Temia Mobile Device Management Webinar 03 21-12

994 views

Published on

TEMIA and Wireless Analytics hosted a webinar on Wednesday that helped participants understand their options when choosing an MDM supplier. Attendees were able to learn more about their options for MDM providers, BYOD programs and other issues that are key to mobilizing an enterprise’s workforce. Here are five key MDM considerations Erik Eames, managing director and Fernando Oliveira, VP of client services, shared with webinar attendees.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
994
On SlideShare
0
From Embeds
0
Number of Embeds
86
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Temia Mobile Device Management Webinar 03 21-12

  1. 1. Thinking about an MDM Solution…Now What? Wednesday, March 21, 2012 11:20AM - Noon EDT www.temia.orgThe views expressed in this presentation are meant to reflect the majority of our members, but they may not be reflective of all members.
  2. 2. TEMIA Member Companies
  3. 3. Today’s Speakersn  Joe Basilin  Managing Director, TEMIAn  joebasili@temia.org 3  
  4. 4. Today’s SpeakersErik M. Eames Fernando M. OliveiraManaging Director VP of Client ServicesWireless Analytics Wireless Analytics978-762-0900 x111 office 978-762-0900 x115 office603-817-6300 cell 978-360-1040 celleeames@wirelessanalytics.com foliveira@wirelessanalytics.com 4  
  5. 5. About TEMIAn  The purpose of TEMIA is to promote the value of TEM through education and marketingn  TEMIA’s mission is to expand the size of the TEM market globally and develop open industry standards to augment service quality and performancen  Members work together for growth of the industry while still competing for business 5
  6. 6. Mobile Device Managementn  The explosion of mobile devices and operating systems have changed the rules of the game for the enterprise. q  Device Management q  Device Security q  Employee Mobile Productivity q  Device Provisioning q  Ongoing Mobility Supportn  Companies that offer MDM solutions have multiplied as smartphones have flooded the enterprise. AirWatch     Good  Technology     Mobile  Iron     Blackberry  Enterprise  Server     HP     Mobiquant  Technologies     Boxtone     IBELEM     NoDfy  Technology     Capricode     JAMF  SoIware     Pointsec  Mobile  Security     CommonTime     Kaspersky     Odyssey  SoIware     Dell     LANDesk     Smith  Micro  SoIware     Excitor     MaaS360     SOTI     F-­‐Secure     Mcafee     Sophos  Mobile  Control     FancyFon  SoIware     MicrosoI  Exchange.   Sybase    Afaria   Fixmo     MformaDon     Symantec     Fromdistance     Mobile  AcDve  Defense     Zenprise   6
  7. 7. Selecting An MDM Solutionn  What is Mobile Device Management? q  It is more than just a piece of software q  Enterprises need to approach an MDM Strategy from a holistic approach: •  Mobile Visibility – beyond security •  Device Management – beyond remote wipe •  Reporting – beyond active directory •  Cost Management – beyond MDM license costs •  Help Desk Support – beyond connectivity •  Policy Management – beyond compliance•  MDM should address the complete security and oversight of a device inside an organization from selecting new devices, to provisioning, securing and managing existing devices, and finally to decommissioning end-of-life devices. 7
  8. 8. People, Process, TechnologyTo develop and implement a successful MDM program, oneshould identify the key people, process and technologyneeded within your organization. 8
  9. 9. Level of Effort with MDM SolutionMobile IT Resource Requirements q  The resources required to run a mobile IT offering are different from the resources traditionally required to run a desktop service. q  Mobile devices have little in common with desktop systems both in terms of technology, features, and user experiences. q  Mobile device expertise and skills are essential to deploying a successful MDM program. q  The roles recommended for successful enterprise-grade mobile IT services are listed below: •  Mobile System Engineer •  Mobile Device Expert •  Mobile Security Expert •  Mobile Applications Developer 9
  10. 10. Level of Effort by Device OSPlatform/Devices Strengths Weaknesses Outlook Slow in reaching OS parity w/ •  Has suffered a dramatic loss Offered by all US and international carriers competitors in market and mindshare. In competition w/ Apple, Google, •  Recent device and OS7 BES/Security and Microsoft release has narrowed the gap RIM: Blackberry QNX Migration is risky and between Apple and Android. Device Pricing "jerky" •  The upcoming migration to QNX will be critical for the User Friendly Keyboard, BMI Playbook has been a flop platform. Hardware and Software Design and Features Apple is overly controlling Clear OS & Device Strategy Limited Device Selection •  Meets most enterprise Apple: iOS Minimal Malware requirements. Security Encrytion. App Security. Offered by all US and international carriers Hardware and Software Design and Has not met most security •  Has surpassed Apple in Features requirements innovation and time to market. Open model has lead to •  Androids openness has been Relatively unified phone and table strategy increase in Malware its strength (and its weakness (malware, OS Google: Android Multiple Device Types, sizes, shapes, etc OS and UI Fragmentation fragmentation, no "corporate Offered by all US and international carriers standard" device. App availability and minimal App •  At this time Google has not requirements articulated a strategy to overcome corporate security 4G Support concerns. Has met most enterprise security •  The slowness to market, lack requirements of carrier support, andMicrosoft: Windows Innovative Software Design Limited Carrier Support Microsofts lack of enterprise Phone 10 strategy have so far made
  11. 11. Live Polling Question 11
  12. 12. MDM Deployment Processn  A successful MDM implementation should follow a careful device deployment process. MDM  Deployment  Process   Build Roll-Out Sustain Device/OS Selection Device Provisioning End-user Management Solution Testing Device Registration and Device Retirement MDM Choice/Approval Configuration q  The Build and the Roll-Out phases are important, but the Sustain phase will determine the program success q  The solution should allow IT to configure, monitor, and control data & access on multiple OSs and devices 12
  13. 13. Stakeholders & Resources     Es;mated  Time  Stakeholder   Responsibili;es   Commitment  Execu;ve   •  Secure  adequate  funding  for  the  program      Sponsor   •  Free  up  organiza;onal  resources  as  necessary   •  Ensure  stakeholders  stay  engaged   •  Approve  business  requirements  and  proposed  solu;on   •  Develop  business  plan  and  jus;fica;on  Legal   •  Iden;fy  and  resolve  regulatory  compliance  gaps  and  issues       •  Determine  corporate  vs.  employee  liability  for  devices  and  data   •  Review  new/revised  policies  and  end  user  agreements  Human   •  Create/revise  privacy,  en;tlement,  and  acceptable  use  policy  and  end  user  agreements      Resources   •  Produc;vity  and  efficiency  improvements   •  Recruit  staff  needed  to  develop/maintain  the  BYOD  program   •  Handle  internal  communica;ons  and  marke;ng  of  the  program  Finance   •  Develop  reimbursement/s;pend  policy       •  Develop  plan  for  telecom  expense  management   •  Nego;ate  with  carriers  on  pooled/discounted  rates,  early  termina;on  fee  waivers,  upgrade   allowances,  number  por;ng,  unlocked  devices,  interna;onal  roaming  rates,  value  added   services,  bill  on  behalf  of,  account  management  IT  Security   •  Determine  device  security  requirements,  including:       §  Encryp;on   §  Password  policy  (PIN,  ;meout,  allowed  failed  aXempts)   §  Remote  wipe   §  Security  policy  configura;on  and  enforcement   §  Data  protec;on  (data  loss  preven;on,  data  separa;on,  data  classifica;on,  digital  rights   management)   §  Policy  enforcement  (no;fy  user,  suspend/revoke  access,  remove  corporate  data,  disciplinary   ac;on  (with  HR))  IT  Opera;ons   •  Monitor  costs  to  ensure  program  meets  cost  maintenance  or  reduc;on  goals       •  Provide  ;ered  service  offerings   •  Determine  Help  Desk  vs.  end  user  responsibili;es   •  Provide  training  for  Help  Desk  and  end  users   13A Successful MDM Program Requires Coordinating Among Many Stakeholders
  14. 14. MDM Implementation ChecklistOrganizaDonal  Commitment   Please  place  an  x  in  the  appropriate  column               Strong   Moderate   Weak   Non-­‐existent   Comments       Execu;ve-­‐level  sponsorship                           Key  stakeholder  (decision-­‐makers)  commitment  to  project                           Stakeholder  consensus  on  goals                       Stakeholder  agreement  to  balance  security/cost  concerns       with  end  user  experience                           Technical  literacy  of  workforce                      IT  Readiness   Please  place  an  x  in  the  appropriate  column               Ready   Planned   None   N/A   Comments       IT  Resources                           Device  experts                           Device  tes;ng                      Sufficient  Staffing   Please  place  an  x  in  the  appropriate  column               Ready   Planned   None   N/A   Comments       MDM  Implementa;on                           Design  infrastructure:    <list  name(s)>                           Implement  infrastructure:    <list  name(s)>                           Exchange  Administrator:  <list  name(s)>                           Network  Administrator  (FW  and  LB):    <list  name(s)>                           PKI  and  Cer;ficate  Administrator:    <list  name(s)>                           Design  processes:    <list  name(s)>                           Documenta;on:    <list  name(s)>                           Communica;ons:    <list  name(s)>                           Training:    <list  name(s)>                           Opera;ons  and  maintenance:    <list  name(s)>                           Develop  and  implement  device  lifecycle  process               Wireless Analytics, LLC             Develop  and  implement  new  Help  Desk  processes                       14
  15. 15. MDM Program Implementationn  End-user communication is critical to program success q  Welcome letter introducing the program to users. q  Copy of the End User mobile device agreement. q  Getting started instructions with a basic device tutorial and links to online training resources. q  Registration instructions for connecting devices to corporate resources and configuring security. q  FAQ and support guide for troubleshooting common problems with links to support resources. 15
  16. 16. Mobile Security Policyn  It is important to review, update and communicate all critical aspects of an enterprise security policy when implementing an MDM solution q  Device Security Policy q  Encryption Security Policy q  PIN Lock Policy q  Application Security Policy q  End-user Policy Awareness and Training 16
  17. 17. Mobility Strategiesn  Bring Your Own Device (BYOD)? q  User preferences are starting to dictate device choice •  Device capabilities, functions and applications •  Needs to be flexible and adaptable to new solutions •  High service availability •  Protect Intellectual property and litigation rights to equipment •  Minimize operating costs q  Cost of ownership is higher than expected •  Infrastructure needed •  Upgradability •  Scalability •  Single point of failure •  Device support •  MDM solution must meet the needs of the both IT and the employees q  Application management becomes more important •  App Design and Governance •  Apps not appropriate on personal devices for security reasons •  Policies will vary as will user expectations •  User prohibited from social apps on corporate device •  User will NOT accept that type of policy on personal device 17
  18. 18. Summary - Best Practicesn  Best practices for creating a successful MDM program should address a broad spectrum of challenges in order to increase program success: q  Balance  security,  compliance,  legal  liability,  and  cost  concerns   with  a  posi;ve  user  experience   q  Engage  stakeholders  early  and  keep  them  involved  throughout   the  project  so  that  decisions  can  be  made  in  a  ;mely  fashion   q  Acquire  and  test  all  devices  and  OSs  you  are  considering  and  only   allow  those  that  meet  your  requirements   q  Build  a  team  of  experts  that  can  support  all  aspects  of  the   program  –  from  implementa;on  to  ongoing  maintenance   q  Measure  and  demonstrate  the  results  and  value  of  the  MDM   program  to  the  business  and  on  the  boXom  line.   18
  19. 19. Complete SolutionMobility Management for Enterprises Carrier Lifecycle Expense Analysis 19
  20. 20. Live Polling Question 20
  21. 21. Join TEMIA for Future Webinarsn  Plan Globally, Deliver Locally: Finding the Smart Balance for Your Organization’s International Mobile and Fixed TEM Needs Register: http://tiny.cc/9i1hbwn  Participate in our Brief survey on billing: Enterprise: http://tiny.cc/czw3aw Solutions Providers: http://tiny.cc/42ehbwn  Learn More About Our Webinars Online 21  

×