330 likes | 558 Views
Mobile Device Management: Do You Know Who’s Accessing Your Network?. Umesh Shah, Dir. Channel Marketing. Agenda. Consumerization of IT Defining Mobile Device Management Numara Cloud Mobile Device Management. Mobile Device Management. Consumerization of it. In the News.
E N D
Mobile Device Management: Do You Know Who’s Accessing Your Network? Umesh Shah, Dir. Channel Marketing
Agenda • Consumerization of IT • Defining Mobile Device Management • Numara Cloud Mobile Device Management
Mobile Device Management Consumerization of it
5 Trends Leading to Consumerization of IT • The rise of social media as a business application i.e. LinkedIn and Salesforce.com • The blurring of work and home Forrester Research: 43% of the American workforce will have the option to telecommute by 2016 • The emergence of new mobile devices By 2013, global smartphone shipments will exceed PC shipments for the first time. • Shifting business models Reliance on social media and ecommerce • Employee expectations of corporate IT Facebook, open source generation coming into the workforce
What Challenges Are You Facing? Effective IT Security Policies and Procedures • How to manage and ensure security of data on the move • When to restrict device content and capabilities • Device and user profile management Ensuring Technical Ability to support Security Policies • Knowledge of devices and mobile OS’s • Effective perimeter security (i.e. firewalls, VPN etc…) • Effective Mobile Device Management Software Employee Resistance to Managed Personal Devices • Co-mingling of personal and corporate data on the same device • IT ability to monitor and remotely wipe the device • Geo-Location aka Big Brother
What Opportunities Can You Take Advantage of? Revamp Security Policies and Procedures • In place of taking a piece-meal approach, take the opportunity for an overhaul of existing policies in support of consumerization. Revamp of Perimeter Security Hardware & Software (i.e. MDM) • Updated and tightened perimeter to support hybrid devices accessing the corporate network. Increased Employee Productivity • The top metric used to support consumerization ROI is employee productivity followed by employee moral. * * Source: CIO.com study of IT Consumerization
Mobile Device Management Defining the Discipline
So What is Mobile Device Management (MDM)? Mobile Device Management is managing and securing devices • Protecting Microsoft Exchange from unmanaged devices • Remotely provisioning • Remotely troubleshooting • Backing up and restoring • Policy management • Preventing theft and recovering lost devices • Managing inventory • Reporting on mobile infrastructure
Gartner predicts adoption rate of MDM Conservative estimates place value of “pure” MDM model at $180m in 2011, with CAGR of 30% over next 2-3 years Gartner Market Growth Expectations 514 395 30% CAGR 304 $(M) 234 180 2011 2012 2013 2014 2015 Source: Gartner, 2011
Mobile Device Management Lifecycle Identify mobile devices on network Hardware and software ID On-device file system management End-user self-registration Auto-deployment Auto-provision email configuration, pass codes and security policies Prevent unauthorized Microsoft Exchange access Restore contacts, calendar, SMS, multimedia, files Recover lost or stolen devices Geo-locate devices with Google MapsTM Lock and Wipe Prevent sharing of critical data via email Assess exposure to malicious email Remote deployment & management Executive reports
Defining The Discipline • Partnering With The End User • Make it easy for the user to do “their job” in MDM • Take the Geek out of configuration • Being sensitive to privacy concerns
Defining The Discipline • Making IT feel Comfortable • Securing corporate data • Ensuring limited interaction required • Providing a robust toolset
Defining The Discipline • Transitioning to a Device is a Device • MDM is becoming an IT responsibility • Balancing corporate policies on personal devices • Needs to be founded in strong ITIL based best practices
Key Features • 100% web based cloud offering • Enjoy the full inventory of your wireless devices • Self-Service Registration and Auto Provisioning • Manage applications • Provision settings • “Over the Air” Actions • Corporate Email Protection • Integrated helpdesk • Remote Control • Geo-Location
“Over the Air” Actions • Remote “detonate”/wipe • Remote auto-lock policy • Enable/disable camera or Bluetooth capabilities • Enforce device encryption • Blacklist applications • Prevent users from installing blocked third party applications • SIM card change policy • Security applications support • Backup/restore contacts, calendar, SMS, bookmarks, notes, sales, and folders (across devices)
Corporate Email Protection • Numara Software Exchange DefenderTM – Prevent unmanaged mobile devices from accessing and sharing critical data and documents via email • Numara Software Exchange InvestigatorTM– Quickly assess risk and exposure to malicious email hackers with executive level reporting detailing the number of users and mobile devices connected to Exchange
Self-Service Registration and Auto Provisioning • Just got that new iPhone and have no idea how to connect to Exchange or what the WiFi security key is? • Easy via company Self Service Page • User registers with their phone number and follows a text message to the App store • Once registered, the defined auto provision packages are automatically deployed. • Out of the box Exchange, Wireless, and Pass code security provisioning
Mobile Device Management Feature Tour
Mobile Device Management The Wrap-up
Numara Cloud Mobile Device Management IT Consumerization is here to stay. Organizations need a flexible and robust MDM solution Numara Cloud MDM provides IT organizations the control they need to securely manage mobile devices throughout their entire lifecycle.