Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
“Best Practices in Mobile DeviceManagement (MDM)Assoc. Prof. Dr. Thanachart NumnondaExecutive DirectorIMC Institute
2Technology Trends
3Gartner Top 10 Strategic Technology TrendsMedia tablets and beyondMobile-centric applications andinterfacesSocial &contex...
4Mobile ComputingCloud ComputingSocial Technologies Information
5Cloud Computing Smartphone 3G/4G Wireless BroadbandEye-Tracking Augmented Reality Social Networking3D Printing Autonomous...
6Radical Transformation
7Source :London Futurists; mz@envisioningtech.com
8The power of your handin 10 yearsLook like this todaySource: Winning in a Digital World; Mark Mueller-Eberstein
9Global smartphones annual sales will growabout 46 percent to 687.9 million units this yearand will touch 1.05 billion uni...
10
11Worldwide Devices Shipment
12Sales of SmartphonesSource Gartner: April 2011
13Sales of TabletsSource Gartner: September 2011
14Smartphone Marketshare Q1: 2013Source Strategy Analytics
15Tablet Marketshare Q1: 2013Source IDC
162013Mobile will become the most commonway of accessing the InternetSource :Trending the future: Mobile Trends 2011
17Welcome toThe Post-PC Era
18The Internet of Things
19Source :London Futurists; mz@envisioningtech.com
20
21Google Glass Nike Fuelband Jawbone UPBasis Band Sony SmartwatchMisfit ShineWearable Technology: The Next Big Things
22
23Emerging Mobile TechnologiesQR Code NFC Tectiles
24CIO Trends
25CIO Survey, CIO magazine, January 2012Q: In your opinion, which of the following trends will have themost profound effec...
26Bring Your Own Devices (BYOD)
27Public Personal Cloud
28“Social computing is moving frombeing just on the outside of the organizationto being at the core of business operations...
29“Big data currently has the most significant impactin social network analysis and content analyticswith 45% of new spend...
30Trends in End User DevicesSource JSC: January 2012
31Sign of the Times1995: Employee Car2005: Employee Cell Phone2015: Employee Computer / Devices
32BYOD
33Mobile in EnterpriseGartner forecasts that in 2016, half of all non-PCdevices will be purchased by employees. By the end...
34Bring Your Own Devices (BYOD)
35BYOD is not the QuestionIt’s already here.“How do we secure personal devices?”“How do we secure the data?”– The policies...
36Connect Assets, People, CustomersSource The Enterprise Appstore: Appear
37Mobility RequirementsSource The Enterprise Appstore: Appear
38Mobility RequirementsSource The Enterprise Appstore: Appear
39BYODPROUser flexibilityLess devices for usersMore advanced deviceson the networkDevices upgraded morefrequently thatorga...
40BYOD Risk
41Top 5 BYOD Security ChallengesLost or stolen mobile devicesMobile vulnerabilities on the riseAbuse of mobile paymentMobi...
42CIO has a big responsibility…Source:BYOD (Bring Your Own Device)Randy Gower – Good Technology
431. Lost or Stolen Mobile Devices•Mobile devices are the fastest growing consumertechnology– Worldwide unit sales 300m in...
442. Mobile Vulnerabilities on the RiseSource BYOD and Top 5 Network Security Threats for 2012•Increased by 93% in 2011•Re...
453. Abuse of Mobile PaymentsSource BYOD and Top 5 Network Security Threats for 2012•Mobile payments target for mobile thr...
464. Mobile Application-Based ThreatsSource BYOD and Top 5 Network Security Threats for 2012•Malware– Making charges to th...
475. Mobile Web-Based ThreatsSource BYOD and Top 5 Network Security Threats for 2012•Phishing Scams– Use web pages or othe...
48Risk in mobile environmentSource:BYOD (Bring Your Own Device)Randy Gower – Good Technology
49Managing Risk inBYODSource BYOD and Top 5 Network Security Threats for 2012
5010 Steps to a secure mobile strategySource The 10 Steps to a Secure BYOD Strategy: Bradford Networks
51Source Whats your Enterprise Appstore: Partnerpedia
52Enterprise App Store
53Application Stores
54“Q1 2013, four leading storeshit 13.4 billion downloads, with revenue of $2.2 billion”Canalys, April 2013
55
5610 Steps to a secure mobile strategySource The 10 Steps to a Secure BYOD Strategy: Bradford Networks
57Public App Stores : IssueLack of business focusLack of volume purchasingSecurity issues
58“An enterprise app store is a web portal throughwhich end users can access, downloadand install corporate-approved softw...
59Enterprise App StoreSource The Enterprise Appstore: Appear
60Why Enterprise App Store?Distribution and Deployment SupportPolicy EnforcementApp Improvement and Tool SetDevelopmentBra...
61“By 2014, 60% of IT organization will deployprivate app stores”Gartner
62Enterprise App Store Solution: Example
63Mobile DeviceManagement
64The Burden ThreatsCredit: ChaiyakornApiwathanokul, S-Generation
65Why MDM?Source: John Rhoton, HPSecure: Ensure integrity of configurationHigher ease-of-useDeploying LOB applicationsLowe...
66Key RequirementsCredit: ChaiyakornApiwathanokul, S-GenerationLet users get access to dataGive the enterprise controlSecu...
67Key RequirementsCredit: ChaiyakornApiwathanokul, S-GenerationGrant app acess one by one (no VPN free-for-all)Secure crit...
68End-to-End simplifiedMobile security frameworkCredit: ChaiyakornApiwathanokul, S-Generation
69MDM ArchitectureSource: [X] Cube LABS
70When MDM is required?
71Thank youthanachart@imcinstitute.comwww.imcinstitute.comwww.facebook.com/imcinstitutewww.slideshare.net/imcinstitute
Upcoming SlideShare
Loading in …5
×

Best Practices in Mobile Device Management (MDM)

149 views

Published on

Presentation for ITU's class on 26 June 2013

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Best Practices in Mobile Device Management (MDM)

  1. 1. “Best Practices in Mobile DeviceManagement (MDM)Assoc. Prof. Dr. Thanachart NumnondaExecutive DirectorIMC Institute
  2. 2. 2Technology Trends
  3. 3. 3Gartner Top 10 Strategic Technology TrendsMedia tablets and beyondMobile-centric applications andinterfacesSocial &contextual user experienceApplication stores and marketplaceThe Internet of everythingNext-generation analyticsBig dataIn-memory computingExtreme low-energy serversCloud computingMobile Device BattlesMobile Applications and HTML5Personal CloudEnterprise App StoresThe Internet of ThingsHybrid IT and Cloud ComputingStrategic Big DataActionable AnalyticsIn Memory ComputingIntegrated Ecosystems2012 2013
  4. 4. 4Mobile ComputingCloud ComputingSocial Technologies Information
  5. 5. 5Cloud Computing Smartphone 3G/4G Wireless BroadbandEye-Tracking Augmented Reality Social Networking3D Printing Autonomous CarCurrent Technologies That Will Shape Our Future
  6. 6. 6Radical Transformation
  7. 7. 7Source :London Futurists; mz@envisioningtech.com
  8. 8. 8The power of your handin 10 yearsLook like this todaySource: Winning in a Digital World; Mark Mueller-Eberstein
  9. 9. 9Global smartphones annual sales will growabout 46 percent to 687.9 million units this yearand will touch 1.05 billion units in 2014[Credit Suisse; Apr 2012]
  10. 10. 10
  11. 11. 11Worldwide Devices Shipment
  12. 12. 12Sales of SmartphonesSource Gartner: April 2011
  13. 13. 13Sales of TabletsSource Gartner: September 2011
  14. 14. 14Smartphone Marketshare Q1: 2013Source Strategy Analytics
  15. 15. 15Tablet Marketshare Q1: 2013Source IDC
  16. 16. 162013Mobile will become the most commonway of accessing the InternetSource :Trending the future: Mobile Trends 2011
  17. 17. 17Welcome toThe Post-PC Era
  18. 18. 18The Internet of Things
  19. 19. 19Source :London Futurists; mz@envisioningtech.com
  20. 20. 20
  21. 21. 21Google Glass Nike Fuelband Jawbone UPBasis Band Sony SmartwatchMisfit ShineWearable Technology: The Next Big Things
  22. 22. 22
  23. 23. 23Emerging Mobile TechnologiesQR Code NFC Tectiles
  24. 24. 24CIO Trends
  25. 25. 25CIO Survey, CIO magazine, January 2012Q: In your opinion, which of the following trends will have themost profound effect on the CIO role in the future?Source:BYOD (Bring Your Own Device)Randy Gower – Good Technology
  26. 26. 26Bring Your Own Devices (BYOD)
  27. 27. 27Public Personal Cloud
  28. 28. 28“Social computing is moving frombeing just on the outside of the organizationto being at the core of business operations.”Peter Sondergaard, senior vice president at Gartner, 2012
  29. 29. 29“Big data currently has the most significant impactin social network analysis and content analyticswith 45% of new spending each year.”Gartner, 2012
  30. 30. 30Trends in End User DevicesSource JSC: January 2012
  31. 31. 31Sign of the Times1995: Employee Car2005: Employee Cell Phone2015: Employee Computer / Devices
  32. 32. 32BYOD
  33. 33. 33Mobile in EnterpriseGartner forecasts that in 2016, half of all non-PCdevices will be purchased by employees. By the endof the decade, half of all devices in business will bepurchased by employees.By 2016, 60% of large enterprises will implementlimited access network zones to limit the connectivityof personally owned mobile devices.Gartner predicts that through 2017, 90% ofenterprises will have two or more mobile operatingsystems to support.
  34. 34. 34Bring Your Own Devices (BYOD)
  35. 35. 35BYOD is not the QuestionIt’s already here.“How do we secure personal devices?”“How do we secure the data?”– The policies go with the data and the risk, notthe deviceSource Mobile Security & BYOD Policy, Sarkis Daglian and Isaac Straley
  36. 36. 36Connect Assets, People, CustomersSource The Enterprise Appstore: Appear
  37. 37. 37Mobility RequirementsSource The Enterprise Appstore: Appear
  38. 38. 38Mobility RequirementsSource The Enterprise Appstore: Appear
  39. 39. 39BYODPROUser flexibilityLess devices for usersMore advanced deviceson the networkDevices upgraded morefrequently thatorganization cycleCONLess control of devicesData security complianceWho owns the data?How will you recover dataif someone leaves?Source Mobile Security & BYOD Policy, Sarkis Daglian and Isaac Straley
  40. 40. 40BYOD Risk
  41. 41. 41Top 5 BYOD Security ChallengesLost or stolen mobile devicesMobile vulnerabilities on the riseAbuse of mobile paymentMobile application-based threatsMobile web-based threatsSource BYOD and Top 5 Network Security Threats for 2012
  42. 42. 42CIO has a big responsibility…Source:BYOD (Bring Your Own Device)Randy Gower – Good Technology
  43. 43. 431. Lost or Stolen Mobile Devices•Mobile devices are the fastest growing consumertechnology– Worldwide unit sales 300m in 2010, to 650m in 2012.– Mobile applications are likewise booming•Mobile Apps / Mobile Web Browsing– Mobile Apps, 81 minutes– Mobile Web Browsing, 74 minutes•Impact– Sensitive personal information or corporate intellectual propertymay get compromisedSource BYOD and Top 5 Network Security Threats for 2012
  44. 44. 442. Mobile Vulnerabilities on the RiseSource BYOD and Top 5 Network Security Threats for 2012•Increased by 93% in 2011•Reinventing existing malware formobile devices•Creating mobile-specific malware•Impact– Designed for activities including datacollection, the sending of content, and usertracking
  45. 45. 453. Abuse of Mobile PaymentsSource BYOD and Top 5 Network Security Threats for 2012•Mobile payments target for mobile threats•Mobile payment transactions– $170 billion in 2010– $630 billion by 2014•Vendors, retailers, merchants, content providers, mobileoperators, and banks are all actively establishing newpayment services•Impact– Mobile payments create an attractive target for attackers w/directmonetization of attacks.
  46. 46. 464. Mobile Application-Based ThreatsSource BYOD and Top 5 Network Security Threats for 2012•Malware– Making charges to the user’s phone bill– Sending unsolicited messages to the user’s contact list•Spyware– Text messages, Email– Location– Browser history– Contact list– Camera pictures•Impact– Steal personal information from a mobile device that could result in identitytheft, financial fraud, or intrusion
  47. 47. 475. Mobile Web-Based ThreatsSource BYOD and Top 5 Network Security Threats for 2012•Phishing Scams– Use web pages or other user interfaces designed to trick a user into providinginformation•Drive-By Downloads– Automatically begin downloading an application when a user visits a web page•Browser exploits– Are designed to take advantage of vulnerabilities in a web browser or software thatcan be launched via a web browser such as a Flash player, PDF reader, or imageviewer.•Wi-Fi Sniffing– Data intercepted by anyone listening across an unsecured local wireless network•Impact– Unauthorized access, data theft, identify theft
  48. 48. 48Risk in mobile environmentSource:BYOD (Bring Your Own Device)Randy Gower – Good Technology
  49. 49. 49Managing Risk inBYODSource BYOD and Top 5 Network Security Threats for 2012
  50. 50. 5010 Steps to a secure mobile strategySource The 10 Steps to a Secure BYOD Strategy: Bradford Networks
  51. 51. 51Source Whats your Enterprise Appstore: Partnerpedia
  52. 52. 52Enterprise App Store
  53. 53. 53Application Stores
  54. 54. 54“Q1 2013, four leading storeshit 13.4 billion downloads, with revenue of $2.2 billion”Canalys, April 2013
  55. 55. 55
  56. 56. 5610 Steps to a secure mobile strategySource The 10 Steps to a Secure BYOD Strategy: Bradford Networks
  57. 57. 57Public App Stores : IssueLack of business focusLack of volume purchasingSecurity issues
  58. 58. 58“An enterprise app store is a web portal throughwhich end users can access, downloadand install corporate-approved software applications.”Enterprise App Store: Definition
  59. 59. 59Enterprise App StoreSource The Enterprise Appstore: Appear
  60. 60. 60Why Enterprise App Store?Distribution and Deployment SupportPolicy EnforcementApp Improvement and Tool SetDevelopmentBranding and User SatisfactionLicense Management
  61. 61. 61“By 2014, 60% of IT organization will deployprivate app stores”Gartner
  62. 62. 62Enterprise App Store Solution: Example
  63. 63. 63Mobile DeviceManagement
  64. 64. 64The Burden ThreatsCredit: ChaiyakornApiwathanokul, S-Generation
  65. 65. 65Why MDM?Source: John Rhoton, HPSecure: Ensure integrity of configurationHigher ease-of-useDeploying LOB applicationsLower TCO
  66. 66. 66Key RequirementsCredit: ChaiyakornApiwathanokul, S-GenerationLet users get access to dataGive the enterprise controlSecure sensitive dataIntegrate with the enterpriseHelp me solve the “Dropbox” issueLet us claw back sensitive data.. and dont muck with the user experience
  67. 67. 67Key RequirementsCredit: ChaiyakornApiwathanokul, S-GenerationGrant app acess one by one (no VPN free-for-all)Secure critical apps end-to-endProtect my network from bad appsEnsure and audit my transactionEnsure app performance and QoS
  68. 68. 68End-to-End simplifiedMobile security frameworkCredit: ChaiyakornApiwathanokul, S-Generation
  69. 69. 69MDM ArchitectureSource: [X] Cube LABS
  70. 70. 70When MDM is required?
  71. 71. 71Thank youthanachart@imcinstitute.comwww.imcinstitute.comwww.facebook.com/imcinstitutewww.slideshare.net/imcinstitute

×