We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byShania Sheron
Modified over 6 years ago
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Mobility Management Mobile Security Mobile Device Management Mobile Application Management Mobile Content Management Mobile Email Management 2
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 3 IT Challenges IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. Securing proprietary content DLP Privacy of Employees Data Network Access Network Security Lost and stolen devices Supporting new and unknown equipment
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 4 Create A Policy Mobile Devices Supported Data Plans Security Compliance Privacy Type of Applications allowed and usage Services – what can employees access (email, VPN.. ) Agreement that outlines employee devices with corporate data
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Security Key Considerations Enable multifactor user authentication Enforce consistent security policies Encrypt sensitive corporate data Support internal PKI and 3rd party certificates Manage user access to corporate resources Establish network access controls Enforce compliance rules and actions Remotely wipe enterprise data 5
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Management Key Considerations Create a corporate container for documents Enforce multifactor user authentication Manage user access rights and file privileges Define standard and custom file metadata Distribute files over encrypted connections Integrate with SharePoint or other file servers Delegate admin control across internal groups Track document versions, updates and usage 6
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Architecture 7 Automated Monitoring Automate monitoring through a direct plug in to Microsofts System Center Operations Manager (SCOM) Disaster Recovery Setup software in a remote data center and enable in the event of a data center failure High Availability Deploy in a highly available environment with all components made to instantly fail over without downtime Scalability Deploy 10 to 100,000 devices through a configuration that easily scales to support additional device capacity Configurability Deploy the specific software to your environment and architecture requirements Multi-tenancy Absorb fragmentation within your corporate infrastructure into a single instance of AirWatch
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 8 Prevent Unapproved Systems and Devices from Accessing Corporate Resources Device Ownership Device Staging Device Registration User Authentication End User License Agreements (EULAs) Restrictions
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Protect Employee Privacy 9 GMail Employee Device Exchange Personal Apps Business Apps Calls Messages GPS Location User Info Enable BYOD by ensuring the privacy of personal data Set privacy policies that do not collect personal data Customize policies based on device ownership Corporate – Dedicated Corporate – Shared Employee – Owned Define granular privacy policies for employee-owned devices GPS location User info Name Phone number Email account Telecom data Calls Messages Data usage Public apps
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Ensure Device Compliance 10 Build Policies Application list Compromised status Encryption Model, OS version Passcode Roaming Define Escalation Time based: Minutes Hours Days Tiered actions Repeat actions Specify Actions Send SMS, Email, push notification Request device check-in Remove or block specific profiles Install compliance profile Remove all profiles Remove or block apps Enterprise wipe 123
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. 11 Measure ROI Compare partially subsidized data plan to a corporate plan Evaluate reduced hardware costs due to elimination of the cost of device Cost of a fully subsidized data plan versus a partially subsidized plan Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch 6,500 customers 150 countries 18 languages 1200 employees 12 Our Mission: Simplify Enterprise Mobility TM
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Representative Customers 13 Consumer Goods/Retail EducationHealthcare Government Services Transportation
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. About AirWatch Adrian DumbletonSales Manager EMEA firstname.lastname@example.org 14
Govern the Flow of Data: Moving from Chaos to Control
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
AirWatch United Kingdom Pricing Mobile Device Management Including Mobile Application Management and Mobile Management Effective April 1, 2012.
1 Confidential Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management MobileIron - Confidential1.
Office 365 for Enterprises ITExpo February 2, 2012.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Meraki Mobile Device Management
XProtect® Expert 2013 Product presentation
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
Understanding Active Directory
Unified Logs and Reporting for Hybrid Centralized Management
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
© 2021 SlidePlayer.com Inc. All rights reserved.