How to Define a Successful Mobility Strategy David Barter, Practice Manager, Microsoft Technologies & EUC Peter Crepeau, Enterprise Consultant & EUC Practice Architect
Introduction Peter Crepeau – Enterprise Consultant and End User Computing Practice Architect 2 Years of Service with GreenPages, 19 Years in the industry working for Value-Added Resellers Citrix Certified Expert – Virtualization, Citrix Certified Professional – Mobility David Barter – Practice Manager, Microsoft Technologies and End User Computing More than 20 years of IT industry expertise—from break-fix technician to CIO Microsoft Virtual Technical Solution Professional and CIE Certified
5 Pillars of Enterprise Mobility User and App Access Mobile Application Management Device Management Threat Protection Secure File Sharing
User and App Access
Users and Applications from Anywhere
Mobility Is Driving Business Transformation 60% of sheriffs saved 30 minutes or more per shift on paperwork U.S. Sheriff’s Department Taco, Inc. Streamlined warehouse ops with tablet-enabled forklift trucks UniPro BV, Netherlands Reduced admin costs by 50% with tablet-enabled field workers … and modernizing the workplace
IT Mobility Challenges Apps Delivering a seamless, productive app experience on any device Devices Increasing BYOD adoption Data Risk of information loss and liability
Mobile Application Management
Mobile App Management (MAM) Mobile Application Management Mobile App Management (MAM) Apply policies on a per app basis Separate personal/company apps/data App Wrapping App Containerization Better BYOD compared to MDM
Mobile Device Management
Mobile Device Management Push policies (e.g. disable WiFi, set device passcode) Monitor and manage compliance (e.g. is device jailbroken?) Provision apps automatically – deliver mobile apps to users Remotely lock or selectively wipe Leverage device security policies (e.g. encrypt data on device) Mobile lifecycle management Remove Enroll Secure Provision Publish Support
Threat Protection
Threat Protection Understand what mobile platforms are in use today within your environment iOS, Android, Windows Phone, Blackberry Good Threat protection includes detection of the following External Attacks Rogue Apps Unsafe Browsing Theft Poor Battery Use
Secure File Sharing
Secure File Sharing Empower users with instant access to data, synced across all devices Improve collaboration and productivity through secure file sharing Meet corporate data security and compliance standards with a secure service Deliver an enterprise-class service that seamlessly integrates with users workflow Enable IT to retain control and deliver a managed service
Next Steps Set up a Mobility Assessment with GreenPages. Let the in-room facilitator know and we will arrange it for you.
Thank You David Barter david.barter@logicsone.com Peter Crepeau peter.crepeau@logicsone.com