airwatch - mobile content strategies and deployment best practices
TRANSCRIPT
Mobile Content Strategies and Deployment Best PracticesAdrian DumbletonAirwatch
Mobile Security
Mobile Device Management
Mobile Application Management
Mobile Content Management
Mobile Email Management
Enterprise Mobility Management
IT departments are faced with several challenges with managing a variety of employee-owned and corporate liable devices. • Securing proprietary content• DLP• Privacy of Employee’s Data• Network Access• Network Security• Lost and stolen devices• Supporting new and unknown equipment
IT Challenges
• Mobile Devices Supported• Data Plans• Security• Compliance• Privacy• Type of Applications allowed and usage• Services – what can employees access (email,
VPN.. )• Agreement that outlines employee devices with
corporate data
Create a Policy
Key Considerations• Enable multifactor user authentication• Enforce consistent security policies• Encrypt sensitive corporate data• Support internal PKI and 3rd party certificates• Manage user access to corporate resources • Establish network access controls • Enforce compliance rules and actions• Remotely wipe enterprise data
Mobile Security
Key Considerations• Create a corporate container for documents• Enforce multifactor user authentication• Manage user access rights and file privileges• Define standard and custom file metadata• Distribute files over encrypted connections• Integrate with SharePoint or other file servers • Delegate admin control across internal groups • Track document versions, updates and usage
Mobile Content Management
Automated MonitoringAutomate monitoring through a direct
plug in to Microsoft’s System Center Operations Manager (SCOM)
Disaster RecoverySetup software in a remote data center
and enable in the event of a data center failure
High AvailabilityDeploy in a highly available environment
with all components made to instantly fail over without downtime
ScalabilityDeploy 10 to 100,000 devices through a configuration that easily scales to support additional device capacity
ConfigurabilityDeploy the specific software to your environment and architecture requirements
Multi-tenancyAbsorb fragmentation within your corporate infrastructure into a single instance of AirWatch
Enterprise Architecture
• Device Ownership• Device Staging• Device Registration• User Authentication• End User License Agreements (EULAs)• Restrictions
Prevent Unapproved Systems and Devices from Accessing Corporate Resources
GMail
Employee Device
Exchange
Personal Apps
Business Apps
CallsMessages
GPS Location
User Info
Enable BYOD by ensuring the privacy of personal data
• Set privacy policies that do not collect personal data
• Customize policies based on device ownership
• Corporate – Dedicated
• Corporate – Shared
• Employee – Owned
Define granular privacy policies for employee-owned devices • GPS location• User info
• Name• Phone number• Email account
• Telecom data• Calls• Messages• Data usage
• Public apps
Protect Employee Privacy
Build PoliciesApplication listCompromised statusEncryptionModel, OS versionPasscodeRoaming
Define EscalationTime based:• Minutes• Hours• DaysTiered actionsRepeat actions
Specify ActionsSend SMS, Email, push notificationRequest device check-inRemove or block specific profilesInstall compliance profileRemove all profilesRemove or block appsEnterprise wipe
1 2 3
Enterprise Architecture
• Compare partially subsidized data plan to a corporate plan• Evaluate reduced hardware costs due to elimination of the cost of device • Cost of a fully subsidized data plan versus a partially subsidized plan• Cost of recycling devices every few years and IT time and labor in managing a corporate
program versus cost of a mobile management platform
Measure ROI
3,500customers
47 countries
15 languages
750employees
Our Mission: Simplify Enterprise MobilityTM
About Airwatch
Thank [email protected]
13