managing byod effectively with enterprise mobility management

28
Powered by Presented by EFFECTIVE BYOD A presentation by: Tzachy Givaty, CommuniTake

Upload: tata-docomo-business-services

Post on 18-Jan-2017

615 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

EFFECTIVE BYOD

A presentation by: Tzachy Givaty, CommuniTake

Page 2: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

MOBILITY TRENDS

2

Page 3: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

MOBILITY TRENDS

3

The Mobile-First organisation

Apps drive the business

BYOD

On device data security - anti Cyber Crime

Page 4: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

MOBILITY MANAGEMENT CHALLENGES

Ensure users’ Productivity by using organisation apps

Enforce security policies for device network access

Support on-device files and messaging security

Balance between security and BYOD

Support overhead in employees’ mobile devices

Page 5: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

ENTERPRISE MOBILITY

MANAGEMENT (EMM)

SNAPSHOT

5

Page 6: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

EMM FUNCTIONS DEFINED

Enterprise mobility management (EMM) suites help organisations

integrate mobile devices into their security frameworks and systems and information technology life cycles.

EMM provides the common, cross-platform baseline to set, contain,

validate, enforce and update device policies.

Page 7: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

EMM TOOLS FUNCTIONS

Defense of enterprise data: Apply technologies to encrypt data, control

data flow and remotely revoke user access to mobile applications and

information in the event the user or device becomes untrusted

Provisioning: Configure devices and applications for enterprise use

Auditing, tracking and reporting: Audit mobile devices and applications to

track compliance with enterprise policies

Support: Help IT departments troubleshoot mobile device problems

Page 8: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

CORE EMM TECHNICAL CATEGORIES

MDM MAM MIM MCM

Mobile Device Management is a platform life cycle management that provides inventory and OS configuration management.

Mobile Applications Management applies for applications usage management via different policies that enforce by the organisation administrator.

Mobile Identity Management helps ensure only trusted devices and users access enterprise applications.

Mobile Content Management enables users to access content from their mobile devices.

Page 9: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

STANDARD EMM

SOLUTION OFFERING

9

Page 10: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

EMM - COMPONENTSPOLICIES MANAGEMENT REMOTE CARE DEVICE SHARING

DEVICE MANAGEMENT SECURE DEVICE CONTAINERISATION

Page 11: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

ASSETS MANAGEMENT

11

Complete assets view

Data filtering

Subject matter views

Easy enrollment / editing

Groups driven

Export to Excel

LDAP integration

Bulk upload

Page 12: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

POLICIES MANAGEMENT

12

Blacklist mgmt.

Whitelist mgmt.

Enterprise catalog

Mass deployments

OS restrictions

PW & Backup policy

Browser restrictions

Page 13: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

POLICIES MANAGEMENT cont’d

13

Event driven policies

BYOD management

Secure container

Launcher – lockdown

Home screen settings

Page 14: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

USAGE MONITORING

14

Call monitoring

Messages monitoring

Data monitoring

Plans definitions

Thresholds settings

Plans definitions

Usage report

Alerts & notifications

Page 15: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

MASS CONFIGURATIONS

15

Exchange definition

Wi-Fi definition

Connection intervals

VPN settings

Unified definitions

Groups driven

Launcher – device lockdown

Home screen settings

Page 16: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

DATA RECOVERY

16

Remote locate

Remote locate; lock; wipe

Remote backup

Inter OS restoration

Selective wipe

Email access control

Content access control

Apps & diagnostics view

Self service

Page 17: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

REMOTE SUPPORT

Remote device takeover

On-device screen drawing

Navigation macros

Guidance macros

Device diagnostics

Device apps / data mgmt.

Remote PC support

iOS remote configuration

Chat; replays; analytics

Page 18: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

BYOD

Strategy: Minimum interference

with private use; secure access

to enterprise content:

Differentiated privacy settings

Controlled access to emails

Contained messages

Secure access to SharePoint files

Ability to wipe enterprise material

18

Page 19: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

Encrypted Voice

Encrypted Chat

Encrypted Data

Hardened Device

Secure Firmware

Anti-malware

Groups’ Policies

SECURE DEVICE - OPTIONAL

Remote Control

Page 20: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

BYOD PROGRAM

DEPLOYMENT

20

Page 21: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

Legal implications

Privacy standards

Cost model

Success criteria

Risk posture/tolerance

Users

Groups

Devices

Apps and data

Access

IT Policies enforcement

Support & maintenance

Train users & IT

Ensuring compliance

Security access rules

User

Requirements

IT

Requirements

Business

Requirements

DEPLOYING A BYOD PROGRAM

Page 22: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

BYOD PROGRAM

Users

behavior

Prioritise

Users

Device

Assessment

Project

Plan

# of Devices

Device Type

Device Form

User Groups

Apps Accessed

Data Accessed

Application usage

User profile

Endpoint device

apps use method

App consolidation

Business Impact

Business priorities

Number of users

Time to Value

Time-frames

Dependencies:

- People

- Training

- Hardware

- Networking

- Active Directory

Page 23: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

EMM VERTICALS

23

Page 24: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

VERTICAL SOLUTIONS

Education UtilitiesRetail

Centrally manage assets &

deployments from afar

Lock devices to only retail

apps and tasks

Perform timely mass updates

of retail apps and content

Remote access and control for

properly operating devices

Centrally manage assets &

deployments from afar

Browsing control for focused

learning

Distribute timely & contextual

content and messages

Allow productive learning via

time & location driven use

Centrally manage assets &

deployments from afar

Guide from afar to mitigate

malfunctions’ risk

Secure access, web, content,

voice calls and IM

Always connected

professionals via total care

Device sharing for remote

guidance and collaboration

Remote control technology for

effective training from afar

Security-rich hardened device

for protected communications

Page 25: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

BYOD BENEFITS

25

Page 26: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

BYOD BENEFITS

Enhances workers’ productivity

Enable enforcement of IT policies on mobile devices

Secures mobile access to the organisation network

Real-time device inventory monitoring

Efficient support in employees devices and applications

Make sure your BYOD program has more pros than cons

Page 27: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

Q&A

[email protected]

Page 28: Managing BYOD effectively with Enterprise Mobility Management

Powered by Presented by

THANK YOU

To deploy MDM and manage BYOD, contact:

Tata Docomo Business Services

Call Toll-Free on: 1800-266-1800

Email: [email protected]