SlideShare a Scribd company logo
Creating a supportable and flexible
IT solution for the post-PC era
Jon Miller
Mobile strategist
@JonMillerUK
What this session will cover

What do we mean by post-PC era?
Enterprise Mobility Management
What do all the acronyms mean?

Offering a corporate mobile solution through MDM
Offering greater flexibility through BYOD and MAM
Supporting the solution
Questions
About me

Mobile strategist and speaker on all
things mobile
Head of Mobility for a division of
Transport for London
iOS developer and hacker
What is the post-PC era?

Category

2012 unit
shipments

2012 market
share

2017 unit
shipments

2017 market
share

2012-2017
growth

Desktop PC

148.4m

12.4%

141.0m

6.0%

-5.0%

Portable PC

202.0m

16.8%

240.9m

11.0%

19.3%

Tablet

128.3m

10.7%

352.3m

16.0%

174.5%

Smartphone

722.4m

60.1%

1516.0m

67.0%

109.9%

TOTAL

1201.1m

100%

2250.3m

100.0%

87.3%

Research firm, IDC’s worldwide Smart Connected Device Tracker Forecast data, Feb 28 2013
Enterprise Mobility Management
Enterprise Mobility Management
What do all the acronyms mean?
MAM
MEM

MIM
MDM
MCM

VPN
BYOD
Mobile is your most personal
interaction with IT and technology
What do users really want?
What do users really want?
What do users really want?
“Simple can be harder than complex:
You have to work hard to get your
thinking clean to make it simple. But
it’s worth it in the end because once
you get there, you can move
mountains”
Steve Jobs
Pick a platform
Pick a platform
1%
3%

3%

14%

Android
iOS
Microsoft
BlackBerry
Other

79%

Gartner (August 2013)
Fragmentation

31%
Honeycomb and below

49%

Ice Cream Sandwich

20%

Jelly Bean

October 2013
Fragmentation

4%
27%
iOS 5 and below
iOS 6
69%

iOS 7

October 2013
Mobile Device Management

Free as part of Microsoft Exchange
Provides basic MDM capabilities like
device wipe, enforcing PIN code and
encryption
Industry standard so pretty much built
into every device type
MDM: Apple vs Android

Apple

Android

Consistent across all devices
Easy to create an end-to-end
configuration deployed over
the air
Deeply integrated into the OS
so can create very granular
configurations

Vary depending on vendor
Profiles are not joined up so
can’t deploy a zero touch
configuration
MDM is a layer on top of the
OS so challenging to create
something simple out of
complex requirements
Mobile Device Management

EMM
Mobile Device Management

EMM
Enterprise integration

EMM

EMM
Enterprise integration

EMM

EMM
What does all this mean?
Security and lock down
Security and lock down
Mobile Application Management

EMM
Why is MAM important?

Focus on the data and not the device – more granular
Capabilities across devices are essentially equal
BYOD solution doesn’t need to be different to the
corporate one
Fewer factors to worry about
Layers of complexity are greatly reduced
Why is MAM important?

Any device
Any owner
Any service
Anywhere
Supporting the solution

Cloud-based EMM is key
No infrastructure to support
Support for new devices and
software is devolved to
vendors
Easy to get up and running
Cheap

EMM
Supporting the solution

Devices
Streamline your offering if you
are providing devices
Keep the solution as open as
possible so that users can
support themselves
Supporting the solution

Enterprise integration
Backend data and systems
shouldn’t need any additional
support
If using certificates as part of
MDM profile need robust
management process
Custom apps introduce new
challenges
Supporting the solution
Ideas to take away

Simplicity is the ultimate sophistication
Don’t be afraid of the technology and the jargon – start with something basic
and expand
If you are focused on one device platform corporately it is easy to extend the
mobile solution to other platforms to enable BYOD and create flexibility in the
future
Don’t fall into the traps of applying old ways of thinking to new ways of
working
Always put your users first – if you cripple their mobile experience you will
never succeed so think hard about why you make the choices you do
Questions?

jonmiller@outlook.com
@JonMillerUK
http://www.linkedin.com/in/jonmilleruk

More Related Content

What's hot

IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
Camilo Fandiño Gómez
 
airwatchexpress_infographic(2)
airwatchexpress_infographic(2)airwatchexpress_infographic(2)
airwatchexpress_infographic(2)
Bridgette Springer
 
Application Strategies for the Connected Enterprise
Application Strategies for the Connected EnterpriseApplication Strategies for the Connected Enterprise
Application Strategies for the Connected Enterprise
Samsung Business USA
 
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
InsightInnovation
 
Competing Against Free
Competing Against FreeCompeting Against Free
Competing Against Free
Sameer Mathur
 
Get Smart About Business Continuity
Get Smart About Business ContinuityGet Smart About Business Continuity
Get Smart About Business Continuity
InteractiveNEC
 
"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slides"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slides
NetDimensions
 
A Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner SessionA Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner Session
Samsung Business USA
 
Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013
Chuck Goldman
 
7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10
AGILLY
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
Enterprise Mobility
Enterprise MobilityEnterprise Mobility
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Citrix
 

What's hot (13)

IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
airwatchexpress_infographic(2)
airwatchexpress_infographic(2)airwatchexpress_infographic(2)
airwatchexpress_infographic(2)
 
Application Strategies for the Connected Enterprise
Application Strategies for the Connected EnterpriseApplication Strategies for the Connected Enterprise
Application Strategies for the Connected Enterprise
 
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
Visual Attention in the Blink of an Eye: Applying Years of Vision Science to ...
 
Competing Against Free
Competing Against FreeCompeting Against Free
Competing Against Free
 
Get Smart About Business Continuity
Get Smart About Business ContinuityGet Smart About Business Continuity
Get Smart About Business Continuity
 
"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slides"Transforming your learning strategy with a mobile LMS" - presentation slides
"Transforming your learning strategy with a mobile LMS" - presentation slides
 
A Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner SessionA Mobile First Strategy Gartner Session
A Mobile First Strategy Gartner Session
 
Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013
 
7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Enterprise Mobility
Enterprise MobilityEnterprise Mobility
Enterprise Mobility
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 

Similar to Bright talk webinar 10 10-13

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Graham Chalk
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
MobileWorxs
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alle
Microsoft
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Logicalis
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
Logicalis
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
Satya Harish
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
Affle mTraction Enterprise
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
Aldo Pietropaolo
 
SITB110: The Workspace of 2020
SITB110: The Workspace of 2020SITB110: The Workspace of 2020
SITB110: The Workspace of 2020
Ivanti
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Enterprise Mobile
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
Softchoice Corporation
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
CA API Management
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
jasonlan
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
Graham Chalk
 
Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1
momobangalore
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
CincoC
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Wheatstone
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
42Gears Mobility Systems
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
DevConFu
 

Similar to Bright talk webinar 10 10-13 (20)

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alle
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
SITB110: The Workspace of 2020
SITB110: The Workspace of 2020SITB110: The Workspace of 2020
SITB110: The Workspace of 2020
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1Mob Dev Conf Enterprise Apps 0 1
Mob Dev Conf Enterprise Apps 0 1
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 

Bright talk webinar 10 10-13

Editor's Notes

  1. So many vendors and products to choose from
  2. Gartner Magic Quadrant for MDM providers is a really good place to start looking
  3. Best way to keep it simple is to concentrate on one platform and get it rightApple iOS and Android are the main players here with Blackberry becoming increasingly less relevant and Microsoft not yet making that big a dent
  4. Android has by far the greatest market share. However, from corporate perspective, need to think about this differently
  5. Bear in mind that Honeycomb was released Feb 2011 – so around a third of Android devices are running a version over 2.5 years old!
  6. Bear in mind that iOS7 was released to the public only three weeks ago!This is great from the security perspective – people want to update so it’s easy to get devices patched when vulnerabilities are publicAlso you can have many device categories but only need to create one set of device configurations and policies
  7. In its simplest form can be up and running in next to no time
  8. In its simplest form can be up and running in next to no time
  9. In its simplest form can be up and running in next to no time
  10. If you lock things down too much and make the experience compromised or hard to understand then users won’t know which way to turn and will not accept it
  11. Email containerised into a secure appMost mobility management vendors provide containerised web browsers and document viewersAlso provide SDKs and App wrapping which mean you can containerise your own appsTraffic from these is then securely tunneled back to your secure corporate dataSecurity and policy is thus managed at the app levelEnterprise integration for EMM cloud essential
  12. Device thus becomes unimportant – as long as you can deliver the data securely to the device it doesn’t matter what it isBecause it doesn’t matter what the device is then doesn’t even need to belong to the companySeparates work from personalIn this model you are not having to implement complex security profiles for devices or certificates for VPN etc so no need to manage those areas
  13. Keep everything simple and you don’t need an army to support it (e.g. I have 1 FTE supporting 1500 devices in a 24/7 organisation)
  14. Mobile moves fast so be part of it rather than waiting for it to happen to you