Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing
Agenda Consumerization of IT Defining Mobile Device Management Numara Cloud Mobile Device Management
CONSUMERIZATION OF IT Mobile Device Management
In the News
5 Trends Leading to Consumerization of IT 1.The rise of social media as a business application i.e. LinkedIn and Salesforce.com 2.The blurring of work and home Forrester Research: 43% of the American workforce will have the option to telecommute by The emergence of new mobile devices By 2013, global smartphone shipments will exceed PC shipments for the first time. 4.Shifting business models Reliance on social media and ecommerce 5.Employee expectations of corporate IT Facebook, open source generation coming into the workforce
What Challenges Are You Facing? Effective IT Security Policies and Procedures How to manage and ensure security of data on the move When to restrict device content and capabilities Device and user profile management Ensuring Technical Ability to support Security Policies Knowledge of devices and mobile OSs Effective perimeter security (i.e. firewalls, VPN etc…) Effective Mobile Device Management Software Employee Resistance to Managed Personal Devices Co-mingling of personal and corporate data on the same device IT ability to monitor and remotely wipe the device Geo-Location aka Big Brother
What Opportunities Can You Take Advantage of? Revamp Security Policies and Procedures In place of taking a piece-meal approach, take the opportunity for an overhaul of existing policies in support of consumerization. Revamp of Perimeter Security Hardware & Software (i.e. MDM) Updated and tightened perimeter to support hybrid devices accessing the corporate network. Increased Employee Productivity The top metric used to support consumerization ROI is employee productivity followed by employee moral. * * Source: CIO.com study of IT Consumerization
DEFINING THE DISCIPLINE Mobile Device Management
So What is Mobile Device Management (MDM)? Mobile Device Management is managing and securing devices Protecting Microsoft Exchange from unmanaged devices Remotely provisioning Remotely troubleshooting Backing up and restoring Policy management Preventing theft and recovering lost devices Managing inventory Reporting on mobile infrastructure
Conservative estimates place value of pure MDM model at $180m in 2011, with CAGR of 30% over next 2-3 years Gartner predicts adoption rate of MDM $(M) 30% CAGR Gartner Market Growth Expectations Source: Gartner, 2011
Mobile Device Management Lifecycle InventoryConfigureMonitorSecure Backup & Recovery Identify mobile devices on network Hardware and software ID On-device file system management End-user self-registration Assess exposure to malicious Remote deployment & management Executive reports Geo-locate devices with Google Maps TM Lock and Wipe Prevent sharing of critical data via Restore contacts, calendar, SMS, multimedia, files Recover lost or stolen devices Auto-deployment Auto-provision configuration, pass codes and security policies Prevent unauthorized Microsoft Exchange access
Defining The Discipline Partnering With The End User –Make it easy for the user to do their job in MDM –Take the Geek out of configuration –Being sensitive to privacy concerns
Defining The Discipline Making IT feel Comfortable –Securing corporate data –Ensuring limited interaction required –Providing a robust toolset
Defining The Discipline Transitioning to a Device is a Device –MDM is becoming an IT responsibility –Balancing corporate policies on personal devices –Needs to be founded in strong ITIL based best practices
NUMARA CLOUD MOBILE DEVICE MANAGEMENT KEY FEATURES
Key Features 100% web based cloud offering Enjoy the full inventory of your wireless devices Self-Service Registration and Auto Provisioning Manage applications Provision settings Over the Air Actions Corporate Protection Integrated helpdesk Remote Control Geo-Location
Over the Air Actions Remote detonate/wipe Remote auto-lock policy Enable/disable camera or Bluetooth capabilities Enforce device encryption Blacklist applications Prevent users from installing blocked third party applications SIM card change policy Security applications support Backup/restore contacts, calendar, SMS, bookmarks, notes, sales, and folders (across devices)
Corporate Protection Numara Software Exchange Defender TM – Prevent unmanaged mobile devices from accessing and sharing critical data and documents via Numara Software Exchange Investigator TM – Quickly assess risk and exposure to malicious hackers with executive level reporting detailing the number of users and mobile devices connected to Exchange
Self-Service Registration and Auto Provisioning Just got that new iPhone and have no idea how to connect to Exchange or what the WiFi security key is? –Easy via company Self Service Page –User registers with their phone number and follows a text message to the App store –Once registered, the defined auto provision packages are automatically deployed. Out of the box Exchange, Wireless, and Pass code security provisioning
FEATURE TOUR Mobile Device Management
Self-Service Registration
SMS Message
Profiles Provisioned
Lock Phone
Install Client
Device Activated
MDM Client Installed
Detect Jailbroken iOS Device
GEO Locating iOS
THE WRAP-UP Mobile Device Management
Numara Cloud Mobile Device Management IT Consumerization is here to stay. Organizations need a flexible and robust MDM solution Numara Cloud MDM provides IT organizations the control they need to securely manage mobile devices throughout their entire lifecycle.
QUESTIONS?