MDM.Cemented Security?
What do you see?
Web Browser                       Communication                     CommunityInternet in my                      GPSOpport...
Crisis?
Crisitunit      Flexibility   Security
Risks Are
How do wesecure these things?
Protect the castle             75% of employees             work outside the “walls”
Ah Ha! What if...
Cement Security             +Mobile Device Management
The MDM way  Data  App  OS              MDM DeviceNetworkLocation
The MDM way
The GoodDevice is secure.um... did I mention the device is secure?
The not so good•   Privacy concerns•   Can’t mix personal & business    Apps & data•   Policies are draconian•   Forced to...
What if we used  the MDM approach to
using old solutions   to solve new    (doesn’t always work)
A better way  Data  App  OS                     MAM DeviceNetworkLocation
A better way
Every time a phone getsMDM’d, god kills a kitten
Pouring Cement on Mobile Devices
Upcoming SlideShare
Loading in …5
×

Pouring Cement on Mobile Devices

821 views
770 views

Published on

A light and insightful look at mobile device security. When did it become acceptable to lock down or wipe a personal mobile device? In the age of user empowerment and BYOD, these practices are no longer being tolerated by the savvy employee.
Read more...

So what are the implications of taking a device lockdown approach, and what are some of the alternatives? Well tell you how a company can secure its data but maintain the privacy and integrity of its employees.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
821
On SlideShare
0
From Embeds
0
Number of Embeds
106
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Pouring Cement on Mobile Devices

  1. 1. MDM.Cemented Security?
  2. 2. What do you see?
  3. 3. Web Browser Communication CommunityInternet in my GPSOpportunity hand ? Collaboration Camera HDTV Tricorder
  4. 4. Crisis?
  5. 5. Crisitunit Flexibility Security
  6. 6. Risks Are
  7. 7. How do wesecure these things?
  8. 8. Protect the castle 75% of employees work outside the “walls”
  9. 9. Ah Ha! What if...
  10. 10. Cement Security +Mobile Device Management
  11. 11. The MDM way Data App OS MDM DeviceNetworkLocation
  12. 12. The MDM way
  13. 13. The GoodDevice is secure.um... did I mention the device is secure?
  14. 14. The not so good• Privacy concerns• Can’t mix personal & business Apps & data• Policies are draconian• Forced to use 2 devices• Inherited liability• One-size-fits-all security model• Complete device wipe upon threat detection
  15. 15. What if we used the MDM approach to
  16. 16. using old solutions to solve new (doesn’t always work)
  17. 17. A better way Data App OS MAM DeviceNetworkLocation
  18. 18. A better way
  19. 19. Every time a phone getsMDM’d, god kills a kitten

×