© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.

Slides:



Advertisements
Similar presentations
© 2012 YP Intellectual Property LLC. All rights reserved. YP, the YP logo and all other YP marks contained herein are trademarks of YP Intellectual Property.
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Symantec App Center 1 Silvester Drobnič
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
© 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobilize your Enterprise Today.
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Discussion Topics Defining Hybrid Industry Trends Unified Communications (UC) Journey Hybrid Models Hybrid Comparisons Case Study 3 © 2014 AT&T Intellectual.
© 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Communicate and Collaborate.
Category : Telecom, 4G & LTE All logos and Images mentioned on this slide belong to their respective owners.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Harris Schneiderman Account Manager Kloud Solutions.
1. 2 Single Admin Interface to Manage all mobile users and their devices: Add/Remove User profiles Add/Remove/Modify User Groups Set access permissions.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
The 2007 Microsoft Office System Andrew Lowson Solution Specialist – Portals & Collaboration Microsoft Australia
© 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Windows 8 tablets with Intel Core 64-bit processors Windows 8 tablets with Intel Atom 32-bit processors Windows RT tablets with ARM processors.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
The time to address enterprise mobility is now
Mobilize your Enterprise Today Enterprise Mobile Device Management
How to Define a Successful Mobility Strategy
Mobilize your Enterprise Today Enterprise Mobile Device Management
What is Geocortex Essentials Workflow
Deployment Planning Services
Cloud-First, Modern Windows Management and Security
Enabling Business to Move to the Cloud with Confidence
Exam Prep : Section 2: Design for Device Access and Protection
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
The power of common identity across any cloud
Microsoft Ignite /18/2018 8:30 PM BRK2065
Threat Management Gateway
Mobilize your Enterprise Today Enterprise Mobile Device Management
Microsoft Intune MAM without Device Enrollment
Welcome! Microsoft Tech Talks - Charlotte, NC
5 Business Benefits of Mobile Device Management [MDM]
Application Delivery & MAM Policy
Which is right for your business, Office 365 or Microsoft 365?
Access and Information Protection Product Overview October 2013
Which is right for your business, Office 365 or Microsoft 365?
Enabling the hybrid cloud with remote access appliances
AT&T Network Based Firewall with NetBond® for Cloud
Microsoft Virtual Academy
Microsoft Data Insights Summit
Utilizing the Network Edge
Microsoft Virtual Academy
Microsoft 365 Business Technical Fundamentals Series
Microsoft Virtual Academy
Presentation transcript:

© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem Scott Agnew May 13 th 2013

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. 2 Mobile Application Environment You know you need mobile…Now what? Target Platforms Goals Target Devices Resources Security

Application Development Options 3 Build In- house Mobile Application Platforms Mobile Application Development Third-Party Applications Build It Outsourcing BuildBuy

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. 3 BUILD VS. BUY: MOBILE APPLICATIONS Platform Approach Custom Development Multiple 5

The Three Pillars of Mobile Application Management ManagePublishSecure OTA deployment of apps Push notification and badging for new apps and updates Custom branding and design for each customer App categorization and search Publish rich content (PDF, MS Office docs, video and audio) as well as apps SSO authentication Malware checks and code inspection FIPS encryption for app and data on the device Per-app VPN to protect data in transit Copy/paste control Targeted app delete Elegant web-based admin dashboard App usage tracking and analytics Crowdsourcing to review user feedback and ratings Rapid scalability across thousands of users Version checking and compliance Force updates or mandatory app install 5 Mobile Application Management (MAM)

Elegant Admin Portal for Managing Apps and Users Add and update company apps Authorize/manage users or groups Review user feedback and ratings with crowdsourcing Apply rich security policies to protect apps and data Inspect apps for malware or poor code Run rich analytics and reports on app usage and adoption Delete apps remotely 6 Mobile Application Management

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. While MDM as a category has been around for several years, it has evolved beyond the traditional lock and wipe capabilities … 7 Mobile Device Management (MDM) WHAT’S IN SCOPE? Consumer Trends Application Management Security Management Enterprise Management Loss & Theft Management Expense Management Remote Management

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Management of mixed platforms/devices Carrier agnostic Protect Provisioning device enhances protection Application management Device monitoring Policy enforcement and notification Usage management Analysis and reporting Professional and Managed services 9 Mobile Device Management KEY CAPABILITIES & TABLE STAKES

The environment is complex but manageable Determine Buy or Build Secure the Application Infrastructure (MAM) Secure the Device (MDM) Help is available © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Summary

© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. 10 THANKYOU