14
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Embed Size (px)

Citation preview

Page 1: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Mobile Content Strategies and Deployment Best Practices

Page 2: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Enterprise Mobility Management

Mobile Security

Mobile Device Management

Mobile Application Management

Mobile Content Management

Mobile Email Management

2

Page 3: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

3

IT ChallengesIT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices.

• Securing proprietary content

• DLP

• Privacy of Employee’s Data

• Network Access

• Network Security

• Lost and stolen devices

• Supporting new and unknown equipment

Page 4: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

4

Create A Policy• Mobile Devices Supported

• Data Plans

• Security

• Compliance

• Privacy

• Type of Applications allowed and usage

• Services – what can employees access (email, VPN.. )

• Agreement that outlines employee devices with corporate data

Page 5: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Mobile Security

Key Considerations• Enable multifactor user authentication

• Enforce consistent security policies

• Encrypt sensitive corporate data

• Support internal PKI and 3rd party certificates

• Manage user access to corporate resources

• Establish network access controls

• Enforce compliance rules and actions

• Remotely wipe enterprise data

5

Page 6: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Mobile Content Management

Key Considerations• Create a corporate container for documents

• Enforce multifactor user authentication

• Manage user access rights and file privileges

• Define standard and custom file metadata

• Distribute files over encrypted connections

• Integrate with SharePoint or other file servers

• Delegate admin control across internal groups

• Track document versions, updates and usage

6

Page 7: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Enterprise Architecture

7

Automated MonitoringAutomate monitoring through a direct

plug in to Microsoft’s System Center Operations Manager (SCOM)

Disaster RecoverySetup software in a remote data center

and enable in the event of a data center failure

High AvailabilityDeploy in a highly available environment

with all components made to instantly fail over without downtime

ScalabilityDeploy 10 to 100,000 devices through a configuration that easily scales to support additional device capacity

ConfigurabilityDeploy the specific software to your environment and architecture requirements

Multi-tenancyAbsorb fragmentation within your corporate infrastructure into a single instance of AirWatch

Page 8: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

8

Prevent Unapproved Systems and Devices from Accessing Corporate Resources

• Device Ownership

• Device Staging

• Device Registration

• User Authentication

• End User License Agreements (EULAs)

• Restrictions

Page 9: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Protect Employee Privacy

9

GMail

Employee Device

Exchange

Personal Apps

Business Apps

CallsMessages

GPS Location

User Info

Enable BYOD by ensuring the privacy of personal data

• Set privacy policies that do not collect personal data

• Customize policies based on device ownership

• Corporate – Dedicated

• Corporate – Shared

• Employee – Owned

Define granular privacy policies for employee-owned devices • GPS location• User info

• Name• Phone number• Email account

• Telecom data• Calls• Messages• Data usage

• Public apps

Page 10: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Ensure Device Compliance

10

Build PoliciesApplication listCompromised statusEncryptionModel, OS versionPasscodeRoaming

Define EscalationTime based:• Minutes• Hours• DaysTiered actionsRepeat actions

Specify ActionsSend SMS, Email, push notificationRequest device check-inRemove or block specific profilesInstall compliance profileRemove all profilesRemove or block appsEnterprise wipe

1 2 3

Page 11: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

11

Measure ROI• Compare partially subsidized data plan to a corporate plan

• Evaluate reduced hardware costs due to elimination of the cost of device

• Cost of a fully subsidized data plan versus a partially subsidized plan

• Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform

Page 12: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

About AirWatch

6,500customers

150countries

18languages

1200employees

12

Our Mission: Simplify Enterprise MobilityTM

Page 13: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Representative Customers

13

Consumer Goods/Retail

Education HealthcareGovernment ServicesTransportation

Page 14: Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

About AirWatchAdrian Dumbleton Sales Manager [email protected]

14