Enterprise Mobile Management (EMM) - MTBC Luncheon

  • 1,349 views
Uploaded on

MDM or EMM - It's all about Mobility. …

MDM or EMM - It's all about Mobility.

What we have learned and experienced on the Mobile world and how we can help companies do more that allow mobile access to company assets, but protect the devices and the content on them BYOD is already here with >95% of users using personal devices for their jobs.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,349
On Slideshare
0
From Embeds
0
Number of Embeds
3

Actions

Shares
Downloads
27
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • One of the most recent studies, conducted in mid 2012, found that 95% of organizations in the United States permit employee-owned devices in some way, shape or form in the workplace.84% of organizationsnot only allow employee-owned devices, but also provide some level of support for these devices. And 36% of surveyed enterprises provide full support for employee-owned devices. In other words, they will provide support for any device (smartphone, tablet, laptop, etc.) the employee brings to the workplace.This study also concluded that the average number of connected devices per worker is expected to reach 3.3 by 2014, up from an average of 2.8 in 2012. ---- Source: Cisco IBSG Horizons Study , May 2012
  • This study was published by InfoWorld. The research was performed by the market research team at Forrester. The study asked IT security managers to describe the most important security concerns.Network security was the top concern, followed by data security, and device security.
  • There are some fundamental basic goals for a BYOD deployment. Most importantly, the protection of corporate data. But the success and adoption of BYOD has to take into account some of management add user aspects that support work-style choice.Many employees simply expect it and you will have trouble stopping it. If you don’t enable it, your business will
  • EMM or Enterprise Mobility Management is the “must have” mobile platform for organizations to embrace BYOD in a simple, secure and scalable manner. A well defined mobile policy coupled with EMM technology to fulfill and enforce the policy is essential. So everything from your enrollment process, configuration management, policy enforcement, and data management can be controlled. There are many ways MDM can help you create these separate work spaces on the device that keep corporate data secure.
  • To further set the stage and provide some perspective on how many of you peer organizations are using MDM in their BYOD deployments, here is some data we have collected on how customers use our platform to provide some perspective on the techniques and tools being used to manage and secure mobile devices. Android: there are no real consistent patterns emerging. Samsung SAFE is getting some traction, but this is really counter intuitive to BYOD in many ways.Integration: We are seeing a trend to towards more control, but most customers are pretty relaxed and visibility is the important aspect at the moment for many.
  • Mobile Security is top of mind for IT departments.The influx of smartphones and tablets accessing corporate data is creating a need to enforce security levels on these devices.MaaS360 can help you ensure data is not compromised while giving employees access to the information and resources they need.MaaS360 provides multiple ways to implement mobile security across devices, email, apps, documents, the Web and networks. With ForeScout MDM you can:Enforce passcode requirements and encryption Restrict jailbroken and rooted devicesFull and selectively wipe of devicesAuto quarantine devices trying to access emailRestrict corporate email from being movedBlacklist applicationsRestrict native apps and features on the deviceEnforce app complianceAuthenticate user access to apps and docsControl edit, share, cut and past of docsDefine URL filters and security policies based on categoriesAllow access to data on corporate intranet sitesUse certificate based access to email, VPN and WiFi
  • MaaS360 delivers a Dual Persona approach to separate personal and enterprise data in this BYOD era. It provides a Trusted WorkPlace container for a complete mobile security and productivity solution with strong data leak prevention (DLP) and consistent and seamless workflows.It is the only comprehensive cloud-based solution for iOS and Android that enables employees to securely access corporate data while preserving the mobile experience on their personal devices.MaaS360 keeps everything your users need for work in one secure container. They can manage all their emails, contacts, calendars, apps, documents and Web browsing from one dedicated workspace on their mobile devices, no matter what devices they’re using or who owns them.With policies to control the movement of data, you can restrict sharing by users, forwarding of attachments, and copying and pasting. Devices that are lost, stolen or compromised can be selectively wiped to remove the secure container and everything in it.It uses a dual persona approach to separate work from play so you can put controls in place to manage this secure container that won't affect the rest of the device.MaaS360 provides IT teams a wide range of mobile security options to separate corporate and personal information across different categories of users, devices, content, and apps, all within the context of their business. This gives our customers the flexibility to offer tiered or layered mobile security to address their varied end user needs and IT security requirements, from MDM essentials to stricter lockdown capabilities of corporate data for specific users.For businesses that need stringent security policy and compliance controls, such as those in the highly regulated healthcare and financial services industries, containerization can be especially helpful in making the BYOD experience more palatable for users.With MaaS360 , organizations can phase in BYOD and “right size” their mobile security investments for different classes of users, departments, geographies, devices and applications, and apply the technology approach that best meets the need of those use cases, all from a unified platform.Secure MailA secure office productivity app with email, calendar and contacts.Application SecurityA mobile application container with full operational and security management.Secure Document SharingA fully secure document container with expanded user support to edit content.Secure BrowserA fully-functional web browser to enforce compliance and control access to content.Key benefitsComplete set of productivity tools for viewing, editing and sharingSafely and securely support Bring Your Own Device (BYOD)Separate personal and corporate dataReduce risk of sensitive data leakageLeverage single sign-on for authentication, and on-line and off-line compliance checksWipe suite container, app containers, enterprise profiles or whole deviceExperience consistent and seamless workflows for iOS and Android devicesUse granular administrative controls and reporting
  • Talk about how mobile security management can be done at three different levels.Talk about how mobile security management can be done at three different levelsMore consistent and user centric data security policy and controls for BYODMore management & security for appsMore separation of corporate & personal apps/data and docsStreamlined onboarding, entitlement enablement and self serviceA light presence on user-owned devices alleviating privacy concernsLeveraging of perimeter NAC and DLP investment for Mobile access
  • Fiberlink differentiates across five key factors:Proven approach to cloud Mobile Device Management – We’ve been doing cloud-based endpoint management since 2007 and we are laser focusedPowerful management and security capabilities to address all market requirements – Start with best practices MDM and evolve with your needs to more advanced management such as our container solutionsSecure containers to separate work and play – MaaS360 contains your emails, apps and docs for a dual persona approach to separate work and playSeamless integration with existing systems – MaaS360 provides plug and play with your enterprise infrastructure; so you can secure and extend it to mobileSimple and fast, delivering an exceptional customer experience – MaaS360 can be turned up instantly with streamlined provisioning, automated workflows, and an intuitive user interfaceLong version:1) Proven approach to cloud Mobile Device ManagementOur focus on a true cloud-based SaaS delivery model and proven experience in enterprise mobility form the core of our competitive advantage. MaaS360 is built on a mature cloud-based architecture that is multi-tenant, fully redundant, secure, and on-demand. The platform has been in operation for 5 years supporting over 1.5 M devices with the performance, reliability and scale that enterprise customers expect.Customers benefit from feature updates that are available instantly and no ongoing maintenance. Customers can effortlessly scale up as there are no infrastructure (hardware, database) limitations on the number of devices supported. MaaS360 is the only MDM solution with FISMA certification from the US government for its compliance with strict information security regulations and guidelines providing, providing customers with peace of mind.  2) Powerful management and security capabilities to address all market requirementsMaaS360 is a comprehensive platform that provides dynamic end-to-end management to continuously monitor the expanding suite of enterprise mobile devices and take automated action. A single console lets IT manage the entire mobile device lifecycle—from enrollment through configuration, security, monitoring, application management, expense management and support.Customers can easily define and implement powerful compliance enforcement rules based on specific events, context, and location. Customers can also leverage innovative features such as container solutions and BYOD privacy settings to protect personally identifiable information for end users .MaaS360 goes beyond smartphones and tablets to include laptops, desktops, and Mac devices to manage and secure all enterprise computing platforms, including employee and corporate owned devices. 3) Secure containers to separate work and play with a dual persona approachMaaS360 provides IT teams a wide range of mobile security options to separate corporate and personal information across different categories of users, devices, content, and apps, all within the context of their business.This gives our customers the flexibility to offer tiered or layered mobile security to address their varied end user needs and IT security requirements, from MDM essentials to stricter lockdown capabilities of corporate data for specific users.For businesses that need stringent security policy and compliance controls, such as those in the highly regulated healthcare and financial services industries, containerization can be especially helpful in making the BYOD experience more palatable for users.With MaaS360 , organizations can phase in BYOD and “right size” their mobile security investments for different classes of users, departments, geographies, devices and applications, and apply the technology approach that best meets the need of those use cases, all from a unified platform.MaaS360 delivers the only comprehensive and complete cloud-based solution for iOS and Android that enables employees to securely access corporate data while preserving the mobile experience on their personal devices.It keeps everything your users need for work in one secure container. They can manage all their emails, contacts, calendars, apps, documents and the Web from one dedicated workspace on their mobile devices, no matter what devices they’re using or who owns them.With policies to control the movement of data, you can restrict sharing by users, forwarding of attachments, and copying and pasting. Devices that are lost, stolen or compromised can be selectively wiped to remove the secure container and everything in it.It uses a dual persona approach to separate work from play so you can put controls in place to manage this secure container that won't affect the rest of the device.4) Seamless integration with existing systems Through the MaaS360 Cloud Extender and robust APIs, customers can easily tie in with their existing infrastructure, extending their enterprise capabilities to a mobile environment. This approach allows them to leverage all their existing investments in enterprise infrastructure, such as Microsoft Exchange, ActiveSync, Office 365, Lotus Notes Traveler, Active Directory, LDAP, certificate authorities, reporting systems, help desk systems, or other 3rd party applications.MaaS360’s Cloud Extender is not intrusive and does not sit "in between" a mail server and the user so it does not introduce any additional points of failure to a customer environment.5) Simple and fast delivering an exceptional customer experienceThrough streamlined provisioning, automated workflows, and an intuitive user interface, customers can get a complete MDM solution up and running in minutes, instead of days, weeks, months, or never at all. This allows us to be more responsive to our customers in helping them to deploy, manage, and secure mobile devices and apps for enterprise use. Zero on-premise infrastructure provides faster time to value and greater ROI. Our pricing is all inclusive and we do not charge fees for activation, installation, professional services, and upgrades. All backed by the most responsive support staff in the business. You always get 24x7x365 live support at no additional cost. No other MDM solution on the market allows customers to get started as easy as we do. In addition, our free evaluation is actually our production environment. So customers don't need to do anything else but sign a contract when ready.
  • Questions & Answers Questions on what we do? Thoughts on what you have seen? Next Steps to progress together Evaluation – scoped together Data Risk Assessment Quiz – take it and see where you stand Sign-up – options and discounts (when applicable) Contact Us – www.mirroredstorage.com or 214-550-0550

Transcript

  • 1. MDM or EMM It's all about Mobility 1
  • 2. Agenda 2 • How Mirrored Storage got into EMM • BYOD Revolution • EMM Best Practices • Security 2.0 • MaaS360 Offering • Q&A
  • 3. Mirrored Storage Experience • Is your device secure? • Now can multiple device/version/platforms/… be managed together? • Most Important Feature? – Desktop Features – Cost of features – What’s possible – Cloud vs. In-house • Is it possible to Manage FOR customers? • Market in moving at lightning speed! 3
  • 4. The BYOD Revolution 95% Source: http://newsroom.cisco.com/release/854754/Cisco-Study-IT-Saying-Yes-To-BYOD Already said yes to BYOD http://www.eweek.com/c/a/Enterprise-Networking/Cisco-Enterprises-are-Embracing-BYOD-252679/ 4
  • 5. Top IT Management Concerns Source: Infoworld / Forrester http://www.infoworld.com/d/wp/the-expanding-role-of-mobility-in-the-workplace-211973 5
  • 6. Key BYOD goals • Protect corporate data • Protect user privacy and personal data • Support a diverse set of platforms/device types • Help users adhere to HR, audit, legal, compliance and security guidance • Support a diverse set of policies, roles, personas and access rights • Improve productivity and accessibility • Support employee work-style choice
  • 7. EMM is Integral for BYOD • Supports BYOD with self-service enrollment • Configure devices and protect employee privacy • Enforce security policies and meet regulations • Push content, apps and docs to separate workspaces 7
  • 8. Current EMM Best Practices Integration  AD/LDAP: 15% integrate for device enrollment & app/doc access  Email Access Control: 20% quarantine new devices w/o MDM Apps  App Catalog: 80% of companies pushing apps  Enterprise Apps: 25% of companies pushing enterprise apps  Enterprise Apps: On average 6 apps per business. Median is 3. Docs  Containerize specific workflows / use cases: 40% of customers use Doc Mgmt  Specific LOB use cases – sales materials, BOD materials, flight materials Device  iOS: ~80% of all enterprise devices. Leading BYOD choice.  Android: Standards to reduce fragmentation. Tablets in field operations.  Policy: Password, Require device encryption, Email/EAS configuration 8
  • 9. EMM • Mobility is becoming the platform, not an add on • Organizations need comprehensive Enterprise Mobility Management • IT needs growing beyond enabling these new platforms 1. More use of identify, context and more sophisticated policy 2. More app management & security (and app dev assist) 3. More separation of corporate & personal apps/data 4. More mobile utilization of corporate network/resources
  • 10. App Management & Security 2.0 EMM App Security Requirements Containerize Enterprise Apps • Further encrypt • AAA • Compliance checks • DLP controls Link & Tunnel Enterprise Apps • SSO • Shared clipboard • Data sharing • Tunnel to corporate LAN • “VPN free” Link Public & Corporate Apps • SSO • Shared clipboard • Data sharing MaaS360 App Security
  • 11. Separation of Work & Personal 2.0 Separate Work & Personal Apps • Ensure sandboxing • Ensure selective wipe Separate Work & Personal Content (Especially Work Docs & Attachments) • Reduce DLP risk • Ensure selective wipe • Tunnel to corporate LAN • “VPN free”Securely Access Content Repositories EMM Data Security Requirements MaaS360 Workplace
  • 12. MDM 1.0 Practices • Over-the-Air Device Configuration of Email, Calendar, Contacts, Corporate Wi-Fi • Applications & Web Clips • Passcode enforcement • Remote lock and wipe • Corporate Wipe, Full Wipe • Expense Management • Comprehensive Reporting & Real-time Alerts EMM Best Practices • App Management • Document Management • Secure Web Browser • URL Filtering / Phishing • Geo-fencing Policies • Secure Container • Encryption and DLP • Email, Contacts, Calendar • Third-party Apps Evolving to Enterprise Mobility Management (EMM)
  • 13. Comprehensive Mobility Management The Essentials • SMS, email, or URL enrollment • Email, calendar, contact profiles • VPN and Wi-Fi settings • Device feature configuration • Policy updates & changes • Inventory management • Compliance reporting Advanced Management • Mobile app management • Document sharing • Event-based policies • Proactive expense controls • BYOD privacy settings • Shared device support • Self service portal 13 Location-based policies Device Enrollment, Acceptable Use OTA Configuration Enterprise App Catalog 13
  • 14. Robust Mobile Security Device Applications Network Email Documents Auto-quarantine/access approval Contain emails and attachments Remote wipe of work email Password authentication Restrict copy, paste, share Remote wipe of work files Configure Wi-Fi and VPN profiles Cert delivery and authentication Dynamic policy based on SSID Encryption and passcodes Jailbreak/Root detection Locate, lock, wipe Blacklist/Whitelist mobile apps Wrapping and compliance rules Remote wipe of managed apps Web Define URL filters and categories Allow access to intranet sites Disable native/3rd party browsers 14
  • 15. MaaS360 Enterprise Mobile Security Secure Mail Application Security Secure Document Sharing Secure Browser A Trusted WorkPlace container for seamless security and productivity Dual Persona to separate personal and work data in the BYOD era 15
  • 16. Why Choose Comprehensive EMM? • Provide options to address multiple use cases • Protects corporate resources and reduces risk of data loss • Preserves the native experience on the device • Allows you to manage the data even if employee owned • Platform choice and device type left to end user Device Level App/Doc Level Enterprise Level Work App Catalog ***** * Doc CatalogApp Wrapping 16
  • 17. Why Customers Love MaaS360 Powerful features to address the full mobility lifecycle Seamless integration with all your existing infrastructure Simple and fast with an exceptional experience Proven approach to cloud mobility management Secure containers to separate work and play Exchange AD/LDAP Lotus BES Certs 17
  • 18. 18
  • 19. 19
  • 20. Q&A John Neibel President & Founder jneibel@mirroredstorage.com 214-550-0550 www.mirroredstorage.com