SlideShare a Scribd company logo
1 of 36
Download to read offline
ThefourlevelsofEnterprise
MobilityManagement
Why Mobile Device Management is only the
beginning, and where you can go from here
Enterprise Mobility Management
Mobile working has come
a very long way in a very
short time.
Your people aren’t just
using mobile devices at
work, they’re using them
to work. And it’s great for
your business.
What isn’t so great is the risk
that all this mobile working
exposes your company to.
Or the strain that managing
and maintaining an ever
growing volume of devices,
apps and content places
on IT.
What isn’t so great is the risk
that all this mobile working
exposes your company to.
Or the strain that managing
and maintaining an ever
growing volume of devices,
apps and content places
on IT.
That’s where Enterprise
Mobility Management
comes in.
Butaswe’llsee,Enterprise
MobilityManagement
hasmanyflavors,and
manylevelsofprotection
andcontrol.
Butaswe’llsee,Enterprise
MobilityManagement
hasmanyflavors,and
manylevelsofprotection
andcontrol.
Here’satypicalprogression...
Nosecurityatall
(the‘crossfingersandpray’approach)
0
Nosecurityatall
(the‘crossfingersandpray’approach)
MobileDeviceManagement(MDM)
1
Nosecurityatall
(the‘crossfingersandpray’approach)
MobileDeviceManagement(MDM)
SecureWorkspaces
2
Nosecurityatall
(the‘crossfingersandpray’approach)
MobileDeviceManagement(MDM)
SecureWorkspaces
MobileApplicationManagement
3
Nosecurityatall
(the‘crossfingersandpray’approach)
MobileDeviceManagement(MDM)
SecureWorkspaces
MobileApplicationManagement
MobileContentManagement
4
Chancesare,youhaven’t
thoughtaboutthelastfour.
Andyoureallyneedto.
Chancesare,youhaven’t
thoughtaboutthelastfour.
Andyoureallyneedto.
Why?
We’llexplainwithastory...
This is Josh,
the founder and CEO
of JoshCo Inc.
WhateveritisJoshCodoes,theydoit
brilliantly,growingto300employees,
andjustasmanymobiledevicesin
underthreeyears.
Happily, Josh has already appointed
his old friend Tim to be Overlord of IT.
(The power to choose his own job
title was non-negotiable.)
Level One
Not long after Tim’s arrival, Josh leaves his
smartphone on the back seat of a taxicab,
its memory brimming with sensitive,
unencrypted files.
For two, interminable hours, panic reigns.
Just as the hysteria reaches its full height,
a kindly cab driver appears, smartphone
in hand, back at JoshCo HQ.
1
Level One
In the days following the scare, Tim
suggests that JoshCo steps up to the first
level of enterprise mobility management,
and invests in MDM.
MDM lets him secure, manage and monitor
all the company’s smartphones, tablets,
and even laptops, from his desk.
1
Level One
He’s now able to do essential things like:
•	 Quickly enroll devices into the
business environment
•	 Update device settings over-the-air
•	 Enforce security policies and compliance
1
MDM is fine for device-level security and
management. But it’s not very fine-grained.
Because it secures and manages the entire
device, users don’t always like MDM.
They can’t separate their personal apps
and content from the sensitive, corporate
stuff. So the company ends up being
liable for the whole thing.
Might be time for another level of
mobile management…
Level Two
A few weeks later, Josh falls in love.
With a tablet.
Within a day, they’re utterly inseparable.
He starts bringing it to board meetings,
and suggesting everyone else does
the same with their own personal tech.
2
Level Two
Tim nods and smiles.
And shudders inwardly.
He sees his precious network become
prey to all manner of shadowy devices
and threats.
He pales, visibly, at the thought of corporate
and personal data mingling on a hundred
tablets, and the security and privacy
minefield that lies ahead.
2
Level Two
Bring on the Secure Workspaces
Rather than rain on Josh’s parade,
or fully commit to a nervous breakdown,
Tim proposes to add a second level of
enterprise mobility management.
He suggests a secure workspace solution
to separate out the business apps from
the personal, and give him the power
to manage them independently.
2
Soon, Tim is back at the top of his game,
revelling in his new ability to:
•	 Separate personal and corporate data
on everyone’s devices
•	 Manage devices, policies and profiles
based on ownership type
And the users all love that there’s separation
between the personal and the corporate
sides of their devices.
Level Three
Then, Josh falls
in love again.
This time, it’s with a new productivity app
he read about in Wired.
He emails everyone in the company to tell
them just how great it is, and how they all
need to start using it ASAP.
3
Level Three
Two weeks later, there’s a security breach.
Josh’s new beloved app has been storing
his username and password on his
smartphone.
An opportunist hacker has swiped the
phone in a cafe, and since Josh uses
the same password for everything,
used the information to break into
JoshCo’s customer database.
3
EnterMobile
Application
Management.
Level Three
Tim leaps into action.
He sources and deploys a Mobile
Application Management solution.
With this third level of mobile security in
place, he’s able to scan apps for common
risks, apply additional security if needed,
and then automatically distribute updates
to all devices.
3
He’s also able to:
•	 Block or restrict apps as necessary
•	 ‘Wrap’ public and third-party apps
for additional security
•	 Use special software development tools
to build new apps, with advanced security
•	 Create JoshCo’s own, secure, enterprise
app store
Users love how quickly they can download
their chosen apps from the company app
store, and that the IT department doesn’t
have to worry about Angry Birds or all
those weird and wacky personal apps.
Level Four
Still reeling from the recent breach,
Josh asks Tim to comprehensively audit
enterprise mobility management at JoshCo.
Tim looks at the types of content people
are viewing on their mobile devices, how
they’re sharing files, and how they’re
accessing corporate data.
And he’s not at all happy with what he finds.
4
Level Four
He puts in place a state-of-the-art Mobile
Content Management solution, and JoshCo
finally achieves all four levels of enterprise
mobility management.
The solution keeps the organization’s
sensitive content — financial reports, sales
materials etc. — in the same, safe place.
It also protects any piece of content in a
security layer that can apply policy, in as
granular a way as needed (by role, by app,
by date, by file type…).
4
Tim gets to relax, a little, knowing:
•	 Documents can be encrypted
•	 He can restrict offline viewing, and even
copy and paste capabilities
•	 He’s got a full set of document analytics
And authorized users get secure, real-time
access to critical content through whatever
device they’ve got to hand, with no sacrifice
on the security front.
ButenoughaboutJoshCo.
Let’stalkaboutyou.
ButenoughaboutJoshCo.
Let’stalkaboutyou.
Whatdoyouneedtodoto
protectyourorganization?
Well… everyone’s mobility
management story is different.
Your organization may have leapt
to level two, and instituted a secure
workspace solution without MDM.
Or, you may have tackled your
concerns around content sharing,
but not even considered the risks
of mobile application use.
Not sure where to start?
Sprint Business can help you level
up all aspects of your enterprise
mobility management, whatever
your story so far.
Our Enterprise Mobility
Management solutions
support:
•	 Nearly every kind of mobile device —
phones, tablets, laptops, rugged devices
•	 Windows, iOS, Android and BlackBerry
mobile platforms
•	 Various types of deployment — corporate
owned, line of business, BYOD
•	 All levels of Mobile Security and
Management, from MDM through full
content management
Let’stalk
Wherever you are on your enterprise
mobility management journey, we
can help — and, frankly, we’d love to.
If that sounds like it might work
for you, we should talk. Give us
a call on 1-877-633-1102 or visit
sprint.com/business

More Related Content

What's hot

The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Symantec
 
State of Missouri ForeScout Case Study
State of Missouri ForeScout Case StudyState of Missouri ForeScout Case Study
State of Missouri ForeScout Case StudyAustin Maccherola
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology SummitCarahsoft
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSSoftchoice Corporation
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 

What's hot (20)

The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Patch management
Patch managementPatch management
Patch management
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
State of Missouri ForeScout Case Study
State of Missouri ForeScout Case StudyState of Missouri ForeScout Case Study
State of Missouri ForeScout Case Study
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 

Similar to Enterprise Mobility Management

how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Mobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementMobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementSoftweb Solutions
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceRihab Chebbah
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppEric Zhuo
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 

Similar to Enterprise Mobility Management (20)

how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Mobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementMobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise management
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 

More from Sprint Business

Spr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 awSpr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 awSprint Business
 
5 simple things that will make your fleet smarter
5 simple things that will make your fleet smarter5 simple things that will make your fleet smarter
5 simple things that will make your fleet smarterSprint Business
 
Sprint business the truth about enterprise access
Sprint business the truth about enterprise accessSprint business the truth about enterprise access
Sprint business the truth about enterprise accessSprint Business
 
The Certainty design model in action
The Certainty design model in actionThe Certainty design model in action
The Certainty design model in actionSprint Business
 
A Tale of Three Smart Cities
A Tale of Three Smart Cities A Tale of Three Smart Cities
A Tale of Three Smart Cities Sprint Business
 
The true impact of tech in schools
The true impact of tech in schoolsThe true impact of tech in schools
The true impact of tech in schoolsSprint Business
 
Serving those who serve - Public Safety
Serving those who serve - Public Safety Serving those who serve - Public Safety
Serving those who serve - Public Safety Sprint Business
 
The Internet of Things is already changing businesses
The Internet of Things is already changing businessesThe Internet of Things is already changing businesses
The Internet of Things is already changing businessesSprint Business
 
Sprint Business Secure WiFi SlideShare
Sprint Business Secure WiFi SlideShareSprint Business Secure WiFi SlideShare
Sprint Business Secure WiFi SlideShareSprint Business
 
Getting information from the field, fast
Getting information from the field, fastGetting information from the field, fast
Getting information from the field, fastSprint Business
 
Why nobody likes IT Slideshare
Why nobody likes IT SlideshareWhy nobody likes IT Slideshare
Why nobody likes IT SlideshareSprint Business
 
A Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of ThingsA Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of ThingsSprint Business
 

More from Sprint Business (16)

Spr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 awSpr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 aw
 
5 simple things that will make your fleet smarter
5 simple things that will make your fleet smarter5 simple things that will make your fleet smarter
5 simple things that will make your fleet smarter
 
Sprint business the truth about enterprise access
Sprint business the truth about enterprise accessSprint business the truth about enterprise access
Sprint business the truth about enterprise access
 
The Certainty design model in action
The Certainty design model in actionThe Certainty design model in action
The Certainty design model in action
 
Emergency management
Emergency management Emergency management
Emergency management
 
A Tale of Three Smart Cities
A Tale of Three Smart Cities A Tale of Three Smart Cities
A Tale of Three Smart Cities
 
The true impact of tech in schools
The true impact of tech in schoolsThe true impact of tech in schools
The true impact of tech in schools
 
Serving those who serve - Public Safety
Serving those who serve - Public Safety Serving those who serve - Public Safety
Serving those who serve - Public Safety
 
The Internet of Things is already changing businesses
The Internet of Things is already changing businessesThe Internet of Things is already changing businesses
The Internet of Things is already changing businesses
 
Sprint Business Secure WiFi SlideShare
Sprint Business Secure WiFi SlideShareSprint Business Secure WiFi SlideShare
Sprint Business Secure WiFi SlideShare
 
The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
Getting information from the field, fast
Getting information from the field, fastGetting information from the field, fast
Getting information from the field, fast
 
Why nobody likes IT Slideshare
Why nobody likes IT SlideshareWhy nobody likes IT Slideshare
Why nobody likes IT Slideshare
 
MultiLine SlideShare
MultiLine SlideShareMultiLine SlideShare
MultiLine SlideShare
 
Stop Buying Tech
Stop Buying TechStop Buying Tech
Stop Buying Tech
 
A Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of ThingsA Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of Things
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Enterprise Mobility Management

  • 1. ThefourlevelsofEnterprise MobilityManagement Why Mobile Device Management is only the beginning, and where you can go from here Enterprise Mobility Management
  • 2. Mobile working has come a very long way in a very short time. Your people aren’t just using mobile devices at work, they’re using them to work. And it’s great for your business.
  • 3. What isn’t so great is the risk that all this mobile working exposes your company to. Or the strain that managing and maintaining an ever growing volume of devices, apps and content places on IT.
  • 4. What isn’t so great is the risk that all this mobile working exposes your company to. Or the strain that managing and maintaining an ever growing volume of devices, apps and content places on IT. That’s where Enterprise Mobility Management comes in.
  • 14. This is Josh, the founder and CEO of JoshCo Inc. WhateveritisJoshCodoes,theydoit brilliantly,growingto300employees, andjustasmanymobiledevicesin underthreeyears. Happily, Josh has already appointed his old friend Tim to be Overlord of IT. (The power to choose his own job title was non-negotiable.)
  • 15. Level One Not long after Tim’s arrival, Josh leaves his smartphone on the back seat of a taxicab, its memory brimming with sensitive, unencrypted files. For two, interminable hours, panic reigns. Just as the hysteria reaches its full height, a kindly cab driver appears, smartphone in hand, back at JoshCo HQ. 1
  • 16. Level One In the days following the scare, Tim suggests that JoshCo steps up to the first level of enterprise mobility management, and invests in MDM. MDM lets him secure, manage and monitor all the company’s smartphones, tablets, and even laptops, from his desk. 1
  • 17. Level One He’s now able to do essential things like: • Quickly enroll devices into the business environment • Update device settings over-the-air • Enforce security policies and compliance 1
  • 18. MDM is fine for device-level security and management. But it’s not very fine-grained. Because it secures and manages the entire device, users don’t always like MDM. They can’t separate their personal apps and content from the sensitive, corporate stuff. So the company ends up being liable for the whole thing. Might be time for another level of mobile management…
  • 19. Level Two A few weeks later, Josh falls in love. With a tablet. Within a day, they’re utterly inseparable. He starts bringing it to board meetings, and suggesting everyone else does the same with their own personal tech. 2
  • 20. Level Two Tim nods and smiles. And shudders inwardly. He sees his precious network become prey to all manner of shadowy devices and threats. He pales, visibly, at the thought of corporate and personal data mingling on a hundred tablets, and the security and privacy minefield that lies ahead. 2
  • 21. Level Two Bring on the Secure Workspaces Rather than rain on Josh’s parade, or fully commit to a nervous breakdown, Tim proposes to add a second level of enterprise mobility management. He suggests a secure workspace solution to separate out the business apps from the personal, and give him the power to manage them independently. 2
  • 22. Soon, Tim is back at the top of his game, revelling in his new ability to: • Separate personal and corporate data on everyone’s devices • Manage devices, policies and profiles based on ownership type And the users all love that there’s separation between the personal and the corporate sides of their devices.
  • 23. Level Three Then, Josh falls in love again. This time, it’s with a new productivity app he read about in Wired. He emails everyone in the company to tell them just how great it is, and how they all need to start using it ASAP. 3
  • 24. Level Three Two weeks later, there’s a security breach. Josh’s new beloved app has been storing his username and password on his smartphone. An opportunist hacker has swiped the phone in a cafe, and since Josh uses the same password for everything, used the information to break into JoshCo’s customer database. 3
  • 26. Level Three Tim leaps into action. He sources and deploys a Mobile Application Management solution. With this third level of mobile security in place, he’s able to scan apps for common risks, apply additional security if needed, and then automatically distribute updates to all devices. 3
  • 27. He’s also able to: • Block or restrict apps as necessary • ‘Wrap’ public and third-party apps for additional security • Use special software development tools to build new apps, with advanced security • Create JoshCo’s own, secure, enterprise app store Users love how quickly they can download their chosen apps from the company app store, and that the IT department doesn’t have to worry about Angry Birds or all those weird and wacky personal apps.
  • 28. Level Four Still reeling from the recent breach, Josh asks Tim to comprehensively audit enterprise mobility management at JoshCo. Tim looks at the types of content people are viewing on their mobile devices, how they’re sharing files, and how they’re accessing corporate data. And he’s not at all happy with what he finds. 4
  • 29. Level Four He puts in place a state-of-the-art Mobile Content Management solution, and JoshCo finally achieves all four levels of enterprise mobility management. The solution keeps the organization’s sensitive content — financial reports, sales materials etc. — in the same, safe place. It also protects any piece of content in a security layer that can apply policy, in as granular a way as needed (by role, by app, by date, by file type…). 4
  • 30. Tim gets to relax, a little, knowing: • Documents can be encrypted • He can restrict offline viewing, and even copy and paste capabilities • He’s got a full set of document analytics And authorized users get secure, real-time access to critical content through whatever device they’ve got to hand, with no sacrifice on the security front.
  • 33. Well… everyone’s mobility management story is different. Your organization may have leapt to level two, and instituted a secure workspace solution without MDM. Or, you may have tackled your concerns around content sharing, but not even considered the risks of mobile application use.
  • 34. Not sure where to start? Sprint Business can help you level up all aspects of your enterprise mobility management, whatever your story so far.
  • 35. Our Enterprise Mobility Management solutions support: • Nearly every kind of mobile device — phones, tablets, laptops, rugged devices • Windows, iOS, Android and BlackBerry mobile platforms • Various types of deployment — corporate owned, line of business, BYOD • All levels of Mobile Security and Management, from MDM through full content management
  • 36. Let’stalk Wherever you are on your enterprise mobility management journey, we can help — and, frankly, we’d love to. If that sounds like it might work for you, we should talk. Give us a call on 1-877-633-1102 or visit sprint.com/business