11.11.2009PUBLIC1 Making enterprise mobility secure and cost-efficient Reducing total cost of...
-
Upload
audrey-johnston -
Category
Documents
-
view
216 -
download
0
Transcript of 11.11.2009PUBLIC1 Making enterprise mobility secure and cost-efficient Reducing total cost of...
11.11.2009 PUBLIC 1
Making enterprise mobility secure and
cost-efficientReducing total cost of ownership (TCO) and minimizing security threats related
to mobile devices and applications.Case studies on end user support, VoIP deployment and policy enforcement.
11.11.2009 PUBLIC 2
FromdistanceCompany overview
11.11.2009 PUBLIC 3
• Goal: to make mobile devices part of enterprise information system
• Main product: Fromdistance MDM (Mobile Device Manager)
• Customers: financial sector, public administration, media companies, security, ...
• Partners: over 50 resellers in 20 countries – from global system integrators to focused service providers and VARs
• OfficesTallinn, Estonia (HQ)Milan, ItalyMadrid, SpainOslo, NorwayHelsinki, Finland
Fromdistance in brief
11.11.2009 PUBLIC 4
Enterprise mobility benefits
Cliches – removed
(why do you have
a mobile
phone?)
Cliches – re
moved
(why do you have
a mobile phone?)
11.11.2009 PUBLIC 5
Enterprise mobility costs
11.11.2009 PUBLIC 6
Points of costs• TCO of smartphone
– $2100-$2500/year– Gartner, of BlackBerry smartphones
• Telecom costs– 1%-2% of total revenue of enterprise
– Tangoe (2009)
• Bogus repairs– 140€/service cycle
40% of mobile devices sent to repair don’t need any fixing - another 40% needs fixes only in softwareConclusion: courier fixes devices
11.11.2009 PUBLIC 7
Out of sight, out of mind?• Best in class companies have used Total Telecom Cost
Management (TTCM) technologies and methodologies to bring better than 70% of telecom spend under management, while average performers manage as little as 30%
– Aberdeen Group
• 85% of telecom invoices are not audited although 7-12% of all charges are in error
– Aberdeen Group
• Surrendering to users’s desires on devices and applications increses TCO of a mobile device by 60%-100%
– Gartner
11.11.2009 PUBLIC 8
Enterprise mobilityThe issues - security
11.11.2009 PUBLIC 9
Taxis, taxis, taxis...• Passengers in New York's Yellow Taxicabs left behind
31,544 cell phones (an average of more than two phones per taxi) in cabs over the last six months– Credant Technologies, 2008
• In fact, the last six months alone have seen 55,843 mobile phones left in the back of London's black cabs– Credant Technologies, 2008
• If the experience is replicated across Sydney's fleet of 5,749 taxis, passengers have left a total of 13,280 mobiles, 977 laptops and 1725 pocket personal computers/personal digital assistants behind over the six month period– Pointsec, 2005
11.11.2009 PUBLIC 10
Learning curveUntil it hit the fan...
11.11.2009 PUBLIC 11
Market awareness evolution2005 ”The devices are already out there, what now?”
2006 ”We standardize to one model, that’s it.”
2007 “We need e-mail, data encryption, VPN, mobile device management, virus protection, backups, scheduled firmware updates, linking to LDAP, ...”
2008 “We’ve been making specs for 3 years now – time to proceed.”2009 “The devices are already out there, what now?”
11.11.2009 PUBLIC 12
Tough economy is good – sometimes
• Companies are looking for savings– VoIP (also over mobile network)– Reduced end-user support costs– Switching Excel and Adidas into something better
• Companies need security– Push e-mail is used– People do store data to devices– Spyware is reality
• Idealism -> pragmatism– Start small, make progress
11.11.2009 PUBLIC 13
Risk and cost reductionSeeing is knowing, knowing is saving
14
Know your devices, know their users
11.11.2009 PUBLIC
11.11.2009 PUBLIC 15
Before cutting hands, try handcuffs
• Application policiesPrevent installationsBlacklist applicationsEnforce security software
• Security settingsEnforce device lockTurn on encryptionConsider Bluetooth
• Lock connectivityIs all WiFi good?What to keep/delete?
11.11.2009 PUBLIC 16
Take control over your devices
Many issues encountered by end users can be solved – but also prevented
You might not be in charge of the network – maybe devices are leased...
But the data is yours.
17
Data costs – where, when?
11.11.2009 PUBLIC
18
Calls cost – where, when?
11.11.2009 PUBLIC
11.11.2009 PUBLIC 19
End user supportCase study
11.11.2009 PUBLIC 20
What you should know and not ask• Device settings
Firmware versionConnectivity settingsLast reboot timeMemory status…
• Installed applicationsVersion (also history)Running or not?…also processes
• Network environment
11.11.2009 PUBLIC 21
Variable user interfaces
11.11.2009 PUBLIC 22
VoIP deploymentCase study
11.11.2009 PUBLIC 23
Policy enforcementCase study
11.11.2009 PUBLIC 24