside their office. Mobility is the new normal annual growth rate for software as a service (SaaS) delivery model. 66%30%80% of employees use personal devices for work purposes.

What’s driving change? DevicesAppsData

Top Concerns for Mobile Device Management Security Need to manage devices securely, providing access to needed apps and data Need to protect organization from non-approved app use Need the ability to selectively wipe corporate data from personal devices to prevent company data from getting into the wrong hands if stolen or employee leaves Licensing Optimization Users may be accessing resources that they are not licensed for, putting the organization at risk of non-compliance Struggle to understand what devices must be counted and how bring your own devices (BYOD) will affect licensing agreements Exposure to higher security risks for data theft and leakage, particularly if the device is lost or stolen. Compromised devices can act as a backdoor to the corporate network. Properly covering employee-owned devices while minimizing licensing costs employee-owned devices Simplifying license management while enabling easier ways to track and support compliance

…leading to these top BYOD security risks for the organization Defining a security policy Enforcing security policies Information on devices Interactions with the cloud Unmanaged connections to the internal network Impact of Bring Your Own Devices (BYOD) BYOD is here to stay… 67% of people who use a smartphone for work and 70% of people who use a tablet for work choose the devices themselves70% of people

How SAM helps support Mobile Device Managemen t Leverage mobility to increase your competitive advantage Increase productivity and security while controlling costs Be informed: know who is using what and how Tailor your mobility strategy to meet your organizational needs Align licensing to actual usage Become empowered to make the right decisions for the organization with an accurate picture of mobile device use.

MDM SAM Engagement: Step 1 Gather preliminary information about the existing environment, future goals, and security concerns Organizational Profile Security Considerations Operations Current Licensing Programs Mobile Device Use Basic information about the organization People Infrastructure

MDM SAM Engagement: Step 2 Inventory deployed software Match installations with licenses...build a detailed report on your current state Microsoft

MDM SAM Engagement: Step 3 An assessment will determine your current status using generally accepted security controls. The assessment will cover topics such as: Mobile Device and Application Management Mobile Device Security Mobile Application Security We will also discuss best ways to balance trade-offs between security controls and usability.

Deployment Consideration s Selecting the right management platform now includes looking at how well it matches your mobile device management needs and objectives for the organization.

Licensing Considerations User Device Location Is the user covered by the Microsoft Core Client Access License (CAL) Suite or the Microsoft Enterprise CAL Suite on a per-user basis? Is the user the single primary user* of the device? Can the organization easily identify the primary user of the device? Is the device covered by the Core CAL Suite or Enterprise CAL Suite on a per-device basis? Is the device running a qualified Microsoft operating system? Is the device a “qualified device” or a “qualified third-party device”? Is the device accessing a virtual desktop infrastructure (VDI)? Is the device owned by the employee or the organization? Will the user access the software on the corporate premises (on- site)? Will the user access the software remotely from outside of the corporate premises (off-site)?

Topics covered by SAM Policies and Processes How much control do you want to maintain over user-owned devices? Example policy: The IT department reserves the right to approve accessibility or refuse connectivity for any personal devices that do not meet security and software requirements as defined by corporate policy. What constitutes acceptable use of corporate IT resources on user-owned mobile devices? How are devices authenticated? What data and apps can users access? What are the minimum security controls that are required? Can you identify the employees, vendors, and others accessing organizational resources? How effective is your security awareness training?

The Path Forward How secure is the IT environment? What licensing is in place? Where do MDM improvement opportunities exist? Are there any licensing issues to discuss?

Next Steps and Q&A