© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415) 606-4416

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Symantec App Center 1 Silvester Drobnič
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
1.How many X86 servers do you have? Are you running any HP equipment in your data center? 2.What mission critical applications are you running on these.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Meraki Mobile Device Management
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
IPhone SDK and Enterprise Peter Wood. Enterprise Upcoming iPhone support for Microsoft Exchange ActiveSync and industry-standard corporate security measures.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Lexmark Print Management
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Grow Your Business with the Mitel Applications Suite PSG Networks Mitel Business Partner.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Harris Schneiderman Account Manager Kloud Solutions.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
User and Device Management
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Accelerate Mobile App Delivery with Kinvey on vCloud Air.
#SummitNow Managing Mobile Content Wednesday 13 th November 2013 Mike Hatfield, Lead Engineer Mobile Apps, Alfresco Marc Dubresson, Dir. Mobile Product.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Total Enterprise Mobility Comprehensive Management and Security
Barracuda Mobile Device Manager
Contract Lifecycle Management In the Disruptive Age
Mobile Data Solutions Inc
Cloud-First, Modern Windows Management and Security
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
BOMGAR REMOTE SUPPORT Karl Lankford
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Get Office 2016 with Office 365 and get down to business
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Virtual Academy
Presentation transcript:

© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)

NetHope : What ICT Can Transform… healthcare humanitarian assistance information access and syndication agriculture and conservation monitoring and evaluation GIS and mapping financial services and business development education disaster response and preparedness Saving & improving lives

3 Internet IP/WiFi Access to services is changing SMS/GPRS/IP Access by Office Workers Access by Field Workers & Beneficiaries … SaaS Cloud Services/Apps

Challenges Confidential Supporting users with different handsets Deploying apps chosen by IT to the field Ensuring confidentiality of data on mobile devices Reducing costs of mobile apps through bulk licensing Reducing costs of cellular and data plans

Bridge the Gap Between Personal and Corporate Users have unrestricted access to their personal persona Download applications, make calls, share pictures, etc. The personal phone cannot be viewed/altered by the enterprise Private life remains private The corporate workspace is completely enterprise-owned and controlled Ability to provision, manage and remove corporate data on employees’ devices Access to corporate applications and infrastructure support Confidential

VMware Workspace: Embrace Enterprise Mobility Empower users with access to enterprise services while on the go Full Version of Android OS  Provide a consistent native mobile experience to employees across devices  Any application can by deployed to employees without modifications Productivity Features  Applications Exchange client, calendar, contacts, VPN and network printing  Dual-telephony and billing (planned) Distribution  Download from Android Store or push to employee’s handset from Horizon Mobile Manager. Confidential

Horizon Mobile Confidential OEM Kit deployed in the Host Android OS VMware Application Downloaded Authenticate user, deploy workspace, apps & security policies Ongoing monitoring & management Installed by handset vendor or by Verizon Authentication tool to allow for installation of workspace Authenticate and deploy apps based on user group & privilege Enforce security and usage policies. Deploy new apps and polices

Administration Web-based monitoring tool with dashboard Customization  Create corporate workspaces  Applications, security, look and feel Deploy corporate work phones over-the-air Continue to support and update devices remotely Security Remote wipe of corporate assets Leased-based authentication Always-on VPN Encryption of workspace Centrally Managed Mobile Workspaces Confidential and Proprietary, VMWare Inc., 2011

Confidential Embrace Employees’ Mobile Way of Working Control and Customize Enterprise Mobile Workspaces Securely Manage Corporate Assets on Mobile Devices VMware Horizon: Android Dual-persona Mobile Workspace

VMware Horizon Managed iOS Workspace (under development) Confidential Policy-based managed collection of corporate resources on the device – apps, files and data o Authentication to control access to device and enterprise services o Protection against data loss o Governance, lifecycle management and distribution of enterprise approved apps Secure utility apps: , browser, etc. Policy-based managed collection of corporate resources on the device – apps, files and data o Authentication to control access to device and enterprise services o Protection against data loss o Governance, lifecycle management and distribution of enterprise approved apps Secure utility apps: , browser, etc. Key Features Support for corporate security, compliance and privacy policies Workspace control and customization, rather than managing the entire device including personal contents Ease of installation in enterprise IT infrastructure, scalability, reliability Productivity gains from secure , calendar, contacts, browser and other apps Support for corporate security, compliance and privacy policies Workspace control and customization, rather than managing the entire device including personal contents Ease of installation in enterprise IT infrastructure, scalability, reliability Productivity gains from secure , calendar, contacts, browser and other apps Benefits Acme Corp.’s Workspace Client App Native Apps Web Clips Referred Apps Data & Files Policies