SlideShare a Scribd company logo
1 of 29
May 6, 2014 Jason Murray, D.CS
BYOD
One to One
Combination
• Decisions:
• Decide which mobile operating systems should be allowed.
• Decide which corporate resources should be accessible from mobile devices.
• A strategy is like a block of raw marble. It needs to be chipped away
at, defining limits and specific details until it is a work of art that is
perfectly suited to your unique organization.
• Introduction of full or partial BYOD programs shifts some choices to
the users, but IT still has – and must maintain – power as
recommenders of which devices to acquire and what to do with
them.
• What do you need to be able to do with users’ devices? Answer this
question before creating written policies or investing in any management
technology.
• Policy Decisions. Mobile devices are personal, and the benefits of more
control are often offset by users resistant to that control. Having to
monitor and enforce more rules also means more hassle for IT. Have a
specific reason for each policy.
• Don’t choose show over substance. Blocking Fruit Ninja may send a
clear message about wasting time, but it is more important to identify
serious risks. If any apps need to be restricted, Proxy server apps are
probably a larger threat than any number of Angry Birds.
• Complement technology policies with people policies. User behavior is
as important as technology in a strong strategy. Educate users on the
technology policies that are in place, and on policies that technology
alone can’t enforce.
DON’T IMPLEMENT MANAGEMENT SOFTWARE, THEN START TICKING BOXES.
FIRST, DECIDE WHAT CONTROL IS NEEDED ON DEVICES, AND WHICH POLICIES
CAN EXERT THAT CONTROL.
• Create a written policy that:
• Explains the purpose of the policy.
• Specifies to whom it applies.
• Explains the policies in place and the
technology enforcing them.
• Warns about the consequences of
non-compliance.
• A policy of remotely wiping devices if anything goes wrong is the
minimum an organization can do to guard against mobile device
disasters.
• It is essential that users are aware of remote wipe capabilities and
procedures, and to consent to have their devices wiped. Such
consent is especially crucial for BYOD organizations.
• Considerations:
• Communicate the purpose and importance of remote wipe.
• Specify who the policy applies to and when it will be invoked.
• Describe the remote wipe technology used.
• Where applicable, procedures for selectively wiping corporate data only
• By connecting to [company name]’s corporate resources, mobile devices gain
the capability of being wiped remotely by [company name]’s IT department.
This capability is enabled by IT’s use of [describe remote wipe technology;
e.g. ActiveSync, BES, third-party MDM vendor].
• When a remote wipe is initiated by the user or the IT department, the user’s
mobile device will be wiped of all data and restored to its factory default
settings. The wipe is not limited to corporate data. Data that the employee
has added to the device for personal use will also be deleted. This data is not
recoverable on the device itself, but can usually be restored from a backup
(e.g. on a personal computer or a cloud service) if the mobile device remains
in or returns to the user’s possession, or a new device is able to store the
backup. It is recommended that users back up their personal data
frequently to minimize loss if a remote wipe is necessary.
• A remote wipe will only be initiated if IT deems it absolutely necessary.
Examples of situations requiring remote wipe include, but are not limited to:
• Theft of the device.
• Loss of the device.
• There is an arms race in MDM features, and different MDM
vendors specialize in different sets of features in order to attempt
to stand out among the crowd.
• Different approaches also offer different levels of security,
weighed against different end-user experiences. For example:
• Containerized approaches completely segregate corporate data and apps
from personal resources, maximizing security but requiring more steps to
set up and operate devices.
• Agent-dependent approaches require installation of an agent on
managed devices. This unlocks some advanced functionality such as
jailbreak detection and remote support.
• Agent-free approaches require minimal setup from users, but can be
limited in the control that IT can exert over their devices.
• Some vendors offer a mixed approach, allowing IT to choose
which approach they prefer.
• 1. Tangoe- Tangoe is one of the famous mobile management service providers. It is available all over the
world and is quite famous in offering MDM services to large size corporations.
• 2. Maas360- Maas360 is known for offering its services to the smaller enterprises. Their professionals
are quite experienced in handling all tasks of MDM.
• 3. Winmagic- Winmagic is one of the famous names in offering security to mobile devices which are
lost. The company is offering its services all over the world and in exchange of a very reasonable price
• 4. CA technologies- this is the company which a great reputation in offering security to mobile devices.
They have a large number of clients who are enjoying their services globally.
• 5. Mobileiron- Mobileiron services are widely recommended by experts in MDM. This company is quite
famous in providing network security, managing cell phones and billing.
• 6. Airwatch- Airwatch is one of the famous names in MDM. The company is known for offering high
level services which are totally free from all issues. Their global presence is their leading specialty.
• 7. Visage mobile- Visage mobile is an American MDM service provider. They have professionals that are
known for effectively integrating the system of one enterprise with another.
• 8. Mformation- Mformation is another American MDM service provider whose professionals are
known for managing usage of all mobile devices in an excellent way.
• 9. Zenprice- Zenprice is the leader in mobile device management that offers its services in exchange of a
very good price.
• 10. Mctel- Mctel is another quality leader in MDM which is known for managing all categories of mobile
devices.
• OpenMEAP
• WSO2 Enterprise Mobility Manager
• Device Policy Manager (Android only)
• Organizations with training programs are best able to reap the
benefits of mobile technology. Training has the most impact in
mitigating the potential negative effects of mobile devices, such
as lowering spending and reducing help desk load.
• Training and enforcement are necessary to set an example. They
show that policies are taken seriously, and in place for a reason.
• In organizations with mixed strategies, customize training for each
group of users. Target their use cases and specify how policies are
implemented on the technology that they use.
• Your carefully chosen strategy and set of policies will mean
nothing if users are unaware of them. Have a method of
educating users on your mobile strategy.
•http://www.slideshare.net/jasonmurray72
•jasonmurray72@gmail.com
• www.infotech.com
• www.mdmserver.org
• thejournal.com
• campustechnology.com
• air-watch.com

More Related Content

What's hot

Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Mobile device management
Mobile device managementMobile device management
Mobile device managementMalin De Silva
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.[x]cube LABS
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case studyManageEngine
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Summit 7 Systems
 

What's hot (20)

Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case study
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 

Viewers also liked

Japan Mobile Web Case Study: mobagetown
Japan Mobile Web Case Study: mobagetownJapan Mobile Web Case Study: mobagetown
Japan Mobile Web Case Study: mobagetownChristopher Billich
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Datakidozen
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...WSO2
 
Executive Overview of Service Management in the Mobile Era
Executive Overview of Service Management in the Mobile EraExecutive Overview of Service Management in the Mobile Era
Executive Overview of Service Management in the Mobile EraKevin Coppins
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility kidozen
 
WSO2 Enterprise Mobility Manager - Product Overview
WSO2 Enterprise Mobility Manager - Product OverviewWSO2 Enterprise Mobility Manager - Product Overview
WSO2 Enterprise Mobility Manager - Product OverviewWSO2
 
Reaching 100 Million Japanese Shoppers on Rakuten Ichiba
Reaching 100 Million Japanese Shoppers on Rakuten IchibaReaching 100 Million Japanese Shoppers on Rakuten Ichiba
Reaching 100 Million Japanese Shoppers on Rakuten IchibaReid Wegner
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunicationKarun Mahajan
 
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDMWSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDMWSO2
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 

Viewers also liked (15)

Japan Mobile Web Case Study: mobagetown
Japan Mobile Web Case Study: mobagetownJapan Mobile Web Case Study: mobagetown
Japan Mobile Web Case Study: mobagetown
 
Japan's Mobile Business Revitilization Plan
Japan's Mobile  Business  Revitilization  PlanJapan's Mobile  Business  Revitilization  Plan
Japan's Mobile Business Revitilization Plan
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Data
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
 
Executive Overview of Service Management in the Mobile Era
Executive Overview of Service Management in the Mobile EraExecutive Overview of Service Management in the Mobile Era
Executive Overview of Service Management in the Mobile Era
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility
 
WSO2 Enterprise Mobility Manager - Product Overview
WSO2 Enterprise Mobility Manager - Product OverviewWSO2 Enterprise Mobility Manager - Product Overview
WSO2 Enterprise Mobility Manager - Product Overview
 
Reaching 100 Million Japanese Shoppers on Rakuten Ichiba
Reaching 100 Million Japanese Shoppers on Rakuten IchibaReaching 100 Million Japanese Shoppers on Rakuten Ichiba
Reaching 100 Million Japanese Shoppers on Rakuten Ichiba
 
Vodafone Presentation
Vodafone PresentationVodafone Presentation
Vodafone Presentation
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunication
 
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDMWSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 

Similar to A strategic view of mobile device management

Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comPhD Assistance
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility managementTim Youm
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comPhD Assistance
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...Diego Alberto Tamayo
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesMidmarketIBM
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementMichael Lemm
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Christopher Hunt
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick SnapshotLinson Kolanchery
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1lverb
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Ahmed Banafa
 

Similar to A strategic view of mobile device management (20)

Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle Management
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Byod
ByodByod
Byod
 
BYOD
BYODBYOD
BYOD
 
Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 

More from Jason Murray

Desktop Support Essentials
Desktop Support EssentialsDesktop Support Essentials
Desktop Support EssentialsJason Murray
 
Schoology Features
Schoology FeaturesSchoology Features
Schoology FeaturesJason Murray
 
Literacy Resources
Literacy ResourcesLiteracy Resources
Literacy ResourcesJason Murray
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali LinuxJason Murray
 
Technology Leadership: Transforming a Culture
Technology Leadership:  Transforming a CultureTechnology Leadership:  Transforming a Culture
Technology Leadership: Transforming a CultureJason Murray
 
Creating Effective elearning
Creating Effective elearningCreating Effective elearning
Creating Effective elearningJason Murray
 
Gamification – Instructional Design Strategy
Gamification – Instructional Design StrategyGamification – Instructional Design Strategy
Gamification – Instructional Design StrategyJason Murray
 
Virtualized Professional Development
Virtualized Professional DevelopmentVirtualized Professional Development
Virtualized Professional DevelopmentJason Murray
 
Second Life: The Distance Ed Vehicle
Second Life: The Distance Ed VehicleSecond Life: The Distance Ed Vehicle
Second Life: The Distance Ed VehicleJason Murray
 
CLSD Technology Partial Roadmap - Admin Retreat
CLSD Technology Partial Roadmap - Admin RetreatCLSD Technology Partial Roadmap - Admin Retreat
CLSD Technology Partial Roadmap - Admin RetreatJason Murray
 
Student Tech Possibilities
Student Tech PossibilitiesStudent Tech Possibilities
Student Tech PossibilitiesJason Murray
 
Mobile Apps for Education
Mobile Apps for EducationMobile Apps for Education
Mobile Apps for EducationJason Murray
 
Flavors of linux - framework
Flavors of linux - frameworkFlavors of linux - framework
Flavors of linux - frameworkJason Murray
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Virtualized professional development
Virtualized professional developmentVirtualized professional development
Virtualized professional developmentJason Murray
 
Mobile learning tools
Mobile learning toolsMobile learning tools
Mobile learning toolsJason Murray
 

More from Jason Murray (20)

Desktop Support Essentials
Desktop Support EssentialsDesktop Support Essentials
Desktop Support Essentials
 
Schoology Features
Schoology FeaturesSchoology Features
Schoology Features
 
Literacy Resources
Literacy ResourcesLiteracy Resources
Literacy Resources
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
 
Technology Leadership: Transforming a Culture
Technology Leadership:  Transforming a CultureTechnology Leadership:  Transforming a Culture
Technology Leadership: Transforming a Culture
 
Creating Effective elearning
Creating Effective elearningCreating Effective elearning
Creating Effective elearning
 
1 to 1 Logistics
1 to 1 Logistics1 to 1 Logistics
1 to 1 Logistics
 
Refining Linux
Refining LinuxRefining Linux
Refining Linux
 
Gamification – Instructional Design Strategy
Gamification – Instructional Design StrategyGamification – Instructional Design Strategy
Gamification – Instructional Design Strategy
 
Virtualized Professional Development
Virtualized Professional DevelopmentVirtualized Professional Development
Virtualized Professional Development
 
Flipped Meetings
Flipped MeetingsFlipped Meetings
Flipped Meetings
 
Second Life: The Distance Ed Vehicle
Second Life: The Distance Ed VehicleSecond Life: The Distance Ed Vehicle
Second Life: The Distance Ed Vehicle
 
Alice training
Alice trainingAlice training
Alice training
 
CLSD Technology Partial Roadmap - Admin Retreat
CLSD Technology Partial Roadmap - Admin RetreatCLSD Technology Partial Roadmap - Admin Retreat
CLSD Technology Partial Roadmap - Admin Retreat
 
Student Tech Possibilities
Student Tech PossibilitiesStudent Tech Possibilities
Student Tech Possibilities
 
Mobile Apps for Education
Mobile Apps for EducationMobile Apps for Education
Mobile Apps for Education
 
Flavors of linux - framework
Flavors of linux - frameworkFlavors of linux - framework
Flavors of linux - framework
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Virtualized professional development
Virtualized professional developmentVirtualized professional development
Virtualized professional development
 
Mobile learning tools
Mobile learning toolsMobile learning tools
Mobile learning tools
 

Recently uploaded

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

A strategic view of mobile device management

  • 1. May 6, 2014 Jason Murray, D.CS
  • 2.
  • 3.
  • 4.
  • 5.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. • Decisions: • Decide which mobile operating systems should be allowed. • Decide which corporate resources should be accessible from mobile devices. • A strategy is like a block of raw marble. It needs to be chipped away at, defining limits and specific details until it is a work of art that is perfectly suited to your unique organization. • Introduction of full or partial BYOD programs shifts some choices to the users, but IT still has – and must maintain – power as recommenders of which devices to acquire and what to do with them.
  • 12.
  • 13.
  • 14.
  • 15. • What do you need to be able to do with users’ devices? Answer this question before creating written policies or investing in any management technology. • Policy Decisions. Mobile devices are personal, and the benefits of more control are often offset by users resistant to that control. Having to monitor and enforce more rules also means more hassle for IT. Have a specific reason for each policy. • Don’t choose show over substance. Blocking Fruit Ninja may send a clear message about wasting time, but it is more important to identify serious risks. If any apps need to be restricted, Proxy server apps are probably a larger threat than any number of Angry Birds. • Complement technology policies with people policies. User behavior is as important as technology in a strong strategy. Educate users on the technology policies that are in place, and on policies that technology alone can’t enforce. DON’T IMPLEMENT MANAGEMENT SOFTWARE, THEN START TICKING BOXES. FIRST, DECIDE WHAT CONTROL IS NEEDED ON DEVICES, AND WHICH POLICIES CAN EXERT THAT CONTROL.
  • 16. • Create a written policy that: • Explains the purpose of the policy. • Specifies to whom it applies. • Explains the policies in place and the technology enforcing them. • Warns about the consequences of non-compliance.
  • 17. • A policy of remotely wiping devices if anything goes wrong is the minimum an organization can do to guard against mobile device disasters. • It is essential that users are aware of remote wipe capabilities and procedures, and to consent to have their devices wiped. Such consent is especially crucial for BYOD organizations. • Considerations: • Communicate the purpose and importance of remote wipe. • Specify who the policy applies to and when it will be invoked. • Describe the remote wipe technology used. • Where applicable, procedures for selectively wiping corporate data only
  • 18. • By connecting to [company name]’s corporate resources, mobile devices gain the capability of being wiped remotely by [company name]’s IT department. This capability is enabled by IT’s use of [describe remote wipe technology; e.g. ActiveSync, BES, third-party MDM vendor]. • When a remote wipe is initiated by the user or the IT department, the user’s mobile device will be wiped of all data and restored to its factory default settings. The wipe is not limited to corporate data. Data that the employee has added to the device for personal use will also be deleted. This data is not recoverable on the device itself, but can usually be restored from a backup (e.g. on a personal computer or a cloud service) if the mobile device remains in or returns to the user’s possession, or a new device is able to store the backup. It is recommended that users back up their personal data frequently to minimize loss if a remote wipe is necessary. • A remote wipe will only be initiated if IT deems it absolutely necessary. Examples of situations requiring remote wipe include, but are not limited to: • Theft of the device. • Loss of the device.
  • 19.
  • 20.
  • 21. • There is an arms race in MDM features, and different MDM vendors specialize in different sets of features in order to attempt to stand out among the crowd. • Different approaches also offer different levels of security, weighed against different end-user experiences. For example: • Containerized approaches completely segregate corporate data and apps from personal resources, maximizing security but requiring more steps to set up and operate devices. • Agent-dependent approaches require installation of an agent on managed devices. This unlocks some advanced functionality such as jailbreak detection and remote support. • Agent-free approaches require minimal setup from users, but can be limited in the control that IT can exert over their devices. • Some vendors offer a mixed approach, allowing IT to choose which approach they prefer.
  • 22.
  • 23. • 1. Tangoe- Tangoe is one of the famous mobile management service providers. It is available all over the world and is quite famous in offering MDM services to large size corporations. • 2. Maas360- Maas360 is known for offering its services to the smaller enterprises. Their professionals are quite experienced in handling all tasks of MDM. • 3. Winmagic- Winmagic is one of the famous names in offering security to mobile devices which are lost. The company is offering its services all over the world and in exchange of a very reasonable price • 4. CA technologies- this is the company which a great reputation in offering security to mobile devices. They have a large number of clients who are enjoying their services globally. • 5. Mobileiron- Mobileiron services are widely recommended by experts in MDM. This company is quite famous in providing network security, managing cell phones and billing. • 6. Airwatch- Airwatch is one of the famous names in MDM. The company is known for offering high level services which are totally free from all issues. Their global presence is their leading specialty. • 7. Visage mobile- Visage mobile is an American MDM service provider. They have professionals that are known for effectively integrating the system of one enterprise with another. • 8. Mformation- Mformation is another American MDM service provider whose professionals are known for managing usage of all mobile devices in an excellent way. • 9. Zenprice- Zenprice is the leader in mobile device management that offers its services in exchange of a very good price. • 10. Mctel- Mctel is another quality leader in MDM which is known for managing all categories of mobile devices.
  • 24. • OpenMEAP • WSO2 Enterprise Mobility Manager • Device Policy Manager (Android only)
  • 25. • Organizations with training programs are best able to reap the benefits of mobile technology. Training has the most impact in mitigating the potential negative effects of mobile devices, such as lowering spending and reducing help desk load. • Training and enforcement are necessary to set an example. They show that policies are taken seriously, and in place for a reason. • In organizations with mixed strategies, customize training for each group of users. Target their use cases and specify how policies are implemented on the technology that they use. • Your carefully chosen strategy and set of policies will mean nothing if users are unaware of them. Have a method of educating users on your mobile strategy.
  • 26.
  • 27.
  • 29. • www.infotech.com • www.mdmserver.org • thejournal.com • campustechnology.com • air-watch.com