SlideShare una empresa de Scribd logo
1 de 26
2012 - Mobile Device
Management & Security




Martins Rudzitis
Key Account Manager

headtechnology Baltics SIA
Latvia, Lithuania and Estonia
                                www.headtechnology.com
headtechnology Group




www.headtechnology.com
Company business card
  Founded in 2000, Germany
  Core business – IT Security
  Offices in Ludwigsburg, Warsaw, Riga, Kiev,
  Moscow, St.Petersburg, Kazan, Ekaterinburg, Minsk,
  Baku, Almaty, Sofia
  More than 100 employees
  More than 25 vendors in portfolio
  Official distributor (for many cases exclusive) in
  Eastern Europe and Asia for number of products /
  solutions / vendors
  Participant of many IT exhibitions, road shows,
  business forums, ENISA IT Security Awareness
  program – local IT Security evangelist


www.headtechnology.com
Headtechnology for Partners


                                  Innovative product portfolio
                                  Partnership           programms
                                  (Authorized, Bronze, Silver and
                                  Gold)
                                  Partner / Customer protection
                                  International knowledge base



 Multilanguage technical, sales
 and marketing support
 Product, Partner Trainings,
 demonstrations,     webexes,
 certifications etc.
 More than 500 partners world
 wide

www.headtechnology.com
Headtechnology – choice of portfolio


 World class IT security names
 (best in class)
 Fits      International   laws
 regarding IT auditing (EU,
 NATO directives)
 Regulation compliance (HIPAA,
 SOX, BASEL2, GLBA, PCI,
 etc.)
 Best Price / Performance
 Close and good relationships
 with vendors for years
 Local competence center



www.headtechnology.com
Operations in The Baltic States

  Mobile Security       Gateway Security        Endpoint Security       Network Security




   700 global reseller partner network, 2nd level technical support & local competence center

www.headtechnology.com
Mobile Device Security




     You wouldn't think of leaving your computer open to viruses and
     hackers, but your smartphone probably doesn't have the same
                               protections...
             Michael Finney - Bay Area's consumer problem analyst


www.headtechnology.com
Starting questions….

             • Do you have a smartphone or tablet?

             • What kind of mobile device, OS?

             • How many app’s your device has?

             • Are they connected to your company’s data?

             • What’s your highscore in «Angry Birds»???




www.headtechnology.com
Old technologies Old Solutions




www.headtechnology.com
Gadgets, gadgets, gadgets




www.headtechnology.com
Mobile operating system evolution continues

       2007                  2010                      2013




                                                                    10




                                                     • Touch wins
                                                 • Consumer UX wins
                                               • Global IT will have to
                                                    support 3-5 OS
                                               • Migration is constant

www.headtechnology.com
                                                             11
What do local companies say?
1. Up to 60% of new phone buyers choose smartphones

 2. Most bought smartphones at the moment - iPhone4, Nokia 5230,
iPhone4S un Samsung Galaxy S2

3. In our network there are 150 000 smartphone users.
By Jānis Vēvers



1. We predict that in 2014 the internet on mobile devices will be over 100
   Mb p/s

2. On year 2015 from all sold mobile phones 75% will be smartphones

3. All-in-one plans and solutions will be the dominating choice for buyers
By Valdis Vancovičs

www.headtechnology.com
Local smartphone market




www.headtechnology.com
Background - technology development


 IT continues taking the lead in business (ERP,
 CRM, document management, digital prototyping
 etc.)

 Importance and development of e-World (e-
 Health,    e-government,  e-services, social
 networking, Web 2.0, unified communications
 and tools for that etc.)

 Mobility and borderless enterprise

 Cyber culture develops faster than cyber security



www.headtechnology.com
When Angry Birds Attack



     Hmmm…




www.headtechnology.com
When Angry Birds Attack



     Ouch…




www.headtechnology.com
End users – the weakest link




   Security researchers still label end users the biggest threat to enterprise
   security.



“Unlike applications that can be patched or systems that can be hardened, end
users -- whether through naive, carelessness, or malicious intent -- continue to
expose IT resources to serious security threats.”

                               Amy DeCarlo - Principal Analyst at Current Analysis
www.headtechnology.com
Corporate overview




                        Vision: Mobile becomes the primary communications and
                        computing platform for the enterprise

                        Mission: Deliver the best security, management, and
                        enterprise app storefront for mobile devices and apps
    Founded in 2007



      Global reach

                         2011 Leaders Quadrant for Mobile   A New Paradigm for Mobile Device
    Market leadership          Device Management                     Management



  1400+ MDM customers




www.headtechnology.com
                                                                                  18
Market demands on…


                             TRUSTED USERS

TRUSTED DEVICES                                              TRUSTED APPS
                                      Multi-OS

                         S
                         E
                                                         A
                         C
                                                         P
                         U
                                                         P
                         R
                                                         S
                         I     Work           Personal


                         T              360

                         Y

                                      Multi-OS




           Business transformation for company and users


www.headtechnology.com
                                                                    19
Comprehensive lifecycle
                                                                                  6     Monitor posture
  1          Configure securely

                Email and apps
             Security and identity                                                7     Enforce identity
                Wi-Fi and VPN                5      Manage all devices
      … by group, individual, or ownership
                                                                                  8      Control access

  2          Integrate tightly
                                                                                  9    Automate workflow
                  Email
                 AD/LDAP
                                             Multi-OS console for employee- and
                Certificates                  company-owned mobile devices
                   BES
                 Archival                                                         10   Keep out rogue apps


  3         Protect privacy                                                       11     Publish apps (IT)

              BYOD programs
            Regional regulations                                                  12   Discover apps (user)


                                                                                  13    Secure app data

  4         Roll out at scale

             By group or policy
                                             15   Wipe corporate data             14   Limit roaming costs



  www.headtechnology.com
MobileIron architecture




www.headtechnology.com   MobileIron Confidential
Competitive advantage


                                MobileIron product advantage


    User choice            Purpose-built for multi-OS and BYOD management


                                    Deepest insight into endpoint risk
     Security
                         … tied to automated workflow for data loss prevention


       Apps            Most complete apps security, discovery and management



    Integration          Tightest integration with enterprise systems, like LDAP



    Global scale         Large-scale rollout with lowest TCO (appliance or cloud)




      Core advantage: MobileIron investment in customer success

www.headtechnology.com
                                                                           22
MobileIron a Leader after just one year of operations


                                                                                         Gartner comments on MobileIron:

                                                                                 • “[MobileIron] has seen rapid growth in sales, mind
                                                                                      share and market share, outselling most MDM
                                                                                   platforms during the past year. Built from the ground
                                                                                   up, it is solely focused on mobility management.”

                                                                                   • “Strong presales and postsales support and
                                                                                    programs are particularly effective at building client
                                                                                         relationships and reinforcing credibility”

                                                                                  • “The company emphasizes comprehensive life
                                                                                               cycle management”

                                                                                    • “It offers strong support for corporate and
                                                                                                     personal devices”

                                                                                 • “… superior management interface … sleek UI …
 Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by            full-featured tool … great reporting and dashboard
      Philip Redman, John Girard, and Leif-Olof Wallin (April 13, 2011)                                 capabilities”
This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger
research note and should be evaluated in the context of the entire report. The
          Gartner report is available upon request from MobileIron.




     www.headtechnology.com
                                                                   MobileIron - Confidential                                 23
Possibilities – future steps and HT offers

 Own evaluation (HW / SW)

 Webinar / Demo

 Training / Certification

 Vendor / Partner involvement

 Refference visit

 Pilot




www.headtechnology.com
Questions & Answers




www.headtechnology.com
Contacts




                 headtechnology Baltics SIA

                Innovative IT Security Solutions
                   Value Added Distributor

                   Latvia, Lithuania and Estonia

                         31 Cesu str. 3 floor,
                        LV-1012, Riga, Latvia
                      Phone: +371 674 21 021
                      Fax:    +371 674 21 024
                  eMail: info@headtechnology.lv
                 Internet: www.headtechnology.lv

www.headtechnology.com

Más contenido relacionado

Destacado

Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)SPEC INDIA
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
Tic72 equipo10 tema21_rok_quickcart
Tic72 equipo10 tema21_rok_quickcartTic72 equipo10 tema21_rok_quickcart
Tic72 equipo10 tema21_rok_quickcartZaMm Pérz
 
Foiled Cupcakes - Denmark JBoye
Foiled Cupcakes - Denmark JBoyeFoiled Cupcakes - Denmark JBoye
Foiled Cupcakes - Denmark JBoyeFoiled Inc.
 
Goldbach Media | SPORT Screens
Goldbach Media | SPORT ScreensGoldbach Media | SPORT Screens
Goldbach Media | SPORT ScreensGoldbach Group AG
 
Las mejores playas accesibles.
Las mejores playas accesibles.Las mejores playas accesibles.
Las mejores playas accesibles.José María
 
E+H brochure - Safe Choice for Food & Beverage
E+H brochure - Safe Choice for Food & Beverage E+H brochure - Safe Choice for Food & Beverage
E+H brochure - Safe Choice for Food & Beverage Carotek
 

Destacado (15)

Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Presentación curso pdi
Presentación curso pdiPresentación curso pdi
Presentación curso pdi
 
Curriculum
Curriculum Curriculum
Curriculum
 
Iea bioenergy 2014
Iea bioenergy 2014Iea bioenergy 2014
Iea bioenergy 2014
 
Auxiliar verbs
Auxiliar verbsAuxiliar verbs
Auxiliar verbs
 
Tic72 equipo10 tema21_rok_quickcart
Tic72 equipo10 tema21_rok_quickcartTic72 equipo10 tema21_rok_quickcart
Tic72 equipo10 tema21_rok_quickcart
 
Foiled Cupcakes - Denmark JBoye
Foiled Cupcakes - Denmark JBoyeFoiled Cupcakes - Denmark JBoye
Foiled Cupcakes - Denmark JBoye
 
Los nuevos conquistadores
Los nuevos conquistadoresLos nuevos conquistadores
Los nuevos conquistadores
 
Goldbach Media | SPORT Screens
Goldbach Media | SPORT ScreensGoldbach Media | SPORT Screens
Goldbach Media | SPORT Screens
 
Las mejores playas accesibles.
Las mejores playas accesibles.Las mejores playas accesibles.
Las mejores playas accesibles.
 
José Eloy Alfaro Delgado
José Eloy Alfaro DelgadoJosé Eloy Alfaro Delgado
José Eloy Alfaro Delgado
 
E+H brochure - Safe Choice for Food & Beverage
E+H brochure - Safe Choice for Food & Beverage E+H brochure - Safe Choice for Food & Beverage
E+H brochure - Safe Choice for Food & Beverage
 

Más de Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Más de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

MDM Security Management - MobileIron - August 2012

  • 1. 2012 - Mobile Device Management & Security Martins Rudzitis Key Account Manager headtechnology Baltics SIA Latvia, Lithuania and Estonia www.headtechnology.com
  • 3. Company business card Founded in 2000, Germany Core business – IT Security Offices in Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kazan, Ekaterinburg, Minsk, Baku, Almaty, Sofia More than 100 employees More than 25 vendors in portfolio Official distributor (for many cases exclusive) in Eastern Europe and Asia for number of products / solutions / vendors Participant of many IT exhibitions, road shows, business forums, ENISA IT Security Awareness program – local IT Security evangelist www.headtechnology.com
  • 4. Headtechnology for Partners Innovative product portfolio Partnership programms (Authorized, Bronze, Silver and Gold) Partner / Customer protection International knowledge base Multilanguage technical, sales and marketing support Product, Partner Trainings, demonstrations, webexes, certifications etc. More than 500 partners world wide www.headtechnology.com
  • 5. Headtechnology – choice of portfolio World class IT security names (best in class) Fits International laws regarding IT auditing (EU, NATO directives) Regulation compliance (HIPAA, SOX, BASEL2, GLBA, PCI, etc.) Best Price / Performance Close and good relationships with vendors for years Local competence center www.headtechnology.com
  • 6. Operations in The Baltic States Mobile Security Gateway Security Endpoint Security Network Security 700 global reseller partner network, 2nd level technical support & local competence center www.headtechnology.com
  • 7. Mobile Device Security You wouldn't think of leaving your computer open to viruses and hackers, but your smartphone probably doesn't have the same protections... Michael Finney - Bay Area's consumer problem analyst www.headtechnology.com
  • 8. Starting questions…. • Do you have a smartphone or tablet? • What kind of mobile device, OS? • How many app’s your device has? • Are they connected to your company’s data? • What’s your highscore in «Angry Birds»??? www.headtechnology.com
  • 9. Old technologies Old Solutions www.headtechnology.com
  • 11. Mobile operating system evolution continues 2007 2010 2013 10 • Touch wins • Consumer UX wins • Global IT will have to support 3-5 OS • Migration is constant www.headtechnology.com 11
  • 12. What do local companies say? 1. Up to 60% of new phone buyers choose smartphones 2. Most bought smartphones at the moment - iPhone4, Nokia 5230, iPhone4S un Samsung Galaxy S2 3. In our network there are 150 000 smartphone users. By Jānis Vēvers 1. We predict that in 2014 the internet on mobile devices will be over 100 Mb p/s 2. On year 2015 from all sold mobile phones 75% will be smartphones 3. All-in-one plans and solutions will be the dominating choice for buyers By Valdis Vancovičs www.headtechnology.com
  • 14. Background - technology development IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.) Importance and development of e-World (e- Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for that etc.) Mobility and borderless enterprise Cyber culture develops faster than cyber security www.headtechnology.com
  • 15. When Angry Birds Attack Hmmm… www.headtechnology.com
  • 16. When Angry Birds Attack Ouch… www.headtechnology.com
  • 17. End users – the weakest link Security researchers still label end users the biggest threat to enterprise security. “Unlike applications that can be patched or systems that can be hardened, end users -- whether through naive, carelessness, or malicious intent -- continue to expose IT resources to serious security threats.” Amy DeCarlo - Principal Analyst at Current Analysis www.headtechnology.com
  • 18. Corporate overview Vision: Mobile becomes the primary communications and computing platform for the enterprise Mission: Deliver the best security, management, and enterprise app storefront for mobile devices and apps Founded in 2007 Global reach 2011 Leaders Quadrant for Mobile A New Paradigm for Mobile Device Market leadership Device Management Management 1400+ MDM customers www.headtechnology.com 18
  • 19. Market demands on… TRUSTED USERS TRUSTED DEVICES TRUSTED APPS Multi-OS S E A C P U P R S I Work Personal T 360 Y Multi-OS Business transformation for company and users www.headtechnology.com 19
  • 20. Comprehensive lifecycle 6 Monitor posture 1 Configure securely Email and apps Security and identity 7 Enforce identity Wi-Fi and VPN 5 Manage all devices … by group, individual, or ownership 8 Control access 2 Integrate tightly 9 Automate workflow Email AD/LDAP Multi-OS console for employee- and Certificates company-owned mobile devices BES Archival 10 Keep out rogue apps 3 Protect privacy 11 Publish apps (IT) BYOD programs Regional regulations 12 Discover apps (user) 13 Secure app data 4 Roll out at scale By group or policy 15 Wipe corporate data 14 Limit roaming costs www.headtechnology.com
  • 22. Competitive advantage MobileIron product advantage User choice Purpose-built for multi-OS and BYOD management Deepest insight into endpoint risk Security … tied to automated workflow for data loss prevention Apps Most complete apps security, discovery and management Integration Tightest integration with enterprise systems, like LDAP Global scale Large-scale rollout with lowest TCO (appliance or cloud) Core advantage: MobileIron investment in customer success www.headtechnology.com 22
  • 23. MobileIron a Leader after just one year of operations Gartner comments on MobileIron: • “[MobileIron] has seen rapid growth in sales, mind share and market share, outselling most MDM platforms during the past year. Built from the ground up, it is solely focused on mobility management.” • “Strong presales and postsales support and programs are particularly effective at building client relationships and reinforcing credibility” • “The company emphasizes comprehensive life cycle management” • “It offers strong support for corporate and personal devices” • “… superior management interface … sleek UI … Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by full-featured tool … great reporting and dashboard Philip Redman, John Girard, and Leif-Olof Wallin (April 13, 2011) capabilities” This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from MobileIron. www.headtechnology.com MobileIron - Confidential 23
  • 24. Possibilities – future steps and HT offers Own evaluation (HW / SW) Webinar / Demo Training / Certification Vendor / Partner involvement Refference visit Pilot www.headtechnology.com
  • 26. Contacts headtechnology Baltics SIA Innovative IT Security Solutions Value Added Distributor Latvia, Lithuania and Estonia 31 Cesu str. 3 floor, LV-1012, Riga, Latvia Phone: +371 674 21 021 Fax: +371 674 21 024 eMail: info@headtechnology.lv Internet: www.headtechnology.lv www.headtechnology.com

Notas del editor

  1. As you can see from Michaels qoute, we are all focusing on Computers, Servers, networks laptops etc. But, some of us haven’t yet realized the upcoming problem.. And with upcoming I mean – It is already hear for quite some time, we just tend to ingore it so that we have less to bother.But! There is a problem and it is growing like a snowball that is rolling down a mountain full of snow..
  2. So, as we can see it is all about gadgets nowdays.. Here you can see what IDC and Fortune magazine has to say about the statistics.. As we can see over the last 2 years Android has jumed Magically high comparing to it’s compettitors. iOs, Blackberry, Windows Phone and Symbian and IDC is presuming that till the year of 2015 Android , together with iOs have the leading positions in the market and this means, not only in smart phone market but also in everyday market. Because, we know that technologies develops and in the upcoming years, there won’t be many possibilities to buy phones like Nokia 33 of Siemens S40... There will be smartphones and tablets everywhere. This also means that the threats to our gadget technology will be rising like mushrooms after rain.. And if we look at the Fortune magazine report, the growth of application downloading into our smartphones has rised and will continue to rise because, I would say that this is in human nature to have more if it is for free.. 
  3. As we can see in the Mobile phone operating system evaluation chart .. In 2007 we all were using Palm, Windows mobile, Symbian and BlackBerry, The situation changed a lot when in 2010 Android and Ios steped in the picture.. Judging by everything that we can here in the news and see in everyday life, Symbian is slowly dying out and leaving free market for ..... And the summary – Touch wins, Consumers want more things to play with and in the end our IT department has to support 3-5 OSSo,.. The migration is constant and this is a huge problem because we all want to be able to use our smarthones for everything... Receiving and sending out work emails, playing games, checking maps, measuring our heart rate and so on..
  4. And , Why shouldn’t we? Most apps are for free, and some are actually very usefull. On Saturday me and my colleague were in Vilnius and late at night we had to get home.. All this time we were using Vaze and App for Androids to know where to go.. In the end.. His phone died and we had to do this the old fashioned way.. The moral is.. We didn’t actually need a map or any knowleadge of the city untill our smartphones died.. :)So and if we look at the global scale.. IT continues taking the lead in business and also in everyday life.. Everything is suddenly going E.... E- government, E-trafic, E-Bay, E-pay, E-donate blood.. etc.. The mobility is growing ... And also with that the Security problems are growing.. Some say that the current IT world is like Wild wild west.. Who has the biggest gun and and/or quickest hands – win... Very few laws that very few people obay, too few sheriffs on the Multiquadrillion data teritorry.. And the same problem is with Mobile security...
  5. Title.. In most cases, The threat to our companies security is made by our own workers with simple not knowing and curiosity.. So let’s imagine that we put a big red shiny button on each of our employees tables.. With a sign.. DO not push..  You all know, it is just a matter of time..  But what it means to the comapny.. Spyware, companies and personal data leakage, huge finansial losses, new security measures and policies, investing more money in precousions, time spent in recovering and so on and on.. And in the end.. Who is responsible? ??So I am here today to tell that we have a solution for the existing and rapidly growing problem..
  6. MobileIron, fonded in 2007 and launchedfirst product in August 2009.Since then they have achieved global reach, selling MobileIron in over 30 countries, and acquired over 1200 new enterprise customers in just the last 12 months, including close to 100 of the Fortune 500 and Global 250.Their underlying vision is that mobile becomes the go-to platform for accessing enterprise systems, and the phone or tablet becomes the preferred interface for the end-user.Their taret is to eliminating the obstacles that come in the way of mobile adoption. As a result of this focus and the success of our customers, Gartner placed MobileIron in the Leader’s Quadrant of their first ever MDM Magic Quadrant in April 2011. MobileIron at the time was one of the youngest companies ever to be placed in a Leader’s Quadrant by Gartner.
  7. Trusted devices, Trusted users, Trusted apps..In a world of this much change, enterprise IT struggles with how to provide end-users the services they demand, like apps, without sacrificing data security. This needs to happen over multiple operating systems, unlike the single OS days of the desktop.The Mobile iron solution is to ensure that only trusted devices used by trusted users for trusted apps gain access to enterprise data, networks, and resources. And the level of access depends on the level of trust.Trusted Mobility is a strategy for business enablement and transformation. MobileIron is a software platform that provides the foundation for this approach.
  8. The MobileIron platform covers the full enterprise lifecycle and is available on-premise or in the cloud.When we put on Mobileiron First Devices must be configured to set the the company policy..This can be done to a specific individual or a whole group.. Let’s say, your boss doesn’t give a .. «Penny».. For the company policies and wants full access and control of everything and all apps enebled etc. Etc.. No problem.. ;)But for all the rest, we set strict or not so strict policies.. The devices must also integrate tightly with back-end enterprise systems. When it does.. What happens..MobileIron… protects corporate email… uses the same authentication mechanisms and groups as your existing directory services… connects to your enterprise certificate authority … triggers commands through the BES (Back end services)for management and security… archives SMS messages with your existing archival systemAlso, MobileIron provides granular privacy controls, so you can decide whether to track data like location or application inventoryAnd of course, all these configurations, policies, integrations, and controls can be send out to thousands and tens of thousands of devices in an automated wayNot only that but also there is the posiblility to push out applications.. Let’s say your company just decided to use CRM and to put it on all employees who are in the financial department... A few clicks and you employees, where ever they are at the moment will get a notification that a new app has been put on remotly on their device and that they should use it from now on..Another special possiblitity is to split the phone in particions...Once your policies are set, you need to make sure they continue to remain like that..You must monitor posture.. It is the security state of the device – is it jailbroken? Is it out-of-policy? Has the user turned encryption off by mistake? And so on..Based on the trust level of the device, MobileIron Sentry controls access to enterprise email. If a device is not trusted, email is blocked. And these actions are automated, so that IT can focus on managing exceptions, not the details of every device. This allows MobileIron to secure and manage the device fleet with limited people resources. Now let’s talk apps!And finally, when the employee leaves or the device is lost, MobileIron allows you to wipe the entire device or selectively wipe just the enterprise persona, which includes corporate email, VPN and WiFi settings, and business apps.Tracking.. Producitivity, safety, costs..
  9. From day on, MobileIronwas built with five goals in mind:Give users choice of deviceSecure mobile dataDrive business enablement through appsIntegrate into existing enterprise systemsScale quickly and cost-effectively to global rollouts
  10. Only existing for more then a year but already up in the leaders..