HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.

Slides:



Advertisements
Similar presentations
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Mobile Asset Disposition in a BYOD World Craig Boswell HOBI International, Inc.
Mobile Protection Overview
UMHS Enterprise Encryption An Overview for Medical School Departments and Centers January/February 2015.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
IT’s Gone Mobile: How to do your Job Anywhere Jason Hand IT Specialist, Central NM Electric Cooperative Jason Hand Cell:
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Getting Started with Spiceworks 7.0 Nick Rowlett Sparta Area School District Technology Director.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Lack of control for mobile devices Different tools for phone & PC Policy conflict Inconsistent user experience… Granular mobile device mgmt Converged.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
MLO’s Make It Easy For Borrowers To Understand Your Loan Proposals With The LoanQConnect Mortgage Calculator.
NEW MOBILE WEB. August ‘Mobile First’ Mentality “If you don’t have a mobile strategy, you don’t have a future strategy.” - Dr. Eric Schmidt, Executive.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
…. Make It Easy For Borrowers To Understand Your Loan Proposals With The LoanQConnect Mortgage Calculator.
Mobile Device Management Overview Information Security Office.
Installing Air Watch and updating the operating system.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Mobile Device Management ZEST4. Features of Zest4 MDM  Security  Device Management  Control  Support.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Setting Up Your New iPad. Turn on Your iPad and then… Select English Select United States Select DVUSD Mobile as your wifi network Select enable location.
Moving to BYOD Gary Audin 1.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Session 2.  Recap of Services We Provide  Refund Policy  Selling Tools Demo(s)  CRM Demo  Commission/Bonus Recap  Teen to show how to configure.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Debra Mann Reference Librarian Innisfil Public Library
Mobile Devices in the Corporate World
Fourth ICT Security Conference 2017
Barracuda Mobile Device Manager
ITO 2017.
Mobile Operating Systems
POC Open House Welcome to the POC Open House. My name is _____ and today we will learn about the iPad Courses for the Month of September. If you have any.
Mobile Data Solutions Inc
The Cost of Free Lesson 4-4.
Cloud-First, Modern Windows Management and Security
Impact of IT Consumerisation on Enterprise Security
Looking for Gmail Help? JUST CALL (800)
Staying Austin College
5 Business Benefits of Mobile Device Management [MDM]
MobileIron SMALL BUSINESS SALES PRESENTER September 2014
Office 365 MDM On the field experience
Microsoft 365 Business Technical Fundamentals Series
Personal Mobile Device Acceptable Use Policy Training Slideshow
This is a template for a presentation that you can use to introduce your team to Harvest. You can customize the content of the slides. You’ll want to pay.
Presentation transcript:

HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to show the value of managing mobile devices to the company. Yup. That rhymes!

Agenda So why are we even here? The company policy on mobile devices Mobile device management benefits What we can and cant see/control Our mobile management pledge Next steps

Mobile devices are a big part of doing business. And the here is no different. We have… X number of employees X phones with access X number of phones with company WIFI X number of tablets connecting To add a little color… Estimated 1.4B mobile devices in the world by end of phones are lost/stolen in the US every minute

The biggest challenges with mobile devices at the office Getting you the tools you need to work outside the office Understanding the WIFI usage so we can keep the system snappy Keeping data secure even outside the office Staying compliant with HIPAA and PCI regulations There are real legal implications Managing our costs for phones and plans Tracking down lost/stolen devices

We are rolling out a mobile device management (MDM) package. So what does that mean? MDM is a lightweight agent on your phone/tablet to help us manage your device. Lets ask Siri… Siri, what is MDM?

So, whats our mobile policy? The MDM Basics The MDM Works Things we can view What you get Personal devices Device type Phone number Carrier Installed software Memory usage Passcode status Serial number Policy compliance on your phone Company WIFI Things we can view What you get Company owned/subsidized devices All the basics Remotely lock your device Locate your device Remote wipe your device Reset your passcode Distribute applications on your phone Company WIFI VPN

And the bonus! Locate your phone if it is misplaced Reset your passcode in case you get locked out Lock or reset your phone if it is lost or stolen

Fret not! We arent spying. What we cant (and dont want to) see and do. Read your s View your photos See your contacts View your bank info See your passwords Locate your family See time spent in apps Make phone calls

Our pledge to you: We'll use our powers for good. We don't care what apps you have on your phone, as long as they're not malicious or snagging company data, were all good. We'll even help you get your phone back if it's lost!

So, what happens now? Review and sign the Mobile Management Contract. Youll get an from MaaS360 that includes your enrollment info. Open the on your phone. Follow the instructions to install the agent by DATE. Thats it! Youre good to go! Need some help? Let us know and well give you a hand!

Now lets hear your questions.