Your SlideShare is downloading. ×
0
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
LANDesk Mobility Manager
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

LANDesk Mobility Manager

1,575

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,575
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • When talking about Mobile devices inundating the enterprise, the largest blindspot is devices that walk into the door where the user has the ability to connect the device to Exchange without IT’s help. We helped solve that problem a year ago through our agentless discovery. Here, we extend our agentless integration ability by allowing the administrator to set policy on which devices can enter the system. For those of you familiar with LANDesk Management Suite, think of what we did last year as “Unmanaged Device Discovery” and this is an extension to that capability. We expect that most administrators will set the “Allow Only Managed devices to connect” and then new devices, once brought under management through a simple self-service enrollment process that I will talk about on the next slide, can be automatically allowed to connect. Other administrators may want to say that only certain device types that we know are secure can connect, such as ones that can do encryption natively (such as iOS4 and Android 3.x devices) but not necessarily require them to be managed.
  • When talking about Mobile devices inundating the enterprise, the largest blindspot is devices that walk into the door where the user has the ability to connect the device to Exchange without IT’s help. We helped solve that problem a year ago through our agentless discovery. Here, we extend our agentless integration ability by allowing the administrator to set policy on which devices can enter the system. For those of you familiar with LANDesk Management Suite, think of what we did last year as “Unmanaged Device Discovery” and this is an extension to that capability. We expect that most administrators will set the “Allow Only Managed devices to connect” and then new devices, once brought under management through a simple self-service enrollment process that I will talk about on the next slide, can be automatically allowed to connect. Other administrators may want to say that only certain device types that we know are secure can connect, such as ones that can do encryption natively (such as iOS4 and Android 3.x devices) but not necessarily require them to be managed.
  • Transcript

    • 1. LANDesk Mobility Manager 9.0 November, 2011 Mike Temple, Product Manager
    • 2. <ul><li>“ I have devices coming into my organization that are not compliant, or that I cannot manage.” </li></ul><ul><li>Solution: Device Connection Policy! </li></ul>Problem #1 – Unauthorized Devices <ul><li>Prevent Unmanaged Devices from Connecting </li></ul><ul><li>Limit by Device Type </li></ul><ul><li>“ Grandfather” existing devices </li></ul>
    • 3. <ul><li>Users get notified that their device has been quarantined. </li></ul>Problem #1 – Unauthorized Devices <ul><li>Customizable Message </li></ul><ul><li>Link to agent install </li></ul><ul><li>Support existing processes </li></ul>
    • 4. <ul><li>“ My users have devices that I need to get set up in the system.” </li></ul><ul><li>Solution: Simple Enrollment! </li></ul>Problem #2 – Getting devices configured <ul><li>Profile Policy by User/AD Container </li></ul><ul><li>As easy as configuring mail </li></ul><ul><li>Installs agent, applies Device Configuration/ Security Policy </li></ul>
    • 5. <ul><li>“ Without touching all the devices, I need to make sure they can get their mail, WiFi, VPN, and are secured.” </li></ul><ul><li>Solution: Device Configuration/Security Policy! </li></ul>Problem #3 – Device Configuration/Security <ul><li>Configure e-mail, WiFi, VPN, and much more </li></ul><ul><li>Set Lock, Password strength, Screen Timeout, and much more </li></ul><ul><li>Update Policy at will </li></ul><ul><li>User-Focused/Policy-Based </li></ul>
    • 6. Feature/Benefit Eye Chart
    • 7. <ul><li>Premium support for iPhone and iPad devices </li></ul><ul><ul><li>Full support of iOS 4 MDM API – Zero-touch management </li></ul></ul><ul><ul><li>Simplified enrollment with AD authentication </li></ul></ul><ul><ul><li>Automatic provisioning of certificates (SCEP) </li></ul></ul><ul><ul><li>Extended hardware and software inventory </li></ul></ul><ul><ul><li>Jailbreak detection (9 different tests) </li></ul></ul><ul><ul><li>Utilizes Apple Push Notification Service </li></ul></ul><ul><ul><li>Supports all native iOS policies </li></ul></ul><ul><ul><li>Remote lock & wipe – full or selective (PIM data only) </li></ul></ul><ul><ul><li>Find my phone feature and location history </li></ul></ul>Apple iOS Support
    • 8. <ul><li>Accounts </li></ul><ul><ul><li>Exchange ActiveSync </li></ul></ul><ul><ul><li>IMAP/ POP email </li></ul></ul><ul><ul><li>VPN </li></ul></ul><ul><ul><li>Wi-Fi </li></ul></ul><ul><ul><li>LDAP </li></ul></ul><ul><ul><li>CalDAV </li></ul></ul><ul><ul><li>CardDAV </li></ul></ul><ul><ul><li>Subscribed calendars </li></ul></ul><ul><li>Policies </li></ul><ul><ul><li>Require passcode </li></ul></ul><ul><ul><li>Allow simple value </li></ul></ul><ul><ul><li>Require alphanumeric value </li></ul></ul><ul><ul><li>Passcode length </li></ul></ul><ul><ul><li>Number of complex characters </li></ul></ul><ul><ul><li>Maximum passcode age </li></ul></ul><ul><ul><li>Time before auto-lock </li></ul></ul><ul><ul><li>Number of unique passcodes before reuse </li></ul></ul><ul><ul><li>Grace period for device lock </li></ul></ul><ul><ul><li>Number of failed attempts before wipe </li></ul></ul><ul><ul><li>Control Configuration Profile removal by user </li></ul></ul>Apple iOS Policy Support <ul><li>Restrictions </li></ul><ul><ul><li>App installation </li></ul></ul><ul><ul><li>Camera </li></ul></ul><ul><ul><li>Screen capture </li></ul></ul><ul><ul><li>Automatic sync of mail accounts while roaming </li></ul></ul><ul><ul><li>Voice dialing when locked </li></ul></ul><ul><ul><li>In-application purchasing </li></ul></ul><ul><ul><li>Require encrypted backups to iTunes </li></ul></ul><ul><ul><li>Explicit music & podcasts in iTunes </li></ul></ul><ul><ul><li>Allowed content ratings for movies, TV shows, apps </li></ul></ul><ul><ul><li>Safari security preferences </li></ul></ul><ul><ul><li>YouTube </li></ul></ul><ul><ul><li>iTunes Store </li></ul></ul><ul><ul><li>App Store </li></ul></ul><ul><ul><li>Safari </li></ul></ul><ul><li>Other settings </li></ul><ul><ul><li>Certificates and identities </li></ul></ul><ul><ul><li>Web Clips </li></ul></ul><ul><ul><li>APN settings </li></ul></ul>
    • 9. <ul><li>Premium support for Android devices </li></ul><ul><ul><li>Simplified enrollment with AD authentication </li></ul></ul><ul><ul><li>Automatic provisioning of certificates (SCEP) </li></ul></ul><ul><ul><li>Rooting detection </li></ul></ul><ul><ul><li>Extended hardware and software inventory </li></ul></ul><ul><ul><li>Utilizes push notifications via Google Cloud to Device Messaging </li></ul></ul><ul><ul><li>Zero-touch management </li></ul></ul><ul><ul><li>Supports all Android 2.2+ policies </li></ul></ul><ul><ul><li>Remote lock & wipe </li></ul></ul><ul><ul><li>Find my phone feature and location history </li></ul></ul>Android Support
    • 10. <ul><li>Android 2.2+ policies </li></ul><ul><ul><li>Lock now </li></ul></ul><ul><ul><li>Reset password </li></ul></ul><ul><ul><li>Set maximum failed passwords for wipe </li></ul></ul><ul><ul><li>Set maximum inactivity time to lock </li></ul></ul><ul><ul><li>Set password minimum length </li></ul></ul><ul><ul><li>Set password quality </li></ul></ul><ul><ul><li>Wipe data 1 </li></ul></ul><ul><ul><li>Password expiration (number of days) 2 </li></ul></ul><ul><ul><li>Password history (max number of past passwords stored) 2 </li></ul></ul><ul><ul><li>Password complex characters required 2 </li></ul></ul><ul><ul><li>Data Encryption 2 </li></ul></ul><ul><ul><ul><li>1 - Wipes user data on device; does not wipe memory (SD) card </li></ul></ul></ul><ul><ul><ul><li>2 - Android 3.0 required </li></ul></ul></ul>Android Policy Support
    • 11. <ul><li>“ Problems and Incidents arise. I need to remotely manage these devices.” </li></ul><ul><li>Solution: Remote Management </li></ul>Problem #4 – Remote Management <ul><li>Device Location/Breadcrumbs (where allowed by law) </li></ul><ul><li>Remote Wipe/Selective Wipe </li></ul><ul><li>Remote Lock/Unlock </li></ul><ul><li>Remote Password Reset </li></ul>
    • 12. What it looks like…
    • 13. What it looks like…
    • 14. <ul><li>“ I need to make sure the correct apps are on the device.” </li></ul><ul><li>Solution: LANDesk Mobile LaunchPad </li></ul>Problem #5 – Application Management <ul><li>Distribute in-house built apps without submitting to the Horizontal App Stores. </li></ul><ul><li>Launch links in controlled browser, limiting where a user can surf. </li></ul><ul><li>Link to “suggested” apps from the Horizontal App Stores. </li></ul><ul><li>Cross-Platform policies. </li></ul>
    • 15. <ul><li>Start of the LANDesk myIT Initiative </li></ul><ul><ul><li>More on that later… </li></ul></ul><ul><li>Self-Service approach </li></ul><ul><ul><li>Get IT Recommended public apps </li></ul></ul><ul><ul><li>Launch web apps in a controlled browser </li></ul></ul><ul><ul><li>Install home-grown apps </li></ul></ul><ul><ul><li>Documents, Spreadsheets, PDF’s, etc. </li></ul></ul><ul><ul><li>Targeted by AD Group </li></ul></ul>LANDesk Mobile LaunchPad
    • 16. LANDesk Mobile LaunchPad <ul><li>App Store style layout </li></ul><ul><li>Easy to Use </li></ul><ul><li>Easy to Navigate </li></ul>
    • 17. LANDesk Mobile LaunchPad <ul><li>Launch Documents and content </li></ul>
    • 18. LANDesk Mobile LaunchPad <ul><li>Links and link management – control how a user browses </li></ul>
    • 19. LANDesk Mobile LaunchPad <ul><li>Launch websites in a controlled browser </li></ul><ul><li>IT controls where the user can go </li></ul>
    • 20. How it works…
    • 21. LANDesk Mobile LaunchPad <ul><li>Notifications </li></ul>
    • 22. The End fin

    ×