Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Speaker Name, Title Windows 8 Pro: For Small Business.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
City of Boroondara Mobile Device Management
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
IBM Endpoint Manager for Mobile Devices Mobile Device Management
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Which server is right for you? Get in Contact with us
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Meraki Mobile Device Management
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
IT’s Gone Mobile: How to do your Job Anywhere Jason Hand IT Specialist, Central NM Electric Cooperative Jason Hand Cell:
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
User and Device Management
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
With xTV, Quickly Build Your Enterprise.TV Network, a Single-Destination, Real-Time Stream of Information to Inform Customers, Employees, Partners & Investors.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Craig Pringle & Derek Moir
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
Mobile Devices in the Corporate World
Product Specialist Enterprise Mobility Technical Readiness EMEA
Top 10 Strategic Technology Trends for 2013
Mobile Data Solutions Inc
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Top 10 Strategic Technology Trends for 2013
MICROSOFT AZURE ISV PROFILE: ONEBE
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
Zendos Tecnologia Utilizes the Powerful, Scalable
COMPLETE BUSINESS TEXTING SOLUTION
IT Management, Simplified
Presentation transcript:

Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing

Agenda Consumerization of IT Defining Mobile Device Management Numara Cloud Mobile Device Management

CONSUMERIZATION OF IT Mobile Device Management

In the News

5 Trends Leading to Consumerization of IT 1.The rise of social media as a business application i.e. LinkedIn and Salesforce.com 2.The blurring of work and home Forrester Research: 43% of the American workforce will have the option to telecommute by The emergence of new mobile devices By 2013, global smartphone shipments will exceed PC shipments for the first time. 4.Shifting business models Reliance on social media and ecommerce 5.Employee expectations of corporate IT Facebook, open source generation coming into the workforce

What Challenges Are You Facing? Effective IT Security Policies and Procedures How to manage and ensure security of data on the move When to restrict device content and capabilities Device and user profile management Ensuring Technical Ability to support Security Policies Knowledge of devices and mobile OSs Effective perimeter security (i.e. firewalls, VPN etc…) Effective Mobile Device Management Software Employee Resistance to Managed Personal Devices Co-mingling of personal and corporate data on the same device IT ability to monitor and remotely wipe the device Geo-Location aka Big Brother

What Opportunities Can You Take Advantage of? Revamp Security Policies and Procedures In place of taking a piece-meal approach, take the opportunity for an overhaul of existing policies in support of consumerization. Revamp of Perimeter Security Hardware & Software (i.e. MDM) Updated and tightened perimeter to support hybrid devices accessing the corporate network. Increased Employee Productivity The top metric used to support consumerization ROI is employee productivity followed by employee moral. * * Source: CIO.com study of IT Consumerization

DEFINING THE DISCIPLINE Mobile Device Management

So What is Mobile Device Management (MDM)? Mobile Device Management is managing and securing devices Protecting Microsoft Exchange from unmanaged devices Remotely provisioning Remotely troubleshooting Backing up and restoring Policy management Preventing theft and recovering lost devices Managing inventory Reporting on mobile infrastructure

Conservative estimates place value of pure MDM model at $180m in 2011, with CAGR of 30% over next 2-3 years Gartner predicts adoption rate of MDM $(M) 30% CAGR Gartner Market Growth Expectations Source: Gartner, 2011

Mobile Device Management Lifecycle InventoryConfigureMonitorSecure Backup & Recovery Identify mobile devices on network Hardware and software ID On-device file system management End-user self-registration Assess exposure to malicious Remote deployment & management Executive reports Geo-locate devices with Google Maps TM Lock and Wipe Prevent sharing of critical data via Restore contacts, calendar, SMS, multimedia, files Recover lost or stolen devices Auto-deployment Auto-provision configuration, pass codes and security policies Prevent unauthorized Microsoft Exchange access

Defining The Discipline Partnering With The End User –Make it easy for the user to do their job in MDM –Take the Geek out of configuration –Being sensitive to privacy concerns

Defining The Discipline Making IT feel Comfortable –Securing corporate data –Ensuring limited interaction required –Providing a robust toolset

Defining The Discipline Transitioning to a Device is a Device –MDM is becoming an IT responsibility –Balancing corporate policies on personal devices –Needs to be founded in strong ITIL based best practices

NUMARA CLOUD MOBILE DEVICE MANAGEMENT KEY FEATURES

Key Features 100% web based cloud offering Enjoy the full inventory of your wireless devices Self-Service Registration and Auto Provisioning Manage applications Provision settings Over the Air Actions Corporate Protection Integrated helpdesk Remote Control Geo-Location

Over the Air Actions Remote detonate/wipe Remote auto-lock policy Enable/disable camera or Bluetooth capabilities Enforce device encryption Blacklist applications Prevent users from installing blocked third party applications SIM card change policy Security applications support Backup/restore contacts, calendar, SMS, bookmarks, notes, sales, and folders (across devices)

Corporate Protection Numara Software Exchange Defender TM – Prevent unmanaged mobile devices from accessing and sharing critical data and documents via Numara Software Exchange Investigator TM – Quickly assess risk and exposure to malicious hackers with executive level reporting detailing the number of users and mobile devices connected to Exchange

Self-Service Registration and Auto Provisioning Just got that new iPhone and have no idea how to connect to Exchange or what the WiFi security key is? –Easy via company Self Service Page –User registers with their phone number and follows a text message to the App store –Once registered, the defined auto provision packages are automatically deployed. Out of the box Exchange, Wireless, and Pass code security provisioning

FEATURE TOUR Mobile Device Management

Self-Service Registration

SMS Message

Profiles Provisioned

Lock Phone

Install Client

Device Activated

MDM Client Installed

Detect Jailbroken iOS Device

GEO Locating iOS

THE WRAP-UP Mobile Device Management

Numara Cloud Mobile Device Management IT Consumerization is here to stay. Organizations need a flexible and robust MDM solution Numara Cloud MDM provides IT organizations the control they need to securely manage mobile devices throughout their entire lifecycle.

QUESTIONS?