Understand & Develop a Mobile Management Strategy Rein in the Mobile Fleet to Ensure Enterprise Security, Productivity, and Appropriate Use of Network.

Slides:



Advertisements
Similar presentations
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Advertisements

Security for Mobile Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Mobile Asset Disposition in a BYOD World Craig Boswell HOBI International, Inc.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
MOBILIZING CRM ONE STEP AT A TIME Mark Wright, Sybase Senior Systems Consultant Nora Tucker, Sybase Product Marketing Manager Bill Laberis, IDG.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Improving Connections for the Mobile Worker Theron Dodson Ascendent Systems August 9.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Security Controls – What Works
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
1 Unified Communications Survey Summary Results Market Connections, Inc. June 2007.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
Gauteng Provincial Government
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Security considerations for mobile devices in GoRTT
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
The State of Computer & Data Security in Corporations Independent Survey.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
User and Device Management
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Practical IT Research that Drives Measurable Results Leverage Server Virtualization for DR Affordability and Agility 1Info-Tech Research Group.
Practical IT Research that Drives Measurable Results Get Started Bringing Order to Help Desk Request Chaos.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Manage the Invasion of Consumer Technology.
Practical IT Research that Drives Measurable Results Document the IT Service Catalog.
Make the Decision to Upgrade to Microsoft Office 2010.
Info-Tech Research Group Practical IT Research that Drives Measurable Results Reduce Telecom Expenses.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Get Moving with Server Virtualization.
Info-Tech Research Group1 Build a Strategy for Big Data Platforms Big Data; let’s talk about the elephant in the room.
5 Challenges in Implementing Risk Management Software (RMS)
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Benefits and Cost of Desktop Virtualization.
Practical IT Research that Drives Measurable Results Make the Case for IP Telephony 1Info-Tech Research Group.
Moving to BYOD Gary Audin 1.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
Info-Tech Research Group1 Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Atlantic Coast Operations Business Intelligence Mobility Project.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Total Enterprise Mobility Comprehensive Management and Security
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Unified Communications Survey Summary Results
Build an Enterprise IT Security Training Program
Renovate the Data Center
Select the Right Vendor for Desktop Virtualization
Gain Control of Cloud Integration Strategies Before they Float Away
Develop a Mobile Management Strategy
Document the IT Service Catalog
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Understand & Develop a Mobile Management Strategy Rein in the Mobile Fleet to Ensure Enterprise Security, Productivity, and Appropriate Use of Network Resources

Introduction Mobile device usage is outpacing traditional forms of computing such as desktop and laptop devices, surpassing them by Info-Tech research shows up to 30% of mobile devices are lost or stolen along with their corporate data and intellectual property. Info-Tech estimates that deployment and ownership of a mobile device costs a minimum of $2740 over three years, excluding long distance and roaming charges. Management tools and policies are still in the development phase and don’t necessarily integrate well with other enterprise system management tools. This solution set will help your enterprise create strategies and policies to manage mobile device growth, risk and costs in the most effective way. Understand Mobile Device Management Mobile Device Management Solutions Real World Examples Arrive at a Strategy

Executive Summary IT leader interviews revealed that the real benefit of mobile devices is in deploying key enterprise applications as part of an overall mobile strategy 58% of IT leaders are dissatisfied with their mobile device management success, particularly security Mobile device management creates cost savings that grow with the fleet Saving big on mobile device voice and data costs, the biggest mobile device expense, is as simple as switching to an individual liability policy Mobile device security must be rigorously managed. Just because you can’t see them doesn’t mean the security breach won’t hurt. Mobile device data backup and recovery is not a requirement with always on connectivity and synchronization Management functionality included in the delivery platform (i.e. Blackberry Enterprise Server (BES) or Microsoft Exchange ActiveSync) is “good enough” for most enterprises Outsourcing mobile device management is off the table for enterprises with less than 500 devices Design and communicate mobile device support processes or face dissatisfied users, some of which will be senior management

58% of IT Leaders are Dissatisfied with their Mobile Device Telecom Cost Management Satisfaction with telecom and data cost managements lags while security and compliance success is high. n = 100 Source: Info-Tech Research Group Success Factors Measured Security - Never had a serious mobile device security breach? Compliance - Avoided issues passing compliance and regulatory audits? Application Deployment - Are able to deploy mobile applications and updates over the air in less than 24 hours? Asset Management - Can identify all mobile device assets, who has them and where they are? Remote Support - Are able to provide remote support for corporate application users? Telecom and Data Cost Minimization - Have the lowest possible telecom and data costs?

Mobile Device Management Creates Ongoing Cost Savings that Grow with the Fleet 62% of Info-Tech survey respondents indicated that they had ongoing cost savings stemming from managing their mobile fleet, exclusive of telecom and data costs. n = 100 Source: Info-Tech Research Group Number of Survey Respondents Number of Mobile Devices Deployed

Saving Big on Mobile Device Voice and Data Costs is as Simple as Switching to an Individual Liability Policy While 73% of enterprises surveyed are still issuing cell phones, Info-Tech recommends individual liability is the best way to reduce costs Only 39% of enterprises Info-Tech surveyed have a corporate application deployed, one of the key factors in opting to issue a mobile device or cell phone Other criteria that may dictate a corporate liability policy, such as security and compliance needs or roaming costs, play a role but for most organizations it’s time to reevaluate the need to continue issuing corporate devices IT leaders are leaving money on the table by not getting out of the cell phone business. n = 101 Source: Info-Tech Research Group Individually Liable Cell Phone Policy 1)Users acquire their own device and plan. 2)The business reimburses a capped expense amount monthly. 3)Minimum security requirements are a prerequisite. Info-Tech Recommends:

Proactively Manage your Mobile Fleet to Minimize Risk, Cost, Downtime, Audit and Data Loss Pain. Don’t ignore those “non-smart phones”. Simple cell phones, “Aircards” and tablet computers with cellular capabilities will need to be included in your management plan. Info-Tech Insight: Apple iPhone, RIM Blackberry, Google Android, Microsoft Windows Mobile (Windows Phone), Nokia, Palm/HP webOS and Symbian all need some form of proactive management. ObjectiveMethodology Risk MinimizationCorporate data and security, backup and restore capability Cost MinimizationTelecom and data communication expense management IT Cost MinimizationSoftware deployment and maintenance Downtime MinimizationRemote support Audit and Data Loss ControlsDevice lifecycle management, asset management, error and log management

Understand Mobile Device Management Corporate or Individual Liability Mobile Device Management Policies and Standards Mobile Device Management Solutions Manufacturer Solutions Point Solutions Enterprise Systems Management Solutions Outsourcing Arrive at a Strategy AssessmentStrategy Real World Examples Small EnterpriseMid-Size EnterpriseLarge Enterprise Mobile Device Management Roadmap

Corporate vs Individual Liability - Which is Best for You? Recommended if your primary concerns include: CorporateIndividual “ Our environment requires a high degree of security, with sensitive device resident data, company issued devices was the only way. - Manager, Healthcare Provider ” “ We’ve found individual liability is the most cost effective and lowest maintenance mobile deployment policy. - Manager, Accounting Firm ”

Making Users Responsible for Mobile Device Expenses Reduces Direct Costs. Enterprises have been held accountable for cellphones as a taxable benefit. Understand tax policies for individual and corporate cellphones, i.e. IRS - Employee Cellphones. IRS - Employee Cellphones Info-Tech Insight: 1 Users acquire their own device and plan. Users acquire either a plan and device of their own choosing or a plan and device recommended by IT. Any phone number used in a corporate context becomes company property. 2 The business reimburses a capped expense amount monthly. IT leaders interviewed by Info-Tech indicated that they capped expense reimbursement for non-management staff at $65 to $80 per month and managers at $95 to $125 per month. 3 Minimum security requirements are a prerequisite. Employees must agree to the following policies: Personal Identification Number(PIN). Users will be required to have their phone’s locked with a PIN. Ten incorrect PIN entries will wipe the device. Remote Wipe. Users must agree that if they leave the company or lose their device, IT will remotely wipe out the content of the device. Encryption. All or part of the data communicated and stored on the device must be encrypted. Individual Liability Mobile Policy Pros Reduces direct costs Minimizes management costs with less IT oversight required Sidesteps any taxable benefit issues Cons Deploying corporate applications becomes difficult or impossible without operating system standardization Employees control what other applications live on their devices, a potential security risk An Individual Liability Mobile Policy will be ineffective in environments where : Extensive roaming or timely communication is required or expected. Dedicated devices for warehouse or delivery staff are required. Compliance needs override cost concerns.

Education, Transportation, Utilities and Government are Leading the Individual Liability Charge Some industries will naturally gravitate to corporate mobile devices for a variety of reasons: Specialized devices such as barcode, RFID or meter readers are impractical for individual liability Other factors such as timely communications, on-call, high mobility or extensive travel may warrant a corporately provided cell phone. In industries where IT resources are at a premium, cost is a significant concern, and information workers dominate, individual liability will flourish. Individual liability cell phone policy is gaining ground with cost conscious enterprises dominated by information workers. n = 101 Source: Info-Tech Research Group “ We’re seeing much greater adoption of individual liability mobile policy to reduce cost and stabilize monthly bills. - Manager, Mobile Device Manufacturer ”

Info-Tech Helps Professionals To: Sign up for free trial membership to get practical Solutions for your IT challenges “Info-Tech helps me to be proactive instead of reactive - a cardinal rule in stable and leading edge IT environment.” - ARCS Commercial Mortgage Co., LP