2. Enterprise Mobility Management
Mobile Security
Mobile Device Management
Mobile Email Management
Mobile Application Management
Mobile Content Management
3. IT Challenges
IT departments are faced with several challenges with managing a variety of employee-owned
and corporate liable devices.
• Securing proprietary content
• DLP
• Privacy of Employee’s Data
• Network Access
• Network Security
• Lost and stolen devices
• Supporting new and unknown equipment
4. Create a Policy
• Mobile Devices Supported
• Data Plans
• Security
• Compliance
• Privacy
• Type of Applications allowed and usage
• Services – what can employees access
(email, VPN.. )
• Agreement that outlines employee devices with
corporate data
5. Mobile Security
Key Considerations
• Enable multifactor user authentication
• Enforce consistent security policies
• Encrypt sensitive corporate data
• Support internal PKI and 3rd party certificates
• Manage user access to corporate resources
• Establish network access controls
• Enforce compliance rules and actions
• Remotely wipe enterprise data
6. Mobile Content Management
Key Considerations
• Create a corporate container for documents
• Enforce multifactor user authentication
• Manage user access rights and file privileges
• Define standard and custom file metadata
• Distribute files over encrypted connections
• Integrate with SharePoint or other file servers
• Delegate admin control across internal groups
• Track document versions, updates and usage
7. Enterprise Architecture
Configurability High Availability
Deploy the specific software to your Deploy in a highly available environment
environment and architecture with all components made to instantly
requirements fail over without downtime
Multi-tenancy Disaster Recovery
Absorb fragmentation within your Setup software in a remote data center
corporate infrastructure into a single and enable in the event of a data
instance of AirWatch center failure
Scalability Automated Monitoring
Deploy 10 to 100,000 devices through Automate monitoring through a direct
a configuration that easily scales to plug in to Microsoft’s System Center
support additional device capacity Operations Manager (SCOM)
8. Prevent Unapproved Systems and Devices from
Accessing Corporate Resources
• Device Ownership
• Device Staging
• Device Registration
• User Authentication
• End User License Agreements (EULAs)
• Restrictions
9. Protect Employee Privacy
Enable BYOD by ensuring the Employee Device Define granular privacy policies
privacy of personal data for employee-owned devices
• Set privacy policies that do
User Info • GPS location
not collect personal data • User info
GMail Exchange • Name
• Customize policies based on
• Phone number
device ownership
Personal Business
• Email account
• Corporate – Dedicated Apps Apps
• Telecom data
• Corporate – Shared • Calls
Calls
• Employee – Owned Messages • Messages
• Data usage
GPS Location • Public apps
10. Enterprise Architecture
1 Build Policies 2 Define Escalation 3 Specify Actions
Application list Time based: Send SMS, Email, push notification
Compromised status • Minutes Request device check-in
Encryption • Hours Remove or block specific profiles
Model, OS version • Days Install compliance profile
Passcode Tiered actions Remove all profiles
Roaming Repeat actions Remove or block apps
Enterprise wipe
11. Measure ROI
• Compare partially subsidized data plan to a corporate plan
• Evaluate reduced hardware costs due to elimination of the cost of device
• Cost of a fully subsidized data plan versus a partially subsidized plan
• Cost of recycling devices every few years and IT time and labor in managing a corporate
program versus cost of a mobile management platform