Download presentation
Presentation is loading. Please wait.
Published byChristopher Greene Modified over 9 years ago
1
Mobile enabling existing applications
2
BMIST DD 1380 ReadinessSF 600
3
So Why Not? Platform choice Connectivity options ManagementSecurity
4
Mobile Device Platforms Increased Functionality NotebookPC Windows Mobile Windows XP TabletPC Smart Personal Objects.NetTechnology Media Centric Data Centric Voice Centric
5
Product Update i-mate SP3 i-mate PDA 2k O2 XDA IIs Motorola MPx220 (Mar) i-mate JAM O2 XDA mini Motorola MPx (Mar) i-mate SP3i O2 XPhone2 HP iPAQ 6365
6
Connectivity Options 1xEV-DO Bluetooth GPRS 1xRTT 3G/4G WiMAX EDGE
7
Fit for Purpose Current using WiFi/GPRS/1xEV-DO solutions are ‘good enough’ for most PIM and LOB solutions Look for network independence and future support Intelligent multi-network operation will become important
8
Device Management
9
Mobility Management Issues Devices infrequently connected to an organisation’s network Low bandwidth, higher cost connections Unreliable connections Personal devices, yet managed by their employer Device loss that leads to work stoppage Mixture of business and personal applications
10
Device Management Approach Enterprise Support Integrate into existing or planned PC Systems Management solutions Mobile Operator Support Mobile Operator provisions device and provides support Integrates into existing Mobile Operator device provisioning platform Typical approach today Mobile Operator provisions device Enterprise controls software configuration Mobile Operator provides hardware support
11
Enables IT to: Capture and understand asset characteristics Configure settings and security policies Update and deploy new applications Seamless end user experience Consistent administration experience Utilizes existing SMS infrastructure Device Management Feature Pack
12
Information Device name Hardware ID Device model Power (battery status) Display resolution Generate reports on any hardware characteristic Can be extended to capture other hardware inventory information Asset Management Hardware Inventory File system MemoryNetwork Operating system
13
Hardware Inventory
15
Information Presence of files File details Last software scan Product details Specify directories Specify wildcard file extensions List of files or applications in the file system Permits collection of log/data files Generate reports on any software or file Asset Management Software Inventory and File Collection
16
Software Inventory
17
Configuration Management Device Settings SMS provides integrated experience to configure and deploy settings Example of configurable settings: Network GPRS Network PPP Network VPNSecurityCertificates Registry Entry Applications ActiveSync & Exchange E- mail Internet E-mail Proxy Browser Favorite
18
Configuration Management Password Policy Centralized control of device password policy Configure mandatory numeric or strong password Force password setting prior to use Power off timeout maybe defined Administrator defined ‘lockout’ strong password applies after certain failed device entry attempts Implementation Password applet contained in a separate install from core SMS client Password policy configured and deployed as part of settings
19
Device Management Feature Pack Partner Add-ons SMS Managed Systems Pocket PC 2003/ Phone Edition Pocket PC 2002/ Phone Edition Windows CE 3.0/4.2/5.0 Smartphone (H1CY05) PalmRIMSymbian Windows Server 2003 Windows XP Windows XPe Windows 2000 Windows NT 4.0 Server Windows 98
20
More Information Resources:www.microsoft.com/sms SMS 2003 DM FP Documentation
21
Device Security
22
Main Security Issues 1.Device Access 2.Protecting data on the Device 3.Network Security
23
Perimeter protection Device lock: PIN, Strong, exponential delay Authentication protocols: PAP, CHAP, MS- CHAP, NTLM, TLS Data protection 128-bit Cryptographic services: CAPIv2 Code signing (SmartPhone only) Anti-virus API Network protection Secure Browsing: HTTP (SSL), WAP (WTLS) Virtual Private Networking (PPTP, L2TP IPSec) Wireless network protection (WEP, 802.1x, WPA) Windows Mobile Security Features
24
Extending Windows Mobile Security Signature authentication Certicom Corporation Communication Intelligence Corporation TSI/Crypto-SignVASCO Enhanced password protection Hewlett-Packard Credant Technologies Pointsec Mobile Technologies Firewall Bluefire Security Checkpoint Fingerprint authentication Biocentric Solutions Inc. Hewlett-Packard Two factor authentication RSA Security Software Storage Encryption Pointsec Mobile Technologies Trust Digital LLC Credant Technologies Bluefire Security Ultimaco Safeware AG Application Data Encryption Certicom Corporation Glück & Kanja Group Ntrū Cryptosystems, Inc. Virtual Private Networking Certicom Corporation Check Point Software Technologies Ltd. Columbitech Entrust, Inc. Epiphan Consulting Inc. Disable Applications Odyssey Software Trust Digital LLC Credant Technologies Intellisync Device Wipe Asynchrony.com Public Key Infrastructure (PKI) enhancements Certicom Corporation Diversinet Corp. Dreamsecurity Co., Ltd. Glück & Kanja Group Antivirus Software Computer Associates
25
Anti-Virus & Firewall
26
Mobile Device Security Recommendations Risk assessment is key Evaluate applicability of organisation’s standards for laptop computers Passwords Activate power-on, SIM, device lock passwords Anti-virus Flash-able ROM for security and management Encryption Encrypting sensitive information in the devices and on external storage cards End-to-end network encryption when using a virtual private network (VPN) connection 802.1x authentication/encryption over 802.11b WLANs
27
Summary There are real applications being deployed Exchange Server 2003 with Windows Mobile-based devices works out-of-the- box for mobile PIM There are a range of new powerful devices currently available Security and Management issues are addressable Try it for yourself!
28
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.