Presentation on theme: "SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the."— Presentation transcript:
of employees spend at least some portion of their time working outside their office. Mobility is the new normal annual growth rate for software as a service (SaaS) delivery model. 66%30%80% of employees use personal devices for work purposes.
Top Concerns for Mobile Device Management Security Need to manage devices securely, providing access to needed apps and data Need to protect organization from non-approved app use Need the ability to selectively wipe corporate data from personal devices to prevent company data from getting into the wrong hands if stolen or employee leaves Licensing Optimization Users may be accessing resources that they are not licensed for, putting the organization at risk of non-compliance Struggle to understand what devices must be counted and how bring your own devices (BYOD) will affect licensing agreements Exposure to higher security risks for data theft and leakage, particularly if the device is lost or stolen. Compromised devices can act as a backdoor to the corporate network. Properly covering employee-owned devices while minimizing licensing costs employee-owned devices Simplifying license management while enabling easier ways to track and support compliance
…leading to these top BYOD security risks for the organization Defining a security policy Enforcing security policies Information on devices Interactions with the cloud Unmanaged connections to the internal network Impact of Bring Your Own Devices (BYOD) BYOD is here to stay… 67% of people who use a smartphone for work and 70% of people who use a tablet for work choose the devices themselves70% of people
How SAM helps support Mobile Device Managemen t Leverage mobility to increase your competitive advantage Increase productivity and security while controlling costs Be informed: know who is using what and how Tailor your mobility strategy to meet your organizational needs Align licensing to actual usage Become empowered to make the right decisions for the organization with an accurate picture of mobile device use.
MDM SAM Engagement: Step 1 Gather preliminary information about the existing environment, future goals, and security concerns Organizational Profile Security Considerations Operations Current Licensing Programs Mobile Device Use Basic information about the organization People Infrastructure
MDM SAM Engagement: Step 2 Inventory deployed software Match installations with licenses...build a detailed report on your current state Microsoft
MDM SAM Engagement: Step 3 An assessment will determine your current status using generally accepted security controls. The assessment will cover topics such as: Mobile Device and Application Management Mobile Device Security Mobile Application Security We will also discuss best ways to balance trade-offs between security controls and usability.
Deployment Consideration s Selecting the right management platform now includes looking at how well it matches your mobile device management needs and objectives for the organization.
Licensing Considerations User Device Location Is the user covered by the Microsoft Core Client Access License (CAL) Suite or the Microsoft Enterprise CAL Suite on a per-user basis? Is the user the single primary user* of the device? Can the organization easily identify the primary user of the device? Is the device covered by the Core CAL Suite or Enterprise CAL Suite on a per-device basis? Is the device running a qualified Microsoft operating system? Is the device a “qualified device” or a “qualified third-party device”? Is the device accessing a virtual desktop infrastructure (VDI)? Is the device owned by the employee or the organization? Will the user access the software on the corporate premises (on- site)? Will the user access the software remotely from outside of the corporate premises (off-site)?
Topics covered by SAM Policies and Processes How much control do you want to maintain over user-owned devices? Example policy: The IT department reserves the right to approve accessibility or refuse connectivity for any personal devices that do not meet security and software requirements as defined by corporate policy. What constitutes acceptable use of corporate IT resources on user-owned mobile devices? How are devices authenticated? What data and apps can users access? What are the minimum security controls that are required? Can you identify the employees, vendors, and others accessing organizational resources? How effective is your security awareness training?
The Path Forward How secure is the IT environment? What licensing is in place? Where do MDM improvement opportunities exist? Are there any licensing issues to discuss?