Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques

990 visualizaciones

Publicado el

The BYOD phenomenon is impacting all organizations. It is no longer a choice whether to ‘allow’ BYOD within the organization – it is happening, and organizations need to figure out how to manage it – fast. With the recent release of Kaseya BYOD Suite, we want to share with you the many ways organizations can harness BYOD to not only secure and manage corporate data, but to drive new value for the organization. We will cover many ways to use the full power of this using examples from actual customer deployments. Come to learn how you can get up and running in minutes and solving this critical IT service need.

Publicado en: Tecnología
  • Sé el primero en comentar

Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques

  1. 1. BYOD Tips, Tricks and Techniques Jonathan Foulkes VP of Mobile Product Management Copyright ©2014 Kaseya 1
  2. 2. The information in this presentation is confidential and proprietary to Kaseya and may not be disclosed or distributed without the prior written permission of Kaseya. This document, and any related presentation, as well as Kaseya's strategy, possible future developments, products, platforms, directions and/or functionality are all subject to change without notice at Kaseya’s sole discretion. The information in this document does not constitute a commitment, contract, promise or legal obligation to deliver any material, code or functionality. This document is provided without warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. This document is for informational purposes only and may not be incorporated into a contract. All forward-looking statements, including those set forth in this presentation, are subject to various assumptions, risks and uncertainties that could cause actual results to differ materially from projections. Readers are cautioned not to place undue reliance on such forward-looking statements, and specifically, not to rely upon such in making purchasing decisions. Copyright ©2014 Kaseya 2
  3. 3. What BYOD Customers Want 1. Secure access to corporate data on personally owned devices 2. Segregate personal from business 3. Minimize inconvenience to the user 4. Easy to deploy and centrally manage Copyright ©2014 Kaseya 3
  4. 4. The Answer - Containerization Copyright ©2014 Kaseya 4
  5. 5. BYOD Recap  Add-on enabling secure mobile access to enterprise resources  Secure containers  On-prem Gateway & Cloud Services Copyright ©2014 Kaseya 5 Browser Docs Mail
  6. 6. BYOD Elements Copyright ©2014 Kaseya 6
  7. 7. What can you do with it?  Connect to Exchange servers  Leverage behind firewall resources – SharePoint – Document shares – Business web apps  Create your own mobile- optimized web apps Copyright ©2014 Kaseya 7
  8. 8. DEMO Copyright ©2014 Kaseya 8
  9. 9. Tips  Start Simple – Publish a couple of web resources – Get one doc source up  For mail, configure native, then transcribe  Use AD integration to: – Simplify setup – Single-Sign-On to back-end systems with NTLM Copyright ©2014 Kaseya 9
  10. 10. How do customers use it?  Large Software ISV – Corporate email on BYOD devices – Sales team access to internal CRM • Created mobile optimized views for high-value workflows – IT access to intranet monitoring consoles – Document Access Copyright ©2014 Kaseya 10
  11. 11. Tricks  Secure access to cloud services – Ensure total security by adding site entries for critical cloud apps – Handle locked-down apps by adding to proxy list • Certain cloud apps limit access from known IP’s • Common in finance and healthcare • Even if URL is publicly resolvable, mobiles will tunnel the requests if domain is in proxy list Copyright ©2014 Kaseya 11
  12. 12. How do customers use it?  Medium Financial Services (~700 empl.) – Corporate email on BYOD devices – Account managers in field capture forms • Mobile optimized, incl. signature capture – Tunnel several services that are locked to its IP – Document Access – Intranet Access Copyright ©2014 Kaseya 12
  13. 13. Mobile Optimized App Copyright ©2014 Kaseya 13
  14. 14. Techniques for Apps  Basic: use existing web apps and deal with it  Improved: Optimize the CSS for mobile  Front-end: new custom web app just for mobile  Hybrid App: HTML5-based hosted app that can still access native capabilities  Native App: New custom native apps(s) Copyright ©2014 Kaseya 14
  15. 15. Hybrid Apps  Built using HTML5/Javascript  Deployed to central servers on intranet  Leverage PhoneGap API’s for Native Access  Hosted by Secure Browser – All PhoneGap APIs exposed + BarCode scanner – Secure Local Storage APIs  No builds, no software distribution hassles Copyright ©2014 Kaseya 15
  16. 16. How do customers use it?  Small Drug Screening lab – Must be HIPAA compliant – Deployed on BYOD devices in remote clinics – Image capture & barcode printing – Centralized updates a must – Custom Hybrid App hosted by Secure Browser – Talks to mid-tier relayed by Gateway Copyright ©2014 Kaseya 16
  17. 17. Clinical Data Capture Copyright ©2014 Kaseya 17
  18. 18. Summary  Don’t wait, get started with BYOD, it’s easy  Make corporate data accessible  Grow into advanced mobile solutions Copyright ©2014 Kaseya 18
  19. 19. Copyright ©2014 Kaseya 19 Questions and Answers Thanks for Attending Kaseya Connect #KaseyaConnect Let's Share!