10
nterprise, 4th Floor, Aliso Viejo, CA 92656 www.ust-global.com BYOD & MDM BYOD & MDM 8/17/22 How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business

MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Embed Size (px)

DESCRIPTION

Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. This applies to both company-owned and employee-owned (BYOD) devices across the enterprise or mobile devices owned by consumers

Citation preview

Page 1: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

20 Enterprise, 4th Floor, Aliso Viejo, CA 92656 www.ust-global.com

April 11, 2023

BYOD & MDM

BYOD & MDM

How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business

Page 2: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

BYOD & MDM

2

Tipping Points Passed for Critical Technologies

Traffic from things is ½ traffic from people

½ of serverworkloads are virtual

2013201220112010 2014

Businessvideo traffic

surpassesvoice

Mobile

Virtualization

Video

Voice

Things

More mobile OS devices

than PCs

20% of endpointsare BYO

½ of endpoints are mobile

½ of server deployments

are virtual

½ of business voice is mobile

½ of users use video in work

More connected things than people

Software-based VC passes hardware

Information supplied courtesy of Gartner

Page 3: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

Smartphones Change IndianBusiness & Consumer Strategies

BYOD & MDM

Consumers Employees

Using a paper map

Reading books

Watching TV

Using a computer

Taking photos on a camera

Playing games on a PC / console

0% 10% 20% 30% 40%

Activities done less since having a smartphone

Information supplied courtesy of OFCOM, OFCOM copyright, Communications Market Report: UK, 2011

Blurring roles, changing expectations

Page 4: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

Key Mobile & Wireless Technologies

BYOD & MDM

Technology Trigger

Peak ofInflated Expectations

Trough of Disillusionment Slope of Enlightenment Plateau of

Productivity

timeYears to mainstream adoption:

less than 2 years 2 to 5 years 5 to 10 years more than 10 yearsobsoletebefore plateau

As of August 2011

802.11ad

802.11ac

Context Delivery Architecture

Mobile Consumer Application Platforms

4G Standard

6LoWPAN

Machine-to-Machine Communication Services

Mobile Device Management

Software-Defined RadioHosted Virtual Desktops

Network Access Control802.11n

Mobile Enterprise Applications via SaaS

Location-Aware Technology

Location-Aware Applications

Mobile Enterprise Application Platforms

InvestmentWi-FiMDMMobile AppsMobile Security

Information supplied courtesy of Gartner

Page 5: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

Chaos and Opportunity From Mobile Devices and Consumerization

BYOD & MDM

CIOs WorldwideSay:• They will support more than 3 smartphone or tablet

platforms by 2013.• About a quarter of mobile devices used for business

purposes will be owned by employees.And Yet…

• Less than 30% believe that current smartphone and tablet strategies will satisfy an auditor.

From "CIO Attitudes Toward Consumerization of Mobile Devices and Applications"May 2011

Page 6: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

Advanced ManagementMulti-OS Mobile Operations Under

Control

Multi-OS management

Enterprise Data boundary

Application management

Access Control

Advanced security

Remote control

Lost phone recovery

Enterprise services integration

BYOD & MDM

6

Mobile Activity Intelligence Cut wireless bills using real - time activity

monitoring

Visibility and reporting

Real-time Roaming Control

Exception and Abuse Control

My Phone @ WorkSelf-governance and end -user productivity

Usage visibility

App discovery

Self service

Features & Benefits

Page 7: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

Reference Architecture

BYOD & MDM

Page 8: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

Gartner Magic Quadrant on MDMBYOD & MDM

Page 9: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Confidential & Proprietary

BYOD – Case Study For India based oil and gas exploration and production company

BYOD & MDM

9

Our SolutionBusiness Issues

Client Benefits

Ensure safe usage of IPAD’s Need a secure solution to ensure employees

privacy they need while maintaining the required level of corporate protection

Define a BYOD Strategy for the enablement of BYOD mobile devices within their enterprise and to provision mobile devices

Enable highly secure corporate network access Manage the devices remotely once connected to

corporate network.

UST Global helped our client with the in-house deployment of MDM (Mobile Device Management) solution through the McAfee EMM platform

UST Global team also helped our client to define the security policies to monitor compliance for secure access to corporate network with those mobile devices.

UST Global team executed a proof of concept to evaluate of EMM software and to assess the IT change process to be in place for Server/Network setup

UST installed McAfee Enterprise Mobility Management EMM MDM infrastructure in their DMZ to enable iPAD’s to connect securely to client’s corporate applications from Internet and wireless. We have done iPAD provisioning through the EMM platform, but the solution scales to accommodate other mobile OS's

The BYOD Strategy for the client included the following components:

• BYOD Deployment Options• MDM Provider• Plan management• Reimbursement Strategy

UST Global have done iPAD provisioning through the McAfee’s EMM platform, the solution also scales to accommodate other mobile OS's.

Improved Efficiency and productivity• Improved the overall productivity and

collaboration within the organization. • Secure Access to Corporate Network to

access the latest corporate information form anywhere, enabling senior executives to make smarter decisions that positively impacts client’s business

Scalable mobile security architecture Improved TCO

Client Profile: Our client, a Nifty 50

company, is one of the biggest private sector exploration and production companies in India

Highlights: Company IT realized

that allowing people to bring and manage their own devices would significantly improve productivity and at the same time bring considerable savings not having to manage the devices for their employees

Page 10: MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

Thank You

Copyright © 2012 UST Global Inc. All Rights Reserved www.ust-global.com