Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enterprise Mobility Management (EMM)

Similar presentations


Presentation on theme: "Enterprise Mobility Management (EMM)"— Presentation transcript:

1 Enterprise Mobility Management (EMM)
Rishabh Sinha MDM Team

2 Content What is EMM? History/ How it came to picture
Uses/ mobility Stategy. Why is it becoming popular? MDM is not enough! MDM BYOD EMM other features(MAM, MCM, MEM) AIRWATCH vs other Venders.

3

4 What is meant by enterprise mobility?
What is an EMM? Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing the increasing array of mobile devices, wireless networks, and related services to enable broad use of mobile computing in a business context. What is meant by enterprise mobility? Enterprise mobility is the trend toward a shift in work habits, with more employees working out of the office and using mobile devices and cloud services to perform business tasks. The term refers not only to mobile workers and mobile devices, but also to the mobility of corporate data.

5 History/ How it came to picture?
Five years ago the enterprise was dominated by Blackberry, formerly known as RIM. In 2010 Blackberry had 43% U.S. smartphone market share. The popularity of Blackberry in the business world created a pressing need for mobile device management (MDM), which was created to enable IT full access and control to manage employee mobile devices. MDM was broadly accepted in the early days of enterprise mobility when companies bought Blackberry phones for their employees en masse.

6 Overview. Enterprise mobility management (EMM) is an all-encompassing approach to securing and enabling employee use of smartphones and tablets. In addition to addressing security concerns, a strong EMM strategy also helps employees be more productive by providing them with the tools they need to perform work-related tasks on mobile devices. EMM typically involves some combination of mobile device management (MDM), mobile application management (MAM) and mobile content management (MCM). MDM focuses on locking down mobile devices, while MAM focuses on controlling which users can access which applications and MIM focuses on allowing only approved applications to access corporate data or transmit it.

7

8 Security Email Devices Workspace Apps Browsing Content BYOD
Uses/ Mobility Stategy Security Devices Workspace Apps Browsing Content BYOD

9 Why?

10 Why is it becoming popular?

11 Why EMM, Why not just MDM?? MDM alone isn’t enough!!!

12 EMM vs MDM When Bring Your Own Device (BYOD) was making a dramatic entrance with enterprises a few years ago, Mobile Device Management (MDM) seemed an effective counterbalance to the security concerns posed by the influx of new devices. But just a few short years later, it’s clear that MDM alone isn’t enough to address all the concerns in an enterprise mobility program. In response, the market has moved to a new acronym du jour, Enterprise Mobility Management (EMM). Where MDM limited admins to managing at a device level, EMM solutions expand the capabilities of IT to set up policies on an application and information level. And because it wouldn’t be business software if there weren’t an acronymed accompanying every single software feature, the terms describing EMM features are best divided into these categories:

13 Mobile Application Management (MAM)
management of devices from application level, like putting a wrapper around an app or configuring how applications access information, both from the business network and from other apps on the device Mobile Identity Management (MIM) functions like role-based access that apply context such as geo-fencing to determine not only who’s using the device, but also where they’re using it from Mobile Content Management (MCM) oversight and control at a content level, which can include copy and paste restriction and access to business content repositories like Sharepoint

14 Along with MDM, these three categories help articulate the broad reach of EMM for managing mobility. However, this multi-layered approach isn’t a concession to additional complexity, but rather a method for centralizing the management of mobile devices for IT admins.

15 Now, lets come to a very important aspect of EMM that is Mobile Device Management(MDM)

16 Mobile device management (MDM) is the administrative area dealing with deploying, securing, monitoring, integrating and managing mobile devices, such as smartphones,tablets and laptops, in the workplace. The intent of MDM is to optimize the functionality and security of mobile devices within the enterprise, while simultaneously protecting the corporate network.

17 Definition: Mobile device management software allows distribution of applications, software allows administrators to oversee mobile devices as easily as desktop computers and provides optimal performance for users. MDM tools should include application management, file synchronization and sharing, data security tools, and support for either a corporate-owned or personally owned device.data and configuration settings and patches for such devices.

18 Ideal, MDM

19 The ideal mobile device management tool:
Is compatible with all common hand held device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary. Can deploy next-generation hardware, operating platforms and applications quickly. Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.

20 MDM Challenges

21 MDM Challenges: Security & Compliance enforcement
Reduce support cost of mobile assets Provide application & performance management Provide better business continuity Make employees more productive & more satisfied

22 From a Technology Perspective:

23 MDM from a Technology Perspective:
Solutions that provide coordinated visibility & control over ALL devices & operating systems. Enforce Passcode Protection, Encryption, & Security Updates Control Network & Application settings Remotely locate, block, or wipe (full & selective) devices that have been lost, stolen, or are no longer authorized. Secure , Messaging, & Browsing Whitelisting & Blacklisting Be easy to use, centrally managed, and quick to deploy

24 Vendors

25 MDM Vendors in Market: MDM Considerations. CA Technologies MDM.
AirWatch by VMware. Citrix XenMobile. Amtel MDM. Dell EMM. BlackBerry BES10. Good Technology MDM.

26 BYOD, is new cost effective feature of EMM

27 What is the BYOD? Bring your own device (BYOD) is an IT policy where employees are allowed or encouraged to use their personal mobile devices—and, increasingly, notebook PCs—to access enterprise data and systems. There are four basic options, which allow: Unlimited access for personal devices.

28 Why Organizations prefer
BYOD.

29 BYOD has the potential for big cost savings because organizations don't waste money on corporate phones. Plus, when an employee can work from and use a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. 

30

31 Risks involved.

32 What are the Concerns? The sensitive data present on a device that is lost, stolen or in the possession of someone who leaves the company. An infected personal device connecting to the corporate network. Malicious apps downloaded by an user. Theft of data via uploading to a personal device.

33 Other features of EMM MAM MCM MEM

34  Mobile application management (MAM).

35 Mobile application management (MAM) describes software and services responsible for provisioning and controlling access to internally developed and commercially available mobile apps used in business settings on both company-provided and “bring your own” smartphones and tablet computers. Mobile application management provides granular controls at the application level that enable administrators to manage and secure app data. MAM differs from mobile device management(MDM), which focuses on controlling the entire device and requires that users enroll their device and install a service agent. While some enterprise mobility management(EMM) suites include a MAM function, their capabilities may be limited in comparison to stand-alone MAM solutions because EMM suites require a device management profile in order to enable app management capabilities.

36  Mobile content management (MCM).

37 Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices. The main component of a mobile content management system is a file storage and filesharing service. Some services are entirely based in the cloud; others take a middleware approach that connects existing data repositories, such as network file shares, to a mobile-friendly front end.

38 MCM should also incorporate identity management, giving IT and/or business leaders control over end user access to specific sets of data.  MCM products offer additional security features for endpoint devices. An example is AirWatch's Secure Content Locker, which uses secure storage containers to protect data downloaded to a mobile device.

39 Mobile Email management (MEM).

40 Mobile management (MEM) ensures your corporate s are containerized using advanced proprietary/free encryption algorithms. MEM ensures all s remain inside the secure container, so that attackers get encrypted data even if they try to compromise the device data using USB cable on a system. Heavy restrictions on clipboard, attachments and trusted domains can be enforced. Nothing can move in-out of the secure container as clipboard is disabled. Even the attachments are downloaded and saved inside the secure container. To view the attachments there is secure document reader as well as secure document editor available in MDM solutions. Adding trusted domains will ensure that data from corporate is not leaked to malicious/suspicious domains.

41 AirWatch is an Atlanta-based provider of enterprise mobility management (EMM) software and standalone management systems for content, applications and .

42 Why vmware?

43 Why vmware is better than others:

44 Gartner reviews on Airwatch
Gartner recognizes AirWatch as a Leader positioned HIGHEST in ability to EXECUTE and furthest in completeness of VISION for Enterprise Mobility Management. This is the sixth consecutive year AirWatch is recognized as a LEADER.

45 Thank you


Download ppt "Enterprise Mobility Management (EMM)"

Similar presentations


Ads by Google