Presentation is loading. Please wait.

Presentation is loading. Please wait.

How to Define a Successful Mobility Strategy

Similar presentations


Presentation on theme: "How to Define a Successful Mobility Strategy"— Presentation transcript:

1 How to Define a Successful Mobility Strategy
David Barter, Practice Manager, Microsoft Technologies & EUC Peter Crepeau, Enterprise Consultant & EUC Practice Architect

2 Introduction Peter Crepeau – Enterprise Consultant and End User Computing Practice Architect 2 Years of Service with GreenPages, 19 Years in the industry working for Value-Added Resellers Citrix Certified Expert – Virtualization, Citrix Certified Professional – Mobility David Barter – Practice Manager, Microsoft Technologies and End User Computing More than 20 years of IT industry expertise—from break-fix technician to CIO Microsoft Virtual Technical Solution Professional and CIE Certified

3 5 Pillars of Enterprise Mobility
User and App Access Mobile Application Management Device Management Threat Protection Secure File Sharing

4 User and App Access

5 Users and Applications from Anywhere

6 Mobility Is Driving Business Transformation
60% of sheriffs saved 30 minutes or more per shift on paperwork U.S. Sheriff’s Department Taco, Inc. Streamlined warehouse ops with tablet-enabled forklift trucks UniPro BV, Netherlands Reduced admin costs by 50% with tablet-enabled field workers … and modernizing the workplace

7 IT Mobility Challenges
Apps Delivering a seamless, productive app experience on any device Devices Increasing BYOD adoption Data Risk of information loss and liability

8 Mobile Application Management

9 Mobile App Management (MAM)
Mobile Application Management Mobile App Management (MAM) Apply policies on a per app basis Separate personal/company apps/data App Wrapping App Containerization Better BYOD compared to MDM

10 Mobile Device Management

11 Mobile Device Management
Push policies (e.g. disable WiFi, set device passcode) Monitor and manage compliance (e.g. is device jailbroken?) Provision apps automatically – deliver mobile apps to users Remotely lock or selectively wipe Leverage device security policies (e.g. encrypt data on device) Mobile lifecycle management Remove Enroll Secure Provision Publish Support

12 Threat Protection

13 Threat Protection Understand what mobile platforms are in use today within your environment iOS, Android, Windows Phone, Blackberry Good Threat protection includes detection of the following External Attacks Rogue Apps Unsafe Browsing Theft Poor Battery Use

14 Secure File Sharing

15 Secure File Sharing Empower users with instant access to data, synced across all devices Improve collaboration and productivity through secure file sharing Meet corporate data security and compliance standards with a secure service Deliver an enterprise-class service that seamlessly integrates with users workflow Enable IT to retain control and deliver a managed service

16 Next Steps Set up a Mobility Assessment with GreenPages.
Let the in-room facilitator know and we will arrange it for you.

17 Thank You David Barter david.barter@logicsone.com Peter Crepeau


Download ppt "How to Define a Successful Mobility Strategy"

Similar presentations


Ads by Google