Mobile Strategiesfor the Enterprise<br />AuthorizedAsia PacificRepresentative<br />
Do not try this at home!  Picture was staged in a non-moving vehicle with a professional stunt woman, well versed in multi...
3<br />
Agenda<br /><ul><li>What’s happening?
Key strategies
Steps to success
Why Good?
Next steps</li></ul>4<br />
5<br />FromMobile Phones with basic browsing and messaging capabilities…<br />…toMobile Computers often with integrated te...
6<br />Tablet &Smartphone<br />Laptop<br />What’s Happening<br />NewLaptop<br />NewDesktop<br />
What’s Happening<br />Personal mobile devices are rapidly evolving into business devices.<br /><ul><li>Employees forward c...
They routinely disregard IT security standards
They adopt whichever device satisfies BOTH personal and work needs</li></ul>7<br />
8<br />Smartphone use by age group<br />iPass Survey Results – Nov 2010<br />
9<br />What’s Happening<br />Rise of Consumer Apps…<br />…<br />… raises expectations and demands for Enterprise Apps <br />
10<br />What’s Happening<br />The Mobile Enterprise<br />Line-of-Business (LOB) Apps<br />Collaborative Apps<br />Email<br...
Employee Behavior Is Changing<br />11<br />ʻ<br />ʻ<br />ʻ<br />ʻ<br />“A wide variety of device models are entering the b...
They are frustrated in their levels of professional productivity
They need their work life to co-exist with home life
They are looking to consolidate the number of devices they carry
They will use their own devices, even if requests for support are not met</li></li></ul><li>12<br />ʻ<br />ʻ<br />ʻ<br />ʻ...
They should support the devices employees already own & prefer
IT solutions should focus on regulating access and behavior rather than devices
Compliance should enhance mobility, not restrict it</li></ul>Companies Realize Need for Change Too<br />
GOOD Enterprise Mobility SuiteHelps You Capitalize on These Shifts<br />13<br />Consumerization<br />Mobile Computing<br /...
Key Strategies<br />Manage security and deployment<br /><ul><li>To ensure compliance</li></ul>Embrace employee choice<br /...
Ensure Compliance<br />15<br />ʻ<br />ʻ<br />ʻ<br />ʻ<br />“Nearly 30% of companies experience a breach due to unauthorize...
Important to separate enterprise data from personal data
Important to deny rogue devices access to the network
IT Administrator should retain centralized control</li></li></ul><li>Embrace Employee Choice<br />16<br />ʻ<br />ʻ<br />ʻ<...
Mobile workers are more productive; more responsive to clients
They are more collaborative with others inside the organization
Their use of mobile productivity and collaboration tools drives further adoption among other employees</li></li></ul><li>S...
Transport Security<br />Internal Security<br />Perimeter Security<br />Handheld Security<br /><ul><li>Guaranteed delivery
AES-192 encryption
FIPS 140-2 certificate
S/MIME & Bluetooth CAC support1
Outbound connection
No firewall holes
Authorized device check
Role-based admin
Policy groups
Remote device control
Upcoming SlideShare
Loading in …5
×

Good for Enterprise by GMS Mobility

4,182 views

Published on

Presentation by Robert Kleinschmidt on best practices for enabling mobility devices, securely, within the work place.

Published in: Technology
0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,182
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
81
Comments
0
Likes
6
Embeds 0
No embeds

No notes for slide
  • Now, I just want to start with an image which all of us, I’m certain, have seen on many occasions.This is absolutely horrid, no?!It simply isn’t right!And it breaks my heart every time I see this!I mean, come on, a person simply shouldn’t have to carry both a BlackBerry AND an iPhone! In my opinion, this is a tell-tale sign of user needs (or preferences) outpacing an organization’s mobility strategy.So not only should I be asking, “Is Your Mobility Strategy Well Defined?” but also, “Is It Updated?”
  • My parting advice is this: Constantly Experiment!Experiment with a particular department or business unit.Ideally one which is largely composed of early adopters of mobility devices, applications, and platforms.Thank you! 
  • Good for Enterprise by GMS Mobility

    1. 1. Mobile Strategiesfor the Enterprise<br />AuthorizedAsia PacificRepresentative<br />
    2. 2. Do not try this at home! Picture was staged in a non-moving vehicle with a professional stunt woman, well versed in multi-tasking.<br />2<br />
    3. 3. 3<br />
    4. 4. Agenda<br /><ul><li>What’s happening?
    5. 5. Key strategies
    6. 6. Steps to success
    7. 7. Why Good?
    8. 8. Next steps</li></ul>4<br />
    9. 9. 5<br />FromMobile Phones with basic browsing and messaging capabilities…<br />…toMobile Computers often with integrated telephony capabilities<br />What’s Happening<br />
    10. 10. 6<br />Tablet &Smartphone<br />Laptop<br />What’s Happening<br />NewLaptop<br />NewDesktop<br />
    11. 11. What’s Happening<br />Personal mobile devices are rapidly evolving into business devices.<br /><ul><li>Employees forward corporate email & files to personal accounts
    12. 12. They routinely disregard IT security standards
    13. 13. They adopt whichever device satisfies BOTH personal and work needs</li></ul>7<br />
    14. 14. 8<br />Smartphone use by age group<br />iPass Survey Results – Nov 2010<br />
    15. 15. 9<br />What’s Happening<br />Rise of Consumer Apps…<br />…<br />… raises expectations and demands for Enterprise Apps <br />
    16. 16. 10<br />What’s Happening<br />The Mobile Enterprise<br />Line-of-Business (LOB) Apps<br />Collaborative Apps<br />Email<br />Voice Mail<br />Limited Deployment<br />Broad Deployment<br />Profit Driver<br />Cost Center<br />
    17. 17. Employee Behavior Is Changing<br />11<br />ʻ<br />ʻ<br />ʻ<br />ʻ<br />“A wide variety of device models are entering the business domain, creating havoc for IT organizations…”<br />Use Managed Diversity to Support Endpoint Devices<br />― May 2010, Ken Dulaney<br /><ul><li>Mobile users are experiencing new levels of personal productivity
    18. 18. They are frustrated in their levels of professional productivity
    19. 19. They need their work life to co-exist with home life
    20. 20. They are looking to consolidate the number of devices they carry
    21. 21. They will use their own devices, even if requests for support are not met</li></li></ul><li>12<br />ʻ<br />ʻ<br />ʻ<br />ʻ<br />“75% of Forrester enterprise survey respondents indicated user demand for support of devices on multiple platforms.”<br />Five-Year Forecast for Enterprise<br />Smartphone Marketshare, January 2010<br /><ul><li>Companies should leverage personal productivity in the workplace
    22. 22. They should support the devices employees already own & prefer
    23. 23. IT solutions should focus on regulating access and behavior rather than devices
    24. 24. Compliance should enhance mobility, not restrict it</li></ul>Companies Realize Need for Change Too<br />
    25. 25. GOOD Enterprise Mobility SuiteHelps You Capitalize on These Shifts<br />13<br />Consumerization<br />Mobile Computing<br />+ <br />Enterprise Apps<br />+ <br />Enterprise Mobility<br />+ <br />We enable IT to embrace consumerizationwithout sacrificing compliance or policies<br />We enable consistentsecurity, management, and controlacross the most hotly demanded mobile platforms<br />We support the messaging and Intranet access that users immediately require<br />We are extending the Good solution to enable full enterprise collaboration and mobility<br />
    26. 26. Key Strategies<br />Manage security and deployment<br /><ul><li>To ensure compliance</li></ul>Embrace employee choice<br /><ul><li>To reap gains in productivity and collaboration</li></ul>Increase operational efficiency<br /><ul><li>To reduce costs and streamline support</li></ul>14<br />
    27. 27. Ensure Compliance<br />15<br />ʻ<br />ʻ<br />ʻ<br />ʻ<br />“Nearly 30% of companies experience a breach due to unauthorized mobile device use.”<br />Q1 Enterprise and SMB Survey, 2009<br />― Forrester Research<br /><ul><li>Companies with a complex, disparate infrastructure face more challenges attaining end-to-end security
    28. 28. Important to separate enterprise data from personal data
    29. 29. Important to deny rogue devices access to the network
    30. 30. IT Administrator should retain centralized control</li></li></ul><li>Embrace Employee Choice<br />16<br />ʻ<br />ʻ<br />ʻ<br />ʻ<br />“Internal corporate policies should focus on regulating behavior rather than devices…”<br />The Changing Definition of ‘Mobile Device’ Will Challenge Policies<br />― Nick Jones, May 2010<br /><ul><li>Employees allowed to use personal devices are more willing to access enterprise data in a managed and secure way
    31. 31. Mobile workers are more productive; more responsive to clients
    32. 32. They are more collaborative with others inside the organization
    33. 33. Their use of mobile productivity and collaboration tools drives further adoption among other employees</li></li></ul><li>Steps to Success<br />17<br />Step 1: Protect Data & Apps<br />
    34. 34. Transport Security<br />Internal Security<br />Perimeter Security<br />Handheld Security<br /><ul><li>Guaranteed delivery
    35. 35. AES-192 encryption
    36. 36. FIPS 140-2 certificate
    37. 37. S/MIME & Bluetooth CAC support1
    38. 38. Outbound connection
    39. 39. No firewall holes
    40. 40. Authorized device check
    41. 41. Role-based admin
    42. 42. Policy groups
    43. 43. Remote device control
    44. 44. Remote erase & lockout
    45. 45. Encrypted databases
    46. 46. Application lockdown
    47. 47. Virus protection
    48. 48. Control traffic by:
    49. 49. IP address
    50. 50. Subnet
    51. 51. Service
    52. 52. Protocol</li></ul>How Do You Protect Enterprise Dataand Apps?<br /><ul><li>Separate:“Quarantine” enterprise data on devices – without interfering with personal information and applications
    53. 53. Secure:Ensure security at each level of data delivery – internal, perimeter, transport, and at the handheld device
    54. 54. Manage:Manage the whole device or just the business applications and data consistently and in accordance with your policies</li></ul>Enabling & Empowering the Mobile Workforce<br />
    55. 55. GOOD for EnterpriseA Simple & Cost-Effective Architecture<br />Enterprise Apps<br />Messaging & Collaboration<br />Wireless<br />Networks<br />Firewall<br />Good Server<br />Devices with Good<br />Network<br />Operations<br />Center<br />Intranet<br />Connect & Collaborate<br />With Enterprise Security & Control<br />Over Any Network<br />On A Broad Range Of Devices<br /><ul><li>4G
    56. 56. 3G
    57. 57. EVDO
    58. 58. WiFi
    59. 59. Managed
    60. 60. Secure
    61. 61. Scalable
    62. 62. Reliable
    63. 63. Audited
    64. 64. Integrated
    65. 65. Email & PIM
    66. 66. Visual Voice Mail
    67. 67. Corp IM/Presence
    68. 68. PBx Integration
    69. 69. Vertical Apps
    70. 70. CDMA
    71. 71. EDGE
    72. 72. HSDPA
    73. 73. GPRS</li></ul>Enabling & Empowering the Mobile Workforce<br />
    74. 74. GOOD for EnterpriseSeparate Personal & Enterprise Data<br />Enterprise data lockdown<br /><ul><li>Data encryption
    75. 75. Password policies
    76. 76. Remote wipe
    77. 77. Secure data at rest</li></ul>Corporate apps access<br /><ul><li>Email, attachments, & PIM
    78. 78. Intranets
    79. 79. Document repositories
    80. 80. Corporate IM
    81. 81. PBx</li></ul>Devices remain personal<br />Untouched by enterprise<br /><ul><li>Justifies shared employee expense</li></ul>Freely access your own content<br /><ul><li>Applications
    82. 82. Pictures / Video
    83. 83. Personal email accounts</li></ul>Enterprise Data<br />Personal Data<br />Employees are more likely to accept “enterprise-grade” mobile security policies when enterprise control is “contained” and does not impact personal experience, apps, or data<br />Enabling & Empowering the Mobile Workforce<br />
    84. 84. GOOD for Enterprise“Containerize” Apps or Manage Whole Device<br />Containerized applicationsand data<br />Whole device<br />Security and management policies can be restricted to selected applications or applied to the functionality of the entire device.<br />Enabling & Empowering the Mobile Workforce<br />
    85. 85. Steps to Success<br />22<br />Step 2: Increase Productivity & Collaboration<br />
    86. 86. Mobile Workers More Productive<br />23<br />ʻ<br />ʻ<br />ʻ<br />ʻ<br />“Mobilizing a workforce can increase productivity and sales, and improve customer satisfaction.<br />Mobile Enterprise Strategy Key Initiative Overview<br />― Phillip Redman, February 2010<br /><ul><li>How will you adapt to the needs of a more decentralized, remote, and mobile workforce?
    87. 87. How do you keep mobile costs under control, w/o limiting capabilities?
    88. 88. How can you evolve from a one-off to a more strategic implementation?
    89. 89. How well do you tailor your offerings to suite different user segments?
    90. 90. How will you track & manage fast-changing, nonstandard technologies such as wireless and mobile?</li></li></ul><li>GOOD for EnterpriseExtend Beyond Email to Collaboration<br />The collaboration tools employees use<br />most often will be securely mobilized.<br />E-mail<br />Contacts<br />Calendar<br />Secure<br />Browser<br />Future Roadmap<br />Corporate IM & Presence<br />Firewall<br />Document<br />Handling & Sharing<br />Unified Communications<br />The information on any roadmap shown is not a commitment, promise, or legal obligation to deliver any material, code or functionality. The development, release and timing of any features or functionality described for Good products remains at Good’s sole discretion. Future product will be priced separately.<br />Enabling & Empowering the Mobile Workforce<br />
    91. 91. Steps to Success<br />25<br />Step 3: Manage Your Entire Deployment<br />
    92. 92. GOOD for EnterpriseA Complete Suite…For Broadest Range of Devices<br />Good Mobile Control<br /><ul><li>Secure control, provisioning, and management
    93. 93. Software distribution and version management
    94. 94. Guaranteed policy enforcement</li></ul>Good Mobile Messaging<br /><ul><li>Secure email/PIM with exceptional user experience
    95. 95. FIPS-certified OTA and on-device data encryption
    96. 96. S/MIME option for high-security government and enterprise</li></ul>Good Mobile Access<br /><ul><li>Secure applications access
    97. 97. No extra VPN hardware/software required
    98. 98. No proprietary SDK required</li></ul>Enabling & Empowering the Mobile Workforce<br />
    99. 99. GOOD for EnterpriseKeep An Eye On Your Entire Mobile Deployment<br />A single, web-based console to manage:<br /><ul><li>IT Control
    100. 100. Large-scale deployment
    101. 101. Complexity
    102. 102. Different roles and policies</li></ul>IT administrators get a dashboard view of the entire fleet of mobile devices accessing enterprise data.<br />Enabling & Empowering the Mobile Workforce<br />
    103. 103. 28<br />Why GOOD?<br />
    104. 104. GOOD TechnologyThe Leader in Multiplatform Enterprise Mobility<br /><ul><li>4,000+ Enterprise Accounts and growing fast
    105. 105. 40 of the Fortune 100
    106. 106. Certified for deployment by DoD, DoHS, and US Federal government
    107. 107. Active users on 200+ carriers, 100’s of devices
    108. 108. Carrier, device, and platform agnostic</li></ul>Enabling & Empowering the Mobile Workforce<br />
    109. 109. GOOD TechnologySupports the Most Popular Devices & Platforms<br />Which platform do you anticipate company will support?<br />iPass Survey Results – Nov 2010<br />Enabling & Empowering the Mobile Workforce<br />
    110. 110. GOOD TechnologyReduces Costs!<br />Corporate-Liable BlackBerry vs. Individual-Liable Smartphone<br /><ul><li>Users are already paying for devices and personal data plans
    111. 111. You can strike a ‘new deal’ with employees, save money, and expand your overall deployment and enterprise productivity
    112. 112. Plus, control roaming costs on personal accounts which is not included in this cost comparison</li></ul>Average Device Cost (Annualized)<br />$21 $0<br />Data Plan (Annualized)<br />$510 $180<br />Solution Cost (Annualized)<br />$112 $113<br />Cost / User / Year<br />$643 $283<br />Device cost based on BlackBerry Storm, Bold and Tour models after two-year service contract discount and rebates based on published pricing averages from June 2010. Data plan cost based on published pricing averages from June 2010 – assumes company will cover cost difference between “personal” and “enterprise” data plans. BlackBerry solution cost based on published reseller pricing from June 2010. Good solution cost based on server and client license list pricing for 50 users. Actual costs will vary by company and policy set. Device, server, and client license costs annualized over 3 years.<br />Enabling & Empowering the Mobile Workforce<br />
    113. 113. GOOD TechnologySo You Gain Broader Enterprise Mobility Benefits<br /><ul><li>You can manage and secure your deployments consistently
    114. 114. By gaining a single view into your entire mobile workforce
    115. 115. Runs alongside BlackBerry (No need to scrap existing investment)
    116. 116. You can increase productivity
    117. 117. By supporting device choice on the broadest range of devices and platforms
    118. 118. You can increase operational efficiency
    119. 119. By reducing costs and streamlining support</li></ul>Enabling & Empowering the Mobile Workforce<br />
    120. 120. 33<br />Case Study<br />Robert Walters<br />
    121. 121. Case Study: Robert Walters<br />The Challenge<br />Consumerization of IT<br />Users demanded support for personal devices<br />Support users without increasing workload of IT<br />The Solution<br />“Good for EnterpriseTM” Mobility Suite<br />34<br />
    122. 122. 35<br />
    123. 123. 36<br /><ul><li>192 bit AES encryption
    124. 124. Compressed</li></ul>View and respond to email in your corporate inbox.<br />Download and view attachments.<br /><ul><li>Over-the-air deployment
    125. 125. Corporate data separate from personal data</li></ul>View and access all your inbox subfolders<br />Setup meetings quickly<br />and easily<br />
    126. 126. 37<br />
    127. 127. 38<br />
    128. 128. 39<br />
    129. 129. 40<br />
    130. 130. 41<br />
    131. 131. Case Study: Robert Walters<br />The Results<br />Single platform to support all devices<br />Allowed users to bring own personal phones<br />Able to “mobilize” a broader group of employees<br />Able to manage and ensure security of corporate data<br />Reduced costs<br />42<br />Now have a good platform on which<br />to develop and maintain theirEnterprise Mobility Strategy & Policy<br />
    132. 132. info@gmsm.co+65 6830-8435<br />www.gmsm.co<br />43<br />

    ×