SlideShare a Scribd company logo
1 of 13
Mobile Content Strategies and
Deployment Best Practices
Adrian Dumbleton
Airwatch
Enterprise Mobility Management
Mobile Security


Mobile Device Management


Mobile Email Management


Mobile Application Management

Mobile Content Management
IT Challenges
IT departments are faced with several challenges with managing a variety of employee-owned
and corporate liable devices.
• Securing proprietary content
• DLP
• Privacy of Employee’s Data
• Network Access
• Network Security
• Lost and stolen devices
• Supporting new and unknown equipment
Create a Policy
•   Mobile Devices Supported
•   Data Plans
•   Security
•   Compliance
•   Privacy
•   Type of Applications allowed and usage
•   Services – what can employees access
    (email, VPN.. )
•   Agreement that outlines employee devices with
    corporate data
Mobile Security
Key Considerations
•   Enable multifactor user authentication
•   Enforce consistent security policies
•   Encrypt sensitive corporate data
•   Support internal PKI and 3rd party certificates
•   Manage user access to corporate resources
•   Establish network access controls
•   Enforce compliance rules and actions
•   Remotely wipe enterprise data
Mobile Content Management
Key Considerations
•   Create a corporate container for documents
•   Enforce multifactor user authentication
•   Manage user access rights and file privileges
•   Define standard and custom file metadata
•   Distribute files over encrypted connections
•   Integrate with SharePoint or other file servers
•   Delegate admin control across internal groups
•   Track document versions, updates and usage
Enterprise Architecture
Configurability                                                                     High Availability
Deploy the specific software to your                          Deploy in a highly available environment
environment and architecture                                    with all components made to instantly
requirements                                                                fail over without downtime


Multi-tenancy                                                                     Disaster Recovery
Absorb fragmentation within your                               Setup software in a remote data center
corporate infrastructure into a single                               and enable in the event of a data
instance of AirWatch                                                                    center failure


Scalability                                                                 Automated Monitoring
Deploy 10 to 100,000 devices through                            Automate monitoring through a direct
a configuration that easily scales to                            plug in to Microsoft’s System Center
support additional device capacity                                       Operations Manager (SCOM)
Prevent Unapproved Systems and Devices from
        Accessing Corporate Resources

                   •   Device Ownership
                   •   Device Staging
                   •   Device Registration
                   •   User Authentication
                   •   End User License Agreements (EULAs)
                   •   Restrictions
Protect Employee Privacy
Enable BYOD by ensuring the        Employee Device                      Define granular privacy policies
privacy of personal data                                                for employee-owned devices
•   Set privacy policies that do
                                               User Info                • GPS location
    not collect personal data                                           • User info
                                    GMail                    Exchange        •   Name
•   Customize policies based on
                                                                             •   Phone number
    device ownership
                                   Personal                  Business
                                                                             •   Email account
      •   Corporate – Dedicated     Apps                      Apps
                                                                        •   Telecom data
      •   Corporate – Shared                                                 •   Calls
                                                Calls
      •   Employee – Owned                     Messages                      •   Messages
                                                                             •   Data usage
                                              GPS Location              •   Public apps
Enterprise Architecture
1   Build Policies         2   Define Escalation   3   Specify Actions
    Application list           Time based:             Send SMS, Email, push notification
    Compromised status         • Minutes               Request device check-in
    Encryption                 • Hours                 Remove or block specific profiles
    Model, OS version          • Days                  Install compliance profile
    Passcode                   Tiered actions          Remove all profiles
    Roaming                    Repeat actions          Remove or block apps
                                                       Enterprise wipe
Measure ROI
•   Compare partially subsidized data plan to a corporate plan
•   Evaluate reduced hardware costs due to elimination of the cost of device
•   Cost of a fully subsidized data plan versus a partially subsidized plan
•   Cost of recycling devices every few years and IT time and labor in managing a corporate
    program versus cost of a mobile management platform
About Airwatch
3,500
customers


47
countries


15
languages


750
employees
            Our Mission: Simplify Enterprise MobilityTM
Thank you
AdrianDumbleton@air-watch.com



                                13

More Related Content

What's hot

Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft Singapore
 
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft Private Cloud
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
yonifine
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview
Lilian Schaffer
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
Lilian Schaffer
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
Digicomp Academy AG
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
Novell
 

What's hot (20)

The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview
 
Thinkfree Office Live Introduction Material En
Thinkfree Office Live   Introduction Material EnThinkfree Office Live   Introduction Material En
Thinkfree Office Live Introduction Material En
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
WEBINAR: Uncover the Benefits of Office 365 and Windows Azure
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Miratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech Infrastructure Support Services
Miratech Infrastructure Support Services
 
Designing Mobile Applications
Designing Mobile ApplicationsDesigning Mobile Applications
Designing Mobile Applications
 
System Center Configurations Manager 2012
System Center Configurations Manager 2012System Center Configurations Manager 2012
System Center Configurations Manager 2012
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
 
Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2
 

Similar to Airwatch - Mobile Content Strategies and Deployment Best Practices

Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Jeremy Siewert
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 

Similar to Airwatch - Mobile Content Strategies and Deployment Best Practices (20)

Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
W8 client management
W8 client managementW8 client management
W8 client management
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 

More from Global Business Events

More from Global Business Events (20)

Cio Event
Cio EventCio Event
Cio Event
 
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 

Airwatch - Mobile Content Strategies and Deployment Best Practices

  • 1. Mobile Content Strategies and Deployment Best Practices Adrian Dumbleton Airwatch
  • 2. Enterprise Mobility Management Mobile Security Mobile Device Management Mobile Email Management Mobile Application Management Mobile Content Management
  • 3. IT Challenges IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. • Securing proprietary content • DLP • Privacy of Employee’s Data • Network Access • Network Security • Lost and stolen devices • Supporting new and unknown equipment
  • 4. Create a Policy • Mobile Devices Supported • Data Plans • Security • Compliance • Privacy • Type of Applications allowed and usage • Services – what can employees access (email, VPN.. ) • Agreement that outlines employee devices with corporate data
  • 5. Mobile Security Key Considerations • Enable multifactor user authentication • Enforce consistent security policies • Encrypt sensitive corporate data • Support internal PKI and 3rd party certificates • Manage user access to corporate resources • Establish network access controls • Enforce compliance rules and actions • Remotely wipe enterprise data
  • 6. Mobile Content Management Key Considerations • Create a corporate container for documents • Enforce multifactor user authentication • Manage user access rights and file privileges • Define standard and custom file metadata • Distribute files over encrypted connections • Integrate with SharePoint or other file servers • Delegate admin control across internal groups • Track document versions, updates and usage
  • 7. Enterprise Architecture Configurability High Availability Deploy the specific software to your Deploy in a highly available environment environment and architecture with all components made to instantly requirements fail over without downtime Multi-tenancy Disaster Recovery Absorb fragmentation within your Setup software in a remote data center corporate infrastructure into a single and enable in the event of a data instance of AirWatch center failure Scalability Automated Monitoring Deploy 10 to 100,000 devices through Automate monitoring through a direct a configuration that easily scales to plug in to Microsoft’s System Center support additional device capacity Operations Manager (SCOM)
  • 8. Prevent Unapproved Systems and Devices from Accessing Corporate Resources • Device Ownership • Device Staging • Device Registration • User Authentication • End User License Agreements (EULAs) • Restrictions
  • 9. Protect Employee Privacy Enable BYOD by ensuring the Employee Device Define granular privacy policies privacy of personal data for employee-owned devices • Set privacy policies that do User Info • GPS location not collect personal data • User info GMail Exchange • Name • Customize policies based on • Phone number device ownership Personal Business • Email account • Corporate – Dedicated Apps Apps • Telecom data • Corporate – Shared • Calls Calls • Employee – Owned Messages • Messages • Data usage GPS Location • Public apps
  • 10. Enterprise Architecture 1 Build Policies 2 Define Escalation 3 Specify Actions Application list Time based: Send SMS, Email, push notification Compromised status • Minutes Request device check-in Encryption • Hours Remove or block specific profiles Model, OS version • Days Install compliance profile Passcode Tiered actions Remove all profiles Roaming Repeat actions Remove or block apps Enterprise wipe
  • 11. Measure ROI • Compare partially subsidized data plan to a corporate plan • Evaluate reduced hardware costs due to elimination of the cost of device • Cost of a fully subsidized data plan versus a partially subsidized plan • Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform
  • 12. About Airwatch 3,500 customers 47 countries 15 languages 750 employees Our Mission: Simplify Enterprise MobilityTM