Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Mobile Content Strategies andDeployment Best PracticesAdrian DumbletonAirwatch
Enterprise Mobility ManagementMobile SecurityMobile Device ManagementMobile Email ManagementMobile Application ManagementM...
IT ChallengesIT departments are faced with several challenges with managing a variety of employee-ownedand corporate liabl...
Create a Policy•   Mobile Devices Supported•   Data Plans•   Security•   Compliance•   Privacy•   Type of Applications all...
Mobile SecurityKey Considerations•   Enable multifactor user authentication•   Enforce consistent security policies•   Enc...
Mobile Content ManagementKey Considerations•   Create a corporate container for documents•   Enforce multifactor user auth...
Enterprise ArchitectureConfigurability                                                                     High Availabili...
Prevent Unapproved Systems and Devices from        Accessing Corporate Resources                   •   Device Ownership   ...
Protect Employee PrivacyEnable BYOD by ensuring the        Employee Device                      Define granular privacy po...
Enterprise Architecture1   Build Policies         2   Define Escalation   3   Specify Actions    Application list         ...
Measure ROI•   Compare partially subsidized data plan to a corporate plan•   Evaluate reduced hardware costs due to elimin...
About Airwatch3,500customers47countries15languages750employees            Our Mission: Simplify Enterprise MobilityTM
Thank youAdrianDumbleton@air-watch.com                                13
Upcoming SlideShare
Loading in …5
×

Airwatch - Mobile Content Strategies and Deployment Best Practices

3,581 views

Published on

Adrian Dumbleton, Sales Manager EMEA - Airwatch spoke at the CIO Event (dot) com

Airwatch - Mobile Content Strategies and Deployment Best Practices

  1. 1. Mobile Content Strategies andDeployment Best PracticesAdrian DumbletonAirwatch
  2. 2. Enterprise Mobility ManagementMobile SecurityMobile Device ManagementMobile Email ManagementMobile Application ManagementMobile Content Management
  3. 3. IT ChallengesIT departments are faced with several challenges with managing a variety of employee-ownedand corporate liable devices.• Securing proprietary content• DLP• Privacy of Employee’s Data• Network Access• Network Security• Lost and stolen devices• Supporting new and unknown equipment
  4. 4. Create a Policy• Mobile Devices Supported• Data Plans• Security• Compliance• Privacy• Type of Applications allowed and usage• Services – what can employees access (email, VPN.. )• Agreement that outlines employee devices with corporate data
  5. 5. Mobile SecurityKey Considerations• Enable multifactor user authentication• Enforce consistent security policies• Encrypt sensitive corporate data• Support internal PKI and 3rd party certificates• Manage user access to corporate resources• Establish network access controls• Enforce compliance rules and actions• Remotely wipe enterprise data
  6. 6. Mobile Content ManagementKey Considerations• Create a corporate container for documents• Enforce multifactor user authentication• Manage user access rights and file privileges• Define standard and custom file metadata• Distribute files over encrypted connections• Integrate with SharePoint or other file servers• Delegate admin control across internal groups• Track document versions, updates and usage
  7. 7. Enterprise ArchitectureConfigurability High AvailabilityDeploy the specific software to your Deploy in a highly available environmentenvironment and architecture with all components made to instantlyrequirements fail over without downtimeMulti-tenancy Disaster RecoveryAbsorb fragmentation within your Setup software in a remote data centercorporate infrastructure into a single and enable in the event of a datainstance of AirWatch center failureScalability Automated MonitoringDeploy 10 to 100,000 devices through Automate monitoring through a directa configuration that easily scales to plug in to Microsoft’s System Centersupport additional device capacity Operations Manager (SCOM)
  8. 8. Prevent Unapproved Systems and Devices from Accessing Corporate Resources • Device Ownership • Device Staging • Device Registration • User Authentication • End User License Agreements (EULAs) • Restrictions
  9. 9. Protect Employee PrivacyEnable BYOD by ensuring the Employee Device Define granular privacy policiesprivacy of personal data for employee-owned devices• Set privacy policies that do User Info • GPS location not collect personal data • User info GMail Exchange • Name• Customize policies based on • Phone number device ownership Personal Business • Email account • Corporate – Dedicated Apps Apps • Telecom data • Corporate – Shared • Calls Calls • Employee – Owned Messages • Messages • Data usage GPS Location • Public apps
  10. 10. Enterprise Architecture1 Build Policies 2 Define Escalation 3 Specify Actions Application list Time based: Send SMS, Email, push notification Compromised status • Minutes Request device check-in Encryption • Hours Remove or block specific profiles Model, OS version • Days Install compliance profile Passcode Tiered actions Remove all profiles Roaming Repeat actions Remove or block apps Enterprise wipe
  11. 11. Measure ROI• Compare partially subsidized data plan to a corporate plan• Evaluate reduced hardware costs due to elimination of the cost of device• Cost of a fully subsidized data plan versus a partially subsidized plan• Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform
  12. 12. About Airwatch3,500customers47countries15languages750employees Our Mission: Simplify Enterprise MobilityTM
  13. 13. Thank youAdrianDumbleton@air-watch.com 13

×