Systems Management: The key to lower TCO. High Cost of PDA’s -Average Handheld TCO is $3,000 per year. Source: Gartner Group -Average Wireless Handheld.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
The System Center Family Microsoft. Mobile Device Manager 2008.
SMARTPHONE & TABLET CONSIDERATIONS. Smartphones and Tablets – PROVIDE VALUE FOR COUNCILS Enables mobility - Streamline business process - Remote access.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
The future of Desktops Transform Your Desktop with Virtualization.
Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
Motorola Mobility Services Platform (MSP3.2) Control Edition Optimizing use of your mobile assets Daphanie Wallace June 2008 Enterprise Mobility Solutions.
Operating System Customization
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Mobility Methods for document access while away from the office.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Troubleshooting Windows Vista Security Chapter 4.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Time Collection with Mobile Devices Session Presented by JP Issock Quality Business Consulting.
Computer Emergency Notification System (CENS)
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Session PM-4 Cost Justifying A Handheld Computing Strategy Don Sorcinelli BostonPocketPC.com.
Leveraging Handhelds for Sales and Support Force Automation Andrew Robertson Director of Technology ArcStream Solutions
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
Microsoft Management Seminar Series SMS 2003 Change Management.
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Winning Wireless Applications Corina Moore PrinterOn Corporation
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Questions Executives Should Ask Prior To Tablet Rollout ? Fritz Switzer, CAO The abletFactory.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
ITExpo January 24, 2006 Networks C OGNITRONICS Network Media Servers Conferencing and Collaboration Mike Keefe CTO Presented by.
MANAGED LAN SERVICES How will you benefit? Managed LAN service  Full LAN service (hardware, operation, other services)  Per-port pricing  International.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Desktop Virtualization —An Elegant Solution Presented by Cloud Computing. Endless Possibilities. August 10, 2012.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Simplifying IT, Empowering Business.
What’s New in Fireware v WatchGuard Training.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Moving to BYOD Gary Audin 1.
Vodafone Business Cloud
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Avtec Inc Virtualization - Securely Moving to the Cloud.
Chapter 7. Identifying Assets and Activities to Be Protected
Distributed Asset Management Making The Business Case
Cloud-First, Modern Windows Management and Security
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
PLANNING A SECURE BASELINE INSTALLATION
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

Systems Management: The key to lower TCO

High Cost of PDA’s -Average Handheld TCO is $3,000 per year. Source: Gartner Group -Average Wireless Handheld TCO is $4,554 per year. ????? Average Cost of Handheld is $300

High Cost of mobile Source: Gartner Group Capital CostsOperations Administration End User Operations $$$$$$$$

Mobile Device Cost of Ownership TCO Components Device Modem Connectivity Training Deployment Software Support User Operations * “The True Costs and Benefits of Mobile Wireless Devices”, Gartner Research Note, May 2002 Laptop TCO Roughly $9,000

Mobile Device Cost of Ownership TCO Components Hardware Device Modem Memory Cards

Mobile Device Cost of Ownership TCO Components Connectivity Security VPN Proxy Wireless Plan Data Voice Coverage Sync

Mobile Device Cost of Ownership TCO Components Management Deployment Troubleshooting Disaster Recovery Software Delivery Asset Management Training Mobile Infrastructure Solution must provide good Systems Management to overcome high TCO

Scary Facts “ Between 250,000 and 300,000 handheld devices are lost each year at airports, hotels, and customer sites—often with no password protection in place” “ 300 phones and devices are left in London cabs per week.” “Only 23% of PDAs are company-owned. 2 of 3 are supplied without any formal PDA policy or security guidelines” * PDA usage survey of 332 IT and sales personnel published by Pointsec Mobile Technologies and Infosecurity Europe (23 May 2002)

Systems Management ROI * “Mobile Device Management and Synchronization: Take Control or Lose Control”, Gartner ITXpo October 2001 Laptop Annual TCO$9,500 22% Savings$2,090 Solution Cost/User$ 200 One Year ROI945% Handheld Annual TCO$3,500 22% Savings$ 770 Solution Cost/User$ 90 One Year ROI755% “Along with desktop management tools, policy management and ‘healing tools’ are two key contributors to lowering costs by as much as 18 percent to 26 percent against base TCO numbers.” -Gartner Group*

Systems Management Device Configuration Software Installations Software Updates Device Backup Hardware Inventory Software Inventory What does is do?

Mobile challenges Security Deployment options Expensive bandwidth Bandwidth is hard to find Unreliable wireless connections Usage patterns Device management User adoption

Security Considerations Account Shut Out Connection frequency Secure Data On Device SecurID Encryption Authentication Secure Device VPN Sync disable thresholds RAS Settings Invalid login attempts Password enforcement Credential expiration Usability Secure Network Secure Communications Device deactivation

Corporate data is at risk. Security metrics –1 in 4 users not bothering to protect their PDA with a password –71% don't use encryption Corporate usage –23% of PDAs are company-owned 2 of 3 are supplied without any formal PDA policy or security guidelines –89% of workers use PDAs as a business Calendar –36% store corporate information –Just under half of those surveyed used PDAs to store passwords and PIN numbers * PDA usage survey of 332 IT and sales personnel published by Pointsec Mobile Technologies and Infosecurity Europe (23 May 2002)

Secure the devices right Protect against theft Enforce PIN entry Encrypt data stored on device Biometric sign-on Don’t over-secure!

Security Options Push to PDA phones During sync for other devices Dealing with Theft and Loss

Usability vs. Security Be realistic about security Users will not accept difficult logon routine Some procedures will lock user out

Deployment Options Key Takeaways: Administratively controlled OTA or Cradle provisioning Little or no user intervention Flexibility with availability (web site, extracting executable)

Device Configuration Profiles for Device Characteristics Proxy Connection frequency Memory allocation Ports Push Backlight settings Sync Server IP Address VPN Sync disable thresholds RAS Settings Invalid login attempts Password enforcement Credential expiration Auto update Power management Encryption options Device deactivation DNS Entries Reverse Proxy Authentication Method

The power of profiling Security Connection Rules Auto Updates Device Configs

Managing Bandwidth Guaranteed Delivery Check Point Restart Compression Bandwidth Management Delta Change Management What to look for:

Software Distribution Packaged Installs Custom Installs Performed Offline Rollback CPR Publish and subscribe model Flexibility scripting and actions What to look for:

Software Distribution Key Takeaways: Eliminates ongoing redistribution of runtimes Ensure software appears in inventory (add/remove programs) Optimize install, update or uninstall actions Bandwidth optimization End user is always a problem

Collecting Inventory Full Hardware Inventory: For a variety of device types Alerts based on information collected Tools for troubleshooting View by manufacturer, platform, or OS Full Software Inventory: For a variety of device types Review by user files/ apps delivered User’s state at anytime Publication’s state at anytime

Collecting Inventory Device Tracking/Policing Software Delivery ** General Admin and Reporting What do you need it for?:

Collecting Inventory Store data in database Provide adequate reports Use device assets as criteria for software distribution Have broad device coverage Accommodate for mobile Provide alert mechanisms Good Systems Management must:

User Adoption: Mobile Infrastructure

Usage patterns Push Technology Incremental sync Cradle Sync Wireless Sync Combination

Usage patterns Key Takeaways: Use Push Technology whenever possible Encourage User Flexibility Get a solution that does adequate reporting

Drivers for ROI Resolving helpdesk calls faster Eliminating costs of sending CDs with software updates Preventing downtime from impacting user productivity Shipping fewer devices for maintenance Keeping users focused on task…not device maintenance Improving communications efficiency to save money Reducing travel cost for IT support staff Increasing the ratio of devices to support staff

ROI from Software Distribution Assumptions 1000 employees; 4 installs per year; $10 to burn & ship CD; 25 minutes to install; user value is $100 / hr; 10% call helpdesk with issues; 35 minutes to fix problems; cost of helpdesk $50/hr; $90 / user to implement; 3 year amortization; 2MB avg install; $1 / MB wireline connectivity. Shipping CDs to Users Vs. $240,000 per year $34,000 per year 611% ROI Automated Deployment

Savings from Alerts Minimizing Downtime$ 210,000 / yr Preventing Problems$ 175,000 / yr 1000 employees; 2 incidents per year; 35 minutes to correct; user value $100 / hr; helpdesk cost $50 / hr; 1000 employees; 10% users connect per hour; 2 hours saved by alerts; 35 minutes to address issues; user value $100 / hr; helpdesk cost $50 / hr; 1 incident per month

Thank You Reminder: Please be sure to complete your session evaluation forms and place them in the box outside the room. We appreciate your feedback.