Your SlideShare is downloading. ×
0
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Strategies for Managing Disparate Devices in Your Mobile Fleet
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Strategies for Managing Disparate Devices in Your Mobile Fleet

761

Published on

Chances are, your firm’s fleet of mobile devices is by no means a uniform one. It may work, but that doesn’t mean that the hodge-podge environment of disparate devices is easy to manage. This session …

Chances are, your firm’s fleet of mobile devices is by no means a uniform one. It may work, but that doesn’t mean that the hodge-podge environment of disparate devices is easy to manage. This session will explore how to allow multiple vendors into your mobile environment, as well as how to handle staff leaving, touchscreen versus QWERTY, carrier contracts, and integration options such as Good, BES, ActiveSynch and Notifylink.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
761
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Strategies for Managing Disparate Devices in Your Mobile Fleet MRW1 - August 24, 2010 Kris Snyder Brian Donato Christopher Hunt MRW1 – 8/24/2010
  • 2. Agenda • MANAGEMENT APPROACH • MOBILE DEVICE POLICY • DEVICES / TRENDS • MANAGEMENT TOOLS MRW1 – 8/24/2010
  • 3. “Enterprises have been reluctant to embrace the newest mobile devices because of concerns about security, not to mention the increased management burdens that the new devices would place on already strapped IT departments.” Philippe Winthrop, Research Director, Strategy Analytics MRW1 – 8/24/2010
  • 4. “Consumerization” of Enterprise Mobility In a recent survey, nearly 80% of companies have seen increases in the number of employees wanting to use their own mobile devices to access enterprise data, due in large part to the iPhone, and more recently, Android devices. Source: Vanson Bourne, “The Device Dilemma,” Sept. 2009 MRW1 – 8/24/2010
  • 5. Approaches to Mobile Device Management • Big Brother – Standardize on one, and only one, platform – most likely Blackberry – Firm owns and controls all devices ** Users want more freedom, more choice • Free-for-all – Allow any device – Users responsible for purchasing and maintaining ** How to manage? • Hybrid – Multiple devices supported, within set limitations – Users or firm can purchase ** IT controls certain aspects, users retain control over device choice, everyone is happy. Or are they? Poll Results MRW1 – 8/24/2010
  • 6. Determine the Right Approach • WHO? – End User Segmentation • Executives/Management • IT vs. Non IT • Lines of Business: Partner vs. Non-Partner; Timekeeper vs. Staff • IL vs. CL • WHAT? – PIM, Extended Application or Mobilized Task • Mobile Operating Systems • Device or form factor selection • WHERE? – Cellular, Wi-Fi • HOW? – Device, Application, Service, Security, Expense, and Asset Management MRW1 – 8/24/2010
  • 7. Mobile Device Policy • Device Selection – Standardize on one platform, or allow variety? • Form / Function (QWERTY vs. Touch Screen) – Who owns the device? – All about the apps – Support and Inventory Implications • Carriers / Plans – Who pays? MRW1 – 8/24/2010
  • 8. Mobile Device Policy • Security – Policy Compliance – Passwords – Data Encryption – What to do when employee leaves? • Wipe whole device vs. wipe enterprise data? • Office Cultural and Political Considerations – Finding common ground without causing a mutiny MRW1 – 8/24/2010
  • 9. Poll • Please pick all the items below that best describe your mobile device password policy • Please pick all the items below the best describe your mobile device encryption policy. • Please pick the items below the best describe how you view Mobile device security. MRW1 – 8/24/2010
  • 10. Live Example - Vorys • Vorys, Sater, Seymour and Pease LLP – 7 offices, 375 attorneys, 850 users – About 450 mobile devices supported • Management Model – Hybrid • Firm manages a loaner pool of blackberry – Managed with BES • Firm supports personal RIM, Windows and iPhone devices – We use Exchange Active Sync and Good – User buys devices, Reimbursed for service MRW1 – 8/24/2010
  • 11. Live Example - Vorys • The Good – Users can choose from many devices – Firm not tied into a single device – Attorney feel more relevant with latest devices. • The Bad – Much more setup and support work – Cannot leverage all devices to run firm standard software. MRW1 – 8/24/2010
  • 12. Live Example - Vorys • The Ugly – Managing devices requires compromises • Example - Good for iPhone makes device much less adept at email. – Can be difficult to say no to a popular device – Lost control of data • iTunes, BB Desktop backups? MRW1 – 8/24/2010
  • 13. Live Example - Vorys • Lessons Learned – Treat security and manageability as the primary requirements. – If you view these devices as a platform, treat them as such – Long term, supporting multiple devices likely isn’t a win for the firm. MRW1 – 8/24/2010
  • 14. Live Example - Tarlow • Tarlow, Breed, Hart & Rodgers, P.C. – 1 office, 21 attorneys, 47 users – 26 mobile devices • 57% iPhone; 31% Symbian; 8% Android; 4% Windows Mobile • Management Model – Hybrid • Good for Enterprise – Currently supports 120 devices over the 4 major OS platforms – Users may select from either a Firm-provided device or buy their own APPROVED device; Firm pays for data. MRW1 – 8/24/2010
  • 15. Live Example - Tarlow • The Good – Users are happy with device selection – IT is happy with uniform email delivery service – Easy management of mobile device fleet – Compliance with data security laws • The Bad – Users not always happy with limitations of the Good email client – IT is assumed to know everything about every phone AND app on the market – When something breaks, users want IT to deal with it, even if they bought their own phone MRW1 – 8/24/2010
  • 16. Live Example - Tarlow • Lessons Learned – Security of data is paramount – Find balance between keeping users happy and keeping IT sane – Letting go of some control also requires users to assume some control – if they won’t, this strategy may not work MRW1 – 8/24/2010
  • 17. Future Management Considerations • Evolution of Privacy laws – Encryption to a higher standard. • Evolution of devices as platforms – How do you handle O/S upgrades for PC? • Consumer v. Business devices – Where to draw the line • Hybrid Devices? – How significant is the phone part of SmartPhone? • Evolution of policy – Data is mingled MRW1 – 8/24/2010
  • 18. Mobile Device Trends • Global Trends • US Smartphone Market Share • Legal Industry MRW1 – 8/24/2010
  • 19. Global Smartphone Sales Millions of Units Source: Gartner; Forecast: Smartphones by Operating System and End User Segment, Worldwide, 2007-2013; Sept. 2009 MRW1 – 8/24/2010
  • 20. Smartphone Platform Market Share Share (%) of Smartphone Subscribers Feb-10 May-10 % Change RIM 42.1% 41.7% -0.4% Apple* 25.4% 24.4% -1.0% Microsoft 15.1% 13.2% -1.9% Google 9.0% 13.0% 4.0% Palm 5.4% 4.8% -0.6% Other 3.0% 2.9% -0.1% Source: comScore May 2010 U.S. Mobile Subscriber Market Share MRW1 – 8/24/2010
  • 21. Legal Industry • RIM is still the King in Legal – 78% of law firms in 2009 ILTA tech survey indicate RIM devices in use in their firms, an upward trend over the past three years. • iPhone beginning to infiltrate – 7% of firms indicated the presence of the iPhone • Support for multiple platforms increasing – 35% of firms indicate support for multiple platforms (up from 26% in 2008), with another 8% moving toward multiple platform support. • 2010 – the year of Android? – Great concern surrounding Android devices, centering on lack of policy enforcement and weak native enterprise email support. Source: ILTA’s 2009 Technology Survey MRW1 – 8/24/2010
  • 22. Device and Platform Standardization has been replaced by Device and Platform  Heterogeneous control, security and management as the key initiative for corporate  IT organizations.  This, combined with the individual liable trend, is forcing cross  platform acceptance. iPhone Has BlackBerry Android is Windows Changed is a Here Mobile is the Game Mainstay Still Around MRW1 – 8/24/2010
  • 23. Social Engineering; Policy & People Exchange Active sync BES Apple Third Party Tools (EAS) via Tools (Good, Mobile Iron, & BAS Trust Digital) MRW1 – 8/24/2010
  • 24. BES / BES Express MRW1 – 8/24/2010
  • 25. Microsoft Exchange ActiveSync MRW1 – 8/24/2010
  • 26. Microsoft Mobile Device Manager MRW1 – 8/24/2010
  • 27. iPhone Configuration Utility MRW1 – 8/24/2010
  • 28. Good for Enterprise MRW1 – 8/24/2010
  • 29. Zenprise MRW1 – 8/24/2010
  • 30. Boxtone MRW1 – 8/24/2010
  • 31. Our Advice • Having A strategy is better than NO strategy • Think long-term when developing your policy • Lots of technology tools, no technology solutions MRW1 – 8/24/2010
  • 32. Questions? MRW1 – 8/24/2010
  • 33. Thank You! • Kris Snyder, President and CEO Vox Mobile • Brian Donato, IT Director Vorys, Sater, Seymour and Pease LLP • Christopher Hunt, IT Director Tarlow, Breed, Hart & Rodgers, P.C. MRW1 – 8/24/2010

×