SlideShare una empresa de Scribd logo
1 de 38
Mobile Device Management John Rhoton Hewlett Packard [email_address]
What is MDM? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
But just what is mobility ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobility on the rise! YOY  % shipping growth 35 30 25 20 15 10 5 0 2006-2010 Source: Gartner Dataquest, and IDC 2006 18.6% Mobile PCs 34.1% Converged Mobile Phones 5.8% Mobile Phones 3.9% Desktop PCs ,[object Object],[object Object],[object Object]
Status of Mobility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What customers typically want from mobility HP Confidential - Animated (0) Legacy  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Messaging Forms Workflow Sheets
Mobility: Challenges
Mobile Content Protection Access Control Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Centralized Provisioning and Configuration
Bluetooth  security Bluejacking Bluesnarfing PIN Attack Virus Propagation In
WLAN security ,[object Object],[object Object],[object Object],[object Object],Require Non-Trivial Client Configuration
Why MDM? ,[object Object],[object Object],[object Object],[object Object],June 9, 2009
Reduction in Total Cost of Ownership Cost reduction per user per year with MDM  $322 Net Reduction in TCO    11% Net Reduction in Annual Device Management Costs 32% Source :  HP & Gartner Cost per User per Year MDM Benefit Device Cost $250 8% Amortized over 2 years Connectivity data $900 30% Connectivity voice $800 27% Backend/Ops $504 17% -30% -$151 Setup & operate backend mobile application, change requests Service Management $192 6% -40% -$77 Setup users, connectivity, user management, change requests User Support $312 11% -30% -$94 $2958 100% -11% -$322
Customer MDM Maturity Levels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 9, 2009
Different MDM Approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 9, 2009 ,[object Object],[object Object]
OMA DM Standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HP MDM Logical Topology June 9, 2009
Scalability: Replication & Server Farms June 9, 2009 GEO 2 CLUSTER MASTER TEST DEV GEO 1 CLUSTER ,[object Object],[object Object],[object Object]
Device Management Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
June 9, 2009 Afaria Mobile Clients Windows Laptops Java WinCE/Pocket PC Palm Blackberry Symbian Console Highlights Web Administration SNMP Alerts Console Status and Event Logs ESM Integration Enterprise Integration Microsoft SMS Software & Inventory Management Capabilities Inventory Management Software and Application Deployment Document and Content Management Process Automation Data Backup and Recovery Configuration Management Web Server Connectivity TCP/IP Wireless WWAN HTTP, HTTPS, ISA Dial-up LAN or WLAN Mobile Optimizations Compression Check-Point Restart Byte Level Differencing Segmented File Delivery Opportunistic Execution Safe File Transfer Encryption Afaria Server Features MS NT 4.0/2000/2003 Unlimited Clients Highly Scalable Device and Data Security LDAP & NT Domain User Authentication Channel Replication iAnywhere Afaria
Inventory June 9, 2009
Server “Channels” June 9, 2009
Channel Sets June 9, 2009
Script Commands June 9, 2009
HP Enterprise Mobility Suite WW Wireless Operator Networks HP Enterprise Devices HP Worldwide  Hosting Facilities Enterprise HTTPS Internet HTTPS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Existing IT Systems FOR ENTERPRISE Leading OEM Device Manufacturers SMS TCP/IP SMS TCP/IP HTTPS
Self Care Driven
Use Case: Set Up My Device ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use Case: Diagnose My Device ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use Case: Update Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use Case: Device Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft SCMDM Management Workload Deployment: inside firewall Network Access Workload Deployment: in DMZ Security  Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Device  Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile VPN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Management Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Device Management Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secured Corporate Data Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security ,[object Object],[object Object],Efficiency ,[object Object],[object Object],Extensible ,[object Object],[object Object],Reliability ,[object Object],[object Object],Simplicity DMZ Internal Corporate Site Domain Controller Mobile VPN Mobile VPN Mobile Operators Cellular Data Connection Internet WiFi Connection Mobile VPN Gateway Corporate Internal Firewall Controlled access to Internal corporate resources from the mobile devices connected via Mobile VPN Corporate External Firewall
[object Object],June 9, 2009 Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile GW Back Firewall SSL  Auth (PIN+Corp Root) SSL  Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service OMA Proxy CA Mobile VPN
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? Contact me at: john.rhoton@hp.com
Your Feedback is Important ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device ManagmentMTG IT Professionals
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft IntuneSimon May
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Identity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryIdentity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryHanno Ekdahl
 
Modern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group PoliciesModern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group PoliciesAnoop Nair
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceAhmad Almarzouk
 
Get started with Windows AutoPilot Deployment
Get started  with Windows AutoPilot DeploymentGet started  with Windows AutoPilot Deployment
Get started with Windows AutoPilot DeploymentMicrosoft
 
Microsoft 365 UG Windows Autopilot 1st May 2019
Microsoft 365 UG Windows Autopilot 1st May 2019Microsoft 365 UG Windows Autopilot 1st May 2019
Microsoft 365 UG Windows Autopilot 1st May 2019Andrew Bettany
 
Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing FlorisKlaver1
 

La actualidad más candente (20)

Windows intune
Windows intuneWindows intune
Windows intune
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Identity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryIdentity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and Recovery
 
Modern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group PoliciesModern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group Policies
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor Technology
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
 
Get started with Windows AutoPilot Deployment
Get started  with Windows AutoPilot DeploymentGet started  with Windows AutoPilot Deployment
Get started with Windows AutoPilot Deployment
 
Microsoft 365 UG Windows Autopilot 1st May 2019
Microsoft 365 UG Windows Autopilot 1st May 2019Microsoft 365 UG Windows Autopilot 1st May 2019
Microsoft 365 UG Windows Autopilot 1st May 2019
 
Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing
 

Destacado

SAP ISU: Out-sorting Billing Validation
SAP ISU: Out-sorting Billing ValidationSAP ISU: Out-sorting Billing Validation
SAP ISU: Out-sorting Billing ValidationRakesh Dasgupta
 
Configuration steps to create Front Office Process for Technical Master Data ...
Configuration steps to create Front Office Process for Technical Master Data ...Configuration steps to create Front Office Process for Technical Master Data ...
Configuration steps to create Front Office Process for Technical Master Data ...jai_sinha
 
SAP ISU Training
SAP ISU TrainingSAP ISU Training
SAP ISU TrainingENUMentor
 
Implementing smart metering in the German energy market
Implementing smart metering in the German energy marketImplementing smart metering in the German energy market
Implementing smart metering in the German energy marketMichaline Todd
 
Data migration blueprint legacy to sap
Data migration blueprint  legacy to sapData migration blueprint  legacy to sap
Data migration blueprint legacy to sapAjay Kumar Uppal
 

Destacado (8)

SAP ISU: Out-sorting Billing Validation
SAP ISU: Out-sorting Billing ValidationSAP ISU: Out-sorting Billing Validation
SAP ISU: Out-sorting Billing Validation
 
Configuration steps to create Front Office Process for Technical Master Data ...
Configuration steps to create Front Office Process for Technical Master Data ...Configuration steps to create Front Office Process for Technical Master Data ...
Configuration steps to create Front Office Process for Technical Master Data ...
 
Rental price variants
Rental price variantsRental price variants
Rental price variants
 
Sap isu tcodes
Sap isu tcodesSap isu tcodes
Sap isu tcodes
 
SAP ISU Training
SAP ISU TrainingSAP ISU Training
SAP ISU Training
 
Implementing smart metering in the German energy market
Implementing smart metering in the German energy marketImplementing smart metering in the German energy market
Implementing smart metering in the German energy market
 
Data migration blueprint legacy to sap
Data migration blueprint  legacy to sapData migration blueprint  legacy to sap
Data migration blueprint legacy to sap
 
Sap configuration-guide
Sap configuration-guideSap configuration-guide
Sap configuration-guide
 

Similar a Mobile Device Management

System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
View Slides
View SlidesView Slides
View SlidesVideoguy
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
Windows Mobile 6.1
Windows Mobile 6.1Windows Mobile 6.1
Windows Mobile 6.1jasonlan
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
Azure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 MobilityAzure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 MobilityMorgan Simonsen
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 

Similar a Mobile Device Management (20)

System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Embrace network
Embrace networkEmbrace network
Embrace network
 
View Slides
View SlidesView Slides
View Slides
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Windows Mobile 6.1
Windows Mobile 6.1Windows Mobile 6.1
Windows Mobile 6.1
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Azure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 MobilityAzure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 Mobility
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 

Más de John Rhoton

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsJohn Rhoton
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerJohn Rhoton
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapJohn Rhoton
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingJohn Rhoton
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationJohn Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the EnterpriseJohn Rhoton
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document WorkflowJohn Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 

Más de John Rhoton (18)

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and Trends
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to consider
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - Beamap
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud Computing
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Mobile Device Management

  • 1. Mobile Device Management John Rhoton Hewlett Packard [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10. Bluetooth security Bluejacking Bluesnarfing PIN Attack Virus Propagation In
  • 11.
  • 12.
  • 13. Reduction in Total Cost of Ownership Cost reduction per user per year with MDM $322 Net Reduction in TCO 11% Net Reduction in Annual Device Management Costs 32% Source : HP & Gartner Cost per User per Year MDM Benefit Device Cost $250 8% Amortized over 2 years Connectivity data $900 30% Connectivity voice $800 27% Backend/Ops $504 17% -30% -$151 Setup & operate backend mobile application, change requests Service Management $192 6% -40% -$77 Setup users, connectivity, user management, change requests User Support $312 11% -30% -$94 $2958 100% -11% -$322
  • 14.
  • 15.
  • 16.
  • 17. HP MDM Logical Topology June 9, 2009
  • 18.
  • 19.
  • 20. June 9, 2009 Afaria Mobile Clients Windows Laptops Java WinCE/Pocket PC Palm Blackberry Symbian Console Highlights Web Administration SNMP Alerts Console Status and Event Logs ESM Integration Enterprise Integration Microsoft SMS Software & Inventory Management Capabilities Inventory Management Software and Application Deployment Document and Content Management Process Automation Data Backup and Recovery Configuration Management Web Server Connectivity TCP/IP Wireless WWAN HTTP, HTTPS, ISA Dial-up LAN or WLAN Mobile Optimizations Compression Check-Point Restart Byte Level Differencing Segmented File Delivery Opportunistic Execution Safe File Transfer Encryption Afaria Server Features MS NT 4.0/2000/2003 Unlimited Clients Highly Scalable Device and Data Security LDAP & NT Domain User Authentication Channel Replication iAnywhere Afaria
  • 23. Channel Sets June 9, 2009
  • 25.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Questions? Contact me at: john.rhoton@hp.com
  • 38.

Notas del editor

  1. Microsoft ASP.NET Connections Updates will be available at http://www.devconnections.com/updates/LasVegas _06/ASP_Connections