SlideShare una empresa de Scribd logo
1 de 30
@Waterstonsltd
www.waterstons.com
Mobile Device Management and
BYOD – Simple Changes Big
Benefits
Charlie Hales and Nigel Robson
25th April 2014
Agenda
@ Overview from last Seminar
@ Use what you already have
@ Windows device possibilities
@ Exchange
@ SCCM overview
@ Intune
Overview from last Seminar
@ What is Mobile Device Management
@ Strategy
@ What is a Mobile Device?
@ Mobile Device Management vs Mobile Application Management
@ What is BYOD
@ What can MDM/BYOD do for business?
@ Where is your Data?
@ Acceptable usage policy
@ Defining the right solution
Data Classifications
Information
Category
Description Example Information Assets
Public Information which is or can be made public. Advertisements
Public web content
Proprietary Information which is restricted to internal access and protected from
external access. Unauthorised access could cause a drop in customer
confidence, could influence operational effectiveness, cause financial loss
or provide gain for competitors.
Internal presentations
Performance data
Source code
Proprietary knowledge
Confidential Information received from Customers, or sensitive information about
Customers and Staff.
Customer Data
Customer intellectual property
Customer documents
Customer backups
Internal reports
Restricted Highly sensitive information
Limited access to specific individuals
Passwords
HR & Payroll
Backups
Card Data
DPA Information
Data Classifications
Category Public Proprietary Confidential Restricted
Description: Prevent easy access without prolonged or
determined access to the device
Prevent access even with prolonged and
determined access to device
As per confidential and access is
restricted to specific individuals
Physical Media or Device
Printed Media ok In possession of staff or customer In possession of staff or customer, within
property
Held in the safe or secure ICT Server
room
Mobile Phone ok PIN Coded PIN Coded & Remote Wipe not normally acceptable
Laptop / Tablet ok User authentication Authentication & Encryption not normally acceptable
Portable Storage ok Encryption Encryption Held in a safe
PC ok User authentication Physically Secured within property or
Encrypted
Physically secured within property
Cloud Storage ok Encrypted Encrypted not normally acceptable
ICO Website
Defining the right solution
@ What do you want to manage on the device?
@ Types of devices
@ PIN
@ Remote Wipe/Selective Wipe
@ Apps
@ Device/App Encryption
Defining the right solution
@ What do you want to manage on the device?
@ Integration with enterprise
applications
@ Multi user profiles
@ Separation of personal and work
data
@ Internet access
@ Advanced features
@ Data usage
@ GPS tracking
Example of device functionality
Content removed when
retiring a device
Windows 8.1 Windows Phone 8 iOS Android
Company apps and
associated data installed by
using Configuration Manager
and Windows Intune
Uninstalled and sideloading
keys are removed.
In addition any apps using
Windows Selective Wipe will
have the encryption key
revoked and data will no
longer be accessible.
Uninstalled and data
removed.
Uninstalled and data
removed.
Apps and data remain
installed.
VPN and Wi-Fi profiles Removed. Not applicable. Removed.
VPN: Not applicable.
Wi-Fi: Not removed.
Certificates Removed and revoked. Not applicable. Removed and revoked. Revoked.
Settings Requirements removed. Requirements removed. Requirements removed. Requirements removed.
Management Client
Not applicable. Management
agent is built-in.
Not applicable. Management
agent is built-in.
Management profile is
removed.
Device Administrator
privilege is revoked.
Example for SCCM and Intune
Use what you already have
@ Dependant on devices and existing technologies
@ Workplace folders
@ Exchange ActiveSync
@ Networking tools
@ SCCM (with Intune)
Workplace folders
@ Free and managed version
similar to Dropbox
@ Built into Windows 8.1
@ Windows 7 released this week
@ Soon will also work with iOS
and possibly Android
Exchange Active Sync by Server
@ Very limited in Exchange 2003 (now unsupported)
@ Added HTML emails, Auto discover and a few others in Exchange
2007 but still limited
@ 2010 SP1 onwards (including Office 365) saw improvements, added
Block/allow/quarantine list for example
@ Still some limitations in Exchange 2013 and Office 365, for example:
@ Free/Busy lookup
@ Encryption
@ Limited phone policies, e.g. application management
Exchange Active Sync by Device
@ Spreadsheet Server software vs Devices
What is SCCM
@ Device Management
@ Desktops, laptops, thin clients, mobile devices
@ Operating System Deployment
@ Anti-virus
@ Software Update Management
@ Power Management
@ Client Health & Monitoring
@ Asset Intelligence and Inventory
What is SCCM
@ Application management
@ Application Delivery
@ Application Intelligence and Inventory
@ Application Updates
@ Deploy to user or device
@ Self-Service for application provisioning
@Waterstonsltd
www.waterstons.com
PC Demo
@Waterstonsltd
www.waterstons.com
iPad Demo
What is Intune?
Differences between Intune and
Intune with SCCM
@ Intune is a standalone product for managing devices from the cloud
@ Intune standalone is a subscription service
@ Limited domain integration to your infrastructure unless SCCM, ADFS
or DirSync is used
@ Limits in domain related tasks and business specific tasks
Intune Limitations
@ Limited integration with Apple VPP
@ Device encryption capabilities limited
@ Intune is still maturing and therefore missing some of the more
advanced features of a fully fledged MDM solution.
Intune Costs
@ Complicated as always with Microsoft
@ Available through multiple options
@ Online
@ Through EA
@ Add on to existing SCCM/SCEP licencing, or can be purchased together new
How Intune can work with your network
How Intune can bring User and IT
Benefits
@Waterstonsltd
www.waterstons.com
iPad Demo
@Waterstonsltd
www.waterstons.com
SCCM Remote Wipe Demo
@Waterstonsltd
www.waterstons.com
SCCM Demo
Summary
@ Define requirements first
@ System fundamentals
@ What devices will be used
@ Use what you already have if possible?
@ Windows devices
@ Exchange
@ SCCM overview
@ Intune
Upcoming Events….
@ Mobile Device Management & BYOD Technologies - The
Major Players on 23rd May. Charlie Hales and Ian Craggs
@ How to Build a Benefits-led Business Case on 9th May.
Joanne Adair and Alistair McLeod
@Waterstonsltd
www.waterstons.com
Questions?
Keep in Touch….
charlie.hales@waterstons.com
nigel.robson@waterstons.com
http://www.waterstons.com
@WaterstonsLtd

Más contenido relacionado

La actualidad más candente

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingIvanti
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 

La actualidad más candente (20)

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Byod
ByodByod
Byod
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
BYOD
BYODBYOD
BYOD
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 

Destacado

Web administration lab file
Web administration lab fileWeb administration lab file
Web administration lab fileAnkit Dixit
 
Management of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
Management of Geo-Fencing - Alarm Zones & User's Location - Technical ApproachesManagement of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
Management of Geo-Fencing - Alarm Zones & User's Location - Technical ApproachesJose María Carazo Cepedano
 
Roll Your Own Content Management System
Roll Your Own Content Management SystemRoll Your Own Content Management System
Roll Your Own Content Management Systemguest0fe006
 
Seo 7 step seo process
Seo 7 step seo processSeo 7 step seo process
Seo 7 step seo processPractical SEO
 
Introduction to SEO Presentation
Introduction to SEO PresentationIntroduction to SEO Presentation
Introduction to SEO Presentation7thingsmedia
 
Search Engine Optimization PPT
Search Engine Optimization PPT Search Engine Optimization PPT
Search Engine Optimization PPT Kranthi Shaik
 
Basic SEO Presentation
Basic SEO PresentationBasic SEO Presentation
Basic SEO PresentationPaul Kortman
 
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013Amazon Web Services
 
SEO Tactics to Love vs. Leave
SEO Tactics to Love vs. LeaveSEO Tactics to Love vs. Leave
SEO Tactics to Love vs. LeaveRand Fishkin
 
How to Build SEO into Content Strategy
How to Build SEO into Content StrategyHow to Build SEO into Content Strategy
How to Build SEO into Content StrategyJonathon Colman
 
Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEORand Fishkin
 
The History of SEO
The History of SEOThe History of SEO
The History of SEOHubSpot
 

Destacado (16)

Web administration lab file
Web administration lab fileWeb administration lab file
Web administration lab file
 
Management of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
Management of Geo-Fencing - Alarm Zones & User's Location - Technical ApproachesManagement of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
Management of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Open source CMS comparison
Open source CMS comparisonOpen source CMS comparison
Open source CMS comparison
 
Roll Your Own Content Management System
Roll Your Own Content Management SystemRoll Your Own Content Management System
Roll Your Own Content Management System
 
Seo 7 step seo process
Seo 7 step seo processSeo 7 step seo process
Seo 7 step seo process
 
Content Management System
Content Management SystemContent Management System
Content Management System
 
SEO PPT
SEO PPTSEO PPT
SEO PPT
 
Introduction to SEO Presentation
Introduction to SEO PresentationIntroduction to SEO Presentation
Introduction to SEO Presentation
 
Search Engine Optimization PPT
Search Engine Optimization PPT Search Engine Optimization PPT
Search Engine Optimization PPT
 
Basic SEO Presentation
Basic SEO PresentationBasic SEO Presentation
Basic SEO Presentation
 
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
 
SEO Tactics to Love vs. Leave
SEO Tactics to Love vs. LeaveSEO Tactics to Love vs. Leave
SEO Tactics to Love vs. Leave
 
How to Build SEO into Content Strategy
How to Build SEO into Content StrategyHow to Build SEO into Content Strategy
How to Build SEO into Content Strategy
 
Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEO
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 

Similar a Mobile device management and BYOD – simple changes, big benefits

Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...SolarWinds
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Federal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service ManagementFederal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service ManagementSolarWinds
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...SolarWinds
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 

Similar a Mobile device management and BYOD – simple changes, big benefits (20)

Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Federal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service ManagementFederal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service Management
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...Government and Education Webinar: Successfully Migrating Applications to the ...
Government and Education Webinar: Successfully Migrating Applications to the ...
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 

Más de Waterstons Ltd

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Waterstons Ltd
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike WaterstonWaterstons Ltd
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraWaterstons Ltd
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project ManagerWaterstons Ltd
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond IntelligenceWaterstons Ltd
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...Waterstons Ltd
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...Waterstons Ltd
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...Waterstons Ltd
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessWaterstons Ltd
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...Waterstons Ltd
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for EnterpriseWaterstons Ltd
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementWaterstons Ltd
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The CloudWaterstons Ltd
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationWaterstons Ltd
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime CommunicationsWaterstons Ltd
 

Más de Waterstons Ltd (16)

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike Waterston
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint Era
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project Manager
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond Intelligence
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications Success
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for Enterprise
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service Management
 
Mobile for business
Mobile for businessMobile for business
Mobile for business
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The Cloud
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime Communications
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Mobile device management and BYOD – simple changes, big benefits

  • 1. @Waterstonsltd www.waterstons.com Mobile Device Management and BYOD – Simple Changes Big Benefits Charlie Hales and Nigel Robson 25th April 2014
  • 2. Agenda @ Overview from last Seminar @ Use what you already have @ Windows device possibilities @ Exchange @ SCCM overview @ Intune
  • 3. Overview from last Seminar @ What is Mobile Device Management @ Strategy @ What is a Mobile Device? @ Mobile Device Management vs Mobile Application Management @ What is BYOD @ What can MDM/BYOD do for business? @ Where is your Data? @ Acceptable usage policy @ Defining the right solution
  • 4. Data Classifications Information Category Description Example Information Assets Public Information which is or can be made public. Advertisements Public web content Proprietary Information which is restricted to internal access and protected from external access. Unauthorised access could cause a drop in customer confidence, could influence operational effectiveness, cause financial loss or provide gain for competitors. Internal presentations Performance data Source code Proprietary knowledge Confidential Information received from Customers, or sensitive information about Customers and Staff. Customer Data Customer intellectual property Customer documents Customer backups Internal reports Restricted Highly sensitive information Limited access to specific individuals Passwords HR & Payroll Backups Card Data DPA Information
  • 5. Data Classifications Category Public Proprietary Confidential Restricted Description: Prevent easy access without prolonged or determined access to the device Prevent access even with prolonged and determined access to device As per confidential and access is restricted to specific individuals Physical Media or Device Printed Media ok In possession of staff or customer In possession of staff or customer, within property Held in the safe or secure ICT Server room Mobile Phone ok PIN Coded PIN Coded & Remote Wipe not normally acceptable Laptop / Tablet ok User authentication Authentication & Encryption not normally acceptable Portable Storage ok Encryption Encryption Held in a safe PC ok User authentication Physically Secured within property or Encrypted Physically secured within property Cloud Storage ok Encrypted Encrypted not normally acceptable
  • 7. Defining the right solution @ What do you want to manage on the device? @ Types of devices @ PIN @ Remote Wipe/Selective Wipe @ Apps @ Device/App Encryption
  • 8. Defining the right solution @ What do you want to manage on the device? @ Integration with enterprise applications @ Multi user profiles @ Separation of personal and work data @ Internet access @ Advanced features @ Data usage @ GPS tracking
  • 9. Example of device functionality Content removed when retiring a device Windows 8.1 Windows Phone 8 iOS Android Company apps and associated data installed by using Configuration Manager and Windows Intune Uninstalled and sideloading keys are removed. In addition any apps using Windows Selective Wipe will have the encryption key revoked and data will no longer be accessible. Uninstalled and data removed. Uninstalled and data removed. Apps and data remain installed. VPN and Wi-Fi profiles Removed. Not applicable. Removed. VPN: Not applicable. Wi-Fi: Not removed. Certificates Removed and revoked. Not applicable. Removed and revoked. Revoked. Settings Requirements removed. Requirements removed. Requirements removed. Requirements removed. Management Client Not applicable. Management agent is built-in. Not applicable. Management agent is built-in. Management profile is removed. Device Administrator privilege is revoked. Example for SCCM and Intune
  • 10. Use what you already have @ Dependant on devices and existing technologies @ Workplace folders @ Exchange ActiveSync @ Networking tools @ SCCM (with Intune)
  • 11. Workplace folders @ Free and managed version similar to Dropbox @ Built into Windows 8.1 @ Windows 7 released this week @ Soon will also work with iOS and possibly Android
  • 12. Exchange Active Sync by Server @ Very limited in Exchange 2003 (now unsupported) @ Added HTML emails, Auto discover and a few others in Exchange 2007 but still limited @ 2010 SP1 onwards (including Office 365) saw improvements, added Block/allow/quarantine list for example @ Still some limitations in Exchange 2013 and Office 365, for example: @ Free/Busy lookup @ Encryption @ Limited phone policies, e.g. application management
  • 13. Exchange Active Sync by Device @ Spreadsheet Server software vs Devices
  • 14. What is SCCM @ Device Management @ Desktops, laptops, thin clients, mobile devices @ Operating System Deployment @ Anti-virus @ Software Update Management @ Power Management @ Client Health & Monitoring @ Asset Intelligence and Inventory
  • 15. What is SCCM @ Application management @ Application Delivery @ Application Intelligence and Inventory @ Application Updates @ Deploy to user or device @ Self-Service for application provisioning
  • 19. Differences between Intune and Intune with SCCM @ Intune is a standalone product for managing devices from the cloud @ Intune standalone is a subscription service @ Limited domain integration to your infrastructure unless SCCM, ADFS or DirSync is used @ Limits in domain related tasks and business specific tasks
  • 20. Intune Limitations @ Limited integration with Apple VPP @ Device encryption capabilities limited @ Intune is still maturing and therefore missing some of the more advanced features of a fully fledged MDM solution.
  • 21. Intune Costs @ Complicated as always with Microsoft @ Available through multiple options @ Online @ Through EA @ Add on to existing SCCM/SCEP licencing, or can be purchased together new
  • 22. How Intune can work with your network
  • 23. How Intune can bring User and IT Benefits
  • 27. Summary @ Define requirements first @ System fundamentals @ What devices will be used @ Use what you already have if possible? @ Windows devices @ Exchange @ SCCM overview @ Intune
  • 28. Upcoming Events…. @ Mobile Device Management & BYOD Technologies - The Major Players on 23rd May. Charlie Hales and Ian Craggs @ How to Build a Benefits-led Business Case on 9th May. Joanne Adair and Alistair McLeod