Presentation is loading. Please wait.

Presentation is loading. Please wait.

SAM for Mobile Device Management

Similar presentations


Presentation on theme: "SAM for Mobile Device Management"— Presentation transcript:

1 SAM for Mobile Device Management
Presenter Name

2 Mobility is the new normal
66% 30% 80% of employees use personal devices for work purposes. annual growth rate for software as a service (SaaS) delivery model. of employees spend at least some portion of their time working outside their office. Key Points: There are some mega trends that have been changing the world of work as many of us know it. The place where people work is no longer exclusively the workplace. People work from home, from cafes, from customer sites, on the road, in the air. In fact people can – and do – work from just about anywhere. Even when they’re in the office, people don’t expect to be sitting at their desk in order to be productive. We are in an era where mobility really is the new normal. The cloud-first, mobile-first world is here. People expect to have the ability to work where, when and how they choose. Using the devices they love and the apps they are familiar with. Just look at the story told by some of these stats: 66% of employees use personal devices for work. A large percentage of employees work away from their desk – even when they are in the office. And BYOD is going to mean a new way of working across apps and data. References: *CEB The Future of Corporate ITL: *Market Research Media Global Cloud Computing Market Forecast *Value Realization Blog Getting Business Value from the Mega Trends.

3 What’s driving change? User Devices Apps Data IT Key Points: Devices:
What’s behind this shift in work practices? There are a couple of mega trends that have taken hold. Firstly, there’s the proliferation of consumer devices – sometimes called the consumerization of IT. Users have a lot more devices to choose from. New form factors. Different platforms. Different sizes, shapes and colors. The net result is that devices become an object of personal choice and users of those devices feel a strong affinity with the devices they use. Try to force a user to settle for a device they don’t love or stop them from using the device they want and you’re asking for trouble. As it stands, over 60% of devices in the workplace are personally owned. Apps & data: Then there’s the cloud. People are always connected. And there’s an app for just about everything. This explosion of low-cost SaaS apps means that if a user can’t find a way to do what they want with the tools IT give them, it’s very easy and cheap to find their own solutions – and so Shadow IT is born. Apps need data – very soon users are finding ways to use not only personal devices but also apps to access corporate data. User: Finally, there’s a natural shift as a younger generation, a generation that has grown up in this always-connected world, enters the workforce. Your new college graduates are huge social collaborators already and are bringing those connected, collaboration skills to the workplace and expecting an infrastructure that will support them in how they work. These trends combine to create a world where mobile devices are increasingly becoming a fundamental part of the workplace.

4 Top Concerns for Mobile Device Management
Security Licensing Optimization Exposure to higher security risks for data theft and leakage, particularly if the device is lost or stolen. Compromised devices can act as a backdoor to the corporate network. Users may be accessing resources that they are not licensed for, putting the organization at risk of non-compliance Struggle to understand what devices must be counted and how bring your own devices (BYOD) will affect licensing agreements Need to manage devices securely, providing access to needed apps and data Need to protect organization from non-approved app use Need the ability to selectively wipe corporate data from personal devices to prevent company data from getting into the wrong hands if stolen or employee leaves Properly covering employee-owned devices while minimizing licensing costs employee-owned devices Simplifying license management while enabling easier ways to track and support compliance Key Points: Looking beyond the challenges introduced by BYOD, the increased use of mobile devices has broader security and licensing impacts. Some common ones are listed here.

5 …leading to these top BYOD security risks for the organization
Impact of Bring Your Own Devices (BYOD) …leading to these top BYOD security risks for the organization BYOD is here to stay… 67% of people who use a smartphone for work and 70% of people who use a tablet for work choose the devices themselves Defining a security policy Enforcing security policies Information on devices Key Points: The consumerization of IT, or BYOD trend of employees bringing personally-owned mobile devices to their place of work, and using those devices to access privileged company resources, has a big impact on an organization’s ability to manage IT security. And the challenge is growing: Globally, 88% of executives report employees are using their personal computing technologies for business purposes today* Globally, 62% of executives say they are now have or are planning to have a BYOD program for smartphones and tablets* Historically, most or all devices used in the workplace were owned and therefore managed by the organization. Policies and processes were focused on device management—and usually on a relatively small, tightly controlled, and managed set of corporate-approved hardware that was subject to predetermined corporate replacement cycles. BYOD introduces new challenges, including the need to define and enforce policies about user-owned devices, to collect information on the devices, to understand how these devices interact with the cloud, and the need to deal with unmanaged connections to the corporate network. Sources: * Forrester: Building The Business Case For A Bring-Your-Own-Device (BYOD) Program *Gartner: Using Peer-to-Peer communities to Drive BYOD self-support; Aug 3, 2012 * Interactions with the cloud Unmanaged connections to the internal network

6 How SAM helps support Mobile Device Management
Leverage mobility to increase your competitive advantage Increase productivity and security while controlling costs Be informed: know who is using what and how Tailor your mobility strategy to meet your organizational needs Align licensing to actual usage Become empowered to make the right decisions for the organization with an accurate picture of mobile device use. Key Points: The benefits of a Mobile Device Management SAM Engagement are to help you: Leverage mobility to increase your competitive advantage: Enhance the ability of your IT department to leverage mobility for the organization’s competitive advantage and keep users productive while avoiding unnecessary risks. Increase productivity and security while controlling costs: Help make employees more productive and business processes more efficient, while at the same time controlling costs and maintaining a secure environment. Be informed: know who is using what and how: Increase security by knowing what devices are connecting to your network so they can be controlled. Tailor your mobility strategy to meet your organizational needs: Increase the organization’s ability to tailor their mobility strategy to meet the current needs of the organization, and to update the strategy over time as the organization’s needs, capabilities, or resources change. Align licensing to actual usage: Avoid risks of non-compliance with software licensing by knowing what mobile devices, both corporate owned and BYOD, are accessing corporate resources and aligning licensing to match those users/devices. Become empowered to make the right decisions for the organization with an accurate picture of mobile device use.

7 MDM SAM Engagement: Step 1
Gather preliminary information about the existing environment, future goals, and security concerns Organizational Profile Security Considerations Key Points: The first step is to find out more about your organization and any concerns regarding the security of your environment. We will cover topics such as: Organizational Profile: What are your objectives from the engagement? Which assets are the most critical to the success and competitive advantage of the company? What is your level of risk tolerance? Security controls and supporting polices should match the level of risk the organization is willing to tolerate. Basic Information: How many clients and servers are in the organization? What processes are already in place to manage software and other assets? Is there a mobile device management policy currently in place? Mobile Device Use: What is the current state of mobile device use in the organization? What percentage of employees use mobile devices for organizational use? Is the number growing and at what rate? How is use tracked? What models are currently allowed (corporate owned or personally owned) and what is the management approach for the devices? Infrastructure Security: Do employees work remotely? Do external contractors access the network? Operations Security: Does the corporate network connect to external networks? Does the organization receive data feeds from external parties? People Security: Are there any existing policies about mobile device use? Do employees respect existing policies about mobile device use? Are any controls currently in place to restrict an individual’s access to corporate information? Current Licensing Program(s): What Microsoft licensing programs are you already subscribing to? What aspects of the program address MDM? Basic information about the organization Mobile Device Use Current Licensing Programs Infrastructure Operations People

8 MDM SAM Engagement: Step 2
Inventory deployed software Match installations with licenses After establishing an organization’s goals and objectives, the next step is to complete a software review… Microsoft Key Points: In the initial part of the engagement, we will discuss your organization’s future goals and objectives. After establishing an organization’s goals and objectives, the next step of a MDM SAM engagement is to develop a clear understanding of which applications are being access by which users, and how. This information will provide the basis for the mobile device management assessment. ...build a detailed report on your current state

9 MDM SAM Engagement: Step 3
A security assessment of your IT organization will be conducted. An assessment will determine your current status using generally accepted security controls. The assessment will cover topics such as: Mobile Device and Application Management Mobile Device Security Mobile Application Security We will also discuss best ways to balance trade-offs between security controls and usability. Key Points: As part of the assessment, we will: Explain the control and talk about what it covers. Assess your current status relative to each control Provide you with recommendations on related Microsoft service and product offerings We will also assess if the user experience is being negatively impacted. For security controls to actually deliver increased security they must also be functional from a usability perspective. To work right for the enterprise the security controls will need to result in a mobile security posture that protects corporate data without encumbering your users. Controls details: Mobile Device and Application Management Data protection Device provisioning Software update management Policy management Asset Management Monitoring and Alerting Mobile Device Security Device integrity Data, application, memory isolation Policy enforcement Mobile Application Security Authorization and authentication Note to presenter: Add recommendations on any additional services that your organization can also provide as a follow up from the engagement.

10 Deployment Considerations
Selecting the right management platform now includes looking at how well it matches your mobile device management needs and objectives for the organization. Key Points: When choosing a mobile device management platform, look for a solution that can be configured to enable mobile device management to let users access company resources in a secure, managed way. By using device management, company data is protected while letting users enroll their personal or company-owned mobile devices and giving them access to company data. For example, Microsoft System Center Configuration Manager, together with Microsoft Intune, provides the following management capabilities: Over-the-Air enrollment Collect software and hardware inventory Remotely retire and wipe devices Configure compliance settings on devices, including settings for passwords, security, roaming, encryption, and wireless communication Deploy line of business apps to devices Deploy apps from the store that the device connects to: Windows Store, Windows Phone Store, App Store, or Google Play. Self-service portal for end users

11 Licensing Considerations
User Device Location Is the user covered by the Microsoft Core Client Access License (CAL) Suite or the Microsoft Enterprise CAL Suite on a per-user basis? Is the user the single primary user* of the device? Can the organization easily identify the primary user of the device? Is the device covered by the Core CAL Suite or Enterprise CAL Suite on a per-device basis? Is the device running a qualified Microsoft operating system? Is the device a “qualified device” or a “qualified third-party device”? Is the device accessing a virtual desktop infrastructure (VDI)? Is the device owned by the employee or the organization? Will the user access the software on the corporate premises (on- site)? Will the user access the software remotely from outside of the corporate premises (off-site)? Key Points: In order to determine your licensing requirements we will cover these key questions about users, devices, and locations. A “Primary user” means the user who uses the device more than 50 percent of the time in any 90-day period. Additional points that may be covered include: Is Microsoft Office deployed and licensed correctly? A typical scenario is to see Office deployed via a remote desktop service, with employees accessing Office from multiple devices, not all of which are licensed. If suite components are installed, is the entire suite correctly licensed? Where are areas for standardization and consolidation? Understanding the usage patterns of those receiving remote desktop services can highlight who requires access and who may not. If remote services include products that are not being used, there is an opportunity to identify those applications/versions and then define a more appropriate model. Is there an opportunity for cost savings by moving some or all of the workforce to cloud services such as Office 365? Reference: *Slide points are from the “Microsoft Licensing for the Consumerization of IT” licensing brief.

12 Topics covered by SAM Policies and Processes
How much control do you want to maintain over user-owned devices? What constitutes acceptable use of corporate IT resources on user-owned mobile devices? How are devices authenticated? What data and apps can users access? What are the minimum security controls that are required? Can you identify the employees, vendors, and others accessing organizational resources? How effective is your security awareness training? Example policy: The IT department reserves the right to approve accessibility or refuse connectivity for any personal devices that do not meet security and software requirements as defined by corporate policy. Key Points: A large part of the Mobile Device Management SAM Engagement is to review the SAM policies and procedures that will help you to proactively work to manage the mobile devices accessing your organization’s resources. Some of the topics we cover include best practices around the topics shown, and development of related policies that are designed specifically to address your organization’s priorities, goals, and the amount of risk your organization is comfortable in assuming (since every organization is different, and there is no such thing as zero risk).

13 The Path Forward Project scoping & technical meeting Inventory
Now Assess How secure is the IT environment? What licensing is in place? Mobile Devices Management Applications Operations Data Discuss program & next steps Organizational Objectives Understand the organization’s culture, and business goals and objectives they hope to achieve Inventory Collect data on software deployments and gather additional information on the IT environment Review & Validate Detect what assets need to be protected and potential areas of risk. Discover Plan Project scoping & technical meeting Where do MDM improvement opportunities exist? Review Are there any licensing issues to discuss? Key Points: 3 minutes We will guide you through a well- defined process to help you develop a plan to protect your environment from cyber threats based upon your future goals and a clear understanding of your current state. REVIEW THESE SPEAKER NOTES We will schedule a scoping meeting with you to have a deeper-level technical discussion to understand your environment and your unique needs. The result will be a full project plan with deliverables and deadlines. During the discovery phase, you’ll work with us to inventory and collect data on Microsoft software in your environment and the mobile devices that are accessing that software. We’ll discuss your organizational objectives, and develop a profile of your current state. In the assessment phase, we develop recommendations based upon considerations of your existing infrastructure, risk tolerance, and how your organization is positioned relative to recommended security controls. We will schedule a review meeting with you to deliver the reports and present the findings. We’ll provide you with guidance about opportunities for you to better protect your infrastructure, with a specific focus on recommendations around SAM policies and procedures to help you optimally manage mobile devices in the organization. We’ll also cover ways to best manage IT assets to help reduce waste, avoid unnecessary costs, and streamline the entire organization. Now it’s time to see what questions there are and to discuss next steps after today.

14 Next Steps and Q&A Next Steps Questions & Answers
2/14/2018 Next Steps and Q&A Next Steps Select project scoping meeting date Review and approve project plan Get started Questions & Answers What’s on your mind? © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "SAM for Mobile Device Management"

Similar presentations


Ads by Google