City of Boroondara Mobile Device Management

Slides:



Advertisements
Similar presentations
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Advertisements

Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.
Security for Mobile Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
National Aeronautics and Space Administration NASA Mobility.
Cloud Computing - clearing the fog Rob Gear 8 th December 2009.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Cisco and NetApp Confidential. Distributed under non-disclosure only. Name Date FlexPod Entry-level Solution FlexPod Value, Sized Right for Smaller Workloads.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Mobile Business Intelligence Sam Beroz 3/2/2011. Mobile BI Speeds Up Decisions Data where and when you need it Bi-directional data access moves beyond.
Cloud Usability Framework
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Making patients’ views count Frequent Feedback Service Regula Dent Marketing Manager Picker Institute 21 April 2009.
Motorola Mobility Services Platform
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Management Information Systems
S ECURE M OBILE W ORKSPACES – N EXT G ENERATION D ESKTOPS E MPOWERING A GILE G OVERNMENT J EFF P ORTER - D IRECTOR P LATFORM TECHNOLOGY D IVISION D EPARTMENT.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
TELUS Work Styles Copyright © TELUS Corporation. All rights reserved. Neither the whole nor any part of this work maybe copied, scanned, reproduced, or.
Empowering Your Users-Security & Mobility Bil Martin 1.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
10/8/20151 Mobile Apps and QAD Stephen McHugh Broom Street Software 03-17,2013.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Mobile Device Management Overview Information Security Office.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
© 2012 IBM Corporation IBM Mobile Virtualization Services TRIAL (based on Citrix backend infrastructure) Daniel Stössel – Workplace Services Sales Leader.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Accessing Student Data What Reporters Need to Know Aimee Guidera| Founder & Executive Director May 2014.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Mobile device management
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
How to Securely Enable Your Mobile Workforce Board Books Kirk Wolfe 11/17/2015.
Data management with mobile devices © 2014 wheresjenny.com Data management with mobile devices.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Data Management With Mobile Devices ©2015 albert-learning.com Data management with mobile devices.
What Are the Different Platforms for Enterprise Mobility Solutions?
Total Enterprise Mobility Comprehensive Management and Security
BYOD Security Risks Presentation by Ravi Namboori Visit
Data-centric security of Blutalon
Contract Lifecycle Management In the Disruptive Age
Windows 10 Enterprise E3 for Small and Medium Business
2016 Citrix presentation.
Microsoft 365 Business Customer Targeting 2/6/18
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Microsoft 365 Business Technical Fundamentals Series
Plan and design the solution
Overview Presentation
Presentation transcript:

City of Boroondara Mobile Device Management Case Study Jim Papazoglou

Current Environment The adoption of next-generation mobile technologies, such as smartphones, is rapidly driving users to embrace a more portable lifestyle. These business-centric devices provide the workforce with more options and greater flexibility to stay informed, responsive and productive from any location. The demands on IT to provide greater access to sensitive business data and applications is also growing. This further compounds the challenges of securing and managing this infrastructure.

IT Challenges Mobile devices have created a number of new challenges and issues: Protecting against malicious access when mobile devices are misplaced or stolen. Enforcing corporate security and configuration policies. Simplifying provisioning and activation without overwhelming. Ensuring consistent management across mobile and non-mobile systems.

City of Boroondara Solution After reviewing various products with costs ranging from 8K – 30K we decided on a product called Airwatch. Reasons for this decision as follows: Gartner positioned AirWatch as a leader based on an evaluation of completeness of vision and ability to execute. Our maturity regarding these products is low so we are beginning at a lower base. Cost, we got more “bang for our buck”.

Where are we at now? Have implemented Airwatch and are piloting with small group. Devices we are testing: iPhone, iPad and Android. What is our focus with this pilot: Ease of management devices on our network. Application deployment. Security features.

Next steps Feedback from pilot group. Tweaking of system. Deploy to councillors and open to whole organisation.