Enterprise Mobile Management (EMM) - MTBC Luncheon

20
MDM or EMM It's all about Mobility 1

description

MDM or EMM - It's all about Mobility. What we have learned and experienced on the Mobile world and how we can help companies do more that allow mobile access to company assets, but protect the devices and the content on them BYOD is already here with >95% of users using personal devices for their jobs.

Transcript of Enterprise Mobile Management (EMM) - MTBC Luncheon

Page 1: Enterprise Mobile Management (EMM) - MTBC Luncheon

MDM or EMMIt's all about Mobility

1

Page 2: Enterprise Mobile Management (EMM) - MTBC Luncheon

Agenda

2

• How Mirrored Storage got into EMM• BYOD Revolution• EMM Best Practices• Security 2.0• MaaS360 Offering• Q&A

Page 3: Enterprise Mobile Management (EMM) - MTBC Luncheon

Mirrored Storage Experience

• Is your device secure?• Now can multiple device/version/platforms/… be managed

together?• Most Important Feature?

– Desktop Features– Cost of features– What’s possible– Cloud vs. In-house

• Is it possible to Manage FOR customers?• Market in moving at lightning speed!

3

Page 4: Enterprise Mobile Management (EMM) - MTBC Luncheon

The BYOD Revolution

95%

Source: http://newsroom.cisco.com/release/854754/Cisco-Study-IT-Saying-Yes-To-BYOD

Already said yes to BYOD

http://www.eweek.com/c/a/Enterprise-Networking/Cisco-Enterprises-are-Embracing-BYOD-252679/

4

Page 5: Enterprise Mobile Management (EMM) - MTBC Luncheon

Top IT Management Concerns

Source: Infoworld / Forrester http://www.infoworld.com/d/wp/the-expanding-role-of-mobility-in-the-workplace-211973

5

Page 6: Enterprise Mobile Management (EMM) - MTBC Luncheon

Key BYOD goals

• Protect corporate data• Protect user privacy and personal data• Support a diverse set of platforms/device types• Help users adhere to HR, audit, legal, compliance and

security guidance• Support a diverse set of policies, roles, personas and

access rights• Improve productivity and accessibility• Support employee work-style choice

Page 7: Enterprise Mobile Management (EMM) - MTBC Luncheon

EMM is Integral for BYOD

• Supports BYOD with self-service enrollment

• Configure devices and protect employee privacy

• Enforce security policies and meet regulations

• Push content, apps and docs to separate workspaces

7

Page 8: Enterprise Mobile Management (EMM) - MTBC Luncheon

Current EMM Best Practices

Integration AD/LDAP: 15% integrate for device enrollment & app/doc access Email Access Control: 20% quarantine new devices w/o MDM

Apps App Catalog: 80% of companies pushing apps Enterprise Apps: 25% of companies pushing enterprise apps Enterprise Apps: On average 6 apps per business. Median is 3.

Docs Containerize specific workflows / use cases: 40% of customers use Doc Mgmt Specific LOB use cases – sales materials, BOD materials, flight materials

Device iOS: ~80% of all enterprise devices. Leading BYOD choice.Android: Standards to reduce fragmentation. Tablets in field operations. Policy: Password, Require device encryption, Email/EAS configuration

8

Page 9: Enterprise Mobile Management (EMM) - MTBC Luncheon

EMM

• Mobility is becoming the platform, not an add on

• Organizations need comprehensive Enterprise Mobility Management

• IT needs growing beyond enabling these new platforms1. More use of identify, context and more sophisticated policy2. More app management & security (and app dev assist)3. More separation of corporate & personal apps/data4. More mobile utilization of corporate network/resources

Page 10: Enterprise Mobile Management (EMM) - MTBC Luncheon

App Management & Security 2.0

EMM App Security Requirements

Containerize Enterprise Apps• Further encrypt• AAA• Compliance checks• DLP controls

Link & Tunnel Enterprise Apps• SSO• Shared clipboard• Data sharing

• Tunnel to corporate LAN• “VPN free”

Link Public & Corporate Apps• SSO• Shared clipboard• Data sharing

MaaS360 App Security

Page 11: Enterprise Mobile Management (EMM) - MTBC Luncheon

Separation of Work & Personal 2.0

Separate Work & Personal Apps• Ensure sandboxing• Ensure selective wipe

Separate Work & Personal Content(Especially Work Docs & Attachments)

• Reduce DLP risk• Ensure selective wipe

• Tunnel to corporate LAN• “VPN free”Securely Access Content Repositories

EMM Data Security Requirements

MaaS360 Workplace

Page 12: Enterprise Mobile Management (EMM) - MTBC Luncheon

MDM 1.0 Practices

• Over-the-Air Device Configuration of Email, Calendar, Contacts, Corporate Wi-Fi

• Applications & Web Clips

• Passcode enforcement

• Remote lock and wipe

• Corporate Wipe, Full Wipe

• Expense Management

• Comprehensive Reporting & Real-time Alerts

EMM Best Practices

• App Management

• Document Management

• Secure Web Browser

• URL Filtering / Phishing

• Geo-fencing Policies

• Secure Container

• Encryption and DLP

• Email, Contacts, Calendar

• Third-party Apps

Evolving to Enterprise Mobility Management (EMM)

Page 13: Enterprise Mobile Management (EMM) - MTBC Luncheon

Comprehensive Mobility Management

The Essentials• SMS, email, or URL enrollment• Email, calendar, contact profiles• VPN and Wi-Fi settings• Device feature configuration• Policy updates & changes• Inventory management• Compliance reporting

Advanced Management• Mobile app management

• Document sharing

• Event-based policies

• Proactive expense controls

• BYOD privacy settings

• Shared device support

• Self service portal13

Location-based policies

Device Enrollment, Acceptable Use

OTA Configuration

Enterprise App Catalog

13

Page 14: Enterprise Mobile Management (EMM) - MTBC Luncheon

Robust Mobile Security

Device

Applications

Network

Email

Documents

Auto-quarantine/access approvalContain emails and attachments

Remote wipe of work email

Password authenticationRestrict copy, paste, shareRemote wipe of work files

Configure Wi-Fi and VPN profilesCert delivery and authentication

Dynamic policy based on SSID

Encryption and passcodesJailbreak/Root detection

Locate, lock, wipe

Blacklist/Whitelist mobile appsWrapping and compliance rulesRemote wipe of managed apps

Web

Define URL filters and categoriesAllow access to intranet sites

Disable native/3rd party browsers

14

Page 15: Enterprise Mobile Management (EMM) - MTBC Luncheon

MaaS360 Enterprise Mobile Security

Secure Mail

Application Security

Secure Document Sharing

Secure Browser

A Trusted WorkPlace container for seamless security and productivity

Dual Persona to separate personal and work data in the BYOD era

15

Page 16: Enterprise Mobile Management (EMM) - MTBC Luncheon

Why Choose Comprehensive EMM?

• Provide options to address multiple use cases• Protects corporate resources and reduces risk of data loss • Preserves the native experience on the device• Allows you to manage the data even if employee owned• Platform choice and device type left to end user

Device Level

App/Doc Level

Enterprise LevelWork

App Catalog

******

Doc CatalogApp Wrapping

16

Page 17: Enterprise Mobile Management (EMM) - MTBC Luncheon

Why Customers Love MaaS360

Powerfulfeatures to address the full mobility lifecycle

Seamlessintegration with all your existing infrastructure

Simpleand fast with an exceptional experience

Provenapproach to cloud mobility management

Securecontainers to separate work and play

Exchange

AD/LDAP

Lotus

BES

Certs

17

Page 18: Enterprise Mobile Management (EMM) - MTBC Luncheon

18

Page 19: Enterprise Mobile Management (EMM) - MTBC Luncheon

19

Page 20: Enterprise Mobile Management (EMM) - MTBC Luncheon

Q&A

John NeibelPresident & Founderjneibel@mirroredstorage.com214-550-0550www.mirroredstorage.com