SlideShare a Scribd company logo
1 of 8
The SIMS Partnership
Transforming health care delivery
The SIMS Partnership
Transforming health care delivery
The SIMS Partnership
Transforming health care delivery
MAC Evaluation
Proof of Concept – Standards Review
Presenter: Kevin Tsai
Date: March 27, 2013
The SIMS Partnership
Transforming health care delivery
2
Agenda
• Summary/Background
• Critical Objectives
• Timelines/Milestones
• Findings/Testing Matrix
• Recommendations/Conclusions
• Questions
The SIMS Partnership
Transforming health care delivery
3
Summary/Background
– SIMS investigated developing standardized processes and methods for
integrating Mac computers securely into our network infrastructure
while establishing the capability to properly service a Mac population.
SIMS was looking to make the Mac an alternative platform for end
users with the intention of ensuring Mac is fully compliant with UHN’s
technology/security/privacy standards.
– The Proof of Concept focused on a single security profile with the goal
of proving security, integration, standardized security configurations
(i.e. Encryption/Antivirus/VPN), supportability, and a repeatable
provisioning process.
– This POC project involved no more than 5 users from the technology
support groups.
The SIMS Partnership
Transforming health care delivery
4
Critical Objectives
The UHN end user should be able to use their Proof of Concept Mac to.
•Use the corporate wireless network
•Meet the documented UHN Enterprise Security Policies & Standards
•Use UHN VPN
•Use Entourage or Outlook 2011 for Mac to connect to UHN’s Microsoft Exchange servers
•Use Winmagic to encrypt Mac laptop hard drive and prevent unencrypted USB storage
•Use McAfee Antivirus software including ePO agent for remote management and application
administration
•Use Citrix applications
The SIMS Partnership
Transforming health care delivery
5
Timelines/Milestones
The SIMS Partnership
Transforming health care delivery
6
Finding(s)/Testing Matrix
TestingResult
Comments
Description Tested By
UHN VPN Kevin Tsai Y Cisco Client is not required
Connecting to UHN Email using MAPI Client Kevin Tsai Y Authenticating required when launching Outlook (expected outcome for a non-domain device)
Connecting to UHN Wireless (corporate) Kevin Tsai Y No issues found
Antivirus Software (McAfee for MAC) Kevin Tsai Y The McAfee for MAC has to be purchased if needed
Standard Office Application (Office for MAC 2011) Kevin Tsai Y No issues found
Lync (Lync for MAC) Kevin Tsai Y No issues found
Standard UHN Encryption Software (WinMagic) Daniel Chen N
Tested two Macs with SecureDoc 5.3 and it appears the hard drives are fully encrypted with
SecureDoc 5.3, however the mandatory encryption policy that applies to UHN managed
Windows clients cannot be applied to these two test Macs. One of the observed issues is that
WinMagic encryption software tends to be behind the Mac OS update release. Recently
WinMagic released SecureDoc 6.1 that offers the full disk encryption that uses the built-in
FileVault 2 in Mac OS.
Standard MAC native disk encryption (filevault 2) Daniel Chen N
Encrypted the internal drive without any issues. Other issues are it does not encrypt the
removable media (USB) and the data is not recoverable if user lost the password/key. (JAMF
has the ability to insert the corporate key for this particular scenario so the data is still
recoverable if the BYOD Mac has enrolled under JAMF)
Citrix Kevin Tsai Y Citrix Recevier was tested with the ability to launch standard UHN Citrix Applications.
MAC Management/Inventory Suite (JAMF-SCCM like) Kevin/Daniel/Mario/Greg M
JAMF (Mac management/reporting/inventory tool) that is not included in the BYOD project
charter initially but we feel that it offers great value/assurance that we will need a tool to
inventory or even to manage the BYOD Mac devices if needed. Further $ ($6K - JumpStart
with the fully functional POC server) required from UHN management’s approval if we want to
investigate the product in a deeper level as we have already done the initial POC for the
duration of one month. Sunnybrook is currently using the same product to manage their
BYOD Mac devices with great success
MAC POC Testing Matrix
The SIMS Partnership
Transforming health care delivery
7
Recommendations/Conclusions
Conclusions
•MAC does not meet the requirements of our standard corporate security
policy and government regulations (Winmagic policy remote push & USB
data encryption)
•There are financial implications and a separate management infrastructure
will be needed if we want to manage MAC. (Estimated $20K CapEx for JAMF
Infrastructure, $140/yr/per devices for JAMF, $12K OpEx/yr/per server; antivirus/office & other CALs are extra)
Recommendation
•MAC should be managed as BYO guideline/corporate IT policy and will be
tested during future BYO proof of concepts (e.g. Mobile Data and
Application Platform)
The SIMS Partnership
Transforming health care delivery
8
Questions?

More Related Content

What's hot

CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
 

What's hot (16)

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 final
 
Photography Company Lifetouch Safeguards IT Security for Third Party Software...
Photography Company Lifetouch Safeguards IT Security for Third Party Software...Photography Company Lifetouch Safeguards IT Security for Third Party Software...
Photography Company Lifetouch Safeguards IT Security for Third Party Software...
 
Leveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom lineLeveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom line
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTUNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Cmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.comCmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.com
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 

Viewers also liked (13)

Abraham maslow
Abraham maslowAbraham maslow
Abraham maslow
 
Folletos administracion
Folletos administracionFolletos administracion
Folletos administracion
 
Apache Web Server Complete Guide
Apache Web Server Complete GuideApache Web Server Complete Guide
Apache Web Server Complete Guide
 
How to write a research paper
How to write a research paperHow to write a research paper
How to write a research paper
 
Pac rim 20013
Pac rim 20013Pac rim 20013
Pac rim 20013
 
Depression
DepressionDepression
Depression
 
International love.
International love.International love.
International love.
 
jees_Resume2
jees_Resume2jees_Resume2
jees_Resume2
 
Feel This Moment
Feel This MomentFeel This Moment
Feel This Moment
 
Target Audience | Fortune/Katrina
Target Audience | Fortune/KatrinaTarget Audience | Fortune/Katrina
Target Audience | Fortune/Katrina
 
Why plants are important
Why plants are importantWhy plants are important
Why plants are important
 
Suleiman the magnificent
Suleiman the magnificentSuleiman the magnificent
Suleiman the magnificent
 
The C4 pathway
The C4 pathwayThe C4 pathway
The C4 pathway
 

Similar to mac integration

Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Kaseya
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
Iaetsd Iaetsd
 

Similar to mac integration (20)

Building DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
Building DevOps in the Enterprise: Balancing Centralized and Decentralized TeamsBuilding DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
Building DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
 
Dual-Track Agile at Scale
Dual-Track Agile at ScaleDual-Track Agile at Scale
Dual-Track Agile at Scale
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
Building DevOps in the enterprise: Transforming challenges into organizationa...
Building DevOps in the enterprise: Transforming challenges into organizationa...Building DevOps in the enterprise: Transforming challenges into organizationa...
Building DevOps in the enterprise: Transforming challenges into organizationa...
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Bringing collaborative test to life an example of community effort
Bringing collaborative test to life  an example of community effort Bringing collaborative test to life  an example of community effort
Bringing collaborative test to life an example of community effort
 
MidoNet roadmap
MidoNet roadmapMidoNet roadmap
MidoNet roadmap
 
MidoNet Vision & Roadmap
MidoNet Vision & RoadmapMidoNet Vision & Roadmap
MidoNet Vision & Roadmap
 
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration Whitepaper
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

mac integration

  • 1. The SIMS Partnership Transforming health care delivery The SIMS Partnership Transforming health care delivery The SIMS Partnership Transforming health care delivery MAC Evaluation Proof of Concept – Standards Review Presenter: Kevin Tsai Date: March 27, 2013
  • 2. The SIMS Partnership Transforming health care delivery 2 Agenda • Summary/Background • Critical Objectives • Timelines/Milestones • Findings/Testing Matrix • Recommendations/Conclusions • Questions
  • 3. The SIMS Partnership Transforming health care delivery 3 Summary/Background – SIMS investigated developing standardized processes and methods for integrating Mac computers securely into our network infrastructure while establishing the capability to properly service a Mac population. SIMS was looking to make the Mac an alternative platform for end users with the intention of ensuring Mac is fully compliant with UHN’s technology/security/privacy standards. – The Proof of Concept focused on a single security profile with the goal of proving security, integration, standardized security configurations (i.e. Encryption/Antivirus/VPN), supportability, and a repeatable provisioning process. – This POC project involved no more than 5 users from the technology support groups.
  • 4. The SIMS Partnership Transforming health care delivery 4 Critical Objectives The UHN end user should be able to use their Proof of Concept Mac to. •Use the corporate wireless network •Meet the documented UHN Enterprise Security Policies & Standards •Use UHN VPN •Use Entourage or Outlook 2011 for Mac to connect to UHN’s Microsoft Exchange servers •Use Winmagic to encrypt Mac laptop hard drive and prevent unencrypted USB storage •Use McAfee Antivirus software including ePO agent for remote management and application administration •Use Citrix applications
  • 5. The SIMS Partnership Transforming health care delivery 5 Timelines/Milestones
  • 6. The SIMS Partnership Transforming health care delivery 6 Finding(s)/Testing Matrix TestingResult Comments Description Tested By UHN VPN Kevin Tsai Y Cisco Client is not required Connecting to UHN Email using MAPI Client Kevin Tsai Y Authenticating required when launching Outlook (expected outcome for a non-domain device) Connecting to UHN Wireless (corporate) Kevin Tsai Y No issues found Antivirus Software (McAfee for MAC) Kevin Tsai Y The McAfee for MAC has to be purchased if needed Standard Office Application (Office for MAC 2011) Kevin Tsai Y No issues found Lync (Lync for MAC) Kevin Tsai Y No issues found Standard UHN Encryption Software (WinMagic) Daniel Chen N Tested two Macs with SecureDoc 5.3 and it appears the hard drives are fully encrypted with SecureDoc 5.3, however the mandatory encryption policy that applies to UHN managed Windows clients cannot be applied to these two test Macs. One of the observed issues is that WinMagic encryption software tends to be behind the Mac OS update release. Recently WinMagic released SecureDoc 6.1 that offers the full disk encryption that uses the built-in FileVault 2 in Mac OS. Standard MAC native disk encryption (filevault 2) Daniel Chen N Encrypted the internal drive without any issues. Other issues are it does not encrypt the removable media (USB) and the data is not recoverable if user lost the password/key. (JAMF has the ability to insert the corporate key for this particular scenario so the data is still recoverable if the BYOD Mac has enrolled under JAMF) Citrix Kevin Tsai Y Citrix Recevier was tested with the ability to launch standard UHN Citrix Applications. MAC Management/Inventory Suite (JAMF-SCCM like) Kevin/Daniel/Mario/Greg M JAMF (Mac management/reporting/inventory tool) that is not included in the BYOD project charter initially but we feel that it offers great value/assurance that we will need a tool to inventory or even to manage the BYOD Mac devices if needed. Further $ ($6K - JumpStart with the fully functional POC server) required from UHN management’s approval if we want to investigate the product in a deeper level as we have already done the initial POC for the duration of one month. Sunnybrook is currently using the same product to manage their BYOD Mac devices with great success MAC POC Testing Matrix
  • 7. The SIMS Partnership Transforming health care delivery 7 Recommendations/Conclusions Conclusions •MAC does not meet the requirements of our standard corporate security policy and government regulations (Winmagic policy remote push & USB data encryption) •There are financial implications and a separate management infrastructure will be needed if we want to manage MAC. (Estimated $20K CapEx for JAMF Infrastructure, $140/yr/per devices for JAMF, $12K OpEx/yr/per server; antivirus/office & other CALs are extra) Recommendation •MAC should be managed as BYO guideline/corporate IT policy and will be tested during future BYO proof of concepts (e.g. Mobile Data and Application Platform)
  • 8. The SIMS Partnership Transforming health care delivery 8 Questions?