SlideShare a Scribd company logo
1 of 9
Download to read offline
Mobile Device Management
Author: Balag
MDM- The Pain
Mobile Device Management (MDM)
Mobile Device Management (MDM) is a security application used by an IT department to monitor,
manage and secure employee's mobile devices being used in the organization.
The mobile device management tool:
Is compatible with common handheld device operating platforms and applications.
 Can function through multiple service providers.
Can be implemented over the air, targeting specific devices as necessary.
Can be deploy in next-generation hardware, operating platforms and applications quickly.
Why do we need MDM?
 Secure, monitor, manage mobile devices
 Remote distribution of applications, data and configuration settings for all mobile devices in a
network, support costs and business security risks are lowered
 Deploy, manage, block or remove rogue apps on individual or groups of devices
 Reducing the risk of dangerous mobile malware
 Maintaining data plan and call budgets
 Locate and track connected devices in real time via Google Maps
 Configuration and management for backup process of all mobile devices
 User audit such as call logs, call costs, messages sent and received as well as the apps that have
been installed or removed
Market Need for MDM
 International Data Corporation (IDC) estimates 450 million smart phones manufactured in 2011 and
expected to double by 2013
0
200
400
600
800
1000
2011 2013
450
900
Manufactured Smartphone's
Millions
Market Need for MDM
Osterman Research:
 28% of employees in the US in 2011 use company mobile devices which is expected to rise up to 33% in
2012
 Forrester reports 49% of small business owners use Smartphone's
Proportion of North American Employees Using Company Supplied / Funded Smartphone's
0%
5%
10%
15%
20%
25%
30%
35%
2010 2011 2012
23%
28%
33%
The Cost
 Gartner reports companies spend $2,500 a year per device
 Timico says 42.5% of companies spend time daily managing devices
 14% spend one day per week managing devices
Exponential MDM Market Size
 Configuration Management
 Configures Corporate Email Server, Exchange Active Sync, Lightweight Directory Access Protocol
(LDAP)
 Configures Virtual Private Network (VPN), Wi-Fi and Access Points
 Remote Monitoring
 Remote Diagnostics, Remote Access, Device Performance
 Security Management
 Remote Lock, Wipe, Device Locate, Backup, Restore, SD Card Blocking
 Application Management
 Application Tracking, Install, Remove, Update, Configure
 Document Management
 Document Publish, Tracking
 Multi lingual support and Content Management System
 SAAS module Integration
Imperatives
Big Names

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation BlueChipICT
 
Jenkins Pipeline meets Oracle
Jenkins Pipeline meets OracleJenkins Pipeline meets Oracle
Jenkins Pipeline meets OracleOliver Lemm
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for EndpointCheah Eng Soon
 
Android Security
Android SecurityAndroid Security
Android SecurityArqum Ahmad
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration TestingSubho Halder
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
android activity
android activityandroid activity
android activityDeepa Rani
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Mobile security
Mobile securityMobile security
Mobile security
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Mobile security
Mobile security Mobile security
Mobile security
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation
 
Jenkins Pipeline meets Oracle
Jenkins Pipeline meets OracleJenkins Pipeline meets Oracle
Jenkins Pipeline meets Oracle
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Android Security
Android SecurityAndroid Security
Android Security
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
Google Maps in Android
Google Maps in AndroidGoogle Maps in Android
Google Maps in Android
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
android activity
android activityandroid activity
android activity
 

Viewers also liked

AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Mdm Brochure
Mdm BrochureMdm Brochure
Mdm Brochuremartgroot
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013Andris Soroka
 
Präsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule BernPräsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule BernPhilip Büchler
 
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngineGoogle Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngineRoman Kirillov
 
Mobility at Work: Mobile Device Management
Mobility at Work: Mobile Device ManagementMobility at Work: Mobile Device Management
Mobility at Work: Mobile Device Managementdigitallibrary
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSteven Cull
 
C:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd siresC:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd siresMkhitar Sebastatsi
 
Mobile device management GFE
Mobile device management GFEMobile device management GFE
Mobile device management GFEpplester
 
Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible Jürgen Ambrosi
 
CRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro OracleCRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro OracleJürgen Ambrosi
 
AngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue SolutionsAngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue SolutionsRapidValue
 
Crui cloud computing solution for university campus
Crui   cloud computing solution for university campusCrui   cloud computing solution for university campus
Crui cloud computing solution for university campusJürgen Ambrosi
 

Viewers also liked (19)

MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Mdm Brochure
Mdm BrochureMdm Brochure
Mdm Brochure
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
 
Google cloud endpoints
Google cloud endpointsGoogle cloud endpoints
Google cloud endpoints
 
Präsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule BernPräsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule Bern
 
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngineGoogle Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngine
 
Mobility at Work: Mobile Device Management
Mobility at Work: Mobile Device ManagementMobility at Work: Mobile Device Management
Mobility at Work: Mobile Device Management
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solution
 
C:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd siresC:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd sires
 
Mobile device management GFE
Mobile device management GFEMobile device management GFE
Mobile device management GFE
 
Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible
 
CRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro OracleCRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro Oracle
 
AngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue SolutionsAngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue Solutions
 
Crui cloud computing solution for university campus
Crui   cloud computing solution for university campusCrui   cloud computing solution for university campus
Crui cloud computing solution for university campus
 

Similar to MDM- Mobile Device Management

Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
All About Enterprise
All About EnterpriseAll About Enterprise
All About EnterpriseCodal
 
Mobile device management
Mobile device managementMobile device management
Mobile device managementsara stanford
 
Why Is Mobile Device Management (MDM) Important.pptx
Why Is Mobile Device Management (MDM) Important.pptxWhy Is Mobile Device Management (MDM) Important.pptx
Why Is Mobile Device Management (MDM) Important.pptxBluechipComputerSyst
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
Maas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMMaas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMdocallahan
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Mobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsMobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsIRJET Journal
 

Similar to MDM- Mobile Device Management (20)

Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
All About Enterprise
All About EnterpriseAll About Enterprise
All About Enterprise
 
Custom Mobile Services
Custom Mobile ServicesCustom Mobile Services
Custom Mobile Services
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
Why Is Mobile Device Management (MDM) Important.pptx
Why Is Mobile Device Management (MDM) Important.pptxWhy Is Mobile Device Management (MDM) Important.pptx
Why Is Mobile Device Management (MDM) Important.pptx
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
BYOD
BYODBYOD
BYOD
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Maas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMMaas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDM
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Mobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsMobile Device Management and Their Security Concerns
Mobile Device Management and Their Security Concerns
 
Mobi manager mdm
Mobi manager mdmMobi manager mdm
Mobi manager mdm
 

Recently uploaded

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 

Recently uploaded (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

MDM- Mobile Device Management

  • 3. Mobile Device Management (MDM) Mobile Device Management (MDM) is a security application used by an IT department to monitor, manage and secure employee's mobile devices being used in the organization. The mobile device management tool: Is compatible with common handheld device operating platforms and applications.  Can function through multiple service providers. Can be implemented over the air, targeting specific devices as necessary. Can be deploy in next-generation hardware, operating platforms and applications quickly.
  • 4. Why do we need MDM?  Secure, monitor, manage mobile devices  Remote distribution of applications, data and configuration settings for all mobile devices in a network, support costs and business security risks are lowered  Deploy, manage, block or remove rogue apps on individual or groups of devices  Reducing the risk of dangerous mobile malware  Maintaining data plan and call budgets  Locate and track connected devices in real time via Google Maps  Configuration and management for backup process of all mobile devices  User audit such as call logs, call costs, messages sent and received as well as the apps that have been installed or removed
  • 5. Market Need for MDM  International Data Corporation (IDC) estimates 450 million smart phones manufactured in 2011 and expected to double by 2013 0 200 400 600 800 1000 2011 2013 450 900 Manufactured Smartphone's Millions
  • 6. Market Need for MDM Osterman Research:  28% of employees in the US in 2011 use company mobile devices which is expected to rise up to 33% in 2012  Forrester reports 49% of small business owners use Smartphone's Proportion of North American Employees Using Company Supplied / Funded Smartphone's 0% 5% 10% 15% 20% 25% 30% 35% 2010 2011 2012 23% 28% 33%
  • 7. The Cost  Gartner reports companies spend $2,500 a year per device  Timico says 42.5% of companies spend time daily managing devices  14% spend one day per week managing devices Exponential MDM Market Size
  • 8.  Configuration Management  Configures Corporate Email Server, Exchange Active Sync, Lightweight Directory Access Protocol (LDAP)  Configures Virtual Private Network (VPN), Wi-Fi and Access Points  Remote Monitoring  Remote Diagnostics, Remote Access, Device Performance  Security Management  Remote Lock, Wipe, Device Locate, Backup, Restore, SD Card Blocking  Application Management  Application Tracking, Install, Remove, Update, Configure  Document Management  Document Publish, Tracking  Multi lingual support and Content Management System  SAAS module Integration Imperatives