ENTERPRISE MOBILITY. IT CONSUMERIZATION Social Media Cloud Services Mobile Devices.

Slides:



Advertisements
Similar presentations
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Cloud Services for Education
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Harris Schneiderman Account Manager Kloud Solutions.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Consumerization of IT Microsoft in the Enterprise.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Microsoft Azure RemoteApp Michael Hacker Cloud Solutions Architect
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Dual Identity Devices By: Tony Peadick By: The Breakdown What is a dual identity device Why they were designed and who needs one How they work Availability.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
The time to address enterprise mobility is now
Mobilize your Enterprise Today Enterprise Mobile Device Management
Transforming business
Mobilize your Enterprise Today Enterprise Mobile Device Management
Deployment Planning Services
Mobile Data Solutions Inc
Mobile Device Management options in Office 365 and beyond
Impact of IT Consumerisation on Enterprise Security
Power BI Security Best Practices
Mobilize your Enterprise Today Enterprise Mobile Device Management
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
Microsoft Ignite /20/2018 2:21 PM
Access and Information Protection Product Overview October 2013
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Virtual Academy
Microsoft 365 Business Technical Fundamentals Series
Microsoft Virtual Academy
Presentation transcript:

ENTERPRISE MOBILITY

IT CONSUMERIZATION Social Media Cloud Services Mobile Devices

THE BIG IDEA One will be able to communicate, collaborate with business colleagues, agents and clients, As well as access corporate computing and data resources securely on a mobile device with a seamless user experience

Social Collaboratio n CRM Content Management Mobile Administration Android Enterprise Mobility Mobile Office Architecture Mobile busines s Objects s, Calendar, CRM, Project BI/Analytics, Video/Audi o Business appsBusiness apps

MAJOR OS MARKETSHARE

OFFICE-ON-THE-GO Mobile Virtualization

DESIGN SOLUTION A multi-layered approach Outer ideals are built upon inner requirements BYO D M V MAM MIM MDM

WHY BYOD? $avings Leverage the power of consumerization in mobile tech Convenience and Productivity of Employees Increasing pace of innovation Hardware becomes obsolete at a faster pace New capabilities added often BYOD

WITH SO MANY DEVICES, HOW DO YOU MANAGE THIS?

MOBILE VIRTUALIZATION- AN ENABLING TECHNOLOGY Standard platform on heterogeneous devices Secure employee-owned devices connecting to company network. and accessing corporate resources. Manage and provision all mobile end-points and desktop from a single interface. Mobile Virtualizatio n

MOBILE VIRTUALIZATION ADVANTAGES Integrate with Your Infrastructure Broad Hardware Support Broad Application Support Lowest Total Cost of Development Use existing applications Develop future apps for a single environment An ever-increasing concern with the pace of technological innovation and fragmentation Lowest Total Cost of Management Heterogeneous devices centrally managed as a single platform

MOBILE ADMINISTRATION Any mobile solution must address these core requirements of mobile administration: MDM MAM MIM

MDM Mobile Device Management Policy enforcement and management Access control policies specify rules about which users can authenticate to a device and perform operations on that device Password requirements on devices Inventory management Registering devices, assigning devices to groups, centralized dashboard reporting and billing tracking MDM MAM MIM

Mobile Information Management Security management Creates a secure sandbox around sensitive dataaround sensitive data Data exists separately from private information and apps Data is protected at rest with encryption, data is protected in transit, and data access is controlled so only work apps can access enterprise data. Allows only approved applications to access or transmit data MDM MAM MIM

Mobile Application Management Controls which users can access which applications on which devices Maintain security and infrastructure integrity through application blacklisting and whitelistingblacklistingwhitelisting All applications selected and managed centrally Security and consistency is ensured MDM MAM MIM

TYING IT ALL TOGETHER VMWare Horizon Mobile Manager & Windows Ecosystem An MDM approach to BYOD that goes BeYOnD MDM Extends naturally to MAM & MIM, provided by virtualized platform (Mobile OS) of choice

HORIZON MOBILE MANAGER A USER’S PERSPECTIVE Running VMware MVP makes subtle changes to the Android OS interface. Android phone’s notification bar: you’ll see events for two mobile virtualization partitions – both the work and personal data. Appear in different colors to differentiate between the events that occur in each partition. When you respond to a notification, the Mobile Virtualization Platform hypervisor intelligently switches the phone to the appropriate partition and application.

HORIZON MOBILE MANAGER Initially Android-only, now on iOS IT administrators will be able to create an iOS workspace, which is a collection of applications and data and services, set policies on that workspace and be able to secure and manage it Unmodified native iOS apps can be added to the workspace and they will automatically inherit the security policies defined by IT Android and iOS powered 85% of all smartphones shipped in the second quarter of 2012 (2Q12) (IDC)

WINDOWS ECOSYSTEM In the business world, Microsoft is a mature and proven technology.

COMMUNICATION FEATURES , contacts, calendar, and tasks Outlook Lync Calendar

SOCIAL COLLABORATION As of September 2012, Facebook has over one billion active users,one billion active more than half of them using Facebook on a mobile device.mobile device

CONTENT MANAGEMENT Sharepoint (inhouse) Office Skydrive (off-premise/cloud options)

MOBILE ADMINISTRATION MDM Several ways to wiping or locking a phone in the case of security breach InTune + System Center 2012 MAM Company Hub Blacklist and Whitelisting of applications Sideloading*** of preselected apps MIM IRM (Information Rights Management)

CUSTOMER RELATIONSHIP MANAGEMENT Microsoft Dynamics CRM

ASSESSMENT User Experience Scalability Security Speed to Market Cost Productivity

MARKET SHARE TRENDS

COMPARISON WITH CITRIX In the Citrix approach your business apps will sit side by side with your personal apps.(MAM) could be legal issues for companies that want to remote wipe a device In the VMware approach they are completely separate environments.(MDM) Businesses could also play for a phone/data plan that is only used if you are on the business side thus allowing a separate phone/data plan for the personal side

TCO external costs are the more obvious, but enterprises that let employees expense their service plans need to factor in the loss of bulk buying plans from the carriers. The internal costs are more opaque and can include: mobile device management and security software, wireless networks and access control systems, help desk and IT operations, and general IT, administration and training. BoxTone estimates that these costs total $1,500 per user per year.

ROI Productivity employees tend to work more hours when a BYOD policy is implemented. Good Technology estimates that the average employee works seven more hours per week social media tools could add as much as $1.3 trillion to the U.S economy if fully embraced, increasing knowledge worker productivity by an average of 20 to 25 percentsocial media tools improved communication and collaboration benefits cited in the report can be powerfully driven by mobility

TCO - PHYSICAL VS. VIRTUAL CAN WE CREATE A MOBILE DEVICE ANALOG TO THIS?