1 / 14

Mobile Content Strategies and Deployment Best Practices

Mobile Content Strategies and Deployment Best Practices . Enterprise Mobility Management. Mobile Security. Mobile Device Management . Mobile Email Management. Mobile Application Management. Mobile Content Management. IT Challenges.

yana
Download Presentation

Mobile Content Strategies and Deployment Best Practices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Content Strategies and Deployment Best Practices

  2. Enterprise Mobility Management MobileSecurity Mobile Device Management MobileEmailManagement MobileApplicationManagement Mobile ContentManagement

  3. IT Challenges IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. • Securing proprietary content • DLP • Privacy of Employee’s Data • Network Access • Network Security • Lost and stolen devices • Supporting new and unknown equipment

  4. Create A Policy • Mobile Devices Supported • Data Plans • Security • Compliance • Privacy • Type of Applications allowed and usage • Services – what can employees access (email, VPN.. ) • Agreement that outlines employee devices with corporate data

  5. Mobile Security Key Considerations • Enable multifactor user authentication • Enforce consistent security policies • Encrypt sensitive corporate data • Support internal PKI and 3rd party certificates • Manage user access to corporate resources • Establish network access controls • Enforce compliance rules and actions • Remotely wipe enterprise data

  6. Mobile Content Management Key Considerations • Create a corporate container for documents • Enforce multifactor user authentication • Manage user access rights and file privileges • Define standard and custom file metadata • Distribute files over encrypted connections • Integrate with SharePoint or other file servers • Delegate admin control across internal groups • Track document versions, updates and usage

  7. Enterprise Architecture High Availability Deploy in a highly available environment with all components made to instantly fail over without downtime Configurability Deploy the specific software to your environment and architecture requirements Disaster Recovery Setup software in a remote data center and enable in the event of a data center failure Multi-tenancy Absorb fragmentation within your corporate infrastructure into a single instance of AirWatch Automated Monitoring Automate monitoring through a direct plug in to Microsoft’s System Center Operations Manager (SCOM) Scalability Deploy 10 to 100,000 devices through a configuration that easily scales to support additional device capacity

  8. Prevent Unapproved Systems and Devices from Accessing Corporate Resources • Device Ownership • Device Staging • Device Registration • User Authentication • End User License Agreements (EULAs) • Restrictions

  9. Protect Employee Privacy • Define granular privacy policies for employee-owned devices • GPS location • User info • Name • Phone number • Email account • Telecom data • Calls • Messages • Data usage • Public apps • Enable BYOD by ensuring the privacy of personal data • Set privacy policies that do not collect personal data • Customize policies based on device ownership • Corporate – Dedicated • Corporate – Shared • Employee – Owned Employee Device User Info GMail Exchange Business Apps Personal Apps Calls Messages GPS Location

  10. Ensure Device Compliance 1 2 3 • Build Policies • Application list • Compromised status • Encryption • Model, OS version • Passcode • Roaming • Specify Actions • Send SMS, Email, push notification • Request device check-in • Remove or block specific profiles • Install compliance profile • Remove all profiles • Remove or block apps • Enterprise wipe • Define Escalation • Time based: • Minutes • Hours • Days • Tiered actions • Repeat actions

  11. Measure ROI • Compare partially subsidized data plan to a corporate plan • Evaluate reduced hardware costs due to elimination of the cost of device • Cost of a fully subsidized data plan versus a partially subsidized plan • Cost of recycling devices every few years and IT time and labor in managing a corporate program versus cost of a mobile management platform

  12. About AirWatch 6,500 customers 150 countries 18 languages 1200 employees Our Mission: Simplify Enterprise MobilityTM

  13. Representative Customers Consumer Goods/Retail Education Healthcare Services Government Transportation

  14. About AirWatch Adrian Dumbleton Sales Manager EMEA adriandumbleton@air-watch.com

More Related