SlideShare una empresa de Scribd logo
1 de 29
The Journey to Mobile First
Nigel Hawthorn
EMEA Marketing Director
2 MobileIron Confidential2 MobileIron Confidential
Growth of Mobile Devices
3 MobileIron Confidential3 MobileIron Confidential
Evolution of Personal Computing
SOURCES: Asymco.com, Public Filings, Morgan Stanley Research, Gartner, IDC
The PC/Web Era The Post-PC EraThe Mobile First Era
4 MobileIron Confidential4 MobileIron Confidential
Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by Phillip Redman, John Girard, Terrence Cosgrove, and Monica Basso (May 23, 2013)
This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The
Gartner report is available upon request from MobileIron.
250+ Of Fortune 500 /
Global 2000
97% Customer support
satisfaction
5000+ Customers globally
2007
2009 V1 innovations
•  Enterprise app store
•  BYOD privacy
•  Selective wipe
•  Access control
•  Real-time cost mgmt
Company founded
•  Purpose-built for
multi-OS Mobile IT
•  Coined “Mobile First”
Fastest growing global mobile mgmt vendor
2013 Magic Quadrant for Mobile Device Management Software
Reprint available from MobileIron
5 MobileIron Confidential5 MobileIron Confidential
Multi-OS Management
Security
Compliance
Consumer Speed
User Driven
Device Choice
User Experience
Micro-Mobile Apps
Secure and manage mobile apps, documents, and devices
Mobile IT
The Birth of Mobile IT
6 MobileIron Confidential6 MobileIron Confidential
“How do I manage the explosion
of operating systems?”
“How do I distribute apps
and embrace BYOD?”
“How do I secure and
mobilize content?”
“How do I manage security,
identity, and privacy?”
“I need to move at consumer speed,
without sacrificing security and compliance”
7
Definition…
Mobile First organizations
embrace mobility as their primary
IT platform in order to transform
their businesses and increase their
competitiveness
Content of all types is
easily and securely
available on any device
CONTENT
End users choose their
devices
Security is invisible
to end users
User experience is the
#1 design criteria
USER EXPERIENCES
New apps are
developed and delivered
to mobile devices first
Core business
processes can be
performed on any
device
APPLICATIONS
In a Mobile First Company…
8 MobileIron Confidential8 MobileIron Confidential
MOBILE CONTENT
MANAGEMENT
•  Secure content hub on device
•  DLP for email attachments
•  Remote SharePoint access
•  Secure intranet browsing
MOBILE APP
MANAGEMENT
•  Scalable storefront for delivery
•  Data containerization for DLP
•  Dynamic policy & configuration
•  Secure enterprise app persona
•  App-specific tunneling
•  … for in-house & public apps
MOBILE DEVICE
MANAGEMENT
•  Purpose-built multi-OS security
•  Self-service provisioning/config
•  BYOD privacy protection
•  Certificate-based identity
•  Global scale for cloud & premise
Complete
Solution for
Mobile IT
9 MobileIron Confidential9 MobileIron Confidential
Mobility Discussion – Not Just Security
Privacy,
legal, HR
BYOD
CYOD
(tax)
Content
Management
Help
Desk
Costs
Device
Management
App
Management
Complexity
Which OS,
devices
App
Development
User
Enablement
Cost of
Devices
Roaming
Costs
Network
Integration
10 MobileIron Confidential10 MobileIron Confidential10
Enable global companies
to become MOBILE
FIRST organizations…
…by delivering the
MobileIron Mobile IT
Platform to manage
mobile Applications,
Content and Devices
11 MobileIron Confidential11 MobileIron Confidential
MOBILE IT
User-Led
IT at Consumer
Speed
Devices Apps Content
Multi-OS
Device Choice Apps Explosion Content Ubiquity
Separation of Personal
and Corporate
Security and
Compliance
12 MobileIron Confidential12 MobileIron Confidential
Purpose-built for Mobile IT,
the MobileIron Platform
manages and secures
apps, documents, and devices.
Our Platform…
13 MobileIron Confidential13 MobileIron Confidential
MobileIron
Platform
An End-to-End
Solution for Mobile IT
End-User Services
Complete Mobile IT
Management Platform
14 MobileIron Confidential14 MobileIron Confidential
MobileIron VSP:
Mobile Policy &
Configuration
Engine
•  Extensibility APIs
•  Rules
•  Reporting
•  User self-service
•  Identity and certs
•  Email
•  Data
•  PKI
•  Content
•  Apps
•  Directory
Back-end
Integration
15 MobileIron Confidential15 MobileIron Confidential
MOBILE CONTENT
MANAGEMENT
•  Secure content hub on device
•  DLP for email attachments
•  Remote SharePoint access
•  Secure intranet browsing
MOBILE APP
MANAGEMENT
•  Scalable storefront for delivery
•  Data containerization for DLP
•  Dynamic policy & configuration
•  Secure enterprise app persona
•  App-specific tunneling
•  … for in-house & public apps
MOBILE DEVICE
MANAGEMENT
•  Purpose-built multi-OS security
•  Self-service provisioning/config
•  BYOD privacy protection
•  Certificate-based identity
•  Global scale for cloud & premise
Complete
Solution for
Mobile IT
16 MobileIron Confidential16 MobileIron Confidential
•  Policy-based
access control
•  Two-phase
authentication
•  Secure tunneling
for email, apps,
docs, and web
MobileIron Sentry:
Security for
Data-in-Motion
17 MobileIron Confidential17 MobileIron Confidential
MobileIron
End-User
Services
Device
Choice
Apps
Content
Email
Native experience
Data separation:
business vs. personal
Shared policy
Browsing
Selective wipe
18
A
End User
Services
Device Configuration
and Docs@Work
(Sharepoint Docs)
Native Email Support
with Secure
Attachment and DLP
Apps@Work
Enterprise App Store
Multi-User Support
Native Device Experience
Single Sign-on
19 MobileIron Confidential19 MobileIron Confidential
MobileIron
Deployment:
Cloud or
On-premise
Global
scalability
Trusted
services
20 MobileIron Confidential20 MobileIron Confidential
Current or
upcoming apps
MobileIron
AppConnect:
Apps Ecosystem
Subject to change.
Logos displayed are the property of
third parties.
21 MobileIron Confidential21 MobileIron Confidential
Journey to the Mobile First Enterprise
Device Security
BYOD (user choice)
Email access (secure ActiveSync)
Multi-OS security (BlackBerry replacement)
App & Content
Enablement
1st gen of mobile apps
Mobile documents
Cloud protections
Business
Transformation
New user & business experiences
22 MobileIron Confidential22 MobileIron Confidential
Going Mobile First with
Purpose-built for Mobile IT
Best at apps and security
Architected for scale
Enterprise-class on-premise
or in the cloud
Best
Technology
97%+ support satisfaction
MobileIron University:
industry’s first training and
certification center
Best practice toolkits
(BYOD, Apps,
Android, Deployment)
Deep investment in
customer success
MobileIron Customer Stories
Financial Services
Healthcare, Pharma & Medical Devices
Professional Services
Retail & Consumer Goods
Government & Education
Hospitality
Technology & Manufacturing
Mobile IT transforms the business of our customers
24 MobileIron Confidential24 MobileIron Confidential
Click image for story
Click image for story
Barclays Capital
Creating an internal app storefront
“My iPad is fully secure. I have an internal
app store we deployed with MobileIron and
there is heavy mobile device management
on it. It knows where it is, and what
networks it is allowed to attach to.”
“Obviously, you can’t stick [an internal app]
into Google’s store or Apple’s store, so you
have to be able to deploy it where you want
it, very securely. That’s the basis for an
internal app store.”
Shaygan Kheradpir, COO, Barclays Retail
25 MobileIron Confidential25 MobileIron Confidential
Click image for story
Liberty Mutual
Moving to BYOD
“MobileIron was chosen as the device management
application for the Apple products. The BYOD program
now has about 1,000 users”
“That was more than we expected,”
Chris Moore, Senior Systems Admin
26 MobileIron Confidential26 MobileIron Confidential
Citadele Bank
Security, Choice & Apps
“At our bank, employees are free to choose their work device. Some of
us prefer iOS-based phones, others choose Android-based ones. This
means we have a wide variety of devices from different
manufacturers,”
Citadele Bank CIO Guntars Andersons
The company ultimately chose MobileIron's solution for its data
securing capabilities and its usability. Citadele Bank plans to support
third party apps to increase employee productivity.
27 MobileIron Confidential27 MobileIron Confidential
Creating mobile workstations for employees
who are constantly on the move
Mobile First Case Study
Lidl Mobile Office iPad roll out:
•  Streamlined routine tasks
•  Apps help the manager with
real-time inventory
management
•  Up-to-date and attractive
training material
•  Special offers can be
implemented quickly in the
store
•  Data is presented on a mobile
device using an intuitive
graphic interface
Results
•  Time-savings of 17%
•  Paper files have nearly disappeared
•  Improved employee satisfaction and
retention
28 MobileIron Confidential28 MobileIron Confidential
Integration with Forescout
NAC Integrated with Mobile Device Knowledge
•  MobileIron Device Knowledge
–  OS ver
–  Jailbroken or Rooted Devices
–  Authentication
–  App Details
•  Forescout Access Policies
–  Employee Access
–  Visitor Access
–  Quarantine (Jailbroken)
–  Redirect to internal web page
–  Etc.
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)

Más contenido relacionado

La actualidad más candente

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
IBM Security
 

La actualidad más candente (19)

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Samsung SDS IAM & EMM
Samsung SDS IAM & EMMSamsung SDS IAM & EMM
Samsung SDS IAM & EMM
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 

Similar a DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)

Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
IIC_Barcelona
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
Cleophas Kipruto
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
Warba Insurance Co Kuwait
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
WSO2
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 

Similar a DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron) (20)

Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-Administrators
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 

Más de Andris Soroka

Más de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)

  • 1. The Journey to Mobile First Nigel Hawthorn EMEA Marketing Director
  • 2. 2 MobileIron Confidential2 MobileIron Confidential Growth of Mobile Devices
  • 3. 3 MobileIron Confidential3 MobileIron Confidential Evolution of Personal Computing SOURCES: Asymco.com, Public Filings, Morgan Stanley Research, Gartner, IDC The PC/Web Era The Post-PC EraThe Mobile First Era
  • 4. 4 MobileIron Confidential4 MobileIron Confidential Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by Phillip Redman, John Girard, Terrence Cosgrove, and Monica Basso (May 23, 2013) This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from MobileIron. 250+ Of Fortune 500 / Global 2000 97% Customer support satisfaction 5000+ Customers globally 2007 2009 V1 innovations •  Enterprise app store •  BYOD privacy •  Selective wipe •  Access control •  Real-time cost mgmt Company founded •  Purpose-built for multi-OS Mobile IT •  Coined “Mobile First” Fastest growing global mobile mgmt vendor 2013 Magic Quadrant for Mobile Device Management Software Reprint available from MobileIron
  • 5. 5 MobileIron Confidential5 MobileIron Confidential Multi-OS Management Security Compliance Consumer Speed User Driven Device Choice User Experience Micro-Mobile Apps Secure and manage mobile apps, documents, and devices Mobile IT The Birth of Mobile IT
  • 6. 6 MobileIron Confidential6 MobileIron Confidential “How do I manage the explosion of operating systems?” “How do I distribute apps and embrace BYOD?” “How do I secure and mobilize content?” “How do I manage security, identity, and privacy?” “I need to move at consumer speed, without sacrificing security and compliance”
  • 7. 7 Definition… Mobile First organizations embrace mobility as their primary IT platform in order to transform their businesses and increase their competitiveness Content of all types is easily and securely available on any device CONTENT End users choose their devices Security is invisible to end users User experience is the #1 design criteria USER EXPERIENCES New apps are developed and delivered to mobile devices first Core business processes can be performed on any device APPLICATIONS In a Mobile First Company…
  • 8. 8 MobileIron Confidential8 MobileIron Confidential MOBILE CONTENT MANAGEMENT •  Secure content hub on device •  DLP for email attachments •  Remote SharePoint access •  Secure intranet browsing MOBILE APP MANAGEMENT •  Scalable storefront for delivery •  Data containerization for DLP •  Dynamic policy & configuration •  Secure enterprise app persona •  App-specific tunneling •  … for in-house & public apps MOBILE DEVICE MANAGEMENT •  Purpose-built multi-OS security •  Self-service provisioning/config •  BYOD privacy protection •  Certificate-based identity •  Global scale for cloud & premise Complete Solution for Mobile IT
  • 9. 9 MobileIron Confidential9 MobileIron Confidential Mobility Discussion – Not Just Security Privacy, legal, HR BYOD CYOD (tax) Content Management Help Desk Costs Device Management App Management Complexity Which OS, devices App Development User Enablement Cost of Devices Roaming Costs Network Integration
  • 10. 10 MobileIron Confidential10 MobileIron Confidential10 Enable global companies to become MOBILE FIRST organizations… …by delivering the MobileIron Mobile IT Platform to manage mobile Applications, Content and Devices
  • 11. 11 MobileIron Confidential11 MobileIron Confidential MOBILE IT User-Led IT at Consumer Speed Devices Apps Content Multi-OS Device Choice Apps Explosion Content Ubiquity Separation of Personal and Corporate Security and Compliance
  • 12. 12 MobileIron Confidential12 MobileIron Confidential Purpose-built for Mobile IT, the MobileIron Platform manages and secures apps, documents, and devices. Our Platform…
  • 13. 13 MobileIron Confidential13 MobileIron Confidential MobileIron Platform An End-to-End Solution for Mobile IT End-User Services Complete Mobile IT Management Platform
  • 14. 14 MobileIron Confidential14 MobileIron Confidential MobileIron VSP: Mobile Policy & Configuration Engine •  Extensibility APIs •  Rules •  Reporting •  User self-service •  Identity and certs •  Email •  Data •  PKI •  Content •  Apps •  Directory Back-end Integration
  • 15. 15 MobileIron Confidential15 MobileIron Confidential MOBILE CONTENT MANAGEMENT •  Secure content hub on device •  DLP for email attachments •  Remote SharePoint access •  Secure intranet browsing MOBILE APP MANAGEMENT •  Scalable storefront for delivery •  Data containerization for DLP •  Dynamic policy & configuration •  Secure enterprise app persona •  App-specific tunneling •  … for in-house & public apps MOBILE DEVICE MANAGEMENT •  Purpose-built multi-OS security •  Self-service provisioning/config •  BYOD privacy protection •  Certificate-based identity •  Global scale for cloud & premise Complete Solution for Mobile IT
  • 16. 16 MobileIron Confidential16 MobileIron Confidential •  Policy-based access control •  Two-phase authentication •  Secure tunneling for email, apps, docs, and web MobileIron Sentry: Security for Data-in-Motion
  • 17. 17 MobileIron Confidential17 MobileIron Confidential MobileIron End-User Services Device Choice Apps Content Email Native experience Data separation: business vs. personal Shared policy Browsing Selective wipe
  • 18. 18 A End User Services Device Configuration and Docs@Work (Sharepoint Docs) Native Email Support with Secure Attachment and DLP Apps@Work Enterprise App Store Multi-User Support Native Device Experience Single Sign-on
  • 19. 19 MobileIron Confidential19 MobileIron Confidential MobileIron Deployment: Cloud or On-premise Global scalability Trusted services
  • 20. 20 MobileIron Confidential20 MobileIron Confidential Current or upcoming apps MobileIron AppConnect: Apps Ecosystem Subject to change. Logos displayed are the property of third parties.
  • 21. 21 MobileIron Confidential21 MobileIron Confidential Journey to the Mobile First Enterprise Device Security BYOD (user choice) Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement) App & Content Enablement 1st gen of mobile apps Mobile documents Cloud protections Business Transformation New user & business experiences
  • 22. 22 MobileIron Confidential22 MobileIron Confidential Going Mobile First with Purpose-built for Mobile IT Best at apps and security Architected for scale Enterprise-class on-premise or in the cloud Best Technology 97%+ support satisfaction MobileIron University: industry’s first training and certification center Best practice toolkits (BYOD, Apps, Android, Deployment) Deep investment in customer success
  • 23. MobileIron Customer Stories Financial Services Healthcare, Pharma & Medical Devices Professional Services Retail & Consumer Goods Government & Education Hospitality Technology & Manufacturing Mobile IT transforms the business of our customers
  • 24. 24 MobileIron Confidential24 MobileIron Confidential Click image for story Click image for story Barclays Capital Creating an internal app storefront “My iPad is fully secure. I have an internal app store we deployed with MobileIron and there is heavy mobile device management on it. It knows where it is, and what networks it is allowed to attach to.” “Obviously, you can’t stick [an internal app] into Google’s store or Apple’s store, so you have to be able to deploy it where you want it, very securely. That’s the basis for an internal app store.” Shaygan Kheradpir, COO, Barclays Retail
  • 25. 25 MobileIron Confidential25 MobileIron Confidential Click image for story Liberty Mutual Moving to BYOD “MobileIron was chosen as the device management application for the Apple products. The BYOD program now has about 1,000 users” “That was more than we expected,” Chris Moore, Senior Systems Admin
  • 26. 26 MobileIron Confidential26 MobileIron Confidential Citadele Bank Security, Choice & Apps “At our bank, employees are free to choose their work device. Some of us prefer iOS-based phones, others choose Android-based ones. This means we have a wide variety of devices from different manufacturers,” Citadele Bank CIO Guntars Andersons The company ultimately chose MobileIron's solution for its data securing capabilities and its usability. Citadele Bank plans to support third party apps to increase employee productivity.
  • 27. 27 MobileIron Confidential27 MobileIron Confidential Creating mobile workstations for employees who are constantly on the move Mobile First Case Study Lidl Mobile Office iPad roll out: •  Streamlined routine tasks •  Apps help the manager with real-time inventory management •  Up-to-date and attractive training material •  Special offers can be implemented quickly in the store •  Data is presented on a mobile device using an intuitive graphic interface Results •  Time-savings of 17% •  Paper files have nearly disappeared •  Improved employee satisfaction and retention
  • 28. 28 MobileIron Confidential28 MobileIron Confidential Integration with Forescout NAC Integrated with Mobile Device Knowledge •  MobileIron Device Knowledge –  OS ver –  Jailbroken or Rooted Devices –  Authentication –  App Details •  Forescout Access Policies –  Employee Access –  Visitor Access –  Quarantine (Jailbroken) –  Redirect to internal web page –  Etc.

Notas del editor

  1. We are in the middle of major transformation from the PC/Web era to what the industry calls the Post-PC Era. It is happening at a phenomenal pace.  But since the introduction of the iPhone then Android, the end user computing world has changed dramatically. People now call it the Post-PC era. But we don’t like to define this era in terms of what it is NOT. We believe that in the same way as the web started as a new technology and quickly became the primary platform for end user computing, we believe that mobility will soon become the primary and preferred end user platform in the enterprise. CLICK - Animate This is why we like to call this new era the MOBILE FIRST ERA CLICK – Next Slide Mobile First definition…  -------- Alternative narration This chart shows the end user computing platform evolution over the last 30-40 years. End users have been living in the Wintel monopoly for the good part of the last 30 years. PC and Laptops were the primary means to access applications and data. Click Since the advent of the iPhone and then Android, the end user computing platform landscape has changed dramatically. It is happening MUCH faster than ever before and moving forward it is only going to get more heterogeneous and fragmented. All the IT transformations that happened in the past that have a few things in common: 1 – the vendors who drove the innovation in the previous ERA did not drive the next one. There is a change of guard, new pure players emerge that innovate, deliver value to customers and grow. 2 – the customers who see these changes as opportunity and embrace the change, emerge as the leaders in their markets and in many cases create all new businesses that were not possible before   3 – What is the emerging platform at the beginning of the ERA, quickly become the primary and pervasive computing platform The industry has been calling this the Post-PC era,  Click but we don't like this term because it describes this new exciting era in terms of what it is NOT,  that is why we call it the Mobile First Era. Next slide. Business User Smartphone Shipments (%) SOURCE: IDC
  2. Let me start by introducing our company. Funded in Silicon Valley in 2007 with the sole purpose of building a platform to solve the IT challenges caused by the rapid proliferation of corporate and employee owned mobile devices in the enterprise, we have a history of technology innovation and customer success. MobileIron was the company that originated what the industry calls the Mobile Device Management market, but we did not stop there. We invented the concept of a mobile Enterprise App Storefront, pioneered the field of BYOD and tackled problems like privacy and selective wipe. We ended up building a complete Mobile IT Platform to manage Apps, Documents and Devices in the enterprise. As a result, we have more than 4500 successful customers, 200 of the fortune 500. Our customers are happy with our product and service and over the last 12 months we had a 97% customer satisfaction Industry Analysts Validation Don’t take my word for it, t he industry has recognized MobileIron as well – we have consistently been named as the vendor that 1) can best meet customers current requirements for MobileIT and 2) has the vision and ability to support our customers as the Mobile Era evolves and customer requirements advance Gartner: Leaders Quadrant 2013 MDM Magic Quadrant (graph from May 2013) Three years running. IDC: #1 in market share (amongst pure-plays) and#1 growth overall for Mobile Enterprise Management specialists (Sept 2012) Info-Tech: Champion in 2012 MDM Vendor Landscape (Aug 2012) BusinessWeek: One of five hottest enterprise startups (Sept 2012)
  3. We are at the cusp of the next phase of the mobile tornado that gives birth to a new way of doing IT, mobile IT. In Mobile IT – a new management solution is required – a solution that is designed for the mobile world, sits between users with their favorite devices and back-end enterprise systems, content and applications that they need access to. The mobile IT platform allows IT to focus on Users and the policies that define who gets what when and with what level of security. The good news is that if you, the Mobile IT professional, if you get this right, you can drive this transformation, and become a hero. MobileIron can help you make that happen. This is what MobileIron was built to do.
  4. Main Point : Mobility means big changes and new challenges for IT It used to be so easy! Ok that may be a “slight” overstatement, but the corporate IT environment used to be much more contained and the IT department used to have much more control. IT determined which devices employees could use, and which applications could be installed on those devices. Access to these applications and corporate content was usually done within the corporate firewall or through a secure VPN connection. The network edge was well-defined and well-protected. Now, employees are bringing their own devices to work and are accessing the network from outside the firewall – they are taking those devices, and the access to corporate content and applications wherever they go – the Network Edge is now wherever your employees are – or wherever their devices end up – and it requires a new approach to access and security. Main Point : So IT is now at the center of everything – and is facing both increased challenges due to the explosion of mobile devices in the enterprise combined with increased expectations from employees. We’ll try to qualify some of those challenges here – and I am sure many of these resonate with all of you. How do I manage the explosion of devices, and applications, in a multi-OS environment? IT used to just manage Windows and Blackberry, now we have iOS, Windows Mobile, Android… How do I distribute apps securely? How do enable an employee to use both business and personal apps on their device? How do I make this self-service to the end-user – basically how do I create a corporate app store? How do I mobilize content? And enable me to manage access to the content on the end-user’s personal device? And how do I do this securely? While complying with employer and government mandated security regulations Bottom Line : Corporate IT must meet the standards set by consumer technology while maintaining security compliance. These are the requirements that we hear from our customers that drove the development of our Mobile IT platform.
  5. A company is Mobile First when 1 – all new applications and business processes are available to Mobile devices First CLICK 2 – Corporate documents are securely available on any device CLICK 3 – and most importantly, end users choose the device they want to use and security is enforced by IT without getting in the way of an outstanding user experience This last point is paramount. For the first time in the history of IT, we have an opportunity to allow end users to carry out business processes on a device and with a user experience that they love and they WANT to use.
  6. On top of the VSP we have three main pillars of functionality: Mobile Device management, Mobile Application management and Mobile Content management Mobile Device Management allows IT to embrace modern devices across any mobile OS and provide secure corporate email, automatic device configuration, cert-based security, select wiping for both corporate and employee-owned usage models. - Click Mobile Apps is really the next stage in enabling the workforce to be productive on their mobile devices. It is how to allow them to carry out core business processes. MobileIron Mobile Application Management provides an end-to-end solution to deliver, provision, secure, wipe, mobile apps. It is not just about building an App Storefront, we go beyond that and cover the full lifecycle of mobile apps, from making it available to the storefront for user self-service, to secure apps on the device enforcing authentication and isolating them from other (personal) apps. This process creates secure communication channels between mobile apps managed by our platform on the device so that critical corporate data never escapes from the secure corporate bubble, to create secure communication channels between the apps on the device and the enterprise back end so that data is protected also in motion, without requiring a device-wise VPN. Click The third Pillar is Mobile Content Management. Here we have three main areas of functionality A – The ability to securely mobilize Sharepoint files so that they can be accessed on the devices and securely stored for offline use. B – We secure email attachments so that they are encrypted and can only be viewed with the secure MobileIron Viewer. Native experience for the end user and DLP for the enterprise C – A secure browser that allows user to access HTML content and applications that sits behind the firewall, again without requiring a full blown VPN client on the device. Ease of use for the end user and security for IT.
  7. Our vision to help organization become mobile-first companies and leverage this user-driven technology transformation to their advantage, to emerge the winner in their respective markets.
  8. Main Point : The journey to becoming a Mobile First Organization requires a new IT Platform that is specifically designed to manage Mobile Apps, Content and Devices in the Enterprise. We call this Mobile IT The Mobile IT transformation is driven by end-users and IT moves at consumer’s speed to satisfy increased expectations from employees CLICK Users want: Device choice IT needs to: provide multi-OS management and security CLICK Users want: use personal and business application IT needs to: provide a way to create a clear separation between personal and business assets and application that guarantees enterprise security while preserving user privacy. CLICK Users want: ubiquitous access to their content to be productive on any device IT needs to: enable content access with security and compliance These are the top requirements that we hear from our customers that drove the development of our Mobile IT platform.
  9. MobileIron Mobile IT Platform provides value to both IT, with a solution platform purposely built for Mobile IT, and end users… MobileIron Mobile IT Platform sits between enterprise resources and end user devices and allows IT to define and enforce policies around Apps, documents and Devices and end users to get what they want: device choice, the enterprise apps and data to get the job done without intermixing with their personal stuff.
  10. The VSP is the core of our platform. Think of it as the brain of the operation, where IT defines the management policies for apps, documents and devices that determines which users get what, when, with what level of security across multiple mobile OSs. Policies can be dynamically changed at run-time without redeployment. At runtime, VSP collects and displays analytics about what happens across users, devices, apps and content. In the back-end, MobileIron platform has a rich set of integration technologies to integrate and leverage existing assets within the enterprise namely email systems, content repositories, identity management, certificates and mobile applications. It also include a rich set of APIs for management automation and integration into the existing IT infrastructure.
  11. On top of the VSP we have three main pillars of functionality: Mobile Device management, Mobile Application management and Mobile Content management Mobile Device Management allows IT to embrace modern devices across any mobile OS and provide secure corporate email, automatic device configuration, cert-based security, select wiping for both corporate and employee-owned usage models. - Click Mobile Apps is really the next stage in enabling the workforce to be productive on their mobile devices. It is how to allow them to carry out core business processes. MobileIron Mobile Application Management provides an end-to-end solution to deliver, provision, secure, wipe, mobile apps. It is not just about building an App Storefront, we go beyond that and cover the full lifecycle of mobile apps, from making it available to the storefront for user self-service, to secure apps on the device enforcing authentication and isolating them from other (personal) apps. This process creates secure communication channels between mobile apps managed by our platform on the device so that critical corporate data never escapes from the secure corporate bubble, to create secure communication channels between the apps on the device and the enterprise back end so that data is protected also in motion, without requiring a device-wise VPN. Click The third Pillar is Mobile Content Management. Here we have three main areas of functionality A – The ability to securely mobilize Sharepoint files so that they can be accessed on the devices and securely stored for offline use. B – We secure email attachments so that they are encrypted and can only be viewed with the secure MobileIron Viewer. Native experience for the end user and DLP for the enterprise C – A secure browser that allows user to access HTML content and applications that sits behind the firewall, again without requiring a full blown VPN client on the device. Ease of use for the end user and security for IT.
  12. Sentry is our secure proxy that sits between enterprise system and the devices and enforces the policy that IT defined in the VSP. It encrypts email and attachments and it create a tunnel so that mobile applications can access enterprise data securely.
  13. Finally, end users get what they want: device choice, with access to their enterprise apps and documents with native user experience and complete separation between enterprise and persona data. The best way to show the value we give to the end-user is to show you the product. <Demo if possible>
  14. DEMO – Screenshots of services provided to the end user Call out: - Mobile@work -> automatic device configuration and Doc@Work Support for native Email Out of the box support for Enterprise AppStore SSO for the apps in our secure corporate bubble
  15. The MobileIron platform can be deployed in our cloud that we call the Connected Cloud where we get you set up in less than 30 minutes, or you can host it on-premise as a physical or virtual appliance and start getting value within the first day. Our Connected Cloud has the highest level of security certification in the industry, and our on-premise solution scales to 100k devices on a single appliance giving you the confidence that we can scale with your business without requiring a big investment in hardware infrastructure.
  16. If we go back to the value for end-users, we believe that the biggest gain for them is to get access to a plethora of applications they need to get their job done. This is why we have been working diligently with a number of developers to enable their applications to be managed by the MobileIron platform. This means that end-users will be able to download these apps from the AppStore just like they usually do and IT has peace of mind knowing that they can set security, authentication, and management policies on these apps via the MobileIron VSP console. These are just some of the apps that are coming to market in Q2 that are AppConnect enabled. <<< This information is subject to change. >>>
  17. The journey starts by securing devices and providing end-users with their first level of productivity – usually access to email and device configuration. This allows IT to respond to business challenges like BYOD, securing ActiveSync, and BlackBerry replacement But the real benefit of Enterprise Mobility comes when IT and end-users embrace the management and delivery of mobile apps and content – When IT can enable what users are asking for – access to their apps and content from their mobile device with a native experience - while preserving the appropriate level of security and management. And then an organization can truly make the pivot towards being a Mobile First enterprise, which we define and when the Mobile Platform becomes the primary IT infrastructure for delivery of applications and content. Now mobile is a catalyst for real business transformation, with new user experiences and new business processes and business models. Its just like the web era where companies began to look at the web as their primary IT platform – we’re in the early stages of mobile, but the transition is occurring rapidly – with the MobileIron Platform, we can help you meet you current requirements, and can partner with you through your mobile journey, to ensure that you are able to quickly realize the full potential of a secure, scalable, integrated Mobile IT infrastructure. Now that you can secure the device, deploy mobile apps and data, you can embrace mobile and your primary platform for your end users.
  18. MobileIron is the right choice to embark in your Mobile IT transformation. We have the most innovative technology but also a big investment in the success of our customers On the technology side we have the best technology: Purpose-built for Mobile IT: Other vendors are backing in from legacy businesses, but MobileIron built its platform from scratch with the right long-term architecture. Best at apps : No one else has an architecture than can support an end-to-end mobile apps platform for secure and fast delivery (Apps@Work and App Delivery Network), data-at-rest security (AppConnect), and data-in-motion security (AppTunnel). Best at security : No one else can stop iOS email attachments from being lost to Dropbox. No one else offers integrated security across email DLP, certificate-based identity, app and doc containerization, BYOD privacy protection, and automated closed-loop compliance. No one else has a consistent security and policy framework across enterprise email, apps, docs, and web data. Architected for scale : No one else has single-system scale of 100,000 devices. Enterprise-class on-premise or in the cloud : No one else has the deep installed base on on-premise enterprise along with a trusted SOC 2 audited cloud service. We have also made a deep investment in customer success: MobileIron expertise goes beyond products and technology, we also invest heavily in best practices and education to make our customers successful. Specific program examples Exceptionally high customer support satisfaction, even with the massive customer growth we are experiencing. MobileIron training and certification programs include MobileIron University to train technical staff at our customers on core technologies and the new features of the roadmap as they are launched Best Practice Toolkits to share information that we have consolidated across customers on how they are approaching particular initiatives. We launched our BYOD toolkit in 2011. It contains sample user agreements, security policies, provisioning flows, user surveys, and implementation plans for BYOD rollouts. In 2012 we launched our Apps and Android toolkits. They are available in our support portal at no charge to customers or our systems integration partners. Our Evaluation Companion site brings together all the content necessary to learn MobileIron, prepare for an evaluation, install, and evaluate the software. These are just some of the tools we’ll use to make you successful.
  19. MobileIron customers are focused on enablement and are transforming their businesses through mobility. >>This is a sample of our customers who have publicly talked about MobileIron. [Each of these logos links to the public story (press, case study or video) about that customer – pick one to describe that is appropriate to your sales situation]
  20. Slide added by Nigel
  21. Creating mobile workstations for employees who are constantly on the move Lidl Mobile Office project: equip district managers with iPads to make position more attractive and simplify the business processes with mobile apps: Streamline routine tasks to make more time for focusing on employee development and driving store performance instead of administrative tasks Apps help the manager check inventory and view retail space plans and layouts, and make decisions about what to stock and when Up-to-date and attractive training material helps district manager to teach his staff Special offers can be implemented quickly in the store Data is presented on a mobile device using an intuitive graphic interface Employee Benefits Reduced burden of paperwork through mobile access to all necessary documents using an internally developed mobile app as well as access to key performance indicators Up-to-date information Logistics, product placement in the shops, sales controlling are heavily optimizes by the mobile Lidl apps Results Time-saving of 17% used for employees, store performance, customers and free time Paper files have nearly disappeared Managers really enjoy using the Lidl Mobile Office – employee retention in hard to fill positions More info can be found here: http://www.mobileiron.com/en/company/press-room/press-releases/352-lidl-manages-ipads-and-mobile-apps-conveniently-and-securely-with-mobileiron
  22. Slide added by Nigel