2. Mobile working has come
a very long way in a very
short time.
Your people aren’t just
using mobile devices at
work, they’re using them
to work. And it’s great for
your business.
3. What isn’t so great is the risk
that all this mobile working
exposes your company to.
Or the strain that managing
and maintaining an ever
growing volume of devices,
apps and content places
on IT.
4. What isn’t so great is the risk
that all this mobile working
exposes your company to.
Or the strain that managing
and maintaining an ever
growing volume of devices,
apps and content places
on IT.
That’s where Enterprise
Mobility Management
comes in.
14. This is Josh,
the founder and CEO
of JoshCo Inc.
WhateveritisJoshCodoes,theydoit
brilliantly,growingto300employees,
andjustasmanymobiledevicesin
underthreeyears.
Happily, Josh has already appointed
his old friend Tim to be Overlord of IT.
(The power to choose his own job
title was non-negotiable.)
15. Level One
Not long after Tim’s arrival, Josh leaves his
smartphone on the back seat of a taxicab,
its memory brimming with sensitive,
unencrypted files.
For two, interminable hours, panic reigns.
Just as the hysteria reaches its full height,
a kindly cab driver appears, smartphone
in hand, back at JoshCo HQ.
1
16. Level One
In the days following the scare, Tim
suggests that JoshCo steps up to the first
level of enterprise mobility management,
and invests in MDM.
MDM lets him secure, manage and monitor
all the company’s smartphones, tablets,
and even laptops, from his desk.
1
17. Level One
He’s now able to do essential things like:
• Quickly enroll devices into the
business environment
• Update device settings over-the-air
• Enforce security policies and compliance
1
18. MDM is fine for device-level security and
management. But it’s not very fine-grained.
Because it secures and manages the entire
device, users don’t always like MDM.
They can’t separate their personal apps
and content from the sensitive, corporate
stuff. So the company ends up being
liable for the whole thing.
Might be time for another level of
mobile management…
19. Level Two
A few weeks later, Josh falls in love.
With a tablet.
Within a day, they’re utterly inseparable.
He starts bringing it to board meetings,
and suggesting everyone else does
the same with their own personal tech.
2
20. Level Two
Tim nods and smiles.
And shudders inwardly.
He sees his precious network become
prey to all manner of shadowy devices
and threats.
He pales, visibly, at the thought of corporate
and personal data mingling on a hundred
tablets, and the security and privacy
minefield that lies ahead.
2
21. Level Two
Bring on the Secure Workspaces
Rather than rain on Josh’s parade,
or fully commit to a nervous breakdown,
Tim proposes to add a second level of
enterprise mobility management.
He suggests a secure workspace solution
to separate out the business apps from
the personal, and give him the power
to manage them independently.
2
22. Soon, Tim is back at the top of his game,
revelling in his new ability to:
• Separate personal and corporate data
on everyone’s devices
• Manage devices, policies and profiles
based on ownership type
And the users all love that there’s separation
between the personal and the corporate
sides of their devices.
23. Level Three
Then, Josh falls
in love again.
This time, it’s with a new productivity app
he read about in Wired.
He emails everyone in the company to tell
them just how great it is, and how they all
need to start using it ASAP.
3
24. Level Three
Two weeks later, there’s a security breach.
Josh’s new beloved app has been storing
his username and password on his
smartphone.
An opportunist hacker has swiped the
phone in a cafe, and since Josh uses
the same password for everything,
used the information to break into
JoshCo’s customer database.
3
26. Level Three
Tim leaps into action.
He sources and deploys a Mobile
Application Management solution.
With this third level of mobile security in
place, he’s able to scan apps for common
risks, apply additional security if needed,
and then automatically distribute updates
to all devices.
3
27. He’s also able to:
• Block or restrict apps as necessary
• ‘Wrap’ public and third-party apps
for additional security
• Use special software development tools
to build new apps, with advanced security
• Create JoshCo’s own, secure, enterprise
app store
Users love how quickly they can download
their chosen apps from the company app
store, and that the IT department doesn’t
have to worry about Angry Birds or all
those weird and wacky personal apps.
28. Level Four
Still reeling from the recent breach,
Josh asks Tim to comprehensively audit
enterprise mobility management at JoshCo.
Tim looks at the types of content people
are viewing on their mobile devices, how
they’re sharing files, and how they’re
accessing corporate data.
And he’s not at all happy with what he finds.
4
29. Level Four
He puts in place a state-of-the-art Mobile
Content Management solution, and JoshCo
finally achieves all four levels of enterprise
mobility management.
The solution keeps the organization’s
sensitive content — financial reports, sales
materials etc. — in the same, safe place.
It also protects any piece of content in a
security layer that can apply policy, in as
granular a way as needed (by role, by app,
by date, by file type…).
4
30. Tim gets to relax, a little, knowing:
• Documents can be encrypted
• He can restrict offline viewing, and even
copy and paste capabilities
• He’s got a full set of document analytics
And authorized users get secure, real-time
access to critical content through whatever
device they’ve got to hand, with no sacrifice
on the security front.
33. Well… everyone’s mobility
management story is different.
Your organization may have leapt
to level two, and instituted a secure
workspace solution without MDM.
Or, you may have tackled your
concerns around content sharing,
but not even considered the risks
of mobile application use.
34. Not sure where to start?
Sprint Business can help you level
up all aspects of your enterprise
mobility management, whatever
your story so far.
35. Our Enterprise Mobility
Management solutions
support:
• Nearly every kind of mobile device —
phones, tablets, laptops, rugged devices
• Windows, iOS, Android and BlackBerry
mobile platforms
• Various types of deployment — corporate
owned, line of business, BYOD
• All levels of Mobile Security and
Management, from MDM through full
content management
36. Let’stalk
Wherever you are on your enterprise
mobility management journey, we
can help — and, frankly, we’d love to.
If that sounds like it might work
for you, we should talk. Give us
a call on 1-877-633-1102 or visit
sprint.com/business