Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Device Evolution Greg Pelton Chief Technology Officer
 National association Pamela Walker, Director of Government Affairs National Association of State Chief Information Officers NLC Congressional City Conference:
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Wireless Network Security PRESENTED BY: Mr. Michael J. Hohnka Wireless Technologies Department Head Communications and Imaging Division Applied Research.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
© 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobilize your Enterprise Today.
Centralized Platform for Mobile Device Management and VoIP.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Adapting to a Mobile IT Landscape: From IT Silo to Enterprise Strategy Kimberly Hancher Chief Information Officer (CIO) U.S. Equal Employment Opportunity.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Should We Believe the Hype? Stephen Fast Lead, Cyber Innovation Strategy Cyber Innovation Division Applied Research Laboratory The Pennsylvania State University.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
EDUCAUSE 2014 Top Ten IT Issues. Today’s Agenda Introduction to EDUCAUSE IT Issues History & Methodology 2014 Top Ten IT Issues Selected Issues Reviewed.
The Changing World of Endpoint Protection
Elbert Guintivano Manager – Presales Consulting BMC Software Trend/Strategy in IT Service Management.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012.
CETI Industry Day 2010 – Technology Focus areas Vijay Gopal Chief Technology Officer, Shared Application Nationwide Nationwide Confidential.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
UNCLASSIFIED A Chief Information Officer’s Perspective on Service-Oriented Architecture Presented to Service-Oriented Architectures for E-Government Conference.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
OFFICE OF INNOVATION & TECHNOLOGY CITY OF PHILADELPHIA Innovation & Technology Status Update Adel W. EbeidCity of Philadelphia, Office of Innovation &
WELCOME Mobile Applications Testing
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Internal primer Empower Your Employees
The time to address enterprise mobility is now
How to Define a Successful Mobility Strategy
Transforming business
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
File and unstructured data Solutions
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Mobile Satellite Services Market
Securely run and grow your business with Microsoft 365 Business
Enterprise Mobility + Security
Securing the Threats of Tomorrow, Today.
© 2018 VynZ Research All rights reserved Get in Touch: Mobile Virtual Private Network (VPN) Market.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
The MobileIron® Threat Detection difference:
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Sachiko A. Kuwabara, PhD, MA
Securely run and grow your business
Alliance for Telecommunications Industry Solutions (ATIS) Update
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Enterprise Networking Market Size to Exceed $90 bn by 2025 Growing at CAGR.
Presentation transcript:

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile Enterprise 1

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Panel Members Jeffrey Ait Director of Public Sector North America Good Technology Lt. Col Anmy D. Torres Chief, Cyber Plans, Transport, and Sustainment Air National Guard, National Gurad Bureau Robert Duffy Chief Information Officer Office of the Inspector General U.S. Department of Homeland Security 2

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. CIO’s worldwide see mobility as a key driver of productivity and a primary channel for customer engagement

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. 775K iOS Apps, 40B downloads (January 2013) M Employee-liable devices expected to ship by M Corporate-liable devices expected to ship by K Android Apps, 20B downloads (October 2012) Mobility has descended on the Enterprise

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. The Enterprise Landscape has Changed Forever From a homogeneous set of corporate-issued devices… … To proliferation of personal devices with rich mobile OSs… and increasing demand for wide variety of productivity and business apps

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. IT requires security, compliance, & management

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Users demand to collaborate to be productive

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. BYOD Fixed-Function Devices Business Transformation Blue blocks Company Owned Four Enterprise Use Cases are Emerging

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. New Opportunities Bring New Risks & Challenges Mixed Business and Personal Environments Compliance and Data Protection Risks Accommodate Mix of Devices and OS Limited Enterprise Scaling Patchwork of Point Security Solutions

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. In Order to Succeed, IT Needs the Ability To: Protect business data against loss and leaks (on device, over-the-air, cloud) Protect against rogue devices – jailbroken, rooted Respect user privacy – monitoring, blacklisting, whole device wipe Easily manage and support  Discovery and distribution  Updates and fixes  Business app monitoring and analytics  Self service

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Questions for the Panel  Why is Mobility Important to the Federal Government and to your agency?  What can you share about mobility strategies that will help our audience understand the role of mobility?  Given the nature of the Government’s diverse mission, from customer service to national security, the increase to productivity through the use of mobile technology is both needed and desired. Given the mobility trends of “Bring your own device” and “Bring your own Data” -- Can you comment on your organizations adoption of these trends and the pro and cons of the implementation?  Today, security is on the forefront of all technology discussions. Mobile devices present new, significant security issues to IT departments. What should be done to protect Government organizations from these yet unforeseen threats while enabling the capabilities being demanded by the mobile workforce? How will you address encryption at-rest and in- transit? What methodology will you use to provide Identity management on the Mobile devices in accordance with the latest standards?

Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Questions for the Panel  The real productivity gains in Mobility lie in the applications and data that are transferred to these devices. How can Government agencies leverage organizational specific mobile applications to enhance productivity while maintaining security?  How will Government Apps be created, validated and distributed?  How will you deal with Data Loss Prevention?  What is going well that is supporting the mobile workforce?  What challenges is your organization or others encountering when implementing mobility strategies?  Do you have a best practice that you can share?  What’s next for your agency?