• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
GDS International - CIO - Summit - US - 3
 

GDS International - CIO - Summit - US - 3

on

  • 391 views

Achieving True Enterprise Mobility

Achieving True Enterprise Mobility

Statistics

Views

Total Views
391
Views on SlideShare
391
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    GDS International - CIO - Summit - US - 3 GDS International - CIO - Summit - US - 3 Document Transcript

    • CITO ResearchAdvancing the craft of technology leadership December 2011 Achieving True Enterprise Mobility: MDM Is Only Half the Battle Sponsored by Fiberlink
    • ContentsIntroduction 1Security, Scale, and Simplicity 1A Tale of Two Mobile Management Paradigms 3True Enterprise Mobility 4MaaS360 from Fiberlink 6Conclusion 7
    • Achieving True Enterprise Mobility: 1 MDM Is Only Half the BattleCITO ResearchAdvancing the craft of technology leadership Introduction To achieve true enterprise mobility, mobile device management (MDM) is only half the battle. On its own, MDM only controls the shell of a device, and not the personal- ity—applications. Organizations today need to enable and simplify distribution, man- agement, security, compliance, and updating for these apps. It’s a management battle with many fronts and shifting targets. MDM offers part but not all of the solution. Organizations need fast, low-cost solutions for enabling employees to comply with legal, corporate, and IT requirements. They need a holistic approach to enterprise mobility, as more staff bring their own devices to work and expect IT to support them—while IT maintains the security and integrity of corporate data and applica- tions on those devices. If you need to enable consumer smartphones and tablets in the enterprise, you’ll need more than MDM. To date, IT has led the MDM charge. But now line-of-business teams are also leading the charge for mobile apps to increase productivity, customer satisfaction, and com- petiveness. Enabling these apps requires comprehensive mobile application manage- ment (MAM) as well as device-level control. Devices and apps seek to be harmonized, if things are off key—the result is enterprise mobility deployment with gaps. For instance, if you don’t have a document-sharing application for corporate files, users might download a consumer app, like Dropbox, and open security holes. Just like that, your business plan could end up in the wrong hands. In this paper, CITO Research explains how to chart a path to true enterprise mobility, where two capabilities converge into one with an added dimension: the ability to manage the ever-shifting mobile app landscape securely in the cloud. Security, Scale, and Simplicity Managing enterprise mobility is multidimensional. You need security. You need scale to meet the needs of myriad users. And somehow, you need to keep all this simple.
    • Achieving True Enterprise Mobility: 2 MDM Is Only Half the Battle CITO Research Advancing the craft of technology leadershipSecurity Scale SimplicityAuthentication andauthorization Rapid deployment Unified managementContext-based security Hosting and distribution Enterprise app catalogApp whitelist and Volume purchase Seamless updatesblacklist The Three S’s of Enterprise Mobility Security It’s one thing to build an app and push it out to your staff, but how do you ensure that: • users get access to only their authorized apps? • you can remove apps when users leave the company? • devices aren’t jailbroken or rooted? Employees who bring their own devices to the workplace expect access to corporate data. Most consumer applications and devices have limited security controls, leaving corporate data vulnerable. IT must protect sensitive corporate data from leaks or cor- ruption. Yet if IT denies use of corporate apps and data, employees may “go rogue” and find a way around the policy. Data will be lost if devices are not adequately protected. Built-in cameras can pho- tograph sensitive documents and instantly upload them to the Internet. Automatic syncing with cloud-based file sharing services such as Dropbox or iCloud can instantly launch your unreleased sales figures into the universe for anyone to potentially see. Scale If you have been charged with distributing mobile apps to a large user base across multiple devices, you’re probably asking: How many people should access and down- load these apps at any given time? How will you keep up with upgrades and patches? What happens when 1,000 employees try to download the same app at once? Do
    • Achieving True Enterprise Mobility: 3 MDM Is Only Half the BattleCITO ResearchAdvancing the craft of technology leadership you have native support for the latest mobile operating systems and devices, such as Apple iOS 5 and Android 4.0? Traditional, on-premise solutions are buckling under the strain of these questions, leaving breadcrumbs of failed downloads and varied versions across the range of mobile devices. These solutions are not designed to eas- ily support elastic scalability or rapid growth in user adoption. A true software as a service (SaaS) platform running in the cloud lets companies easily add mobile devices and apps, as requirements change. Apps can be distributed and updated as needed without installing new infrastructure. Simplicity To be viable, your enterprise mobility strategy has to simplify mobility management. Enrollment and configuration are only the beginning. You have to quickly and easily apply policy and application updates. At the same time, you must often juggle com- peting demands for user support, device upgrades and updates, internal business policies, and external compliance regulations. Unless you plan to reconfigure existing systems and networks, think about enabling mobility through a cloud-based architecture. Consider how you will add devices and apps with simple, automated workflows and provide a seamless experience for man- aging both from a single console, efficiently streamlining time-consuming tasks. A cloud-based service for mobile devices and apps is dramatically easier to implement and manage, compared with heavyweight on-premise servers. For the employee, everything from device enrollment to app access and updates must be simple and similar to their native device experiences. When mobile device and mobile application management converge into a single solution, the three “S’s” can thrive. A Tale of Two Mobile Management Paradigms Individually, the two mobility management paradigms—mobile device management and mobile application management—have fallen short of their promise as total enterprise mobility solutions.
    • Achieving True Enterprise Mobility: 4 MDM Is Only Half the BattleCITO ResearchAdvancing the craft of technology leadership Mobile Device Management Mobile device management (MDM) is a set of capabilities for controlling the more complex aspects of smartphones and tablets in the enterprise. With MDM, you can configure security settings, apply policy, automate actions, and enforce compliance. To further support security, MDM may offer context-based rules, such as turning services on or off, depending on whether the user is in the workplace or offsite, head- ing off data loss and excessive roaming charges. On some platforms, you can remove documents if a certain user leaves the premises. Or, if a user downloads an unauthor- ized app, an automated action can block email access, restrict device features and apps (such as blocking use of the camera or iCloud), or remotely wipe the device. Using an MDM platform, you can empower individuals to manage their devices with- out calling IT, enhancing simplicity. For instance, if your tablet is missing, you can log into your company’s end-user portal and determine its location. Users can remotely reset passwords or wipe their device (if it’s lost or stolen). Mobile Application Management Mobile application management (MAM) provides the ability to distribute and update mobile applications, supporting scale, simplicity, and security. Rather than install servers, you can use a cloud-based SaaS solution to manage both public and in-house apps, delivering them through an application distribution system (scale) and pre- senting them to employees through a “company app store” (simplicity). This way, custom and public applications can both be delivered securely (security) from a single user interface, without straining your internal systems. You can automatically push updates and patches from a management console to your company app store. Further, MAM simplifies the process. You can manage volume purchases from Apple’s App Store and upload redemption codes to streamline the provisioning, license man- agement, and administrative process—which definitely beats sifting through 1,000 $1.00 expense reports. True Enterprise Mobility Mobile device management and mobile application management come together. Convergence leads to empowerment. With true enterprise mobility, administrators and developers get a complete picture and can seamlessly manage mobile apps operational and security lifecycle.
    • Achieving True Enterprise Mobility: 5 MDM Is Only Half the BattleCITO ResearchAdvancing the craft of technology leadership True Enterprise Mobility Mobile Device Management Security configuration Continuous monitoring Policy enforcement Mobile Application Management Enterprise catalogs Distribution Access controls Mobile Application Management Mobile Device Management Enterprise catalogs Security configuration Distribution Continuous monitoring Access controls Policy enforcement True enterprise mobility makes scenarios like these possible: • Set app security policies, including required (whitelist) and disallowed (blacklist) applications • Enable enforcement rules for out-of-compliance devices, including active alerts, email blocking, device restriction, and remote wipe • Ensure only authorized users have access to in-house apps from their mobile devices, and that the apps are hosted in a cost-effective and secure environment
    • Achieving True Enterprise Mobility: 6 MDM Is Only Half the Battle CITO Research Advancing the craft of technology leadership Benefits of True Enterprise MobilityBenefits Description Security Scale SimplicityDevelopment Improve the security profile of your own apps under develop- X XEnhancement ment by adding authentication and authorization layers. En- force contextual security policies—without which proprietary apps could be downloaded to compromised devices.Cloud Capacity Handle the flood of upgrades and downloads through a X X cloud-based solution for hosting and distributing apps.Improved IT Distribute the right applications (in-house or purchased)—to X X XProductivity your users. Reduce cycle time and track and monitor app use on devices. Provision and monitor compliance from a single web-based console. MaaS360 from Fiberlink Conquering mobility and harnessing it for business success involves battles on many fronts. Those battles shift almost by the hour. In surveying this market, CITO Research found that a cloud-based solution makes a great deal of business sense. Not only does MaaS360 represent a convergence of MDM and MAM that addresses the full spectrum of requirements for enterprise mobility, but Fiberlink offers it in a cloud-based, mobili- ty-as-a-service platform, combining the functions of mobile device management and mobile application management in one integrated offering. With this approach, you can enforce mobile device management policies and devel- op best practice workflows for managing the complete lifecycle of mobile apps. And through a secure, web-based management console, public apps from the Apple App Store, Android Market, and apps developed in-house can be easily added to a master enterprise catalog and distributed over the air to all users, groups of users, or indi- vidual devices. With MaaS360, enterprises can: • Deploy fast: Gain instant access to mobility management and security with no additional on-premise hardware required to install and manage • Scale effortlessly: From a small group to a large global rollout, you can turn up devices and apps, on demand • Automatically upgrade: Through a continuous stream of new capabilities that are rolled into the platform, you are always using the latest version and never have to deal with change control or downtime
    • Achieving True Enterprise Mobility: 7 MDM Is Only Half the Battle CITO Research Advancing the craft of technology leadership • Keep corporate data secure: MaaS360 provides end-to-end security and compli- ance management capabilities to protect information on mobile devices • Manage mobility with minimal investment: With zero infrastructure and a pay- as-you-go subscription model, MaaS360 delivers unmatched affordability and rapid time to valueIn Practice: Hawthorn PharmaceuticalsMaaS360 has already become a major component of the mobile workforce in companies such as HawthornPharmaceuticals, which uses MaaS360 to manage the iPads used by its entire sales force. Because of the sensitivenature of medical information, Hawthorn needed the ability to remotely wipe data from lost or stolen devices.Hawthorn developed an application that allows doctors to sign off on sample deliveries, directly on the iPad.Rather than host the app on its own premises, Hawthorn distributes its app in the cloud using MaaS360, saving oninfrastructure cost without compromising security. Hawthorn was able to roll out the app in just two weeks versusan estimated six to eight weeks for other approaches. Conclusion How can you achieve true enterprise mobility? When mobile device management and mobile application management converge. And with convergence you get the three S’s: security, scale, and simplicity. You can fight the whole battle, not just half. Mobile device and application security, control, distribution, and management all become streamlined processes using MaaS360. You can deliver operational and security lifecy- cle management capability for all apps across multiple device platforms. IT managers, employees, and management can all sleep at night, untroubled by nightmares of lost phones, leaked data, and unsuccessful app downloads. With true enterprise mobility from MaaS360, corporate data is protected, and your organization is more productive, responsive, and maybe even a little happier. CITO Research CITO Research is a source of news, analysis, research, and knowledge for CIOs, CTOs, and other IT and business professioals. CITO Research engages in a dialogue with its audience to capture technology trends that are harvested, analyzed, and communicated in a sophisticated way to help practitioners solve difficult business problems. This paper was sponsored by Fiberlink and created by CITO Research