SlideShare a Scribd company logo
ENTERPRISE MOBILITY
MANAGEMENT AND ITS
CHALLENGES
An Academic presentation by
Dr. Nancy Agens, Head, Technical Operations,
Phdassistance Group www.phdassistance.com
Email: info@phdassistance.com
TODAY'S DISCUSSION
Outline Introduction
Stages of Enterprise Mobility Management
Enterprise Policies
Device Strategies
Challenges for Implementing Enterprise Mobility Management
Introduction
There are various management schemes for managing the devices and one of the
most popular schemes is Enterprise Mobility Management (EMM).
This scheme includes several mobile solutions including the solutions for mobile
data to voice plans and mobile applications.
Thus it has been asserted that EMM can be envisioned as an inseparable part of
enterprise mobility ecosystem.
EMM augments the productivity of users consequently proving to be more beneficial for
the enterprises
EMM includes Mobile Content Management, Mobile Billing Management, Mobile Device
Management, Mobile Application Management etc.
Stages of Enterprise Mobility Management
There are primarily three main stages of enterprise mobility management.
PLANNING/STRATEGIES FORMULATION:
The essential step of enterprise mobility management is to define or plan suitable
enterprise policies that emphasize on security and management of the devices.
PRODUCT/SOLUTION:
As per the type of business of an enterprise, they employ a suitable catalyst for
designing their products.
PRODUCT/SERVICE MANAGEMENT:
Finally, after planning, designing and implementing the strategies, management of the
products is considered.
Contd..
Figure 1: Stages of
enterprise mobility
management
Figure 2: Enterprise
mobility management
Enterprise Policies
Before delivering any product enterprise formulates different policies which are of
paramount significance as far as security management is concerned.
Some of the popular security mechanisms are:
Data encryption support
Secure communication protocol
These security mechanisms can be enabled through the following ways:
Firewall protection
Implementing password
Virtual private network etc.
Device Strategies
1. BRING YOUR OWN DEVICE (BYOD):
The users are allowed to bring their personal devices for enterprise applications.
The enterprises need to implement well defined policies and security management.
2. CHOOSE YOUR OWN DEVICE (CYOD):
This approach enables the users to use their tools that are permitted by the enterprises.
Similar to BYOD the approach also requires well- defined security mechanisms.
3. CORPORATE OWNED PERSONALLY ENABLED DEVICE (COPE):
This strategy is generally preferred by the enterprises due to higher data and information
security offered by it to the enterprises.
Challenges on Implementing Enterprise
Mobility Management
1. FRAGMENTATION:
The BYOD policy should clearly define what can be done with the device as far as the
applications and information of enterprise are concerned.
Mobility management has been perceived as one of the most common challenges of
current enterprises.
2. Integration:
To make EMM successful, it is necessary that different enterprises and mobility solutions
should be combined which is a complex process.
Contd..
Though integration of devices would facilitate proper sharing of critical data, it would
also increase the complexity and cost.
3. LIFECYCLE MANAGEMENT:
Managing the lifecycle of applications and devices has been described as one of
the most significant challenges for enterprises.
A broad mobility lifecycle can bring organization to a vulnerable state.
4. DEVICE THEFT/LOSS:
The devices varying in capacity from 64GB to 128 GB imposes a threat concerning
the amount of data that can be stolen, lost or hacked.
Thus it is not possible to achieve complete security against theft.
Contd..
There should be some rules for controlling the damage that occurs when such a
condition takes place.
5. COMPLIANCE:
The regulations and compliances necessitate that the company should have
complete knowledge about the flow of its data and the people who are using it.
It is not possible to map the data flow and have knowledge about confidential
information, especially when there are several mobile devices.
To alleviate this issue enterprises are now implementing an approach called mobile
device management.
Contact Us
UNITED KINGDOM
+44-1143520021
INDIA
+91-4448137070
EMAIL
info@phdassistance.com

More Related Content

What's hot

TotalCom Mobility Management
TotalCom Mobility ManagementTotalCom Mobility Management
TotalCom Mobility Management
Comtech TCS
 
Management choices with Microsoft Intune.PDF
Management choices with Microsoft Intune.PDFManagement choices with Microsoft Intune.PDF
Management choices with Microsoft Intune.PDFJoseph Glocke
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Protecting Mobile
Protecting MobileProtecting Mobile
Protecting Mobile
Booz Allen Hamilton
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising businessSno Jutt
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
Chris Pepin
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet SupportFelix Yanko
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
Softweb Solutions
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
sunnay
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
ObserveIT
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
Association for Commuter Transportation (ACT)
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
mrmwood
 

What's hot (13)

TotalCom Mobility Management
TotalCom Mobility ManagementTotalCom Mobility Management
TotalCom Mobility Management
 
Management choices with Microsoft Intune.PDF
Management choices with Microsoft Intune.PDFManagement choices with Microsoft Intune.PDF
Management choices with Microsoft Intune.PDF
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Protecting Mobile
Protecting MobileProtecting Mobile
Protecting Mobile
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
brouch
brouchbrouch
brouch
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet Support
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 

Similar to Enterprise Mobility Management and its Challenges - Phdassistance.com

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
infra-si
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
Ahmed Banafa
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Graham Chalk
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
bupbechanhgmail
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterprise
Ahmed Banafa
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Mobiloitte
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
IBM Software India
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
ManageEngine
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
Jason Murray
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
Aldo Pietropaolo
 
AuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPTAuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPT
AuroIN
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Byod
ByodByod
Business transformation
Business transformationBusiness transformation
Business transformation
Aishwarya Alagh
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 

Similar to Enterprise Mobility Management and its Challenges - Phdassistance.com (20)

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Ahmed Banafa EMM
Ahmed Banafa EMMAhmed Banafa EMM
Ahmed Banafa EMM
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterprise
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
AuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPTAuroIN - Enterprise mobility strategy | PPT
AuroIN - Enterprise mobility strategy | PPT
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Byod
ByodByod
Byod
 
Business transformation
Business transformationBusiness transformation
Business transformation
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 

More from PhD Assistance

The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...
PhD Assistance
 
Referencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptxReferencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptx
PhD Assistance
 
Referencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdfReferencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdf
PhD Assistance
 
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptxROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
PhD Assistance
 
Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...
PhD Assistance
 
Quantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdfQuantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdf
PhD Assistance
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
PhD Assistance
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
PhD Assistance
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
PhD Assistance
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdf
PhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptx
PhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdf
PhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
PhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
PhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
PhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
PhD Assistance
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
PhD Assistance
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
PhD Assistance
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdf
PhD Assistance
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
PhD Assistance
 

More from PhD Assistance (20)

The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...
 
Referencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptxReferencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptx
 
Referencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdfReferencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdf
 
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptxROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
 
Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...
 
Quantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdfQuantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdf
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdf
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptx
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdf
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdf
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Enterprise Mobility Management and its Challenges - Phdassistance.com

  • 1. ENTERPRISE MOBILITY MANAGEMENT AND ITS CHALLENGES An Academic presentation by Dr. Nancy Agens, Head, Technical Operations, Phdassistance Group www.phdassistance.com Email: info@phdassistance.com
  • 2. TODAY'S DISCUSSION Outline Introduction Stages of Enterprise Mobility Management Enterprise Policies Device Strategies Challenges for Implementing Enterprise Mobility Management
  • 3. Introduction There are various management schemes for managing the devices and one of the most popular schemes is Enterprise Mobility Management (EMM). This scheme includes several mobile solutions including the solutions for mobile data to voice plans and mobile applications. Thus it has been asserted that EMM can be envisioned as an inseparable part of enterprise mobility ecosystem. EMM augments the productivity of users consequently proving to be more beneficial for the enterprises EMM includes Mobile Content Management, Mobile Billing Management, Mobile Device Management, Mobile Application Management etc.
  • 4. Stages of Enterprise Mobility Management There are primarily three main stages of enterprise mobility management. PLANNING/STRATEGIES FORMULATION: The essential step of enterprise mobility management is to define or plan suitable enterprise policies that emphasize on security and management of the devices. PRODUCT/SOLUTION: As per the type of business of an enterprise, they employ a suitable catalyst for designing their products. PRODUCT/SERVICE MANAGEMENT: Finally, after planning, designing and implementing the strategies, management of the products is considered. Contd..
  • 5. Figure 1: Stages of enterprise mobility management Figure 2: Enterprise mobility management
  • 6. Enterprise Policies Before delivering any product enterprise formulates different policies which are of paramount significance as far as security management is concerned. Some of the popular security mechanisms are: Data encryption support Secure communication protocol These security mechanisms can be enabled through the following ways: Firewall protection Implementing password Virtual private network etc.
  • 7. Device Strategies 1. BRING YOUR OWN DEVICE (BYOD): The users are allowed to bring their personal devices for enterprise applications. The enterprises need to implement well defined policies and security management. 2. CHOOSE YOUR OWN DEVICE (CYOD): This approach enables the users to use their tools that are permitted by the enterprises. Similar to BYOD the approach also requires well- defined security mechanisms. 3. CORPORATE OWNED PERSONALLY ENABLED DEVICE (COPE): This strategy is generally preferred by the enterprises due to higher data and information security offered by it to the enterprises.
  • 8. Challenges on Implementing Enterprise Mobility Management 1. FRAGMENTATION: The BYOD policy should clearly define what can be done with the device as far as the applications and information of enterprise are concerned. Mobility management has been perceived as one of the most common challenges of current enterprises. 2. Integration: To make EMM successful, it is necessary that different enterprises and mobility solutions should be combined which is a complex process. Contd..
  • 9. Though integration of devices would facilitate proper sharing of critical data, it would also increase the complexity and cost. 3. LIFECYCLE MANAGEMENT: Managing the lifecycle of applications and devices has been described as one of the most significant challenges for enterprises. A broad mobility lifecycle can bring organization to a vulnerable state. 4. DEVICE THEFT/LOSS: The devices varying in capacity from 64GB to 128 GB imposes a threat concerning the amount of data that can be stolen, lost or hacked. Thus it is not possible to achieve complete security against theft. Contd..
  • 10. There should be some rules for controlling the damage that occurs when such a condition takes place. 5. COMPLIANCE: The regulations and compliances necessitate that the company should have complete knowledge about the flow of its data and the people who are using it. It is not possible to map the data flow and have knowledge about confidential information, especially when there are several mobile devices. To alleviate this issue enterprises are now implementing an approach called mobile device management.