Upload
bvandennotelaer
View
614
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
Manage, Control and Secure all mobile devices
Ulrik Van Schepdael [email protected]
Ceci n’est pas un téléphone
What is mobco about
Service portfolio • workshop on corporate mobility
• mobile policy and process development • integration of mobile IT infrastructure
Product portfolio • Manage mobile IT
• Control the
mobile cost
• Make it work for the end-user
focus on mobile
empowers the business to achieve more
The Mobile Challenges
Balanced Policy
Powerful Management
The Mobile Challenges
The user is in control
(WIRED Feb 28 ‘11) -- From the earliest days of aviation,
pilots have relied upon paper maps to help find their
way. Even in an era of GPS and advanced avionics, you
still see pilots lugging around 20 pounds or more of
charts.
But those days are numbered, because maps are giving
way to iPads.
The Federal Aviation Administration is allowing charter
company Executive Jet Management to use Apple's
tablet as an approved alternative to paper charts.
Multi OS
Challenges for IT !
• Manage the Multi-OS
• Control the Cost
• Mixed Personal and Corporate content
• Security of data at rest, travel, …
• AppstorM is here
Implementation scenario
‘web’ Server
Mail server
All have the same profile
No policy, no control
Potential to do better
Professionals with a Smart Phone work 15 hours extra per week,
earn 27% less and they love it!
(Peninsula UK Sept ‘09)
Users will use it for Work
The Mobile Challenges
Balanced Policy
Powerful Management
Differentiate the profiles
A mobile profile is a combination of
- device settings
- telecom billing rules
- applications
- network access
- support level
- …
Based on the user’s profile
What does the user NEED to execute his job in
a more efficient way using mobile resources?
One size does not fit all
(Forrester research) – not one company has the exact same
needs let alone the individual users within the company
Differentiate the profiles
Implementation scenario
‘profile’ Server
Mail server
Differentiated profiles
No policy, no control
Potential to do better
Intranet
LDAP
MobileIron Profile Configuraiton
Differentiate the policies
A mobile policy is a combination of
- device security
- certificates
- data privacy
- hardware concerns
- information security
- …
Based on the company’s IT strategy
What does the company requires the user to DO
in order to secure the business and information ?
Stalin versus Dalai Lama
75% of 1000 interviewed Belgian companies do NOT
agree employees connect their personal smartphone
or tablet to the corporate network.
+50% finds it unacceptable. (Datanews survey November 2010)
More than double of what is thought connects its
own device to the corporate network (IDC 2010)
What’s your style?
Control Choice Innovation Hands-Off
Primary Management goal
Guarantee service level and strictly control risk
Satisfy users without incurring excessive risk
Empower users to develop new techniques and
processes
Minimize management responsibility and
liability
Responsibility for service Quality
Enterprise IT Enterprise IT and Users
Users and Enterprise IT
Users
Support level Everything All, but limited on device
Self support, limited IT
Self support
Information
assurance
Enterprise
responsibility Enterprise and
User User and
Enterprise User
?
What’s your style?
Control Choice Innovation Hands-Off
Primary Management goal
Guarantee service level and strictly control risk
Satisfy users without incurring excessive risk
Empower users to develop new techniques and
processes
Minimize management responsibility and
liability
Responsibility for service Quality
Enterprise IT Enterprise IT and Users
Users and Enterprise IT
Users
Support level Everything All, but limited on device
Self support, limited IT
Self support
Information
assurance
Enterprise
responsibility Enterprise and
User User and
Enterprise User
?
What’s your style?
Control Choice Innovation Hands-Off
Primary Management goal
Guarantee service level and strictly control risk
Satisfy users without incurring excessive risk
Empower users to develop new techniques and
processes
Minimize management responsibility and
liability
Responsibility for service Quality
Enterprise IT Enterprise IT and Users
Users and Enterprise IT
Users
Support level Everything All, but limited on device
Self support, limited IT
Self support
Information
assurance
Enterprise
responsibility Enterprise and
User User and
Enterprise User
?
What’s your style?
Control Choice Innovation Hands-Off
Primary Management goal
Guarantee service level and strictly control risk
Satisfy users without incurring excessive risk
Empower users to develop new techniques and
processes
Minimize management responsibility and
liability
Responsibility for service Quality
Enterprise IT Enterprise IT and Users
Users and Enterprise IT
Users
Support level Everything All, but limited on device
Self support, limited IT
Self support
Information
assurance
Enterprise
responsibility Enterprise and
User User and
Enterprise User
?
What are the consequences ?
Control Choice Innovation Hands-Off
Policy Enforced Applied and Controlled
Applied and Controlled
Checked
Device Ownership
Enterprise Enterprise or User Enterprise or User User
Device choice Limited Medium range Anything Anything
Application
portfolio
Clearly defined Managed and
limited
Unconstrained Limited
enterprise apps
App store policy Forbidden Permitted but following policy
Permitted Permitted
Mobile Expenses Enterprise Mixed Mixed User
Device choice!
Implementation scenario
‘profile’ Server
Mail server
Differentiated profiles
Policy implementation
Potential to do better
Intranet
LDAP
CA
MobileIron Policy Configuraiton
The Mobile Challenges
Balanced Policy
Powerful Management
Survival of the fittest or powerful management :
When the configuration of the device and IT infrastructure is adaptive to changes.
MobileIron Control
Powerful management :
Adapt the device configuration
when device changes are not
acceptable.
MobileIron Control
Powerful management :
Adapt the device configuration when application rules are breached.
White/black/required listing.
MobileIron Posture Control
cable is the biggest threat for mobile
closed loop control
is mandatory
to guarantee
integrity
Implementation scenario
‘profile’ Server
Mail server
Differentiated profiles
Policy implementation
Control
Intranet
LDAP
CA
Posture Check
MobileIron
Manage all
mobile devices
•Device Management
•Security & Access
•Data Boundery
•Remote Control
•Enterprise App Store
+ bi-directional communication
with all devices makes all data is
available is real-time.
Combined with the inventory
comes real-time cost-
management!
MobileIron
Manage all
mobile devices
Control the
mobile cost
•Device Management
•Security & Access
•Data Boundery
•Remote Control
•Enterprise App Store
•Device Inventory
•Activity Analysis
•Int’l Roaming Monitor
•Quality Analysis
•Auto Alerting and
Actions
+ full integration
in IT architecture,
self-provisioning
portal is
available with
‘normal’
credentials.
Full automatic
configuration.
MobileIron
Manage all
mobile devices
Control the
mobile cost
Make it work for
the end-user
•Device Management
•Security & Access
•Data Boundery
•Remote Control
•Enterprise App Store
•Device Inventory
•Activity Analysis
•Int’l Roaming Monitor
•Quality Analysis
•Auto Alerting and
Actions
•Automatic provisioning
•Monitor Activity
•Privacy Control
•Enterprise App Store
•Self Management
Users trigger new Challenges for IT
but also empower IT
Profiles and a balanced Policy
are key success factors
Powerful Management tools enable users,
reduce the mobile cost,
make IT simple and
drive business efficiency
Thank you
Contact [email protected]