managing byod effectively with enterprise mobility management
TRANSCRIPT
Powered by Presented by
EFFECTIVE BYOD
A presentation by: Tzachy Givaty, CommuniTake
Powered by Presented by
MOBILITY TRENDS
2
Powered by Presented by
MOBILITY TRENDS
3
The Mobile-First organisation
Apps drive the business
BYOD
On device data security - anti Cyber Crime
Powered by Presented by
MOBILITY MANAGEMENT CHALLENGES
Ensure users’ Productivity by using organisation apps
Enforce security policies for device network access
Support on-device files and messaging security
Balance between security and BYOD
Support overhead in employees’ mobile devices
Powered by Presented by
ENTERPRISE MOBILITY
MANAGEMENT (EMM)
SNAPSHOT
5
Powered by Presented by
EMM FUNCTIONS DEFINED
Enterprise mobility management (EMM) suites help organisations
integrate mobile devices into their security frameworks and systems and information technology life cycles.
EMM provides the common, cross-platform baseline to set, contain,
validate, enforce and update device policies.
Powered by Presented by
EMM TOOLS FUNCTIONS
Defense of enterprise data: Apply technologies to encrypt data, control
data flow and remotely revoke user access to mobile applications and
information in the event the user or device becomes untrusted
Provisioning: Configure devices and applications for enterprise use
Auditing, tracking and reporting: Audit mobile devices and applications to
track compliance with enterprise policies
Support: Help IT departments troubleshoot mobile device problems
Powered by Presented by
CORE EMM TECHNICAL CATEGORIES
MDM MAM MIM MCM
Mobile Device Management is a platform life cycle management that provides inventory and OS configuration management.
Mobile Applications Management applies for applications usage management via different policies that enforce by the organisation administrator.
Mobile Identity Management helps ensure only trusted devices and users access enterprise applications.
Mobile Content Management enables users to access content from their mobile devices.
Powered by Presented by
STANDARD EMM
SOLUTION OFFERING
9
Powered by Presented by
EMM - COMPONENTSPOLICIES MANAGEMENT REMOTE CARE DEVICE SHARING
DEVICE MANAGEMENT SECURE DEVICE CONTAINERISATION
Powered by Presented by
ASSETS MANAGEMENT
11
Complete assets view
Data filtering
Subject matter views
Easy enrollment / editing
Groups driven
Export to Excel
LDAP integration
Bulk upload
Powered by Presented by
POLICIES MANAGEMENT
12
Blacklist mgmt.
Whitelist mgmt.
Enterprise catalog
Mass deployments
OS restrictions
PW & Backup policy
Browser restrictions
Powered by Presented by
POLICIES MANAGEMENT cont’d
13
Event driven policies
BYOD management
Secure container
Launcher – lockdown
Home screen settings
Powered by Presented by
USAGE MONITORING
14
Call monitoring
Messages monitoring
Data monitoring
Plans definitions
Thresholds settings
Plans definitions
Usage report
Alerts & notifications
Powered by Presented by
MASS CONFIGURATIONS
15
Exchange definition
Wi-Fi definition
Connection intervals
VPN settings
Unified definitions
Groups driven
Launcher – device lockdown
Home screen settings
Powered by Presented by
DATA RECOVERY
16
Remote locate
Remote locate; lock; wipe
Remote backup
Inter OS restoration
Selective wipe
Email access control
Content access control
Apps & diagnostics view
Self service
Powered by Presented by
REMOTE SUPPORT
Remote device takeover
On-device screen drawing
Navigation macros
Guidance macros
Device diagnostics
Device apps / data mgmt.
Remote PC support
iOS remote configuration
Chat; replays; analytics
Powered by Presented by
BYOD
Strategy: Minimum interference
with private use; secure access
to enterprise content:
Differentiated privacy settings
Controlled access to emails
Contained messages
Secure access to SharePoint files
Ability to wipe enterprise material
18
Powered by Presented by
Encrypted Voice
Encrypted Chat
Encrypted Data
Hardened Device
Secure Firmware
Anti-malware
Groups’ Policies
SECURE DEVICE - OPTIONAL
Remote Control
Powered by Presented by
BYOD PROGRAM
DEPLOYMENT
20
Powered by Presented by
Legal implications
Privacy standards
Cost model
Success criteria
Risk posture/tolerance
Users
Groups
Devices
Apps and data
Access
IT Policies enforcement
Support & maintenance
Train users & IT
Ensuring compliance
Security access rules
User
Requirements
IT
Requirements
Business
Requirements
DEPLOYING A BYOD PROGRAM
Powered by Presented by
BYOD PROGRAM
Users
behavior
Prioritise
Users
Device
Assessment
Project
Plan
# of Devices
Device Type
Device Form
User Groups
Apps Accessed
Data Accessed
Application usage
User profile
Endpoint device
apps use method
App consolidation
Business Impact
Business priorities
Number of users
Time to Value
Time-frames
Dependencies:
- People
- Training
- Hardware
- Networking
- Active Directory
Powered by Presented by
EMM VERTICALS
23
Powered by Presented by
VERTICAL SOLUTIONS
Education UtilitiesRetail
Centrally manage assets &
deployments from afar
Lock devices to only retail
apps and tasks
Perform timely mass updates
of retail apps and content
Remote access and control for
properly operating devices
Centrally manage assets &
deployments from afar
Browsing control for focused
learning
Distribute timely & contextual
content and messages
Allow productive learning via
time & location driven use
Centrally manage assets &
deployments from afar
Guide from afar to mitigate
malfunctions’ risk
Secure access, web, content,
voice calls and IM
Always connected
professionals via total care
Device sharing for remote
guidance and collaboration
Remote control technology for
effective training from afar
Security-rich hardened device
for protected communications
Powered by Presented by
BYOD BENEFITS
25
Powered by Presented by
BYOD BENEFITS
Enhances workers’ productivity
Enable enforcement of IT policies on mobile devices
Secures mobile access to the organisation network
Real-time device inventory monitoring
Efficient support in employees devices and applications
Make sure your BYOD program has more pros than cons
Powered by Presented by
THANK YOU
To deploy MDM and manage BYOD, contact:
Tata Docomo Business Services
Call Toll-Free on: 1800-266-1800
Email: [email protected]