SlideShare a Scribd company logo
1 of 28
Implementing Mobile Device
Management: Taking the Network
(and it's Security) With You
Thursday December 5, 2013
9:00AM – 10:00AM
H ashtag : #tech13 LC 1
Larry Covert
D i r e c t o r , I n f o r m a t i o n Te c h n o l o g y
ASAE

@techconf

#tech13 LC1
Goals
• Provide the basics of how
MDM is implemented.
• Provide an overview for
assessing your MDM
requirements based on the
current marketplace.
• Provide a starting point to
match requirements with
vendor offerings.
@techconf

#tech13 LC1
Agenda
•
•
•
•

What is MDM?
Why MDM?
How Does MDM Work?
Larry’s 3 Levels
– In The Game
– All-Star
– MVP

• Quick Vendor Breakdown
@techconf

#tech13 LC1
What is MDM?
• Software that helps deploy,
manage, and secure
smartphones, tablets, and
potentially other devices.
• Capabilities can be wide
ranging depending on needs
and budget.
• On premises, cloud or hybrid.

@techconf

#tech13 LC1
Why MDM?
•
•
•
•

Better access restriction
Device visibility
Policy enforcement
Secure deployment and data
access
• Remote data removal (wipe)
• Can ease device deployments in
larger environments

@techconf

#tech13 LC1
How Does MDM Work?
• ! - FYI: Terms may be somewhat Apple-centric - !
• Device Agents
– Typically for device status collection and enrollment.
– Some products allow enrollment through the browser.

• Management Server
– Typically for distribution of policies and settings.

• Proxy Server
– Internal network authentication
– Data Access
• Email – Exchange ActiveSync
• Browser Proxy
• Additional Corporate Content

@techconf

#tech13 LC1
How Does MDM Work?
• Delivery of Device Profiles
– Delivered OTA or manually connected to a PC via USB
– Contain “Payload” With Device Settings or Policies
– Grants MDM Rights (“MDM Profile”)
• Allows retrieval of device status
• Allows automated changes to device

– Multi-Payload vs. Single Payload
– Typically certificate signed and contains certificate for

secure communication with MDM system.
– Example on my iPhone

@techconf

#tech13 LC1
Larry’s 3 Levels
• In The Game
– Provide email, basic security and some
minor features.

• All-Star
– Advanced security, device visibility and
control.

• MVP
– The kitchen sink!

@techconf

#tech13 LC1
In The Game
• Device Configuration
– Email, Contacts, Calendar
– WiFi Networks
– VPN

@techconf

#tech13 LC1
In The Game
• Security
– Passcode Enforcement with Remote Lock
– Remote Device Wipe (reset to factory)
– Device Restrictions
• Restricting features such as screen capture and
Bluetooth for security purposes

– Encryption
– Jailbreak / Root Detection

@techconf

#tech13 LC1
All-Star
• Device Location – GPS, Cellular,
WiFi
– Locate on Map

• App Visibility & Management
–
–
–
–
–

View Installed Apps
Blacklist Apps
Provide portal for approved store apps
Push required apps
Volume purchasing integration

@techconf

#tech13 LC1
All-Star
• Security
– Selective Wipe – BYOD
– 2 Factor Authentication with
Certificates
– Directory/LDAP Integration
– Secure Browser Proxy
– Notify / Auto-Block access from noncompliant devices

@techconf

#tech13 LC1
All-Star
• Automated Policy & Configuration
Control
– Deploy Profiles based on group
membership, device ownership
(BYOD), device type, etc.

@techconf

#tech13 LC1
MVP

• Automated Policy & Configuration
Control
– GeoFencing
• Deploy Profiles based on GPS Location
• WiFi Networks for branch offices or
conference locations
• Location specific proxy info
• Allow roaming in countries covered in plan.

– Date based profile deployment
• Profiles delivered and removed on specific
dates

@techconf

#tech13 LC1
MVP
• Document Delivery / Management
– Deliver documents on the corporate network
to mobile devices through secure proxy.
– Online or Offline viewing/editing
– Containerization
• One secure app that prevents documents from
being emailed or opened in third party apps
• Can have a combination of documents allowed
and not allowed outside of container.

@techconf

#tech13 LC1
MVP
• Expense Management
– Tracking of cellular data transfer,
SMS messages and voice minutes
– Roaming detection / disabling
– Administrator and user
notifications
– Action escalation
– Disable or even wipe device if not
compliant
@techconf

#tech13 LC1
MVP
• IT Support Features
– Self-service portals for
deployment and apps
– Visibility into device stats and
logs for diagnostics
– Remote control (not on iOS!)

@techconf

#tech13 LC1
MVP
• Multi-User & Kiosk Devices (Personas)
– Great for loaner devices or stationary devices
in locations like conference rooms.
– User logs in and the MDM system delivers
configuration profiles, apps, etc. specific to
the user.
– User logs off (or times out) and device is
automatically wiped of user specific info.
– Single App Mode – ASAE POS
@techconf

#tech13 LC1
MVP
• Deep Analytics and Reporting
– Dive into the details of usage, down to the
app level, user call logs, SMS logs, etc.
– Device operating statistics, Memory, CPU,
Battery, Signal Strength, etc.
– Detailed compliance reports.
– Corporate content access reports
– Etc, etc, etc…
– Example Report
@techconf

#tech13 LC1
MVP
• Deep Analytics and Reporting
– Reports generated on a schedule and
automatically distributed to administrator or
defined individuals or groups.
– Instant Alerts for non-compliant devices and
devices exceeding thresholds
– Dashboards

@techconf

#tech13 LC1
MVP
• Advanced Email
Management
– Apply and enforce encryption
– Compliance policies specific
to email access.
– Containerization for
attachments or all email
content.
– Separate Inbox Passcodes
@techconf

#tech13 LC1
MVP
• Custom App Integration
– Custom apps can leverage MDM
platform features
•
•
•
•
•

Authentication & Data Proxy
Certificate Security
Use logging and integration for analytics
Compliance enforcement for app use.
Configured through SDK or “App
Wrapping”

@techconf

#tech13 LC1
Quick Vendor Breakdown
• Not a comprehensive list, just a starting
point for vendor search.
• Recently added functionality may not be
reflected.
• Consider that pricing for higher level
products is often modular.
– Buy only what you need now with the option
to add features and services later.

@techconf

#tech13 LC1
Quick Vendor Breakdown
• In The Game
– Apple Profile Manager
• Cheap if you already have a Mac.
• iOS only, on-premises only, savvy users could by-pass MDM.

– Microsoft
• Two products required – Intune (cloud) & SCCM (on premise)
• Only basic deployment and management
• SCCM core functionality is PC based not mobile.

– McAfee
• Core product “Enterprise Mobility Management” does not
provide advanced features.
• Need to add “ePolicy Orchestrator” to fill gaps but product
goes way beyond the scope of MDM.

@techconf

#tech13 LC1
Quick Vendor Breakdown
• All-Star
– Symtantec
• Has all the necessary components but with
document management, expense management
and reporting lagging behind competitors.
• On-Premise only
• If you already use Symantec security products, it
may be worth a look.

@techconf

#tech13 LC1
Quick Vendor Breakdown
• All-Star
– Sophos
• Behind on Custom Apps, Reporting and Containerization
• Competitive licensing model allows users multiple devices for
one price.

– Blackberry
• BES 10 now supports iOS and Android
– Secure WorkSpace Container

• Blackberry Balance Container for BB10
• Most will stay away unless legacy BB support needed.
• Cloud offering coming soon

@techconf

#tech13 LC1
Quick Vendor Breakdown
• MVP
– MobileIron & AirWatch
– Both products do everything and continue to
innovate.
– AirWatch pricing is more transparent.

@techconf

#tech13 LC1
Contact Me & Evaluation
Larry Covert
D i r e c t o r, I n f o r m a t i o n Te c h n o l o g y
ASAE
l c o v e r t @ a s a e c e n t e r. o r g
202-326-9522

Evaluate this session:
asae.conferences.io
@techconf

#tech13 LC1

More Related Content

What's hot

Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsRobert Crane
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Thomas Godsted Rysgaard
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionLai Yoong Seng
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their DesksGen-i
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Nordic Infrastructure Conference
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft IntuneSimon May
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 

What's hot (20)

Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their Desks
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 

Viewers also liked

Gartner: Seven Building Blocks of Master Data Management
Gartner: Seven Building Blocks of Master Data ManagementGartner: Seven Building Blocks of Master Data Management
Gartner: Seven Building Blocks of Master Data ManagementGartner
 
The what, why, and how of master data management
The what, why, and how of master data managementThe what, why, and how of master data management
The what, why, and how of master data managementMohammad Yousri
 
Gartner: Master Data Management Functionality
Gartner: Master Data Management FunctionalityGartner: Master Data Management Functionality
Gartner: Master Data Management FunctionalityGartner
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data ManagementSung Kuan
 
How to identify the correct Master Data subject areas & tooling for your MDM...
How to identify the correct Master Data subject areas & tooling for your MDM...How to identify the correct Master Data subject areas & tooling for your MDM...
How to identify the correct Master Data subject areas & tooling for your MDM...Christopher Bradley
 
MDM Strategy & Roadmap
MDM Strategy & RoadmapMDM Strategy & Roadmap
MDM Strategy & Roadmapvictorlbrown
 

Viewers also liked (6)

Gartner: Seven Building Blocks of Master Data Management
Gartner: Seven Building Blocks of Master Data ManagementGartner: Seven Building Blocks of Master Data Management
Gartner: Seven Building Blocks of Master Data Management
 
The what, why, and how of master data management
The what, why, and how of master data managementThe what, why, and how of master data management
The what, why, and how of master data management
 
Gartner: Master Data Management Functionality
Gartner: Master Data Management FunctionalityGartner: Master Data Management Functionality
Gartner: Master Data Management Functionality
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 
How to identify the correct Master Data subject areas & tooling for your MDM...
How to identify the correct Master Data subject areas & tooling for your MDM...How to identify the correct Master Data subject areas & tooling for your MDM...
How to identify the correct Master Data subject areas & tooling for your MDM...
 
MDM Strategy & Roadmap
MDM Strategy & RoadmapMDM Strategy & Roadmap
MDM Strategy & Roadmap
 

Similar to Covert asae tech 13 mdm implementation

Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shahmomoahmedabad
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VRISC-V International
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...mfrancis
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonksRohit Kapoor
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Windows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 AppsWindows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 AppsJorge Orchilles
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 

Similar to Covert asae tech 13 mdm implementation (20)

Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Windows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 AppsWindows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 Apps
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Covert asae tech 13 mdm implementation

  • 1. Implementing Mobile Device Management: Taking the Network (and it's Security) With You Thursday December 5, 2013 9:00AM – 10:00AM H ashtag : #tech13 LC 1 Larry Covert D i r e c t o r , I n f o r m a t i o n Te c h n o l o g y ASAE @techconf #tech13 LC1
  • 2. Goals • Provide the basics of how MDM is implemented. • Provide an overview for assessing your MDM requirements based on the current marketplace. • Provide a starting point to match requirements with vendor offerings. @techconf #tech13 LC1
  • 3. Agenda • • • • What is MDM? Why MDM? How Does MDM Work? Larry’s 3 Levels – In The Game – All-Star – MVP • Quick Vendor Breakdown @techconf #tech13 LC1
  • 4. What is MDM? • Software that helps deploy, manage, and secure smartphones, tablets, and potentially other devices. • Capabilities can be wide ranging depending on needs and budget. • On premises, cloud or hybrid. @techconf #tech13 LC1
  • 5. Why MDM? • • • • Better access restriction Device visibility Policy enforcement Secure deployment and data access • Remote data removal (wipe) • Can ease device deployments in larger environments @techconf #tech13 LC1
  • 6. How Does MDM Work? • ! - FYI: Terms may be somewhat Apple-centric - ! • Device Agents – Typically for device status collection and enrollment. – Some products allow enrollment through the browser. • Management Server – Typically for distribution of policies and settings. • Proxy Server – Internal network authentication – Data Access • Email – Exchange ActiveSync • Browser Proxy • Additional Corporate Content @techconf #tech13 LC1
  • 7. How Does MDM Work? • Delivery of Device Profiles – Delivered OTA or manually connected to a PC via USB – Contain “Payload” With Device Settings or Policies – Grants MDM Rights (“MDM Profile”) • Allows retrieval of device status • Allows automated changes to device – Multi-Payload vs. Single Payload – Typically certificate signed and contains certificate for secure communication with MDM system. – Example on my iPhone @techconf #tech13 LC1
  • 8. Larry’s 3 Levels • In The Game – Provide email, basic security and some minor features. • All-Star – Advanced security, device visibility and control. • MVP – The kitchen sink! @techconf #tech13 LC1
  • 9. In The Game • Device Configuration – Email, Contacts, Calendar – WiFi Networks – VPN @techconf #tech13 LC1
  • 10. In The Game • Security – Passcode Enforcement with Remote Lock – Remote Device Wipe (reset to factory) – Device Restrictions • Restricting features such as screen capture and Bluetooth for security purposes – Encryption – Jailbreak / Root Detection @techconf #tech13 LC1
  • 11. All-Star • Device Location – GPS, Cellular, WiFi – Locate on Map • App Visibility & Management – – – – – View Installed Apps Blacklist Apps Provide portal for approved store apps Push required apps Volume purchasing integration @techconf #tech13 LC1
  • 12. All-Star • Security – Selective Wipe – BYOD – 2 Factor Authentication with Certificates – Directory/LDAP Integration – Secure Browser Proxy – Notify / Auto-Block access from noncompliant devices @techconf #tech13 LC1
  • 13. All-Star • Automated Policy & Configuration Control – Deploy Profiles based on group membership, device ownership (BYOD), device type, etc. @techconf #tech13 LC1
  • 14. MVP • Automated Policy & Configuration Control – GeoFencing • Deploy Profiles based on GPS Location • WiFi Networks for branch offices or conference locations • Location specific proxy info • Allow roaming in countries covered in plan. – Date based profile deployment • Profiles delivered and removed on specific dates @techconf #tech13 LC1
  • 15. MVP • Document Delivery / Management – Deliver documents on the corporate network to mobile devices through secure proxy. – Online or Offline viewing/editing – Containerization • One secure app that prevents documents from being emailed or opened in third party apps • Can have a combination of documents allowed and not allowed outside of container. @techconf #tech13 LC1
  • 16. MVP • Expense Management – Tracking of cellular data transfer, SMS messages and voice minutes – Roaming detection / disabling – Administrator and user notifications – Action escalation – Disable or even wipe device if not compliant @techconf #tech13 LC1
  • 17. MVP • IT Support Features – Self-service portals for deployment and apps – Visibility into device stats and logs for diagnostics – Remote control (not on iOS!) @techconf #tech13 LC1
  • 18. MVP • Multi-User & Kiosk Devices (Personas) – Great for loaner devices or stationary devices in locations like conference rooms. – User logs in and the MDM system delivers configuration profiles, apps, etc. specific to the user. – User logs off (or times out) and device is automatically wiped of user specific info. – Single App Mode – ASAE POS @techconf #tech13 LC1
  • 19. MVP • Deep Analytics and Reporting – Dive into the details of usage, down to the app level, user call logs, SMS logs, etc. – Device operating statistics, Memory, CPU, Battery, Signal Strength, etc. – Detailed compliance reports. – Corporate content access reports – Etc, etc, etc… – Example Report @techconf #tech13 LC1
  • 20. MVP • Deep Analytics and Reporting – Reports generated on a schedule and automatically distributed to administrator or defined individuals or groups. – Instant Alerts for non-compliant devices and devices exceeding thresholds – Dashboards @techconf #tech13 LC1
  • 21. MVP • Advanced Email Management – Apply and enforce encryption – Compliance policies specific to email access. – Containerization for attachments or all email content. – Separate Inbox Passcodes @techconf #tech13 LC1
  • 22. MVP • Custom App Integration – Custom apps can leverage MDM platform features • • • • • Authentication & Data Proxy Certificate Security Use logging and integration for analytics Compliance enforcement for app use. Configured through SDK or “App Wrapping” @techconf #tech13 LC1
  • 23. Quick Vendor Breakdown • Not a comprehensive list, just a starting point for vendor search. • Recently added functionality may not be reflected. • Consider that pricing for higher level products is often modular. – Buy only what you need now with the option to add features and services later. @techconf #tech13 LC1
  • 24. Quick Vendor Breakdown • In The Game – Apple Profile Manager • Cheap if you already have a Mac. • iOS only, on-premises only, savvy users could by-pass MDM. – Microsoft • Two products required – Intune (cloud) & SCCM (on premise) • Only basic deployment and management • SCCM core functionality is PC based not mobile. – McAfee • Core product “Enterprise Mobility Management” does not provide advanced features. • Need to add “ePolicy Orchestrator” to fill gaps but product goes way beyond the scope of MDM. @techconf #tech13 LC1
  • 25. Quick Vendor Breakdown • All-Star – Symtantec • Has all the necessary components but with document management, expense management and reporting lagging behind competitors. • On-Premise only • If you already use Symantec security products, it may be worth a look. @techconf #tech13 LC1
  • 26. Quick Vendor Breakdown • All-Star – Sophos • Behind on Custom Apps, Reporting and Containerization • Competitive licensing model allows users multiple devices for one price. – Blackberry • BES 10 now supports iOS and Android – Secure WorkSpace Container • Blackberry Balance Container for BB10 • Most will stay away unless legacy BB support needed. • Cloud offering coming soon @techconf #tech13 LC1
  • 27. Quick Vendor Breakdown • MVP – MobileIron & AirWatch – Both products do everything and continue to innovate. – AirWatch pricing is more transparent. @techconf #tech13 LC1
  • 28. Contact Me & Evaluation Larry Covert D i r e c t o r, I n f o r m a t i o n Te c h n o l o g y ASAE l c o v e r t @ a s a e c e n t e r. o r g 202-326-9522 Evaluate this session: asae.conferences.io @techconf #tech13 LC1