Enterprise mobility management taking mdm to the next level
This presentation is the property of its rightful owner.
Sponsored Links
1 / 22

Enterprise Mobility Management: , Taking MDM to the Next Level PowerPoint PPT Presentation


  • 87 Views
  • Uploaded on
  • Presentation posted in: General

Enterprise Mobility Management: , Taking MDM to the Next Level. Bob De Armond, Sales Engineer, T-Mobile. An Evolution of Mobile Device Management.

Download Presentation

Enterprise Mobility Management: , Taking MDM to the Next Level

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Enterprise mobility management taking mdm to the next level

Enterprise Mobility Management:,Taking MDM tothe Next Level

Bob DeArmond, Sales Engineer, T-Mobile


An evolution of mobile device management

An Evolution of Mobile Device Management

Mobile Device Management (MDM) has been evolving over time based on the needs of the organizational environment to secure mobile devices and the information accessed by them. BlackBerry and Good Technologies started things off, and now, today there a number of EMM suite products from which to choose.

Core Functions Included in Today’s EMM Products and Services:

  • Hardware management and inventory

  • OS configuration management

  • Remote control for security and troubleshooting

  • Execute remote actions, such as remote wipe

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Emm vs mdm what s the scoop

EMM vs. MDM – What’s the scoop?

As it turns out, managing the device hardware and operating system with security policies and asset management is just the tip of the ice berg. Intellectual property and proprietary applications and content cannot be neglected. So MDM only took us so far and Enterprise Mobility Management takes us further.

Application inventory

Mobile app deployment, updating and removal

Mobile app configuration and policy management

Mobile content management

Core Functions Included in Today’s EMM Products and Services:

  • Hardware inventory

  • OS configuration management

  • Remote view and control for troubleshooting

  • Execute remote actions, such as remote wipe

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Mobile application management

Mobile Application Management

Access to applications from the mobile devices has made the transition from a simple personal and organizational information manager to a full-fledged operational workflow solution with the functionality of a computer. Mobile application management applies management and policy control functionality to individual applications.

Application extensions:

These apply policies to applications by use of a software development kit (SDK) or by wrapping.

This capability is necessary when the OS does not provide the required management capability or when organizations elect not to install an MDM agent on the device.

  • Preconfigured applications:

    • A secure personal information manager (PIM) for email, calendaring and contact management, and

    • A secure browser provided by the EMM provider or a third party.

    • App store and 3rd party app management.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Mobile content management

Mobile Content Management

  • Secure Container — A client-side app that enables a user to store content securely on a mobile device. The EMM can enforce policies such as authentication, file sharing and copy and paste restriction. Content comes from three primary sources:

    • Email (attachments)

    • Content pushed by the administrator or another internal person

    • Content accessed from a back-end repository

  • Content Push — Push-based document delivery. Some specific functions are:

    • Control document versions

    • Alert a user of new files

    • Flag content expiration date

  • Content Access — A connection to a back-end repository where users can pull content to their devices. Specific capabilities are:

    • Support for specific back-end repositories (SharePoint, Documentum, etc.)

    • Restrict downloads while roaming

    • Audit logging to track who accesses or downloads files

Mobile content management enables users to access content from their mobile devices. The mobile content management function has three fundamental roles:

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Emm best practices overview

EMM Best Practices Overview

The EMM environment is in rapid change from the innovation of the OS providers, the hardware OEMs, and the EMM application developers all collaborating to expand, enhance, and integrate the policies, management functions, and advanced features that are the change agents for new capabilities.

Best Practices in Today’s EMM Products and Services:

  • Innovation

  • Security

  • Integration

  • Support

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Best practices in innovation

Best Practices in INNOVATION

  • Ease of use at the end-user and administrator levels offering integrated EMM, service desk, self-service procurement, asset management, and activation capabilities.

  • Demonstrates remote support capabilities, with full remote control for Android devices and real-time remote-view capabilities.

  • Location services capabilities including geo-tracking and geo-fencing.

  • Kiosk mode to customize the user interface to allow and/or deny the access to various functions, features, and applications.

  • Developed applications in their Apps suite and related third-party applications in their App Store.

  • A complete, feature-rich mobile content management capabilities with broad back-end content repository support, including SharePoint, Documentum and other connections.

  • Mature shared-processing multi-tenant architecture providing best-in-class cloud can support up to thousands of installations per day for large accounts.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Best practices in security

Best Practices in SECURITY

  • Secure containers for separating personal and organizational application and content access to allow BYOD management to protect the intellectual property of the organization and the privacy of the end user’s personal content.

  • Integrated strong security features for mobile data loss prevention (DLP) and Identity & Access Management (IAM) for location and theft tracking.

  • Secure PIM applications, such as email, calendar, contacts and messaging, as well as a secure content management application in its core offering.

  • Application management SDK provides comprehensive security for public and private app store apps.

  • Mobile content management transparently encrypts files leaving a PC or mobile device to prevent data leakage. This integrates with third-party file storage providers and enables companies to securely use low-cost third-party storage.

  • Federal Information Processing Standard (FIPS) 140-2 compliant mobile application management, server gateway and client apps have received third-party validation of its appropriate implementation and function.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Best practices in integration

Best Practices in INTEGRATION

  • Depth of platform support across all major mobile platforms, including BlackBerry, making it appropriate for diverse environments.

  • Laptop management functionality providing basic MDM policy management for Windows 8.1 devices and Mac OS X from a single tool.

  • Converged endpoint management from servers to mobile devices to find and fix problems quickly.

  • A scalable architecture and specific product capabilities, such as allowing components to be spread across multiple servers.

  • Endpoint protection platform (EPP) vendors allowing customers to leverage their relationship for support, and potentially improve its user-based pricing by combing multiple solutions.

  • Directly integrates with Unified Threat Management (UTM) gateways (e.g. Sophos and Check Point) for easier enablement of remote access.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Best practices in support

Best Practices in SUPPORT

  • Offers the responsiveness and dialogue on product roadmap and product enhancements.

  • A management console with strong role-based access control (RBAC) and language support.

  • Mature, global, 24x7x365 coverage, customer support program, with several tiers of support subscriptions – depending on customer preference – including support and on-site consultative assistance offering a more rigorous support model.

  • Offers consulting and advisory services for mobile and bring your own device (BYOD) strategy development.

  • Installations and support can be readily personalized to meet a company's needs, and extensive self-help is available for individual users.

  • Other partners to help with sales and implementation to enhance overall viability.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Emm considerations overview

EMM Considerations Overview

The EMM environment is in rapid change from the innovation of the OS providers, the hardware OEMs, and the EMM application developers all collaborating to expand, enhance, and integrate the policies, management functions, and advanced features that are the change agents for new capabilities.

Content and application containment and encryption requirements.

Scalable deployment alternatives to comply with long-term goals.

BYOD support for disparate hardware, OS’s, and applications.

Core Functions Included in Today’s EMM Products and Services:

  • Complexity of the EMM Platform to use securely and efficiently.

  • Multi-Platform Support: Android, Apple, Microsoft, and BlackBerry.

  • Consistency in accommodating new OS releases in a timely manner.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Who are the main industry players

Who are the Main Industry Players?

One place to look for information about information technology topics is the Gartner Magic Quadrant Report. The July 2014 report provided the current leaders in the enterprise mobility management industry provide the top-ten list of the companies in the leaders quadrant. It requires a rigorous review to qualify your options.

MobileIron

SAP (Afaria)

Soti (Mobicontrol)

Symantec

Tangoe

Top-Ten Leaderboard of Gartner’s EMM Magic Quadrant Report:

  • AirWatch

  • BlackBerry

  • Citrix (XenMobile)

  • Good Technology

  • IBM (Maas360)

Knowing which one works best for you takes effort.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Preparing for emm and implementation

Preparing for EMM and Implementation

Before you choose and implement your EMM, you need to understand your options and ensure you have the best option for your solution, but also take into consideration the long-term effort in implementing and maintain your EMM program so that you identify and meet your goals and objectives.

Hardware Installation Work Breakdown

Post-installation support

Knowledge Transfer

Insource or Outsource Service

Core Functions Included in Today’s EMM Products and Services:

  • Project Initialization

  • Environment Assessment

  • Service Design Document

  • Pre-Deployment Checklist

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Program initialization environmental assessment

Program Initialization & Environmental Assessment

Getting the program started correctly will make a significant difference in how the project goes over time. The more diligent you are at the outset, the more likely you will meet your objectives in a timely manner with fewer mistakes. Project risk mitigation starts with understanding the roles, responsibilities, and milestones.

  • Determine and document the stakeholder project goals

  • Review of project phases and action items and expected duration of each phase.

  • Analyze current environment for integration with EMM Service requirements.

  • Analyze current MDM Server domain policies and settings

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Service design and document creation

Service Design and Document Creation

Your EMM service design document is based on an assessment of the environment. The detailed assessment needs to take into consideration current and future hardware; software and applications; and network components and their integration.

  • Recommended EMM device service architecture.

  • Detail integration with stakeholder infrastructure.

  • Recommended IT policy rules based on security requirements and current MDM-related IT policies.

  • Identify best practice recommendations.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Pre deployment checklist

Pre-Deployment Checklist

Now that you have gone through the assessment process and have documented the new EMM requirements, it is imperative that the pre-deployment checklist be created for an objective implementation of the new system components and the integration thereof. Using a checklist will keep you focused.

  • Review EMM design document and determined implementation requirements:

    • Minimum hardware requirements

    • Operating system and third-party software

    • Network and firewall requirements

    • Permissions (e.g. local server(s), database, etc.)

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Hardware installation checklist

Hardware Installation Checklist

EMM services can be cloud-based, on-premises, and hybrid platform services. The type of service you choose varies based on your security policies and the integration requirements to existing hardware relating to your computing and application environment and the composition of your network.

  • Verify all requirements are completed.

  • Install on-site core EMM service server.

  • Identify and install additional database and application servers as required.

  • Install remote server access as needed and configure access to EMM domain(s)

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Post installation support

Post-installation Support

Now that the components are set up and connected, there are the final tasks required to initialize the EMM system associated with getting the platform configured for your user profiles and access to secure applications and content as needed in their mobile communications and workflow for operations.

  • Validate EMM service installation

  • Configure the settings in EMM admin service

  • Activate devices on EMM service

  • Test configured settings and verify functionality

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Knowledge transfer

Knowledge Transfer

For a smoother transition to the EMM platform and its functions and features, post-installation training is an important final step. The EMM provider or associated mobility management services will need to work with your personnel to train them on they daily use of the system and provide future assistance as required.

  • Review platform functions and features.

  • Administration service overview.

  • Review common administrator and user issues.

  • Answer questions relating to operational setup for profiles and security parameters.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Insource or outsource that is the question

Insource or Outsource? That is the Question

Presently, most organizations that are using MDM or EMM platforms to manage their mobile devices, applications, and content, do it them selves. More and more, we are seeing managed services providers picking up more of this business as outsourcing becomes an option to offload work to skilled workers.

Outsourcing Issues:

Present the options and bring in the subject-matter experts to answer your questions for consideration

Can provide an atmosphere where current staff can provide for complex support leaving routine support outsourced.

Insourcing Issues:

  • Provides higher-level control and security for organizational resources and information property from the EMM and local proximity to the entire environment.

  • Can promote an atmosphere where more personal, in-person attention can be provided for routine support.

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


Hosted mobility management service

Hosted Mobility Management Service

Hosted Mobility Management Service (HMMS) provides a turnkey enterprise managed mobility (EMM) solution that manages licensing, installation, mobile-policy configuration, and ongoing administration and end user support as an extension of client IT departments. T-Mobile HMMS is available via a cloud-based, hybrid, or on-premises (virtual cloud) platform.

Reasons why Hosted Mobile Managed Services at Taking Hold:

  • Reduce up-front costs

  • Remove the technology risks

  • Outsource clients’ IT bottleneck

  • Easy to scale and extensible

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


T mobile is here to help you succeed

T-Mobile is here to Help You Succeed

You have to make an informed decision and need the resources and support to get the information to determine your needs, qualify your options, and validate and respond to your concerns. Without this support, it is easy to make an expensive mistake. T-Mobile has the expertise and consultative support to help.

Core Functions Included in Today’s EMM Products and Services:

  • Review current environment and determine likely best candidates for your EMM platform options

  • Present the options and bring in the subject-matter experts to answer your questions for consideration

  • Ultimately provide an optimal HMMS & EMM answer

TO ACTIVATE READING: SHIFT+CTRL+YTO READ THIS PAGE: SHIFT+CTRL+VTO READ TO END OF DOCUMENT: SHIFT+CTRL+B

THIS T-MOBILE TECHBRIEF HAS NARRATED CONTENT


  • Login