SlideShare a Scribd company logo
MOBILITYHOW TO ENABLE TRUE MOBILITY AT
ARISTOCRAT
WHAT IS MOBILITY?
Wireless: “Having no wire or wires.”
Mobility: “1. Capable of moving or of being moved readily. 2.
Changing quickly from one condition to another.”
WHAT WE
HAVE NOW.
WHERE AS WE HAVE A FEW SOLUTIONS WE ARE
NOT FAR OFF.
MOBILE/CELL
PHONES, TABLETS &
LAPTOPS
• Devices:
• Laptops, iPhone, Android, iPad & BlackBerry
• Device Management options (not laptops):
• BES, Good Technologies, Citrix & Exchange plugin
• Services include:
• Email, Calendar, Contacts & Reminders
• Citrix can provide access to non standard solutions
SHORT TERM
ALIGNMENT
ALIGN OUR GLOBAL SHORT TERM SOLUTION
MOBILITY IN THE
SHORT TERM
BYO
• Global unification of
security
• mobile/cell phones &
tablets only
• Remote reset/wipe/lock
• Global unification of
access
• Good vs. Native access
or both?
• Cellular/Mobile data
access
• Use of Guest WiFi
• Access to
Email, Calendar, Remin
ders & Contacts
ALI PROVISIONED
• Global unification of
security
• mobile/cell phones & tablets
only
• Remote reset/wipe/lock
• Global unification of
access
• Good vs. Native access or
both?
• Cellular/Mobile data access
• Corporate Or Guest WiFi
• Access to Email, Calendar,
Reminders & Contacts
MOBILITY IN THE
SHORT TERM
• Devices include:
• Mobile/cell phone and tablets
• Initial usage policy for any BYOD
• Formalise a policy for short term?
• Screen timeout
• Password access
• Access to inappropriate use
• Data
• Cellular data & Roaming
• MDM (Mobile Device Management)
• Dave T. Exchange tool works now
• Remote reset & lock
• Set up basic information portal
• List devices
• List configurations
7 AREAS TO
COVER
WHAT NEEDS TO BE UNDERSTOOD BEFORE
PROCEEDING?
1) REQUIREMENTS
• Define User types
• Identify who qualifies
• Is this just for standard “Office” users?
• Web apps, MS Office, Citrix apps & Internet?
• Define hybrid service model
• BYO vs. ALI provisioned
• Be device agnostic
• Coverage of mobiles, tablets & laptops
• Difference between BYO mobiles & laptops?
• All “MOBILITY” devices should be included
• Both BYO and ALI provisioned
• Ease of access
• Simple access to ALI resources/infrastructure/applications
• Unified Global Approach
• Technology, access, connectivity & policy
• Agree on “productivity” options
• App store usage & options
2) DEVICES
• ALI Provisioned device
• iPads, iPhones, Android phones
• BYO Device
• Mobile/cell phones
• Laptops
• Set specifications standards
3) CONNECTIVITY
• Should be web accessible as opposed to VPN or office
only access.
• Alignment of connectivity models in major ALI facilities
• WiFi reduces data spend and should be used where
possible
While in
ALI
facilities?
WiFi
Corporate
devices on
Corporate
network
BYO, 3rd
Party on
Separate
Web only
network
While
out of
office?
Data (3G
etc)
MiFi
WiFi
Tethering
While
roaming?
MiFi
WiFi
4) TECHNOLOGY
• Infrastructure needs
• Data Centre/Servers
• Additional requirements due to load?
• Citrix farm?
• IaaS
• Dependent on Service type
• Put the “data centre” in the cloud?
• Software/Applications
• SaaS & PaaS
• The more services we move to the cloud the more we are free of access
and infrastructure hurdles.
• Open API for access etc.
• MDM solution
• Good Technologies, McAfee, Mobile Iron & RIM
• Exchange Upgrade??
• $$ vs. Office 360?
5) TECH SECURITY
• BYO & ALI provisioned assets
• Remote wipe & reset
• Password & Access requirements
• Software requirements
• Antivirus on laptop etc
• Personal devices
• Agreement on:
• Passwords, resets & data conditions
6) SUPPORT
• Cost additions vs. Cost savings
• Business Case
• Training of teams
• Resources
• If BYO device fails? Loan equipment?
• 3rd Party providers
• Must buy support?
7) POLICY
• Access
• Corporate models
• Public internet safety
• Behaviors
• Compliance needs
• IP security
STAKEHOLDER
ENGAGEMENT
HOW WILL WE KEEP STAKEHOLDERS UP TO
DATE?
COMMUNICATION
• Surveys to confirm uptake and needs
• It’s a hybrid service model
• Some IT involvement
• Access & configuration
• Primarily 3rd party support
• Portal for information
• Microsoft home usage
• Antivirus downloads
• Purchasing options
• Specifications
• Policy download
• Costs for management to make decisions?
• Should there be a cost associated to BYO to the business?
Much like provisioning a blackberry or laptop?

More Related Content

What's hot

Design Considerations When Building Cross Platform Mobile Applications
 Design Considerations When Building Cross Platform Mobile Applications Design Considerations When Building Cross Platform Mobile Applications
Design Considerations When Building Cross Platform Mobile Applications
SuperConnect
 
Apps for everything Alec Saunders, QNX
Apps for everything   Alec Saunders, QNXApps for everything   Alec Saunders, QNX
Apps for everything Alec Saunders, QNX
appbackr
 
Preventive Maintenance and IoE
Preventive Maintenance and IoEPreventive Maintenance and IoE
Preventive Maintenance and IoE
RF Studio
 
Vodafone uk product on a page
Vodafone uk product on a pageVodafone uk product on a page
Vodafone uk product on a page
RossSurplice
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементира
Metamorphosis
 
How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay Productive
Christi Williams (Keating)
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivity
AllSeen Alliance
 
MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013
Dealmaker Media
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15
Chris Beauchamp
 
ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS Communications Pte Ltd
 
Info Exchange Health & Safety
Info Exchange   Health & SafetyInfo Exchange   Health & Safety
Info Exchange Health & Safety
EnableInfomatrix
 
97 2003 Ppt
97 2003 Ppt97 2003 Ppt
97 2003 Ppt
ryan.w
 
TBL Limelight WiFi
TBL Limelight WiFiTBL Limelight WiFi
TBL Limelight WiFi
TBL Networks
 
Third Place - Closing the Loop
Third Place - Closing the LoopThird Place - Closing the Loop
Third Place - Closing the Loop
Medusabusiness
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CloudIDSummit
 
CIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & ScalableCIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & Scalable
CloudIDSummit
 
Unique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - OverviewUnique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - Overview
Rajesh Kumar Raj
 
Never Clueless Hosted Exchange Email
Never Clueless Hosted Exchange EmailNever Clueless Hosted Exchange Email
Never Clueless Hosted Exchange Email
John Rood
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
Lai Yoong Seng
 

What's hot (20)

Design Considerations When Building Cross Platform Mobile Applications
 Design Considerations When Building Cross Platform Mobile Applications Design Considerations When Building Cross Platform Mobile Applications
Design Considerations When Building Cross Platform Mobile Applications
 
Apps for everything Alec Saunders, QNX
Apps for everything   Alec Saunders, QNXApps for everything   Alec Saunders, QNX
Apps for everything Alec Saunders, QNX
 
Preventive Maintenance and IoE
Preventive Maintenance and IoEPreventive Maintenance and IoE
Preventive Maintenance and IoE
 
Vodafone uk product on a page
Vodafone uk product on a pageVodafone uk product on a page
Vodafone uk product on a page
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементира
 
How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay Productive
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivity
 
MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15
 
ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17
 
Info Exchange Health & Safety
Info Exchange   Health & SafetyInfo Exchange   Health & Safety
Info Exchange Health & Safety
 
97 2003 Ppt
97 2003 Ppt97 2003 Ppt
97 2003 Ppt
 
TBL Limelight WiFi
TBL Limelight WiFiTBL Limelight WiFi
TBL Limelight WiFi
 
Third Place - Closing the Loop
Third Place - Closing the LoopThird Place - Closing the Loop
Third Place - Closing the Loop
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
 
CIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & ScalableCIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & Scalable
 
Unique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - OverviewUnique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - Overview
 
Never Clueless Hosted Exchange Email
Never Clueless Hosted Exchange EmailNever Clueless Hosted Exchange Email
Never Clueless Hosted Exchange Email
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
 

Similar to Corporate Mobility Insights

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Solving access for Hybrid IT
Solving access for Hybrid ITSolving access for Hybrid IT
Solving access for Hybrid IT
Jeff Green
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Jisc
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
WSO2
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
Louis-Martin Landry
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
AFCOM
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
IBM Danmark
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
AMD Developer Central
 
Maximize the Cloud Today
Maximize the Cloud TodayMaximize the Cloud Today
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
WSO2
 
Wp byod
Wp byodWp byod
Wp byod
J
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya
 
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Codero
 

Similar to Corporate Mobility Insights (20)

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Solving access for Hybrid IT
Solving access for Hybrid ITSolving access for Hybrid IT
Solving access for Hybrid IT
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Maximize the Cloud Today
Maximize the Cloud TodayMaximize the Cloud Today
Maximize the Cloud Today
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Wp byod
Wp byodWp byod
Wp byod
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
 

Recently uploaded

Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 

Recently uploaded (20)

Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 

Corporate Mobility Insights

  • 1. MOBILITYHOW TO ENABLE TRUE MOBILITY AT ARISTOCRAT
  • 2. WHAT IS MOBILITY? Wireless: “Having no wire or wires.” Mobility: “1. Capable of moving or of being moved readily. 2. Changing quickly from one condition to another.”
  • 3. WHAT WE HAVE NOW. WHERE AS WE HAVE A FEW SOLUTIONS WE ARE NOT FAR OFF.
  • 4. MOBILE/CELL PHONES, TABLETS & LAPTOPS • Devices: • Laptops, iPhone, Android, iPad & BlackBerry • Device Management options (not laptops): • BES, Good Technologies, Citrix & Exchange plugin • Services include: • Email, Calendar, Contacts & Reminders • Citrix can provide access to non standard solutions
  • 5. SHORT TERM ALIGNMENT ALIGN OUR GLOBAL SHORT TERM SOLUTION
  • 6. MOBILITY IN THE SHORT TERM BYO • Global unification of security • mobile/cell phones & tablets only • Remote reset/wipe/lock • Global unification of access • Good vs. Native access or both? • Cellular/Mobile data access • Use of Guest WiFi • Access to Email, Calendar, Remin ders & Contacts ALI PROVISIONED • Global unification of security • mobile/cell phones & tablets only • Remote reset/wipe/lock • Global unification of access • Good vs. Native access or both? • Cellular/Mobile data access • Corporate Or Guest WiFi • Access to Email, Calendar, Reminders & Contacts
  • 7. MOBILITY IN THE SHORT TERM • Devices include: • Mobile/cell phone and tablets • Initial usage policy for any BYOD • Formalise a policy for short term? • Screen timeout • Password access • Access to inappropriate use • Data • Cellular data & Roaming • MDM (Mobile Device Management) • Dave T. Exchange tool works now • Remote reset & lock • Set up basic information portal • List devices • List configurations
  • 8. 7 AREAS TO COVER WHAT NEEDS TO BE UNDERSTOOD BEFORE PROCEEDING?
  • 9. 1) REQUIREMENTS • Define User types • Identify who qualifies • Is this just for standard “Office” users? • Web apps, MS Office, Citrix apps & Internet? • Define hybrid service model • BYO vs. ALI provisioned • Be device agnostic • Coverage of mobiles, tablets & laptops • Difference between BYO mobiles & laptops? • All “MOBILITY” devices should be included • Both BYO and ALI provisioned • Ease of access • Simple access to ALI resources/infrastructure/applications • Unified Global Approach • Technology, access, connectivity & policy • Agree on “productivity” options • App store usage & options
  • 10. 2) DEVICES • ALI Provisioned device • iPads, iPhones, Android phones • BYO Device • Mobile/cell phones • Laptops • Set specifications standards
  • 11. 3) CONNECTIVITY • Should be web accessible as opposed to VPN or office only access. • Alignment of connectivity models in major ALI facilities • WiFi reduces data spend and should be used where possible While in ALI facilities? WiFi Corporate devices on Corporate network BYO, 3rd Party on Separate Web only network While out of office? Data (3G etc) MiFi WiFi Tethering While roaming? MiFi WiFi
  • 12. 4) TECHNOLOGY • Infrastructure needs • Data Centre/Servers • Additional requirements due to load? • Citrix farm? • IaaS • Dependent on Service type • Put the “data centre” in the cloud? • Software/Applications • SaaS & PaaS • The more services we move to the cloud the more we are free of access and infrastructure hurdles. • Open API for access etc. • MDM solution • Good Technologies, McAfee, Mobile Iron & RIM • Exchange Upgrade?? • $$ vs. Office 360?
  • 13. 5) TECH SECURITY • BYO & ALI provisioned assets • Remote wipe & reset • Password & Access requirements • Software requirements • Antivirus on laptop etc • Personal devices • Agreement on: • Passwords, resets & data conditions
  • 14. 6) SUPPORT • Cost additions vs. Cost savings • Business Case • Training of teams • Resources • If BYO device fails? Loan equipment? • 3rd Party providers • Must buy support?
  • 15. 7) POLICY • Access • Corporate models • Public internet safety • Behaviors • Compliance needs • IP security
  • 16. STAKEHOLDER ENGAGEMENT HOW WILL WE KEEP STAKEHOLDERS UP TO DATE?
  • 17. COMMUNICATION • Surveys to confirm uptake and needs • It’s a hybrid service model • Some IT involvement • Access & configuration • Primarily 3rd party support • Portal for information • Microsoft home usage • Antivirus downloads • Purchasing options • Specifications • Policy download • Costs for management to make decisions? • Should there be a cost associated to BYO to the business? Much like provisioning a blackberry or laptop?