Mobile Device Policy What is your policy? Are new approaches being considered for –Device ownership (IRU v. CRU)? –Procurement? –Full, partial or NO reimbursement.

Slides:



Advertisements
Similar presentations
1 1 State of Oregon Identity and Access Management John Radford, State Controller Department of Administrative Services State Controllers Division.
Advertisements

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
Mobile Asset Disposition in a BYOD World Craig Boswell HOBI International, Inc.
Introducing the Mason Infotech BYOD Commercial Smart Solution Presented by Mark Powelll-Mason Infotech Ltd January 2013.
BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
"If the rate of change inside an institution is less than the rate of change outside, the end is in sight." Jack Welch (while CEO of General Electric)
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
BYOT – What it means and how to prepare Francis Li Softchoice Corporation.
Enterprise Mobility Platform Microsoft Differentiation Managed Mobile Productivity Layered Protection Hybrid Solutions Office 365DynamicsWorkday.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Emerging Risks in a Mobile.
COPYRIGHT © 2011 ALCATEL-LUCENT ENTERPRISE. ALL RIGHTS RESERVED. Constructing an In-Building Wireless Strategy.
Copyright © 2011 Mobile Pulse, Inc. Proprietary and Confidential. For discussion purposes only. Non-binding Fall 2012 What is happening in your mobile.
Implementing Mobile Learning – Technical process Pete Stockley, 2012.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
I.T. Outsourcing in Education Terry Enlow | education consultant Kyle Street | director of proposal management & marketing.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
SNEAK PEEK OF APPEON MOBILE JANUARY 25, – August 14, 2015 MOBILE MARKET TRENDS Some recent figures about the worldwide Market: 1 Billion Smartphone.
The Lloyd’s iPad pilot Adam Stafford, Head of Electronic Distribution.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Presentation for the Russian VC & Technology Event Ministry of Industry, Trade and Labor & MATIMOP March 14 th, 2007.
Your storage on the ground; Your files in the cloud.
Dubai, 2 nd – 3 rd November, 2014 Operational Aspects to ensure the Quality of Service provision in Telecommunication/ICT market Louisa Ama Sosu, Vice-Chair.
5 February 2003 Reality and Future Softswitch - Reality and Future Nikolay Ilyin Chief Technical Officer RealEast Networks ITEXPO.
BYOD Charter Purpose and Scope
Multi-faceted Cyber Security Research Group edited strategy.
Presentation by Paul Vine In partnership with Version Sabre and Business Continuity Planning.
University Health Care Computer Systems Fellows, Residents, & Interns.
10 Things You Need to Know AboutData Security Melanie Wyne, J.D. Sr. Technology Policy Representative Government Affairs Division NAR.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
Secure Bring Your Own Device (BYOD) for Higher Education Name Title .
The Complete Solution Wireless Services. Understanding your Wireless Requirements Infrastructure is Key Budget Coverage Capacity Management Security Integration.
Technology Update October Bring Your Own Device (BYOD) Different stages of implementation (contingent on wireless infrastructure) Full School Partial.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Mobile device management
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
Budget Cuts During a Mobility Boom: Best Practices for Stretching Your Wireless Budget and Managing the Wireless Device Lifecycle Keith Martin Director.
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
Mobility in the Government Workforce Presentation at an ACT-IAC Partners Breakfast June 16, 2011 Thom Rubel, Research Vice President Beth Jolles, IDC Government.
The Modern Workplace Are organizations prepared? 75% 49% 10K40% 75% allow personal mobile devices for business use ~49% of work requires network contribution.
Jeff Alexander & Andrew McMurray Runtime Provisioning in Windows 10 WIN327.
HOME APPLIANCES CONTROL SYSTEM. INTRODUCTION With the Evolving technology, once the realm of science fiction, the Smart home – a fully automated, centrally.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Scott Musgrove Senior Business Systems Analyst Water Corporation of Western Australia Developing for an Evolving Mobility Landscape: How Do You Hit a Moving.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Chapter 15 Telecommunication Department Management.
CIRTL Data Sharing 10/9/15. New Opportunities The CIRTL Network Commons (CNC) offers the potential for easier access to data for evaluation purposes.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
IT Procurement Category Strategy (template)
WIFI & BYOD. Drivers for new Wifi Network Old network was poor quality Lack of training and understanding from IT Staff Access points just added and added.
Total Enterprise Mobility Comprehensive Management and Security
Mobile Devices in the Corporate World
Barracuda Mobile Device Manager
Mobile device Management & BYOD in a mobile world
Mobile Data Solutions Inc
Mobile Device Management
Cisco ISE 1.2 Mobile Device Management Integration
Prepare a DD Form 1081-Return
Zurich Travel Assist Website/Application Registration
Presentation transcript:

Mobile Device Policy What is your policy? Are new approaches being considered for –Device ownership (IRU v. CRU)? –Procurement? –Full, partial or NO reimbursement for service? –Stipends?

Ownership / Identity For an employee who owns a mobile device, and separates from the university –Who owns the contact list? –What about data loaded on a smart device? Are HR policies current for mobile technology?

BYOD? Bring your own mobile device, why stop there? Anyone discussing this as a “condition of employment”? Security concerns? Attitudes? – A generational reality?

Mobile Device Management (MDM) Does your institution do this? –If So, what division / unit? –Are you funded? Or, is this just in the margin ? Anyone researched: –Boxtone? Airwatch? Mobileiron? –Other MDM solutions? Does anyone outsource this?

Network Capacity – Wi-Fi What steps are we taking to prepare for ongoing mobile devices on our Wi-Fi networks? Are there any restrictions to how many devices a individual user can register? IP Space a concern? Outsourcing Wi-Fi to a carrier?

Distributed Antenna Systems Define “DAS...” Do you have, or are you planning for one? Carrier stance and attitudes in your area? Ownership? Charge rent? Is there institutional funding? Experiences to date to share?