SlideShare a Scribd company logo
1 of 18
Presenter: Simon Muraya
MOBILE DEVICE MANAGEMENT
❖ I am Bachelors holder in Information Technology, Diploma In
Information Technology and Diploma in Information Communication
Technology(KNEC). I am a Cisco and Microsoft certified trainer with 5
years of training experience. I hold the following certifications, CompTIA
A+,N+,Security+, Cisco CCNA,CCNA Security, CCNP Enterprise, MCSA
windows server 2016, MCSE Core Infrastructure, Micro soft Azure
Fundamentals and Microsoft azure administrator. Currently pursuing
CEH.
❖ Contacts:0719478257
❖ Email:simonmuraya144@gmail.com
About me…
❖ Connection methods
❖ Mobile device management concepts
❖ Enforcement and monitoring
❖ Deployment models
Mobile Device Security
❖ What is a mobile device?
❖ Any easily transportable computing system
❖ Laptops
❖ Tablets
❖ Hybrids
❖ Smartphones
❖ Watches
❖ IoT
Mobile Devices
❖ Cellular
❖ Wi-Fi
❖ Bluetooth
❖ NFC
❖ SATCOM
❖ ANT
❖ Infrared
❖ USB
Connection methods
❖ Wi-Fi
❖ Bluetooth
❖ NFC – Near-Field Communications
❖ SATCOM – Satellite Communications
❖ ANT – proprietary multicast wireless
❖ Infrared – Using light in the infrared spectrum
❖ USB / Firewire
Connection methods
❖ Personal-Area Network (PAN) – short-range wireless connectivity
❖ Uses a spread spectrum, frequency hopping, full-duplex signal
❖ Pairing devices forms a piconet
❖ Bluesnarfing / Bluejacking
❖ If needed, set to nondiscoverable
Bluetooth
❖ Standards for contactless communication between devices
❖ Chips generate electromagnetic fields
❖ Modes of operation:
❖ Peer-to-peer mode: Two mobile devices exchange data.
❖ Read/write mode: An active device receives data from a passive device.
❖ Card emulation: The device is used as a contactless credit card.
Near-Field Communications (NFC)
NFC
❖ The administration of mobile devices in an organization
❖ Software used to inventory, monitor, manage and secure employees'
mobile devices, deployed across multiple mobile service providers and
across multiple mobile operating systems
❖ Device enrollment, provisioning, and inventory
❖ Configuration management / updating
❖ Managing applications Enforcing policies
Mobile Device Management (MDM
❖ Mobile Application Management (MAM)
• Restricting applications
• Digitally signing applications
• Distribution from a centralized, controlled source
• Managed through whitelisting or blacklisting
❖ Mobile Content Management (MCM)
• Controlling access to data and file storage
❖ Push notification services
• Brief message or alert
• Operating system push notification service (OSPNS)
• Allows auto-updating base OS and client apps
Mobile Device Management Capabilities
❖ Geolocation
• Uses the devices’ GPS
• Some apps (Maps, Foursquare)
❖ Geofencing
• Defining a geographic perimeter
• Example: Texting in front seat of a car
Mobile Device Management Capabilities
❖ Full device encryption
• System and application
• Use TPM when available (laptops)
❖ Screen locks / Lockout – Screen configured to automatically lock after set time
❖ Passwords and Pins
• Based on corporate policy
❖ Biometrics
❖ Context-aware authentication
• Additional criteria used for authentication or device usage
• Examples: Location, time, activity, etc.
Mobile device management concepts
❖ BYOD – Bring Your Own Device
• Employees use own personal device
• Highest risk
• Adherence with company policies
❖ CYOD – Choose Your Own Device
• Employees chose from a list of approved devices
❖ COPE – Company-Owned Provided Equipment
• Company has complete control over the device
❖ VDI – Virtual Desktop Infrastructure
Deployment Models
Third-party app stores
❖ Restrict based on policy
❖ Whitelist applications
Rooting (Android) / Jailbreaking (Apple)
❖ User takes full control of the device (root)
❖ Should be forbidden for corporate devices
Sideloading
❖ Transfer data between two devices – side-channel
USB On-the-Go (OTG)
❖ Standard that enables mobile devices communication using a USB cable
Enforcement and Monitoring
ANY QUESTIONS
Thank you for Listening

More Related Content

Similar to Mobile Device Management.pptx

[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space미래웹기술연구소 (MIRAE WEB)
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsGGR Communications
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionMarko Ruusinen
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
Insight into Managing mobile devices webinar
Insight into Managing mobile devices webinarInsight into Managing mobile devices webinar
Insight into Managing mobile devices webinarJisc RSC East Midlands
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Internetwork Engineering (IE)
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptx
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptxYesist 12 PRESENTATION ON SECURE MOBILITY.pptx
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptxPushparaj567017
 
Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereInductive Automation
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security ars756
 

Similar to Mobile Device Management.pptx (20)

[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
BYOD and your favourite ITSM solution
BYOD and your favourite ITSM solutionBYOD and your favourite ITSM solution
BYOD and your favourite ITSM solution
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
Insight into Managing mobile devices webinar
Insight into Managing mobile devices webinarInsight into Managing mobile devices webinar
Insight into Managing mobile devices webinar
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptx
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptxYesist 12 PRESENTATION ON SECURE MOBILITY.pptx
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptx
 
Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From Anywhere
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security
 

More from PeterOwenje1

An Effective IT Staregy .pdf
An Effective IT Staregy .pdfAn Effective IT Staregy .pdf
An Effective IT Staregy .pdfPeterOwenje1
 
IT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn 2022.pptx
IT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn  2022.pptxIT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn  2022.pptx
IT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn 2022.pptxPeterOwenje1
 
Crafting a winning ICT Strategy .pptx
Crafting a winning ICT Strategy .pptxCrafting a winning ICT Strategy .pptx
Crafting a winning ICT Strategy .pptxPeterOwenje1
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfPeterOwenje1
 
Data Protection Subjects.pdf
Data Protection Subjects.pdfData Protection Subjects.pdf
Data Protection Subjects.pdfPeterOwenje1
 
Adaptive team leadrship.pptx
Adaptive team leadrship.pptxAdaptive team leadrship.pptx
Adaptive team leadrship.pptxPeterOwenje1
 
Digitalization of Goverment Services.pptx
Digitalization of Goverment Services.pptxDigitalization of Goverment Services.pptx
Digitalization of Goverment Services.pptxPeterOwenje1
 
Leadership Strategies.pptx
Leadership Strategies.pptxLeadership Strategies.pptx
Leadership Strategies.pptxPeterOwenje1
 
PIM Data Protection .pptx
PIM  Data Protection .pptxPIM  Data Protection .pptx
PIM Data Protection .pptxPeterOwenje1
 
PIM Data Protection .pptx
PIM  Data Protection .pptxPIM  Data Protection .pptx
PIM Data Protection .pptxPeterOwenje1
 
ERP Presentation .pptx
  ERP Presentation .pptx  ERP Presentation .pptx
ERP Presentation .pptxPeterOwenje1
 
ERP Implementation.pptx
  ERP Implementation.pptx  ERP Implementation.pptx
ERP Implementation.pptxPeterOwenje1
 

More from PeterOwenje1 (13)

An Effective IT Staregy .pdf
An Effective IT Staregy .pdfAn Effective IT Staregy .pdf
An Effective IT Staregy .pdf
 
IT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn 2022.pptx
IT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn  2022.pptxIT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn  2022.pptx
IT Alignment with Bus Strategy CSK IT Mgr Congress Pride inn 2022.pptx
 
Crafting a winning ICT Strategy .pptx
Crafting a winning ICT Strategy .pptxCrafting a winning ICT Strategy .pptx
Crafting a winning ICT Strategy .pptx
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
Data Protection Subjects.pdf
Data Protection Subjects.pdfData Protection Subjects.pdf
Data Protection Subjects.pdf
 
Adaptive team leadrship.pptx
Adaptive team leadrship.pptxAdaptive team leadrship.pptx
Adaptive team leadrship.pptx
 
Digitalization of Goverment Services.pptx
Digitalization of Goverment Services.pptxDigitalization of Goverment Services.pptx
Digitalization of Goverment Services.pptx
 
Leadership Strategies.pptx
Leadership Strategies.pptxLeadership Strategies.pptx
Leadership Strategies.pptx
 
PIM Data Protection .pptx
PIM  Data Protection .pptxPIM  Data Protection .pptx
PIM Data Protection .pptx
 
PIM Data Protection .pptx
PIM  Data Protection .pptxPIM  Data Protection .pptx
PIM Data Protection .pptx
 
IT Govenence.pptx
IT Govenence.pptxIT Govenence.pptx
IT Govenence.pptx
 
ERP Presentation .pptx
  ERP Presentation .pptx  ERP Presentation .pptx
ERP Presentation .pptx
 
ERP Implementation.pptx
  ERP Implementation.pptx  ERP Implementation.pptx
ERP Implementation.pptx
 

Recently uploaded

BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 

Recently uploaded (20)

BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 

Mobile Device Management.pptx

  • 1. Presenter: Simon Muraya MOBILE DEVICE MANAGEMENT
  • 2. ❖ I am Bachelors holder in Information Technology, Diploma In Information Technology and Diploma in Information Communication Technology(KNEC). I am a Cisco and Microsoft certified trainer with 5 years of training experience. I hold the following certifications, CompTIA A+,N+,Security+, Cisco CCNA,CCNA Security, CCNP Enterprise, MCSA windows server 2016, MCSE Core Infrastructure, Micro soft Azure Fundamentals and Microsoft azure administrator. Currently pursuing CEH. ❖ Contacts:0719478257 ❖ Email:simonmuraya144@gmail.com About me…
  • 3. ❖ Connection methods ❖ Mobile device management concepts ❖ Enforcement and monitoring ❖ Deployment models Mobile Device Security
  • 4. ❖ What is a mobile device? ❖ Any easily transportable computing system ❖ Laptops ❖ Tablets ❖ Hybrids ❖ Smartphones ❖ Watches ❖ IoT Mobile Devices
  • 5.
  • 6. ❖ Cellular ❖ Wi-Fi ❖ Bluetooth ❖ NFC ❖ SATCOM ❖ ANT ❖ Infrared ❖ USB Connection methods
  • 7. ❖ Wi-Fi ❖ Bluetooth ❖ NFC – Near-Field Communications ❖ SATCOM – Satellite Communications ❖ ANT – proprietary multicast wireless ❖ Infrared – Using light in the infrared spectrum ❖ USB / Firewire Connection methods
  • 8. ❖ Personal-Area Network (PAN) – short-range wireless connectivity ❖ Uses a spread spectrum, frequency hopping, full-duplex signal ❖ Pairing devices forms a piconet ❖ Bluesnarfing / Bluejacking ❖ If needed, set to nondiscoverable Bluetooth
  • 9. ❖ Standards for contactless communication between devices ❖ Chips generate electromagnetic fields ❖ Modes of operation: ❖ Peer-to-peer mode: Two mobile devices exchange data. ❖ Read/write mode: An active device receives data from a passive device. ❖ Card emulation: The device is used as a contactless credit card. Near-Field Communications (NFC)
  • 10. NFC
  • 11. ❖ The administration of mobile devices in an organization ❖ Software used to inventory, monitor, manage and secure employees' mobile devices, deployed across multiple mobile service providers and across multiple mobile operating systems ❖ Device enrollment, provisioning, and inventory ❖ Configuration management / updating ❖ Managing applications Enforcing policies Mobile Device Management (MDM
  • 12. ❖ Mobile Application Management (MAM) • Restricting applications • Digitally signing applications • Distribution from a centralized, controlled source • Managed through whitelisting or blacklisting ❖ Mobile Content Management (MCM) • Controlling access to data and file storage ❖ Push notification services • Brief message or alert • Operating system push notification service (OSPNS) • Allows auto-updating base OS and client apps Mobile Device Management Capabilities
  • 13. ❖ Geolocation • Uses the devices’ GPS • Some apps (Maps, Foursquare) ❖ Geofencing • Defining a geographic perimeter • Example: Texting in front seat of a car Mobile Device Management Capabilities
  • 14. ❖ Full device encryption • System and application • Use TPM when available (laptops) ❖ Screen locks / Lockout – Screen configured to automatically lock after set time ❖ Passwords and Pins • Based on corporate policy ❖ Biometrics ❖ Context-aware authentication • Additional criteria used for authentication or device usage • Examples: Location, time, activity, etc. Mobile device management concepts
  • 15. ❖ BYOD – Bring Your Own Device • Employees use own personal device • Highest risk • Adherence with company policies ❖ CYOD – Choose Your Own Device • Employees chose from a list of approved devices ❖ COPE – Company-Owned Provided Equipment • Company has complete control over the device ❖ VDI – Virtual Desktop Infrastructure Deployment Models
  • 16. Third-party app stores ❖ Restrict based on policy ❖ Whitelist applications Rooting (Android) / Jailbreaking (Apple) ❖ User takes full control of the device (root) ❖ Should be forbidden for corporate devices Sideloading ❖ Transfer data between two devices – side-channel USB On-the-Go (OTG) ❖ Standard that enables mobile devices communication using a USB cable Enforcement and Monitoring
  • 18. Thank you for Listening