Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah,...

33
www.numaracloud.com Mobile Device Management: Do You Know Who’s Accessing Your Network? Umesh Shah, Dir. Channel Marketing

Transcript of Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah,...

Page 1: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Mobile Device Management: Do You Know Who’s Accessing Your Network?

Umesh Shah, Dir. Channel Marketing

Page 2: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Agenda

• Consumerization of IT• Defining Mobile Device Management• Numara Cloud Mobile Device Management

Page 3: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

CONSUMERIZATION OF IT

Mobile Device Management

Page 4: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

In the News

Page 5: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

5 Trends Leading to Consumerization of IT

1. The rise of social media as a business applicationi.e. LinkedIn and Salesforce.com

2. The blurring of work and homeForrester Research: 43% of the American workforce will have the option to

telecommute by 2016

3. The emergence of new mobile devices

By 2013, global smartphone shipments will exceed PC shipments for the first time.

4. Shifting business modelsReliance on social media and ecommerce

5. Employee expectations of corporate ITFacebook, open source generation coming into the workforce

Page 6: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

What Challenges Are You Facing?

Effective IT Security Policies and Procedures• How to manage and ensure security of data on the move• When to restrict device content and capabilities• Device and user profile management

Ensuring Technical Ability to support Security Policies• Knowledge of devices and mobile OS’s• Effective perimeter security (i.e. firewalls, VPN etc…)• Effective Mobile Device Management Software

Employee Resistance to Managed Personal Devices• Co-mingling of personal and corporate data on the same device• IT ability to monitor and remotely wipe the device• Geo-Location aka Big Brother

Page 7: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

What Opportunities Can You Take Advantage of?

Revamp Security Policies and Procedures• In place of taking a piece-meal approach, take the opportunity for an

overhaul of existing policies in support of consumerization.

Revamp of Perimeter Security Hardware & Software (i.e. MDM)• Updated and tightened perimeter to support hybrid devices

accessing the corporate network.

Increased Employee Productivity• The top metric used to support consumerization ROI is employee

productivity followed by employee moral. *

* Source: CIO.com study of IT Consumerization

Page 8: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

DEFINING THE DISCIPLINE

Mobile Device Management

Page 9: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

So What is Mobile Device Management (MDM)?

Mobile Device Management is managing and securing devices

• Protecting Microsoft Exchange from unmanaged devices• Remotely provisioning• Remotely troubleshooting• Backing up and restoring• Policy management• Preventing theft and recovering lost devices• Managing inventory • Reporting on mobile infrastructure

Page 10: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Conservative estimates place value of “pure” MDM model at $180m in 2011, with CAGR of 30% over next 2-3 years

Gartner predicts adoption rate of MDM

180

234

304

395

514

2011 2012 2013 2014 2015

$(M

)

30% CAGR

Gartner Market Growth Expectations

Source: Gartner, 2011

Page 11: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Mobile Device Management Lifecycle

Inventory

Configure

MonitorSecure

Backup & Recovery

Identify mobile devices on network

Hardware and software ID

On-device file system management

End-user self-registration

Assess exposure to malicious email

Remote deployment & management

Executive reports

Geo-locate devices with Google MapsTM

Lock and Wipe

Prevent sharing of critical data via email

Restore contacts, calendar, SMS,

multimedia, files

Recover lost or stolen devices

Auto-deployment

Auto-provision email configuration, pass codes

and security policies

Prevent unauthorized Microsoft Exchange

access

Page 12: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Defining The Discipline

• Partnering With The End User– Make it easy for the user to do “their job” in MDM– Take the Geek out of configuration– Being sensitive to privacy concerns

Page 13: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Defining The Discipline

• Making IT feel Comfortable– Securing corporate data– Ensuring limited interaction required– Providing a robust toolset

Page 14: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Defining The Discipline

• Transitioning to a Device is a Device– MDM is becoming an IT responsibility– Balancing corporate policies on personal devices– Needs to be founded in strong ITIL based best

practices

Page 15: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

NUMARA CLOUD MOBILE DEVICE MANAGEMENT KEY FEATURES

Page 16: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Key Features

• 100% web based cloud offering• Enjoy the full inventory of your wireless devices• Self-Service Registration and Auto Provisioning• Manage applications• Provision settings• “Over the Air” Actions• Corporate Email Protection• Integrated helpdesk• Remote Control• Geo-Location

Page 17: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

“Over the Air” Actions

• Remote “detonate”/wipe• Remote auto-lock policy• Enable/disable camera or Bluetooth capabilities• Enforce device encryption• Blacklist applications• Prevent users from installing blocked third party applications• SIM card change policy• Security applications support• Backup/restore contacts, calendar, SMS, bookmarks, notes, sales,

and folders (across devices)

Page 18: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Corporate Email Protection

• Numara Software Exchange DefenderTM – Prevent unmanaged mobile devices from accessing and sharing critical data and documents via email

• Numara Software Exchange InvestigatorTM – Quickly assess risk and exposure to malicious email hackers with executive level reporting detailing the number of users and mobile devices connected to Exchange

Page 19: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Self-Service Registration and Auto Provisioning

• Just got that new iPhone and have no idea how to connect to Exchange or what the WiFi security key is?– Easy via company Self Service Page– User registers with their phone number and follows a text

message to the App store– Once registered, the defined auto provision packages are

automatically deployed.• Out of the box Exchange, Wireless, and Pass code security

provisioning

Page 20: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

FEATURE TOUR

Mobile Device Management

Page 21: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Self-Service Registration

Page 22: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

SMS Message

Page 23: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Profiles Provisioned

Page 24: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Page 25: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Lock Phone

Page 26: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Install Client

Page 27: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Device Activated

Page 28: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

MDM Client Installed

Page 29: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Detect Jailbroken iOS Device

Page 30: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

GEO Locating iOS

Page 31: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

THE WRAP-UP

Mobile Device Management

Page 32: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

Numara Cloud Mobile Device Management

IT Consumerization is here to stay.

Organizations need a flexible and robust MDM solution

Numara Cloud MDM provides IT organizations the control they need to securely manage mobile devices throughout

their entire lifecycle.

Page 33: Www.numaracloud.com Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.

www.numaracloud.com

QUESTIONS?