SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Strategies for Managing Disparate
           Devices in Your Mobile Fleet
                        MRW1 - August 24, 2010


          Kris Snyder           Brian Donato     Christopher Hunt




MRW1 – 8/24/2010
Agenda
     •   MANAGEMENT APPROACH
     •   MOBILE DEVICE POLICY
     •   DEVICES / TRENDS
     •   MANAGEMENT TOOLS




MRW1 – 8/24/2010
“Enterprises have been reluctant to embrace the
     newest mobile devices because of concerns about
     security, not to mention the increased
     management burdens that the new devices would
     place on already strapped IT departments.”

                       Philippe Winthrop,
                       Research Director, Strategy Analytics


MRW1 – 8/24/2010
“Consumerization” of
                             Enterprise Mobility

     In a recent survey, nearly 80% of companies
     have seen increases in the number of employees
     wanting to use their own mobile devices to access
     enterprise data, due in large part to the iPhone,
     and more recently, Android devices.



     Source: Vanson Bourne, “The Device Dilemma,” Sept. 2009


MRW1 – 8/24/2010
Approaches to
                   Mobile Device Management
     • Big Brother
           – Standardize on one, and only one, platform – most likely Blackberry
           – Firm owns and controls all devices
           ** Users want more freedom, more choice
     • Free-for-all
           – Allow any device
           – Users responsible for purchasing and maintaining
           ** How to manage?
     • Hybrid
           – Multiple devices supported, within set limitations
           – Users or firm can purchase
           ** IT controls certain aspects, users retain control over device choice,
           everyone is happy. Or are they?



                                                                              Poll Results
MRW1 – 8/24/2010
Determine the Right Approach
     • WHO?
           – End User Segmentation
                   •   Executives/Management
                   •   IT vs. Non IT
                   •   Lines of Business: Partner vs. Non-Partner; Timekeeper vs. Staff
                   •   IL vs. CL
     • WHAT?
           – PIM, Extended Application or Mobilized Task
                   • Mobile Operating Systems
                   • Device or form factor selection
     • WHERE?
           – Cellular, Wi-Fi
     • HOW?
           – Device, Application, Service, Security, Expense, and Asset
             Management

MRW1 – 8/24/2010
Mobile Device Policy
     • Device Selection
           – Standardize on one platform, or allow variety?
                   • Form / Function (QWERTY vs. Touch Screen)
           – Who owns the device?
           – All about the apps
           – Support and Inventory Implications


     • Carriers / Plans
           – Who pays?
MRW1 – 8/24/2010
Mobile Device Policy
     • Security
           – Policy Compliance
           – Passwords
           – Data Encryption
           – What to do when employee leaves?
                   • Wipe whole device vs. wipe enterprise data?


     • Office Cultural and Political Considerations
           – Finding common ground without causing a mutiny

MRW1 – 8/24/2010
Poll
     • Please pick all the items below that best
       describe your mobile device password policy
     • Please pick all the items below the best
       describe your mobile device encryption policy.
     • Please pick the items below the best describe
       how you view Mobile device security.




MRW1 – 8/24/2010
Live Example - Vorys
     • Vorys, Sater, Seymour and Pease LLP
           – 7 offices, 375 attorneys, 850 users
           – About 450 mobile devices supported
     • Management Model
           – Hybrid
                   • Firm manages a loaner pool of blackberry
                      – Managed with BES
                   • Firm supports personal RIM, Windows and iPhone devices
                      – We use Exchange Active Sync and Good
                      – User buys devices, Reimbursed for service


MRW1 – 8/24/2010
Live Example - Vorys
     • The Good
           – Users can choose from many devices
           – Firm not tied into a single device
           – Attorney feel more relevant with latest devices.
     • The Bad
           – Much more setup and support work
           – Cannot leverage all devices to run firm standard
             software.


MRW1 – 8/24/2010
Live Example - Vorys
     • The Ugly
           – Managing devices requires compromises
                   • Example - Good for iPhone makes device much less
                     adept at email.
           – Can be difficult to say no to a popular device
           – Lost control of data
                   • iTunes, BB Desktop backups?




MRW1 – 8/24/2010
Live Example - Vorys
     • Lessons Learned
           – Treat security and manageability as the primary
             requirements.
           – If you view these devices as a platform, treat them
             as such
           – Long term, supporting multiple devices likely isn’t a
             win for the firm.




MRW1 – 8/24/2010
Live Example - Tarlow
     • Tarlow, Breed, Hart & Rodgers, P.C.
           – 1 office, 21 attorneys, 47 users
           – 26 mobile devices
                   • 57% iPhone; 31% Symbian; 8% Android; 4% Windows Mobile

     • Management Model
           – Hybrid
                   • Good for Enterprise
                      – Currently supports 120 devices over the 4 major OS platforms
                      – Users may select from either a Firm-provided device or buy
                        their own APPROVED device; Firm pays for data.


MRW1 – 8/24/2010
Live Example - Tarlow
     • The Good
           –   Users are happy with device selection
           –   IT is happy with uniform email delivery service
           –   Easy management of mobile device fleet
           –   Compliance with data security laws
     • The Bad
           – Users not always happy with limitations of the Good
             email client
           – IT is assumed to know everything about every phone
             AND app on the market
           – When something breaks, users want IT to deal with it,
             even if they bought their own phone

MRW1 – 8/24/2010
Live Example - Tarlow
     • Lessons Learned
           – Security of data is paramount
           – Find balance between keeping users happy and
             keeping IT sane
           – Letting go of some control also requires users to
             assume some control – if they won’t, this strategy
             may not work




MRW1 – 8/24/2010
Future Management Considerations
     • Evolution of Privacy laws
           – Encryption to a higher standard.
     • Evolution of devices as platforms
           – How do you handle O/S upgrades for PC?
     • Consumer v. Business devices
           – Where to draw the line
     • Hybrid Devices?
           – How significant is the phone part of SmartPhone?
     • Evolution of policy
           – Data is mingled
MRW1 – 8/24/2010
Mobile Device Trends
     • Global Trends
     • US Smartphone Market Share
     • Legal Industry




MRW1 – 8/24/2010
Global Smartphone Sales
Millions of Units




                    Source: Gartner; Forecast: Smartphones by Operating System and End User Segment, Worldwide, 2007-2013; Sept. 2009


MRW1 – 8/24/2010
Smartphone Platform
                              Market Share
                                              Share (%) of Smartphone
                                                     Subscribers
                                            Feb-10 May-10 % Change
                       RIM                    42.1%     41.7%      -0.4%
                       Apple*                  25.4%             24.4%    -1.0%
                       Microsoft               15.1%             13.2%    -1.9%
                       Google                    9.0%            13.0%     4.0%
                       Palm                      5.4%             4.8%    -0.6%
                       Other                     3.0%              2.9%   -0.1%

         Source: comScore May 2010 U.S. Mobile Subscriber Market Share


MRW1 – 8/24/2010
Legal Industry
     • RIM is still the King in Legal
           – 78% of law firms in 2009 ILTA tech survey indicate RIM devices
             in use in their firms, an upward trend over the past three years.
     • iPhone beginning to infiltrate
           – 7% of firms indicated the presence of the iPhone
     • Support for multiple platforms increasing
           – 35% of firms indicate support for multiple platforms (up from
             26% in 2008), with another 8% moving toward multiple platform
             support.
     • 2010 – the year of Android?
           – Great concern surrounding Android devices, centering on lack of
             policy enforcement and weak native enterprise email support.


     Source: ILTA’s 2009 Technology Survey


MRW1 – 8/24/2010
Device and Platform Standardization has been replaced by Device and Platform 
          Heterogeneous control, security and management as the key initiative for corporate 
          IT organizations.  This, combined with the individual liable trend, is forcing cross 
          platform acceptance.




      iPhone Has                BlackBerry                Android is               Windows
        Changed                    is a                     Here                   Mobile is
       the Game                  Mainstay                                         Still Around




MRW1 – 8/24/2010
Social Engineering; Policy & People


       Exchange Active sync   BES   Apple     Third Party Tools
              (EAS)           via   Tools   (Good, Mobile Iron, &
                              BAS               Trust Digital)




MRW1 – 8/24/2010
BES / BES Express




MRW1 – 8/24/2010
Microsoft Exchange ActiveSync




MRW1 – 8/24/2010
Microsoft Mobile Device Manager




MRW1 – 8/24/2010
iPhone Configuration Utility




MRW1 – 8/24/2010
Good for Enterprise




MRW1 – 8/24/2010
Zenprise




MRW1 – 8/24/2010
Boxtone




MRW1 – 8/24/2010
Our Advice
     • Having A strategy is better than NO strategy

     • Think long-term when developing your policy

     • Lots of technology tools, no technology solutions




MRW1 – 8/24/2010
Questions?




MRW1 – 8/24/2010
Thank You!
     • Kris Snyder, President and CEO
       Vox Mobile
     • Brian Donato, IT Director
       Vorys, Sater, Seymour and Pease LLP
     • Christopher Hunt, IT Director
       Tarlow, Breed, Hart & Rodgers, P.C.




MRW1 – 8/24/2010

Más contenido relacionado

Destacado

Ilta 2005 successful technology begins outside the computer room by dave cu...
Ilta 2005 successful technology begins outside the computer room   by dave cu...Ilta 2005 successful technology begins outside the computer room   by dave cu...
Ilta 2005 successful technology begins outside the computer room by dave cu...David Cunningham
 
Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?Christopher Hunt
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Destacado (6)

Ilta 2005 successful technology begins outside the computer room by dave cu...
Ilta 2005 successful technology begins outside the computer room   by dave cu...Ilta 2005 successful technology begins outside the computer room   by dave cu...
Ilta 2005 successful technology begins outside the computer room by dave cu...
 
Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 

Similar a Strategies for Managing Disparate Devices in Your Mobile Fleet

Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise  Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise Rosendo Travieso
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?NetMotion Wireless
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsTAKE Supply Chain
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick SnapshotLinson Kolanchery
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Taking Your Website Mobile
Taking Your Website MobileTaking Your Website Mobile
Taking Your Website Mobilenijsitecore
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT hSo
 
Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platformsDeepu S Nath
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless MobilityControlEng
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?szhosain
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 

Similar a Strategies for Managing Disparate Devices in Your Mobile Fleet (20)

Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise  Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?Are Tablets Changing the Game for Field Service?
Are Tablets Changing the Game for Field Service?
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Taking Your Website Mobile
Taking Your Website MobileTaking Your Website Mobile
Taking Your Website Mobile
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT
 
Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platforms
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless Mobility
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 

Último

Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementNuwan Dias
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...Daniel Zivkovic
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 

Último (20)

Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API Management
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 

Strategies for Managing Disparate Devices in Your Mobile Fleet

  • 1. Strategies for Managing Disparate Devices in Your Mobile Fleet MRW1 - August 24, 2010 Kris Snyder Brian Donato Christopher Hunt MRW1 – 8/24/2010
  • 2. Agenda • MANAGEMENT APPROACH • MOBILE DEVICE POLICY • DEVICES / TRENDS • MANAGEMENT TOOLS MRW1 – 8/24/2010
  • 3. “Enterprises have been reluctant to embrace the newest mobile devices because of concerns about security, not to mention the increased management burdens that the new devices would place on already strapped IT departments.” Philippe Winthrop, Research Director, Strategy Analytics MRW1 – 8/24/2010
  • 4. “Consumerization” of Enterprise Mobility In a recent survey, nearly 80% of companies have seen increases in the number of employees wanting to use their own mobile devices to access enterprise data, due in large part to the iPhone, and more recently, Android devices. Source: Vanson Bourne, “The Device Dilemma,” Sept. 2009 MRW1 – 8/24/2010
  • 5. Approaches to Mobile Device Management • Big Brother – Standardize on one, and only one, platform – most likely Blackberry – Firm owns and controls all devices ** Users want more freedom, more choice • Free-for-all – Allow any device – Users responsible for purchasing and maintaining ** How to manage? • Hybrid – Multiple devices supported, within set limitations – Users or firm can purchase ** IT controls certain aspects, users retain control over device choice, everyone is happy. Or are they? Poll Results MRW1 – 8/24/2010
  • 6. Determine the Right Approach • WHO? – End User Segmentation • Executives/Management • IT vs. Non IT • Lines of Business: Partner vs. Non-Partner; Timekeeper vs. Staff • IL vs. CL • WHAT? – PIM, Extended Application or Mobilized Task • Mobile Operating Systems • Device or form factor selection • WHERE? – Cellular, Wi-Fi • HOW? – Device, Application, Service, Security, Expense, and Asset Management MRW1 – 8/24/2010
  • 7. Mobile Device Policy • Device Selection – Standardize on one platform, or allow variety? • Form / Function (QWERTY vs. Touch Screen) – Who owns the device? – All about the apps – Support and Inventory Implications • Carriers / Plans – Who pays? MRW1 – 8/24/2010
  • 8. Mobile Device Policy • Security – Policy Compliance – Passwords – Data Encryption – What to do when employee leaves? • Wipe whole device vs. wipe enterprise data? • Office Cultural and Political Considerations – Finding common ground without causing a mutiny MRW1 – 8/24/2010
  • 9. Poll • Please pick all the items below that best describe your mobile device password policy • Please pick all the items below the best describe your mobile device encryption policy. • Please pick the items below the best describe how you view Mobile device security. MRW1 – 8/24/2010
  • 10. Live Example - Vorys • Vorys, Sater, Seymour and Pease LLP – 7 offices, 375 attorneys, 850 users – About 450 mobile devices supported • Management Model – Hybrid • Firm manages a loaner pool of blackberry – Managed with BES • Firm supports personal RIM, Windows and iPhone devices – We use Exchange Active Sync and Good – User buys devices, Reimbursed for service MRW1 – 8/24/2010
  • 11. Live Example - Vorys • The Good – Users can choose from many devices – Firm not tied into a single device – Attorney feel more relevant with latest devices. • The Bad – Much more setup and support work – Cannot leverage all devices to run firm standard software. MRW1 – 8/24/2010
  • 12. Live Example - Vorys • The Ugly – Managing devices requires compromises • Example - Good for iPhone makes device much less adept at email. – Can be difficult to say no to a popular device – Lost control of data • iTunes, BB Desktop backups? MRW1 – 8/24/2010
  • 13. Live Example - Vorys • Lessons Learned – Treat security and manageability as the primary requirements. – If you view these devices as a platform, treat them as such – Long term, supporting multiple devices likely isn’t a win for the firm. MRW1 – 8/24/2010
  • 14. Live Example - Tarlow • Tarlow, Breed, Hart & Rodgers, P.C. – 1 office, 21 attorneys, 47 users – 26 mobile devices • 57% iPhone; 31% Symbian; 8% Android; 4% Windows Mobile • Management Model – Hybrid • Good for Enterprise – Currently supports 120 devices over the 4 major OS platforms – Users may select from either a Firm-provided device or buy their own APPROVED device; Firm pays for data. MRW1 – 8/24/2010
  • 15. Live Example - Tarlow • The Good – Users are happy with device selection – IT is happy with uniform email delivery service – Easy management of mobile device fleet – Compliance with data security laws • The Bad – Users not always happy with limitations of the Good email client – IT is assumed to know everything about every phone AND app on the market – When something breaks, users want IT to deal with it, even if they bought their own phone MRW1 – 8/24/2010
  • 16. Live Example - Tarlow • Lessons Learned – Security of data is paramount – Find balance between keeping users happy and keeping IT sane – Letting go of some control also requires users to assume some control – if they won’t, this strategy may not work MRW1 – 8/24/2010
  • 17. Future Management Considerations • Evolution of Privacy laws – Encryption to a higher standard. • Evolution of devices as platforms – How do you handle O/S upgrades for PC? • Consumer v. Business devices – Where to draw the line • Hybrid Devices? – How significant is the phone part of SmartPhone? • Evolution of policy – Data is mingled MRW1 – 8/24/2010
  • 18. Mobile Device Trends • Global Trends • US Smartphone Market Share • Legal Industry MRW1 – 8/24/2010
  • 19. Global Smartphone Sales Millions of Units Source: Gartner; Forecast: Smartphones by Operating System and End User Segment, Worldwide, 2007-2013; Sept. 2009 MRW1 – 8/24/2010
  • 20. Smartphone Platform Market Share Share (%) of Smartphone Subscribers Feb-10 May-10 % Change RIM 42.1% 41.7% -0.4% Apple* 25.4% 24.4% -1.0% Microsoft 15.1% 13.2% -1.9% Google 9.0% 13.0% 4.0% Palm 5.4% 4.8% -0.6% Other 3.0% 2.9% -0.1% Source: comScore May 2010 U.S. Mobile Subscriber Market Share MRW1 – 8/24/2010
  • 21. Legal Industry • RIM is still the King in Legal – 78% of law firms in 2009 ILTA tech survey indicate RIM devices in use in their firms, an upward trend over the past three years. • iPhone beginning to infiltrate – 7% of firms indicated the presence of the iPhone • Support for multiple platforms increasing – 35% of firms indicate support for multiple platforms (up from 26% in 2008), with another 8% moving toward multiple platform support. • 2010 – the year of Android? – Great concern surrounding Android devices, centering on lack of policy enforcement and weak native enterprise email support. Source: ILTA’s 2009 Technology Survey MRW1 – 8/24/2010
  • 22. Device and Platform Standardization has been replaced by Device and Platform  Heterogeneous control, security and management as the key initiative for corporate  IT organizations.  This, combined with the individual liable trend, is forcing cross  platform acceptance. iPhone Has BlackBerry Android is Windows Changed is a Here Mobile is the Game Mainstay Still Around MRW1 – 8/24/2010
  • 23. Social Engineering; Policy & People Exchange Active sync BES Apple Third Party Tools (EAS) via Tools (Good, Mobile Iron, & BAS Trust Digital) MRW1 – 8/24/2010
  • 24. BES / BES Express MRW1 – 8/24/2010
  • 26. Microsoft Mobile Device Manager MRW1 – 8/24/2010
  • 28. Good for Enterprise MRW1 – 8/24/2010
  • 31. Our Advice • Having A strategy is better than NO strategy • Think long-term when developing your policy • Lots of technology tools, no technology solutions MRW1 – 8/24/2010
  • 33. Thank You! • Kris Snyder, President and CEO Vox Mobile • Brian Donato, IT Director Vorys, Sater, Seymour and Pease LLP • Christopher Hunt, IT Director Tarlow, Breed, Hart & Rodgers, P.C. MRW1 – 8/24/2010