SlideShare a Scribd company logo
1 of 35
Creating a supportable and flexible
IT solution for the post-PC era
Jon Miller
Mobile strategist
@JonMillerUK
What this session will cover

What do we mean by post-PC era?
Enterprise Mobility Management
What do all the acronyms mean?

Offering a corporate mobile solution through MDM
Offering greater flexibility through BYOD and MAM
Supporting the solution
Questions
About me

Mobile strategist and speaker on all
things mobile
Head of Mobility for a division of
Transport for London
iOS developer and hacker
What is the post-PC era?

Category

2012 unit
shipments

2012 market
share

2017 unit
shipments

2017 market
share

2012-2017
growth

Desktop PC

148.4m

12.4%

141.0m

6.0%

-5.0%

Portable PC

202.0m

16.8%

240.9m

11.0%

19.3%

Tablet

128.3m

10.7%

352.3m

16.0%

174.5%

Smartphone

722.4m

60.1%

1516.0m

67.0%

109.9%

TOTAL

1201.1m

100%

2250.3m

100.0%

87.3%

Research firm, IDC’s worldwide Smart Connected Device Tracker Forecast data, Feb 28 2013
Enterprise Mobility Management
Enterprise Mobility Management
What do all the acronyms mean?
MAM
MEM

MIM
MDM
MCM

VPN
BYOD
Mobile is your most personal
interaction with IT and technology
What do users really want?
What do users really want?
What do users really want?
“Simple can be harder than complex:
You have to work hard to get your
thinking clean to make it simple. But
it’s worth it in the end because once
you get there, you can move
mountains”
Steve Jobs
Pick a platform
Pick a platform
1%
3%

3%

14%

Android
iOS
Microsoft
BlackBerry
Other

79%

Gartner (August 2013)
Fragmentation

31%
Honeycomb and below

49%

Ice Cream Sandwich

20%

Jelly Bean

October 2013
Fragmentation

4%
27%
iOS 5 and below
iOS 6
69%

iOS 7

October 2013
Mobile Device Management

Free as part of Microsoft Exchange
Provides basic MDM capabilities like
device wipe, enforcing PIN code and
encryption
Industry standard so pretty much built
into every device type
MDM: Apple vs Android

Apple

Android

Consistent across all devices
Easy to create an end-to-end
configuration deployed over
the air
Deeply integrated into the OS
so can create very granular
configurations

Vary depending on vendor
Profiles are not joined up so
can’t deploy a zero touch
configuration
MDM is a layer on top of the
OS so challenging to create
something simple out of
complex requirements
Mobile Device Management

EMM
Mobile Device Management

EMM
Enterprise integration

EMM

EMM
Enterprise integration

EMM

EMM
What does all this mean?
Security and lock down
Security and lock down
Mobile Application Management

EMM
Why is MAM important?

Focus on the data and not the device – more granular
Capabilities across devices are essentially equal
BYOD solution doesn’t need to be different to the
corporate one
Fewer factors to worry about
Layers of complexity are greatly reduced
Why is MAM important?

Any device
Any owner
Any service
Anywhere
Supporting the solution

Cloud-based EMM is key
No infrastructure to support
Support for new devices and
software is devolved to
vendors
Easy to get up and running
Cheap

EMM
Supporting the solution

Devices
Streamline your offering if you
are providing devices
Keep the solution as open as
possible so that users can
support themselves
Supporting the solution

Enterprise integration
Backend data and systems
shouldn’t need any additional
support
If using certificates as part of
MDM profile need robust
management process
Custom apps introduce new
challenges
Supporting the solution
Ideas to take away

Simplicity is the ultimate sophistication
Don’t be afraid of the technology and the jargon – start with something basic
and expand
If you are focused on one device platform corporately it is easy to extend the
mobile solution to other platforms to enable BYOD and create flexibility in the
future
Don’t fall into the traps of applying old ways of thinking to new ways of
working
Always put your users first – if you cripple their mobile experience you will
never succeed so think hard about why you make the choices you do
Questions?

jonmiller@outlook.com
@JonMillerUK
http://www.linkedin.com/in/jonmilleruk

More Related Content

What's hot

airwatchexpress_infographic(2)
airwatchexpress_infographic(2)airwatchexpress_infographic(2)
airwatchexpress_infographic(2)Bridgette Springer
 
Application Strategies for the Connected Enterprise
Application Strategies for the Connected EnterpriseApplication Strategies for the Connected Enterprise
Application Strategies for the Connected EnterpriseSamsung Business USA
 
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...InsightInnovation
 
Competing Against Free
Competing Against FreeCompeting Against Free
Competing Against FreeSameer Mathur
 
Get Smart About Business Continuity
Get Smart About Business ContinuityGet Smart About Business Continuity
Get Smart About Business ContinuityInteractiveNEC
 
"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slides"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slidesNetDimensions
 
A Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner SessionA Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner SessionSamsung Business USA
 
Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Chuck Goldman
 
7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10AGILLY
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 

What's hot (13)

IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
airwatchexpress_infographic(2)
airwatchexpress_infographic(2)airwatchexpress_infographic(2)
airwatchexpress_infographic(2)
 
Application Strategies for the Connected Enterprise
Application Strategies for the Connected EnterpriseApplication Strategies for the Connected Enterprise
Application Strategies for the Connected Enterprise
 
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
 
Competing Against Free
Competing Against FreeCompeting Against Free
Competing Against Free
 
Get Smart About Business Continuity
Get Smart About Business ContinuityGet Smart About Business Continuity
Get Smart About Business Continuity
 
"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slides"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slides
 
A Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner SessionA Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner Session
 
Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013
 
7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Enterprise Mobility
Enterprise MobilityEnterprise Mobility
Enterprise Mobility
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 

Similar to Bright talk webinar 10 10-13

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ssGraham Chalk
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleMicrosoft
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksLogicalis
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksLogicalis
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
SITB110: The Workspace of 2020
SITB110: The Workspace of 2020SITB110: The Workspace of 2020
SITB110: The Workspace of 2020Ivanti
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Corporation
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 
Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1momobangalore
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityCincoC
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 

Similar to Bright talk webinar 10 10-13 (20)

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alle
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
SITB110: The Workspace of 2020
SITB110: The Workspace of 2020SITB110: The Workspace of 2020
SITB110: The Workspace of 2020
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Bright talk webinar 10 10-13

Editor's Notes

  1. So many vendors and products to choose from
  2. Gartner Magic Quadrant for MDM providers is a really good place to start looking
  3. Best way to keep it simple is to concentrate on one platform and get it rightApple iOS and Android are the main players here with Blackberry becoming increasingly less relevant and Microsoft not yet making that big a dent
  4. Android has by far the greatest market share. However, from corporate perspective, need to think about this differently
  5. Bear in mind that Honeycomb was released Feb 2011 – so around a third of Android devices are running a version over 2.5 years old!
  6. Bear in mind that iOS7 was released to the public only three weeks ago!This is great from the security perspective – people want to update so it’s easy to get devices patched when vulnerabilities are publicAlso you can have many device categories but only need to create one set of device configurations and policies
  7. In its simplest form can be up and running in next to no time
  8. In its simplest form can be up and running in next to no time
  9. In its simplest form can be up and running in next to no time
  10. If you lock things down too much and make the experience compromised or hard to understand then users won’t know which way to turn and will not accept it
  11. Email containerised into a secure appMost mobility management vendors provide containerised web browsers and document viewersAlso provide SDKs and App wrapping which mean you can containerise your own appsTraffic from these is then securely tunneled back to your secure corporate dataSecurity and policy is thus managed at the app levelEnterprise integration for EMM cloud essential
  12. Device thus becomes unimportant – as long as you can deliver the data securely to the device it doesn’t matter what it isBecause it doesn’t matter what the device is then doesn’t even need to belong to the companySeparates work from personalIn this model you are not having to implement complex security profiles for devices or certificates for VPN etc so no need to manage those areas
  13. Keep everything simple and you don’t need an army to support it (e.g. I have 1 FTE supporting 1500 devices in a 24/7 organisation)
  14. Mobile moves fast so be part of it rather than waiting for it to happen to you