Enterprise Mobile Management (EMM) - MTBC Luncheon
-
Upload
jneibel -
Category
Technology
-
view
1.444 -
download
0
description
Transcript of Enterprise Mobile Management (EMM) - MTBC Luncheon
MDM or EMMIt's all about Mobility
1
Agenda
2
• How Mirrored Storage got into EMM• BYOD Revolution• EMM Best Practices• Security 2.0• MaaS360 Offering• Q&A
Mirrored Storage Experience
• Is your device secure?• Now can multiple device/version/platforms/… be managed
together?• Most Important Feature?
– Desktop Features– Cost of features– What’s possible– Cloud vs. In-house
• Is it possible to Manage FOR customers?• Market in moving at lightning speed!
3
The BYOD Revolution
95%
Source: http://newsroom.cisco.com/release/854754/Cisco-Study-IT-Saying-Yes-To-BYOD
Already said yes to BYOD
http://www.eweek.com/c/a/Enterprise-Networking/Cisco-Enterprises-are-Embracing-BYOD-252679/
4
Top IT Management Concerns
Source: Infoworld / Forrester http://www.infoworld.com/d/wp/the-expanding-role-of-mobility-in-the-workplace-211973
5
Key BYOD goals
• Protect corporate data• Protect user privacy and personal data• Support a diverse set of platforms/device types• Help users adhere to HR, audit, legal, compliance and
security guidance• Support a diverse set of policies, roles, personas and
access rights• Improve productivity and accessibility• Support employee work-style choice
EMM is Integral for BYOD
• Supports BYOD with self-service enrollment
• Configure devices and protect employee privacy
• Enforce security policies and meet regulations
• Push content, apps and docs to separate workspaces
7
Current EMM Best Practices
Integration AD/LDAP: 15% integrate for device enrollment & app/doc access Email Access Control: 20% quarantine new devices w/o MDM
Apps App Catalog: 80% of companies pushing apps Enterprise Apps: 25% of companies pushing enterprise apps Enterprise Apps: On average 6 apps per business. Median is 3.
Docs Containerize specific workflows / use cases: 40% of customers use Doc Mgmt Specific LOB use cases – sales materials, BOD materials, flight materials
Device iOS: ~80% of all enterprise devices. Leading BYOD choice.Android: Standards to reduce fragmentation. Tablets in field operations. Policy: Password, Require device encryption, Email/EAS configuration
8
EMM
• Mobility is becoming the platform, not an add on
• Organizations need comprehensive Enterprise Mobility Management
• IT needs growing beyond enabling these new platforms1. More use of identify, context and more sophisticated policy2. More app management & security (and app dev assist)3. More separation of corporate & personal apps/data4. More mobile utilization of corporate network/resources
App Management & Security 2.0
EMM App Security Requirements
Containerize Enterprise Apps• Further encrypt• AAA• Compliance checks• DLP controls
Link & Tunnel Enterprise Apps• SSO• Shared clipboard• Data sharing
• Tunnel to corporate LAN• “VPN free”
Link Public & Corporate Apps• SSO• Shared clipboard• Data sharing
MaaS360 App Security
Separation of Work & Personal 2.0
Separate Work & Personal Apps• Ensure sandboxing• Ensure selective wipe
Separate Work & Personal Content(Especially Work Docs & Attachments)
• Reduce DLP risk• Ensure selective wipe
• Tunnel to corporate LAN• “VPN free”Securely Access Content Repositories
EMM Data Security Requirements
MaaS360 Workplace
MDM 1.0 Practices
• Over-the-Air Device Configuration of Email, Calendar, Contacts, Corporate Wi-Fi
• Applications & Web Clips
• Passcode enforcement
• Remote lock and wipe
• Corporate Wipe, Full Wipe
• Expense Management
• Comprehensive Reporting & Real-time Alerts
EMM Best Practices
• App Management
• Document Management
• Secure Web Browser
• URL Filtering / Phishing
• Geo-fencing Policies
• Secure Container
• Encryption and DLP
• Email, Contacts, Calendar
• Third-party Apps
Evolving to Enterprise Mobility Management (EMM)
Comprehensive Mobility Management
The Essentials• SMS, email, or URL enrollment• Email, calendar, contact profiles• VPN and Wi-Fi settings• Device feature configuration• Policy updates & changes• Inventory management• Compliance reporting
Advanced Management• Mobile app management
• Document sharing
• Event-based policies
• Proactive expense controls
• BYOD privacy settings
• Shared device support
• Self service portal13
Location-based policies
Device Enrollment, Acceptable Use
OTA Configuration
Enterprise App Catalog
13
Robust Mobile Security
Device
Applications
Network
Documents
Auto-quarantine/access approvalContain emails and attachments
Remote wipe of work email
Password authenticationRestrict copy, paste, shareRemote wipe of work files
Configure Wi-Fi and VPN profilesCert delivery and authentication
Dynamic policy based on SSID
Encryption and passcodesJailbreak/Root detection
Locate, lock, wipe
Blacklist/Whitelist mobile appsWrapping and compliance rulesRemote wipe of managed apps
Web
Define URL filters and categoriesAllow access to intranet sites
Disable native/3rd party browsers
14
MaaS360 Enterprise Mobile Security
Secure Mail
Application Security
Secure Document Sharing
Secure Browser
A Trusted WorkPlace container for seamless security and productivity
Dual Persona to separate personal and work data in the BYOD era
15
Why Choose Comprehensive EMM?
• Provide options to address multiple use cases• Protects corporate resources and reduces risk of data loss • Preserves the native experience on the device• Allows you to manage the data even if employee owned• Platform choice and device type left to end user
Device Level
App/Doc Level
Enterprise LevelWork
App Catalog
******
Doc CatalogApp Wrapping
16
Why Customers Love MaaS360
Powerfulfeatures to address the full mobility lifecycle
Seamlessintegration with all your existing infrastructure
Simpleand fast with an exceptional experience
Provenapproach to cloud mobility management
Securecontainers to separate work and play
Exchange
AD/LDAP
Lotus
BES
Certs
17
18
19
Q&A
John NeibelPresident & Founderjneibel@mirroredstorage.com214-550-0550www.mirroredstorage.com