15. There are now more
mobile devices in
the world than there
are human beings.
16. How many of them are
in the bags and pockets
of your people, whether
they’re corporate or
user-owned?
17. Enough to give your
IT people plenty of
sleepless nights.
How many of them are
in the bags and pockets
of your people, whether
they’re corporate or
user-owned?
18. And they’re all different.
With specific combinations
of hardware, operating system,
firmware version and apps.
This sheer variety is itself
a management nightmare.
20. To cope with this
ever-growing swarm
of devices, IT needs
special powers.
It needs to be able to:
21. • Enroll devices in your environment
quickly, configuring and updating
settings over the air
To cope with this
ever-growing swarm
of devices, IT needs
special powers.
It needs to be able to:
22. • Enroll devices in your environment
quickly, configuring and updating
settings over the air
• Let people provision their own
apps from a company app store
To cope with this
ever-growing swarm
of devices, IT needs
special powers.
It needs to be able to:
23. • Enroll devices in your environment
quickly, configuring and updating
settings over the air
• Let people provision their own
apps from a company app store
• View all enrolled devices
(regardless of ownership) through
a single console
To cope with this
ever-growing swarm
of devices, IT needs
special powers.
It needs to be able to:
24. • Enroll devices in your environment
quickly, configuring and updating
settings over the air
• Let people provision their own
apps from a company app store
• View all enrolled devices
(regardless of ownership) through
a single console
• Manage devices by ‘profile’
e.g. by operating system, or device
ownership type
To cope with this
ever-growing swarm
of devices, IT needs
special powers.
It needs to be able to:
25. • Enroll devices in your environment
quickly, configuring and updating
settings over the air
• Let people provision their own
apps from a company app store
• View all enrolled devices
(regardless of ownership) through
a single console
• Manage devices by ‘profile’
e.g. by operating system, or device
ownership type
• Automatically push appropriate
apps and content
To cope with this
ever-growing swarm
of devices, IT needs
special powers.
It needs to be able to:
26. • Enroll devices in your environment
quickly, configuring and updating
settings over the air
• Let people provision their own
apps from a company app store
• View all enrolled devices
(regardless of ownership) through
a single console
• Manage devices by ‘profile’
e.g. by operating system, or device
ownership type
• Automatically push appropriate
apps and content
• Define use policies
To cope with this
ever-growing swarm
of devices, IT needs
special powers.
It needs to be able to:
27. All these Mobile Device
Management (MDM) powers
help IT tame the device
explosion, and help prevent
the kind of security crises
which true nightmares
are made of.
You don’t want to do this job
with spreadsheets and email.
29. People who leave your
company — however happy
the circumstances and great
the leaving party — may find
that they’re taking a lot of
sensitive corporate data
with them.
30. The same applies to that
freelancer who’s necessarily
been dipping in and out of
your systems during the
course of their employment.
31. Whether someone accidentally
walks off with sensitive info, or
deliberately steals a client list, the
results can be truly nightmarish,
putting you at the center of a
privacy scandal or giving
competitors insights they
shouldn’t have.
34. • Revoke access to corporate email,
WiFi and VPN networks as soon as
anyone leaves the company
Your administrators
need the power to:
35. • Revoke access to corporate email,
WiFi and VPN networks as soon as
anyone leaves the company
• Remove apps and content from
devices instantly
Your administrators
need the power to:
36. • Revoke access to corporate email,
WiFi and VPN networks as soon as
anyone leaves the company
• Remove apps and content from
devices instantly
• Customize privacy policies
Your administrators
need the power to:
37. You’ll also want to use Mobile
Content Management solutions
to create ‘secure workspaces’ —
dividing devices into work areas
and personal areas — to ensure
personal and corporate data
stay separate, and separately
manageable.
38. 03
The lost and found
How can you stop lost
devices meaning lost data?
39. We’ve all read stories in the
newspaper about government
officials leaving important
devices or documents on
trains or in taxis.
40. Before you judge, ask yourself this:
Have you ever
accidentally
left your phone
somewhere?
41. If you haven’t, we guarantee
you can think of someone
who has.
Lost devices are an inevitable
consequence of major trends
like “Bring Your Own Device”
(BYOD).
42. But the concern with lost
devices is actually two-fold.
For one thing, it’s the content
on the device. But it’s also the
content that device can grant
access to, that carries the
greatest threat.
So, what can you do to stop a
lost device meaning lost data?
44. If you’re going to escape
this nightmare, the ability to
remotely access and remove
apps and content from a
device is crucial.
That way, vital data can be
permanently secured, even
if the device is gone forever.
45. Once again, you’ll also want to
use mobile device management
to lock or wipe a device instantly
and secure workspaces, to keep
sensitivecorporatedataseparate
— and encrypted.
47. Hackers cost the American
economy an estimated
$100 billion a year
48. Hackers cost the American
economy an estimated
and you may be surprised to
know small businesses suffer
as much as corporate giants.
$100 billion a year
49. We’re used to defending our
servers behind firewalls, but in
mobile devices hackers now
have a new target: one that’s
fresh enough to be under-
protected, and prevalent
enough to pose a genuine
threat to your organization.
50. So, how can you be sure
the apps your people have
on their devices aren’t giving
hackers a back door to
your systems?
54. Mobile application
management (MAM)
tools are available to
support exactly this
process (sometimes
called App Reputation
Scanning).They’llletyou:
• Identify common risks (such as
access to privacy settings, insecure
network connections, malicious
code and more)
55. • Identify common risks (such as
access to privacy settings, insecure
network connections, malicious
code and more)
• ‘Wrap’ at-risk application — be they
internal or third-party — in an extra
level of security and policy (imagine
literally putting a wrapper around an
app, that limits how it can be used)
Mobile application
management (MAM)
tools are available to
support exactly this
process (sometimes
called App Reputation
Scanning).They’llletyou:
56. You’ll also want the development
tools to build super-secure apps
of your own — and you could even
create a personalized, secure
enterprise app store to ensure
hackable applications stay utterly
off the menu.
58. Your people’s mobile devices
contain a lot of things — pictures
of family, live sports scores, social
media timelines and other even
more, shall we say, ‘private’ content.
59. If your people want to use
these devices for work, then
the liability for what’s on
them becomes yours.
60. If your people want to use
these devices for work, then
the liability for what’s on
them becomes yours.
Notanideal
situation,as
we’resureyou
canimagine.
61. You’re not there to babysit
your people, and tell them
what they can and can’t
look at, and you certainly
don’t want to be backing
up private content, or
illegal content, onto your
company servers.
63. In this scenario, secure workspaces
(‘containers’) really come into their
own. You need to be able to separate
commercial and personal data on a
device, ensuring corporate resources
stay secure and individual privacy
is maintained.
64. So, containerize that content.
Divide the device into two parts:
one for company use and one for
whatever is appropriate outside
of work.
You can also turn to our old friend
app wrapping. Simply wrap on
an app by app basis, restricting
the ability to copy, re-save and
share the content it contains.
66. Mobile is great for business.
It brings levels of flexibility
and productivity to your
workforce that wouldn’t
have been possible a
decade ago.
67. But, with this new power,
comes a new set of risks.
These nightmares are the
stuff of reality. They happen
to companies of all sizes in
all industries every day.
68. But, with this new power,
comes a new set of risks.
These nightmares are the
stuff of reality. They happen
to companies of all sizes in
all industries every day.
But there’s no reason
they should.
70. Managing these risks
and minimizing exposure
to outside threats really
isn’t rocket science.
It just requires a robust,
flexible and powerful
solution that covers
MDM, MAM, and content
management concerns.
71. Managing these risks
and minimizing exposure
to outside threats really
isn’t rocket science.
It just requires a robust,
flexible and powerful
solution that covers
MDM, MAM, and content
management concerns.
We’ll show you how.
72. We’re Sprint Business
and we help companies like
yours tackle their mobility
nightmare so their people
can work better together,
wherever they are.
Read our slideshare to
find out more about the
FourLevelsofEnterprise
Mobile Management
73. If that sounds like it might work for you, we
should talk. Give us a call on 1-877-633-1102
or visit sprint.com/business
Let’stalk
We think there’s a much better way to deliver carrier
services to enterprises. A way that’s optimized for
agility; that makes it easy to pivot; and that lets big
businesses innovate for customers and shareholders
as fast as the upstarts.