This document provides an overview of enterprise mobility management. It discusses the importance of developing a strategic approach and comprehensive plan for managing mobile devices, applications, and services. The presentation covers key considerations like device ownership, security best practices, and total cost of ownership. It also outlines the components of an effective mobility management process, including policy, architecture, tools, and procedures. Managing security risks associated with mobile access is a major focus. The webinar aims to help organizations transform their business through mobilization while maintaining appropriate controls.
Introduction to Unified Communications: Concepts and Opportunitiesdigitallibrary
You've probably heard "Unified Communications" as a technology buzzword, but what does UC actually mean? What technology elements are included in the UC definition, and more importantly, which elements are likely to become part of your enterprise network in the next 12 to 24 months? Separate the UC hype from the reality, and get a better understanding how UC will be used by your enterprise.
A simple presentation on UC irrespective of brands or companies. The references and views are taken from different market leaders, vendors & internet search. All Copyrights with their respective vendors.
Cisco vs. Microsoft - Strategic Decisions for a Unified Communications Deploy...Brent Kelly
Many organizations have Cisco networking equipment as well as Cisco voice communications solutions. These same organizations also have Microsoft desktop software and MIcrosoft Lync, which is used by many enterprises for presence and instant messaging.
Both vendors are pushing very hard to have organizations adopt their entire unified communications offering. For Cisco, this means deploying the Jabber client along with WebEx for conferencing and Cisco video solutions. For Microsoft, this means deploying more capabilities in Microsoft Lync, including conferencing and collaboration as well as Enterprise Voice.
In many companies, there are articulate and impassioned people who are sincerely trying to do their best who argue for one vendor's unified communications offering over the other. This often ends up in a "Cisco versus Microsoft" discussion, which may become a heated argument.
What to do?
This presentation looks at many of the issues involved with a Cisco vs. Microsoft unified communications debate. It provides individuals and companies with strategies for eliminating one vendor as well as ways the two solutions may co-exist in the organization.
Introduction to Unified Communications: Concepts and Opportunitiesdigitallibrary
You've probably heard "Unified Communications" as a technology buzzword, but what does UC actually mean? What technology elements are included in the UC definition, and more importantly, which elements are likely to become part of your enterprise network in the next 12 to 24 months? Separate the UC hype from the reality, and get a better understanding how UC will be used by your enterprise.
A simple presentation on UC irrespective of brands or companies. The references and views are taken from different market leaders, vendors & internet search. All Copyrights with their respective vendors.
Cisco vs. Microsoft - Strategic Decisions for a Unified Communications Deploy...Brent Kelly
Many organizations have Cisco networking equipment as well as Cisco voice communications solutions. These same organizations also have Microsoft desktop software and MIcrosoft Lync, which is used by many enterprises for presence and instant messaging.
Both vendors are pushing very hard to have organizations adopt their entire unified communications offering. For Cisco, this means deploying the Jabber client along with WebEx for conferencing and Cisco video solutions. For Microsoft, this means deploying more capabilities in Microsoft Lync, including conferencing and collaboration as well as Enterprise Voice.
In many companies, there are articulate and impassioned people who are sincerely trying to do their best who argue for one vendor's unified communications offering over the other. This often ends up in a "Cisco versus Microsoft" discussion, which may become a heated argument.
What to do?
This presentation looks at many of the issues involved with a Cisco vs. Microsoft unified communications debate. It provides individuals and companies with strategies for eliminating one vendor as well as ways the two solutions may co-exist in the organization.
A presentation shown at the Communication by Mr. Elias Aad for the Smart SMB event held at Murooj Rotana Dubai last May 21, 2008 organized by Emirates Computers and sponsored by Cisco & 3M.
Unified Communications and CollaborationCisco Canada
Collaboration breeds productivity. The average employee must collaborate with at least 10 people each day. That, together with the growth of mobile workers and telework, makes the need for effective Collaboration solutions more important than ever!
Together, we’ll transform the way we interact and engage.
Take advantage of our Collaboration offers here: http://bit.ly/1kiwka1 or visit our webpage for more information on Collaboration technologies: http://bit.ly/TY2l9x
A Look Into the Unified Communication WorldRADVISION Ltd.
The presentation A look into the Unified Communications (UC) world. Reviews the latest trends in the UC market and discusses UC capabilities in various segments and networks such as Enterprise, SMB, Consumer, Mobile and Web 2.0 and the interaction between them.
The presentation envelopes unified communication services, beginning with what
it means, its importance and benefits. The slide sheds light on what's popularly known as 'Human
Assisted E-commerce' and how Happiest Minds' Lifecycle Services help enhance unified
communications.
Happiest Minds Unified Communication Services:
http://www.happiestminds.com/technology-focus/unified-communications-services/
A presentation shown at the Communication by Mr. Elias Aad for the Smart SMB event held at Murooj Rotana Dubai last May 21, 2008 organized by Emirates Computers and sponsored by Cisco & 3M.
Unified Communications and CollaborationCisco Canada
Collaboration breeds productivity. The average employee must collaborate with at least 10 people each day. That, together with the growth of mobile workers and telework, makes the need for effective Collaboration solutions more important than ever!
Together, we’ll transform the way we interact and engage.
Take advantage of our Collaboration offers here: http://bit.ly/1kiwka1 or visit our webpage for more information on Collaboration technologies: http://bit.ly/TY2l9x
A Look Into the Unified Communication WorldRADVISION Ltd.
The presentation A look into the Unified Communications (UC) world. Reviews the latest trends in the UC market and discusses UC capabilities in various segments and networks such as Enterprise, SMB, Consumer, Mobile and Web 2.0 and the interaction between them.
The presentation envelopes unified communication services, beginning with what
it means, its importance and benefits. The slide sheds light on what's popularly known as 'Human
Assisted E-commerce' and how Happiest Minds' Lifecycle Services help enhance unified
communications.
Happiest Minds Unified Communication Services:
http://www.happiestminds.com/technology-focus/unified-communications-services/
EMM is an evolving organizational trend that deals with the business, as well as technological
context, of the increasing trend of mobile devices usage in routine business operations.
Enterprise mobility is the trend toward a shift in work habits, with more employees working out
of the office and using mobile devices and cloud services to perform business tasks
Learn about the BYOD challenge, and how to effectively address the wave of Mobile technologies, applications and Mobile device management software.
CA Technologies has been identified by Gartner as one of the industry leading providers of Enterprise Movbility Management suite of products
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
Den mobila marknaden har så här långt mest handlat om konsumentappar, men nu ser vi flera trender mot Enterprise Mobile där organisationer önskar erbjuda sina anställda att använda applikationer när de behöver det, med deras egna mobila enheter. Och de vill helst använda de mobila enheter som passer dem själva (BYOD). Dessutom vill organisationer erbjuda sina kunder mobila tjänster och allt det här skapar utmaningar. IBM vill, som ledare inom den här marknaden, hjälpa kunder att ta rätt beslut och göra verklighet av sina visioner. Lyssna på Johannes Eltz från IBM:s huvudkontor prata om IBM:s syn på Enterprise Mobile, de 11 tydligaste trenderna.
Talare: Johannes Eltz, Business Development Executive Mobile, IBM
Besök http://smarterbusiness.se för mer information.
Infogain’s Application Management Services increase the return on application investments and improve IT organization effectiveness freeing IT resources to focus on business priorities.
The Webinar held on July 21, 2011 by Endeavour Software Technologies, on "Enterprise Mobility Strategy" highlighted the 5 Important Factors for a Successful Enterprise Mobility Strategy.
For more details, visit: www.techendeavour.com
Control Your Practice, and Your Future. The lifecycle of information technology is a complex journey. ALN has an established team who stays up-to-date with the latest government regulations surrounding healthcare IT. See how ALN can help you navigate this new path every step of the way.
Managed IT services provider company in India offers IT consultation and support for ... managed web services , cloud based & infrastructure services globally. ... large corporate in USA to provide Remote Infrastructure Support on 24X 7 X 365
Users and Mobility are driving Change and Disruption in the traditional IT environment.
Customers and Users expect faster response times, availability to systems from anywhere & anytime.
Considering a Next Generation Data Centre to support these changes and deliver the platform you need to right source IT services and applications is a fundamental requirement.
Dimension Data provides insight into how we do this from a User Perspective, through to defining a Mobility strategy and architecting an IT landscape to support this.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. Presenters
Marv Sauer, Consulting Manager – Plante Moran, Technology Consulting & Solutions
Marv has more than 25 years taking clients from initial strategic planning through the successful
implementation of a variety of proven and leading edge technologies. He is a talented facilitator of small to
large groups working with personnel ranging from end users to executive management. Marv has given
presentations at local and national conferences on topics such as Building the Network of Tomorrow, Today
and With Strategic Planning First, Successful Implementation Follows. Marv holds a Master of Business
Administration in Finance from the University of Michigan and a Bachelor of Science in Math and Computer
Science from the University of California, Los Angeles (UCLA).
Karl Zager, Consulting Manager- Plante Moran, Technology Consulting & Solutions
Karl specializes in the transition of IT for mergers and acquisitions. His work with both U.S. and non U.S.
investors has included IT due diligence prior to the acquisition and post-acquisition, the development of a
new IT organization structure, global infrastructure design, and project management of the entire IT
transition. Karl has spent more than 25 years designing, implementing, and supporting IT infrastructure from
the high level global network planning to router configuration and packet analysis. His projects have included
Michigan’s two largest counties, school districts, leading hospitals, and the U.S. Military. Karl has received a
Network Architect certification from Pine Mountain Group. Karl has a Bachelor of Science in Electronic
Engineering Technology from Lawrence Technological University.
Kurt VanderWal, Senior Consultant – Plante Moran, Technology Consulting & Solutions
Kurt has spent more than 16 years in the information technology field specializing in PCI compliance,
network security, local area networks, and file servers. Over the past seven years, Kurt has been
performing PCI DSS assessments and network security assessments for financial, education, and
government institutions. Kurt holds a Bachelor of Science in Information Systems and has acquired
multiple certifications over his tenure.
webinars.plantemoran.com
3. Administration
Slides are available for download from your webcast console.
A recording of today’s webinar will be added to our website in
a few days.
We will allow time at the end of the presentation to respond to
your questions, but please feel free to submit questions at any
time.
This is a CPE-eligible webinar. Throughout the webcast,
participation pop-ups will appear.
Participants must respond to at least 75% of these pop-ups in
order to receive CPE credit.
webinars.plantemoran.com
4. Overview
Organizations adopting an enterprise mobility management mindset
and strategic approach to their mobile environments are
transforming the way they do business, leading to innovation and
growth. In today's competitive marketplace, achieving greater
information access, enhanced collaboration, increased productivity,
improved customer service, and lower TCO (total cost of ownership)
can put you miles ahead of your competition.
At the completion of this webinar, participants will understand:
The mobility environment and transformational impact
The importance of mobilization planning and strategy
Key factors to consider in managing devices, applications, and
services
Security and compliance best practices
webinars.plantemoran.com
5. Mobility background
Proliferation of mobile devices including tablets and smartphones
Innovative designs, intuitive, and better access to high speed networks
Integral to staying competitive
Web based applications and services are moving people to the cloud
Dealing with a younger generation of workers
Provides a ‘role model’ for innovation
Greater connection to and engagement with the customer
Improves integration with social networking/media sites
5 webinars.plantemoran.com
6. Reasons to go mobile
Increased information access and sharing
Better response times
Improved customer service
Increased productivity and satisfaction
Enhanced collaboration
Increased efficiencies
Reduced costs
Better recruitment of top talent
Greater innovation
6 webinars.plantemoran.com
8. Strategy is key
Key considerations
Device ownership
Applications
Platforms
Cloud is about enabling and leveraging technology, but mobility
is about enabling and leveraging the business
Focus on the business aspects centered around:
Access
Management
Balance
8 webinars.plantemoran.com
9. Advantages of a sound strategy
A sound strategy
Increases the impact and results
Ensures that delivery is cost effective and efficient
Provides a means to stay competitive
9 webinars.plantemoran.com
10. IT concerns
How do we support the How do we stop data
devices? leakage?
What if the user jailbreaks Do they want it for more
the device? than email?
Do we need to develop Who gets them and how
apps? do we pay for them?
How do we secure the device How do we maintain the
and data? service expectation?
Do we need to support every What about compatibility?
device?
10 webinars.plantemoran.com
11. Process
The process may take multiple iterations to resolve.
Strategy Policy Architecture Tools Procedure
Make nothing public until the process is complete.
11 webinars.plantemoran.com
12. Strategy
Decisions are interrelated and can have a huge impact.
Email Apps
File Support
Exchange
Device Business – Plan
Ownership Employee Coverage
Relationship,
Cost, Productivity
Business
Depth of Apps
Control
Device
Types
12 webinars.plantemoran.com
13. Leading Management Concerns by Strategy
Internal Wi-Fi + Internal
+ Web
Purpose Email Only Business
Applications
Specific Applications
Device Data ownership Data ownership Data ownership
Compatibility Data leakage Data leakage Data leakage
Inventory Device ownership / Device ownership / Device ownership /
Software updates cost cost cost
Access control Inventory Inventory Inventory
Account Account Account
Management Management Management
Communications Communications Communications
Management Management Management
Device Device
Compatibility Compatibility
Communications
Security
Access Control
Support
Training
13 webinars.plantemoran.com
14. Policy
Device ownership, service provider, coverage, communication costs
Data ownership
Privacy – personal data, device use, location, applications
Device care - damage and loss
User separation
Security – features and user actions
Support – depth vs. cost
14 webinars.plantemoran.com
15. Architecture Components
Device type considerations – environment, capabilities
Access to data – messages (includes calendar and contacts) only
apps, synchronization, remote VPN, remote desktop
Data storage and backup
Policy enforcement – security, application restrictions, data
leakage
Lockdown – recovery, wipe
Software and configuration distribution
Support – recovery, configuration, backups, updates, applications
Administration – inventory, IDs, rights, monitoring
Device management depth – light, heavy, containerized
15 webinars.plantemoran.com
16. Management Tools
Mail Synchronization Servers (BES, MS Sync, Notes Traveler)
Mobile Device Management Software (Airwatch, Fiberlink, Zenprise,
Excitor, MobileIron, Sybase, Good)
Antivirus software (AVG, Kaspersky, ESET)
Mobile VPN clients (most major firewall vendors)
Remote control / Virtual PC (Citrix, VMware, Microsoft, VNC)
Training
16 webinars.plantemoran.com
18. Security
Why we need to secure the devices
Types of mobile access
Remote wipes
Managing the security of mobile devices
Additional security points
18 webinars.plantemoran.com
19. Why we need to secure the devices
It is estimated that by 2013
There will be 1.2 billion mobile workers worldwide
75% of all U.S. workers will be mobile at least 20% of the time
Another estimate shows that
36% of cell phone owners have lost a phone or had one stolen
• Of these, almost 90% had no way to remotely lock or wipe the data from
them
• Over 50% did not use password protection on their phones
In the U.S., 113 cell phones are lost every minute
19 webinars.plantemoran.com
20. Why we need to secure the devices
While mobility is a top security concern to business, few have
addressed these concerns. Why?
Businesses and employees are seeing the advantages and pushing
IT to “make it work”
There are many different types of mobile devices
These devices can be both business owned or employee owned
Ability for users to install new, untested applications is too easy
Too many variables
20 webinars.plantemoran.com
21. Types of mobile access
Multiple ways mobile devices attach to the corporate network
Internet Access Only (Internal)
Remote Access to Email
Remote Access to Network Resources and Data
Regardless of the method, both the mobile device and the
corporate network need to be protected
21 webinars.plantemoran.com
22. Internet access only
Description
Staff members bring mobile device (BYOD or Corporate owned) to the office
Only want to access Internet
Security Risk
Potentially infected devices accessing your corporate network
Solutions
Setup a separate Internet-only connection with wireless access
(small companies, banks)
Segment all mobile wireless traffic from the corporate network
22 webinars.plantemoran.com
23. Remote access to corporate email
Description
Staff members accessing corporate email from remote locations
Security Risks
Data now resides on mobile device
• Lost data due to stolen/lost device
• Via OWA or other client software
User credentials are now sent to/from the mobile device to the corporate network
• If insecure, credentials could be stolen
Solutions
Restrict the download of documents to mobile devices (OWA)
Require the use of a SECURE third party application to access the email (Good,
Sync)
Ensure remote locking and remote wiping is enabled and configured properly
23 webinars.plantemoran.com
24. Remote access to corporate network
Description
Staff members accessing corporate network and resources from remote locations
Security Risks
Devices are accessing an internal corporate resource
Spread of viruses/malware across corporate network
Data now resides on mobile device
• Lost data due to stolen/lost device
User credentials are now sent to/from the mobile device to the corporate network
• If insecure, credentials could be stolen
Insecure mobile devices (screen locks, passwords) lead to compromise of
corporate network
Ensure remote locking and wipe are enabled
24 webinars.plantemoran.com
25. Remote access to corporate network
Solutions
Require all remote devices go through a NAC prior to accessing the
network
Require that communications to the corporate network occur through a
secure VPN or secure portal (i.e. Terminal Services) where data is
Read-Only
Ensure that the devices/removable cards are encrypted
Ensure strong policies are established and adhered to
Ensure remote wipe is enabled
25 webinars.plantemoran.com
26. Remote wipes
What is a Remote Wipe?
Erasing the contents of the mobile devices from a remote location (full
or partial)
How is it done?
Depending on the device and OS, it typically deletes either the
encryption key OR writes a series of 1’s over the entire phone
Is it effective?
Yes
Notes
Must be setup and configured prior to device being ‘lost’
If device is being sent in for repairs, a backup should be performed
and then a wipe
26 webinars.plantemoran.com
27. Managing the security
Managing the security of the mobile devices
Implement firewall/NAC technologies which support the mobile
operating systems
Limit the types of devices/OS versions allowed to attach
Inventory/Manage the devices – Mobile Device Management
Ensure that users agree to the corporate policy prior to accessing the
network
• Defines ownership of data
• Defines required configurations
• Prohibits “jail-broken” devices on the network
Security test these devices/apps
Provide end user training
27 webinars.plantemoran.com
28. Additional security points
Configuring the devices
Enable remote wipes
Ensure screen lock passwords are set
Ensure screen lock passwords are strong
Ensure key pad lock is enabled after a period of inactivity
Require Anti-virus and Malware detection software
Act Now!
28 webinars.plantemoran.com
29. Best practices
Set a short-term and long-term direction
Engage all business units
Get support/buy-in
Include total cost of ownership (TCO) and total cost impact
Include devices, applications, services, security, support, policies,
etc. (all facets of mobility)
Establish central governance
29 webinars.plantemoran.com
31. Thank you for attending
Marv Sauer
248.223.3120
Marvin.Sauer@plantemoran.com
Karl Zager
248.223.3241
Karl.Zager@plantemoran.com
Kurt VanderWal
248.223.3119
Kurtis.VanderWal@plantemoran.com
To view a complete calendar of upcoming Plante Moran webinars, visit webinars.plantemoran.com
webinars.plantemoran.com