Mobile Device Management Overview Information Security Office.

Slides:



Advertisements
Similar presentations
Take the IAN Security App Tour! After the Tour, you can download the IAN app from either the App Store or the Android Marketplace. Start the Tour.
Advertisements

Mobile Device Management Timothy Yager SUNY Oswego Labman 2013 – Evergreen State College.
M OBILE D EVICE D EPLOYMENT ( I P ADS ) AND BYOD P OLICY Presented by Tyler Wallace.
Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
City of Boroondara Mobile Device Management
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
Mobile Protection Overview
Now you can download MedEdPORTAL files to your iPad or iPhone using one of many free apps like… iZip iPad or iPhone.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
By: Melissa Varghese Nikhil Madhusudhana Stella Stephens Yang Shi BYOD: Device Management.
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
Appendix A – Document Destruction FIPP 1, 2 and 4 “Company shall retain records for the period of their immediate or current use, unless longer retention.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Meraki Mobile Device Management
Contains M3 Information, LLC sensitive information. Proprietary and Confidential. M3Clinician iPad App Instructions for: Downloading Updating Redirecting.
DCS-825L EyeOn Baby Camera. 3 Ways to keep an eye on your baby with the EyeOn Baby Camera… 1. At home Connect to your EyeOn Baby Camera through your home.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
PAYware Mobile Android Comparison June Discussion Topics Obtaining the App PAYware Mobile App.
IPhone SDK and Enterprise Peter Wood. Enterprise Upcoming iPhone support for Microsoft Exchange ActiveSync and industry-standard corporate security measures.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
1 OPTiM Special Mission Division Vice President Keiichi Yokoyama.
Confidential Company Internal396/ LXE Uen PA2Xperia Transfer Mobile Communication Material Company Internal396/ LXE.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
University of Wisconsin-Madison MobileUW Hideko J. Mills Manager of IT Research Infrastructure, MobileUW Project Manager Office of the CIO & VP for IT.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.
IPad Orientation MR REYNOLDS AND MR BEDFORD. Current Setup  Apple configurator – Must be connected to a MacBook Pro to update  Why move to a new platform?
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Getting Started with Chatter Nina Jameson Senior Business Analyst, ISU-ITS (office)
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
Installing Air Watch and updating the operating system.
District 211 Technology iPad Setup Instructions. Turn power on & Start Setup Hold down the power button to turn on your iPad. The power button is located.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Encryption as a Preventive Countermeasure Sean Maher, Information Security Coordinator.
User and Device Management
Mobile Device Management ZEST4. Features of Zest4 MDM  Security  Device Management  Control  Support.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Kaspersky Small Office Security INTRODUCING New for 2014!
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Lake Minneola High School
Facebook privacy policy
Barracuda Mobile Device Manager
DATA SECURITY FOR MEDICAL RESEARCH
for the Final Stage of our Merger:
Mobile App – For iOS and Android Devices
Mobile Data Solutions Inc
Intercollegiate Athletics Mobile
iPhone & iPad New user Enrollment
Meeting Number: Password: PAPP2017
Setting Up Chatter on Mobile devices
Enrolling Two-Factor Authentication (2FA)
Technical Steps to Install Norton Mobile Security on Android Phone.
Microsoft Intune MAM without Device Enrollment
Download OriginMobile
Multi-Factor Authentication
Downloading & Registering
Kronos Mobile User Guide – CST Drivers
Using your iPad in meetings
Microsoft 365 Business Technical Fundamentals Series
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Mobile Device Management Overview Information Security Office

Who needs to install AirWatch Required to Install Connect your mobile device (iPhone, iPad, Android, etc.) to the secure wireless network WUSM- Secure Not required to Install Only connects your mobile device to or the Guest wireless network

What features of AirWatch will be used Enforce PIN/Passcode and encryption policies to a device Gives the ability to wipe lost or stolen devices after reported to department / Infosec Prevents lost or stolen devices from reconnecting to the network. This will reduces the risk of a breach of a lost or stolen device

Agent Install Download the free AirWatch Agent from your app store. You might need to search for “AirWatch MDM Agent” Launch the app once installed It is not a battery killer

After you enroll Once enrollment is complete, the device will start receiving profiles pushed to the device Today the only profiles that are pushed across the entire Med School are for PIN/Passcode and Encryption If a device is already has a PIN/Passcode and is encrypted, then you won’t have to do anything further We are only using the permissions that allow us to ensure your device complies with existing Wash U Policy

InformationSecurity.wustl.edu

Your Privacy Washington University in St. Louis respects your privacy and will not access your application data, call history, voic , or other personal information WUSTL will not collect/view location information WUSTL Information Security Office classifies this information as confidential. Access to your information is restricted and any inappropriate access may lead to disciplinary action up to and including termination under either the Human Resources corrective action process or the HIPAA Sanction policy

When will it be mandatory? March 31, 2015 we will require having the mobile devices to register with AirWatch before allowing them on the Secure Wireless Network.