Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies and deployment best practices

1,253 views

Published on

Mark Carlile, EMEA Enterprise Lead at Airwatch spoke at the CIO Event, March 2013

  • Be the first to comment

Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies and deployment best practices

  1. 1. Mobile Content Strategies andDeployment Best Practices Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  2. 2. Enterprise Mobility Management Mobile Security Mobile Device Management Mobile Email Management Mobile Application Management Mobile Content Management 2 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  3. 3. IT ChallengesIT departments are faced with several challenges with managing a variety of employee-ownedand corporate liable devices.• Securing proprietary content• DLP• Privacy of Employee’s Data• Network Access• Network Security• Lost and stolen devices• Supporting new and unknown equipment 3 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  4. 4. Create A Policy• Mobile Devices Supported• Data Plans• Security• Compliance• Privacy• Type of Applications allowed and usage• Services – what can employees access (email, VPN.. )• Agreement that outlines employee devices with corporate data 4 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  5. 5. Mobile SecurityKey Considerations• Enable multifactor user authentication• Enforce consistent security policies• Encrypt sensitive corporate data• Support internal PKI and 3rd party certificates• Manage user access to corporate resources• Establish network access controls• Enforce compliance rules and actions• Remotely wipe enterprise data 5 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  6. 6. Mobile Content ManagementKey Considerations• Create a corporate container for documents• Enforce multifactor user authentication• Manage user access rights and file privileges• Define standard and custom file metadata• Distribute files over encrypted connections• Integrate with SharePoint or other file servers• Delegate admin control across internal groups• Track document versions, updates and usage 6 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  7. 7. Enterprise ArchitectureConfigurability High AvailabilityDeploy the specific software to your Deploy in a highly available environmentenvironment and architecture with all components made to instantlyrequirements fail over without downtimeMulti-tenancy Disaster RecoveryAbsorb fragmentation within your Setup software in a remote data centercorporate infrastructure into a single and enable in the event of a datainstance of AirWatch center failureScalability Automated MonitoringDeploy 10 to 100,000 devices through Automate monitoring through a directa configuration that easily scales to plug in to Microsoft’s System Centersupport additional device capacity Operations Manager (SCOM) 7 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  8. 8. Prevent Unapproved Systems and Devices fromAccessing Corporate Resources • Device Ownership • Device Staging • Device Registration • User Authentication • End User License Agreements (EULAs) • Restrictions 8 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  9. 9. Protect Employee PrivacyEnable BYOD by ensuring the Employee Device Define granular privacy policiesprivacy of personal data for employee-owned devices• Set privacy policies that do User Info • GPS location not collect personal data • User info GMail Exchange • Name• Customize policies based on • Phone number device ownership Personal Business • Email account • Corporate – Dedicated Apps Apps • Telecom data • Corporate – Shared • Calls Calls • Employee – Owned Messages • Messages • Data usage GPS Location • Public apps 9 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  10. 10. Ensure Device Compliance1 Build Policies 2 Define Escalation 3 Specify Actions Application list Time based: Send SMS, Email, push notification Compromised status • Minutes Request device check-in Encryption • Hours Remove or block specific profiles Model, OS version • Days Install compliance profile Passcode Tiered actions Remove all profiles Roaming Repeat actions Remove or block apps Enterprise wipe 10 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  11. 11. Measure ROI• Compare partially subsidized data plan to a corporate plan• Evaluate reduced hardware costs due to elimination of the cost of device• Cost of a fully subsidized data plan versus a partially subsidized plan• Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform 11 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  12. 12. About AirWatch4,700customers47countries15languages950employees Our Mission: Simplify Enterprise MobilityTM 12 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  13. 13. Representative Customers Consumer Education Government Transportation Healthcare ServicesGoods/Retail 13 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
  14. 14. About AirWatchIan Evans Managing Director EMEAianevans@air-watch.com 14 Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

×