SlideShare a Scribd company logo
1 of 23
Selecting the Right
Mobility Solutions: From
Devices to Data
Protection
Presenter: Marco Nielsen
Vice President, Services
mnielsen@enterprisemobile.com
 Marco Nielsen, VP of Services, Enterprise Mobile
Marco is an internationally recognized
expert in mobile device management
and mobile devices, with nearly 20 years’
experience spanning systems
architecture, operating systems,
hardware and communications. Marco
brings a broad perspective on how to
design and deliver a successful enterprise
mobility initiative.
Today we’ll help you navigate by offering
guidance on:
 Proliferation of devices
and apps
 Factors to considering
when choosing
 Planning required to
make the right choice
 Decision making beyond
just devices
device
app
network
• Carefully define
security
requirements and
policies
• Consider a tool for
provisioning,
monitoring, and
supporting
employee devices
• Ignore the risks
associated with no
policies
• Limit policies to
employees that are
already mobile
Manageability
Mobility
Strategy &
Solutions
Usability
Support
Security
Manageability
 By linking it directly to
your business strategy
you will obtain:
 clear goals
 focusing on the right
long term solutions
(instead of short term)
 budget avenues
Risk
Assessment
 Security risks - how much risk do you
have by letting your corporate data
on personal devices)
 Usability - how far do you want to
lock down the devices with
corporate data,
 E-mail - Depending on your security
assessment you may want to invest
into mobile device management
solutions that can only allow
managed devices to access
corporate e-mail.
 Usability/
Security
 Support
 Budget/
Investment
Business Critical
Data
Application Risk
Assessment
Requirements
gathering
Is there a mobile application
strategy and aligns with your
business strategy?
Business Critical
Data
Application Risk
Assessment
Requirements
gathering
Has an application risk
assessment been done?
Business Critical
Data
Application Risk
Assessment
Requirements
gathering
 Requirements gathering
◦ Data Protection
◦ Usability/Security
◦ Custom development
◦ AppWrapping
◦ Workflows & Updates
◦ Budget/Investment
◦ Support
Identity management
Protection from risks with BYOD,
rouge devices
Content management strategy
Mobility strategy
Support
Business
Critical
Elements
Global
Needs
Support &
Processes
Ecosystem
Reviews
Business
Critical
Elements
Global
Needs
Support &
Processes
Ecosystem
Reviews
Business
Critical
Elements
Global
Needs
Support &
Processes
Ecosystem
Reviews
Business
Critical
Elements
Global
Needs
Support &
Processes
Ecosystem
Reviews
 Steps to making informed mobility decisions:
◦ Review requirements and policies
◦ Consider key factors like usability, security,
manageability, and support
◦ Ask the right questions around device selection, app
selection, device management and infrastructure
◦ Stay informed
◦ Get help from a Mobility-as-a-Service provider.
 Marco - mnielsen@enterprisemobile.com
 Follow us
https://twitter.com/entmobile
http://www.linkedin.com/company/enterprise-mobile
https://www.facebook.com/entmobile
While every care has been taken to ensure that the information in this document is
correct, Enterprise Mobile cannot accept (and hereby disclaims) any responsibility for
loss or damage caused by errors or omissions. All rights reserved. No part of this
document may be reproduced without the prior permission of Enterprise Mobile.
 2013 Enterprise Mobile
www.enterprisemobile.com
Thank you!

More Related Content

What's hot

Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT Innovators
 
Advanced Analytics to Attain Risk Insights and Reduce Threat
Advanced Analytics to Attain Risk Insights and Reduce ThreatAdvanced Analytics to Attain Risk Insights and Reduce Threat
Advanced Analytics to Attain Risk Insights and Reduce ThreatTripwire
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by FirstMutualHoldings
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overviewbmiller144
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMatePECB
 
Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler, MBA CPA
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure servicesdigitaltrackseo
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementEC-Council
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainInfosecTrain
 
Hernan Huwyler - Identity and Access Management CIO & CISO Nordics
Hernan Huwyler - Identity and Access Management CIO & CISO NordicsHernan Huwyler - Identity and Access Management CIO & CISO Nordics
Hernan Huwyler - Identity and Access Management CIO & CISO NordicsHernan Huwyler, MBA CPA
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure servicesdigitaltracks
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metricsnooralmousa
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 

What's hot (20)

Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Advanced Analytics to Attain Risk Insights and Reduce Threat
Advanced Analytics to Attain Risk Insights and Reduce ThreatAdvanced Analytics to Attain Risk Insights and Reduce Threat
Advanced Analytics to Attain Risk Insights and Reduce Threat
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overview
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
 
Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized World
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure services
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
 
Hernan Huwyler - Identity and Access Management CIO & CISO Nordics
Hernan Huwyler - Identity and Access Management CIO & CISO NordicsHernan Huwyler - Identity and Access Management CIO & CISO Nordics
Hernan Huwyler - Identity and Access Management CIO & CISO Nordics
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure services
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
G-CISO
G-CISOG-CISO
G-CISO
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 

Viewers also liked

Viewers also liked (10)

Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems
Cost-Benefit Analysis for the Design of Personal Knowledge Management SystemsCost-Benefit Analysis for the Design of Personal Knowledge Management Systems
Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems
 
Cost Effectiveness Analysis
Cost Effectiveness AnalysisCost Effectiveness Analysis
Cost Effectiveness Analysis
 
Cost benefit analysis
Cost benefit analysisCost benefit analysis
Cost benefit analysis
 
Cost Benifit Analysis
Cost Benifit AnalysisCost Benifit Analysis
Cost Benifit Analysis
 
Cost benefit analysis
Cost benefit analysisCost benefit analysis
Cost benefit analysis
 
Cost benefit and cost effective analysis
Cost benefit and cost effective analysis Cost benefit and cost effective analysis
Cost benefit and cost effective analysis
 
Cost-benefit analysis
Cost-benefit analysisCost-benefit analysis
Cost-benefit analysis
 
Cost-Benefit Analysis
Cost-Benefit AnalysisCost-Benefit Analysis
Cost-Benefit Analysis
 
Cost benefit analysis
Cost benefit analysis Cost benefit analysis
Cost benefit analysis
 
Cost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyCost effectiveness and cost efficiency
Cost effectiveness and cost efficiency
 

Similar to From Device Selection to Data Protection: Selecting the Right Mobility Solutions

Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by DesignDMI
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxkathyzink87
 
Actionable insights
Actionable insightsActionable insights
Actionable insightsTim Youm
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ssGraham Chalk
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Mobility Risk, Strategy and Policy
Mobility Risk, Strategy and PolicyMobility Risk, Strategy and Policy
Mobility Risk, Strategy and PolicyH Contrex
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 

Similar to From Device Selection to Data Protection: Selecting the Right Mobility Solutions (20)

Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Actionable insights
Actionable insightsActionable insights
Actionable insights
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Mobility Risk, Strategy and Policy
Mobility Risk, Strategy and PolicyMobility Risk, Strategy and Policy
Mobility Risk, Strategy and Policy
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

From Device Selection to Data Protection: Selecting the Right Mobility Solutions

Editor's Notes

  1. Your presenter today will be Marco Nielsen, Marco is the VP of Services and the Chief Mobility Architect at Enterprise Mobile. He leads the company’s services division. As one of Enterprise Mobile’s senior technical experts, Marco participates in the most complex and challenging projects, drawing on his technical expertise. Today he’ll share some of the tips he’s formulated working with clients on building mobility strategy.
  2. Just as with any other area of business, getting it right in the mobility space requires planning. Smart companies take into account not only device and app choices, but also infrastructure and management considerations before implementing mobile solutions.  Before delving into the nitty-gritty, though, consider taking a few key steps:Think about how mobility fits into your overall business strategy. What are your objectives and requirements? By linking mobility directly to your business strategy, you’ll focus on the right long-term solutions and budget avenues. Conduct a mobile platform risk assessment to understand potential risks and see which could be showstoppers and which have workarounds.
  3. These days when it comes to mobility, from apps to devices, we are all well aware that employeesare bringing their own devices, their own apps and even their own networks to the workplace – with them their own set of security risks. Today, mobile platforms may provide separate virtual instances that allow segregation of work and personal data, which makes things easier on IT managers. In the meantime, it’s important to understand that the mobile space is changing rapidly. IT needs to be flexible and prepared to adapt to new solutions. As we dig into our discussion today, a lot of the factors I’ll recommend for making selections of apps, devices, management and infrastructure will keep the BYO era in mind – since 60% of companies now offer BYOD and that number is expected to rise to 90% in 2014 (according to Forrester Research)
  4. Carefully defining security requirements/ policies will help narrow the scope. Make sure you include stakeholders and get their input.Consider a tool for provisioning, monitoring, and supporting employee devices. Mobile has matured, and moved past just e-mail. Most likely you have requests to support applications and data content and there is a large number of tools on the market. You may need to look at different solutions to protect your data if you take the route of no policies.As mobility becomes common place, you may also see a surge of use cases that you don’t have policies for. So it may be very important to revisit your policies frequently and make adjustments as time goes by.
  5. Due to the sheer volume of vendors and device availability, Android will be hard to get around in coming years. Apple has finally crossed 50B apps downloaded from their store since 2007, but Google is right behind at 48B and in fewer years. Google is stating that they are now seeing 1.5M Android devices being activated on a daily basis.With Samsung KNOX and other vendors filling some of the platform gaps, it could be a secure and durable enterprise platform in the future. Next month we will see if Apple iOS 7 or other new offerings from Apple will keep them in the top after Steve Job’s passing.  The ease of use and simple management continues to be copied by other vendors.With Blackberry numbers in a downward spiral even with new offerings, Microsoft has become the new #3 runner but still has some work to do I believe to keep pace. Many IT customers I talk to would love to see a surge in Microsoft devices so that there is a common platform across the organization. New OS updates coming out later this year on both Windows Phone and the desktop may spur some.
  6. When making the decision there are 4 key elements to consider. Keep these in mind as we walk through the following slides. Calpine example – Had setup a stern security policy, if devices didn’t check in after x days, they wanted to automatically wipe the devices. Due to an IT gitch, check-in connectivity was lost, and once restored devices reconnected and automatically wiped. Striking a balance between security, risk, and usability. For BYOD devices, support and usability may be important for success.
  7. Is there a business strategy that includes mobility? Without a clear business strategy (requirements, goals), it is difficult to create a mobility strategy and solution set that makes sense long term. By linking it directly to your business strategy you will obtain clear goals, focusing on the right long term solutions (instead of short term), and even budget avenues.  For a larger company you may have the need to map out all the mobility use cases and treat each one separately. Involving all the stakeholders so you have buy-in and budget support.
  8. Has a mobile platform risk assessment been done? It can be important to understand potential risks before making choices. Some of these risks could be migrated by the solution(s) chosen, or their product roadmaps. It is also important to understand which risks could be showstoppers or which have workarounds.Some of the top issues could include: Security risks -how much risk do you have by letting your corporate data on personal devices)Usability -how far do you want to lock down the devices with corporate data, How can you enable further usage by selecting the right secure solutionsE-mail -Depending on your security assessment you may want to invest into mobile device management solutions that can only allow managed devices to access corporate e-mail. On the network level, there is Network Access Control (NAC) solutions that integrate with mobile device management solutions to even prohibit access to specific subnets on your network.  Without a proper investigation and assessment you could be making the wrong decisions, and using budget and resources on the wrong solutions, or don’t have a long term plan for a complete solution.
  9. Which mobile platforms or form factors have been considered to be included in the mobility strategy?  By solving the first two items, you may now have a better understanding on which mobile platforms would be best. But now different form factors and even usage may come into play. A few years a 10” tablet was all the rage, but now 7” and 8” tablets appear to be gaining a foothold for the best size and form factor for specific use case. Frequent discussions with your end-user customers may flush out more requirements. Accessories, life cycle services, SLAs, downtime having financial impacts, etc. Support - How will you support a large number of different devices, platforms, and operating systems? Perhaps you want to minimize this by limiting the options.Make sure your budget is aligned with the business goals. Perhaps a phased approach can be done to reduce short term costs and provide a long term plan.
  10. Its all about the applications. Without applications, we would all still be just using mobile devices for e-mail type activates. Is there a mobile application strategy and aligns with your business strategy? Important application success factors and decisions can for example be: - How will your business critical data be used on mobile devices, - Can you use off the shelf, browser based, or custom developed solution – what development platform should you then use?- How will you support the end-users with the applications?
  11. Has an application risk assessment been done? If the application is centered around critical business data it will be important to understand the risks on your application strategy.  Is data at rest and data in transit protected? Is any secondary authentication to access the data secure yet have end-user usability in mind? Will you use federated credentials?  How will you purchase/deploy/update applications to your corporate and/or BYOD mobile devices?
  12. Make sure the proper stakeholders are involved, your end customers, business, IT security and legal.If you are planning to develop a custom application since this is critical to your business goals, important decisions will need to be made regarding support of mobile OS platforms, ongoing support of the custom code, development cycle and budget resources. Outsourcing the task may be cost effective, once the proper development solution has been researched. Also a common problem we have seen among customers is the use of 3rd party application development company who have gaps in the understanding of enterprise mobility compared to consumer based mobility. Application deployment through an in-house appstore, AppWrapping, Data Loss Prevention (DLP), MDM APIs, and yearly app certificate updating processes can be important for your strategy.
  13. As we step away from the device and software components, the back-end infrastructure and support is also important to understand.Depending on your requirements, several things could be critical to the overall success.Identity Management – Certificates, Active Directory, AccountsCan you provide certificate management to your managed devices? Will you be using Active Directory/LDAP authentication?E-mail server proxy front end, etc.Are you protected from risks from BYOD devices?  How will you protect against rouge devices that end-users bring to work? NAC solutions, secure e-mail, secure browsing.Do you have a content management strategy for your mobile workforce? If you don’t provide a secure strategy, your end-users will probably already continue to use consumer solutions they already have. By looking at your business strategy, which solutions are being used to store information, you can look at solutions to also provide secure access to the same information on your mobile devices. This is a hot area at this time with many vendors, and it will be important to choose the right solution and direction.Does your mobility strategy include the necessary infrastructure support structure and application backend scalability? As with most companies, mobility projects often start small, with a single department or project and quickly become large and also a mandatory necessity. Some solutions can scale, others may need additional budget and infrastructure requirements. It could be necessary to look at these topics to understand the full cost of a solution. It will also be necessary to understand if your company can support fully hosted/cloud solutions, or if high-security is required and on premise solutions is the direction.   How will you support the solution? Do you have the necessary IT staff and resources?
  14. Proper management of the technology is important. Many different solutions are now available on the market.In the beginning they were very device focused, now we have application management, and perhaps the future will bring tighter network controls as well.Some critical factors are: Look at your priorities - what do you want to do first, what is most important. Then determine your management strategy. What is important and business critical for lifecycle management?  How will you deploy the solution.
  15. GlobalizationDo you have international travelers or staff across the world? If you are a global organization, can you be staffed 24/7 with the proper resources with the right technical knowledge?Do you have different language requirements?How will manage the mobile operator support in different countries?
  16. Do you have regular reviews to adapt to changes in the mobility and solution ecosystem? Many have a hard time keeping up to speed on mobility. New devices are appearing every quarter. Devices are becoming obsolete under 12 months. New features, NFC, device types (Glass/Watch) are also appearing. The device models and form factors chosen in the beginning of a project, might not be available later in the time.
  17. SupportWhat level of help desk services will end-users have access to?  Especially for BYOD this could get complex.Do you allow remote administration of specific solutions with delegated permissions? How will you accommodate VIP/CxO service levels? Does your business and mobility strategy provide the necessary support and resources? Would you rather pay for staffing up your own help desk to cover for peaks, or pay a fixed monthly fee?
  18. As you can see, it isn’t easy to put all the right components of a mobile strategy in place. Many companies either have a hard time keeping up to speed or would rather focus on their core competencies. They choose instead to rely on Mobility-as-a-Service (MaaS) providers to put a mobility strategy on track and implement best-in-class management solutions