SlideShare una empresa de Scribd logo
1 de 33
Mobile Device Management
and BYOD
Charlie Hales and Nigel Robson
28th February 2014
Agenda
• What is Mobile Device Management
• Strategy
• What is a Mobile Device?
• Mobile Device Management vs Mobile Application
Management
• What is BYOD
• What can MDM/BYOD do for business?
• Where is your Data?
• Acceptable usage policy
• Defining the right solution
• Some solutions available
What is Mobile Device
Management?
• Secures, monitors, manages and supports
mobile devices of multiple operating systems,
service providers and enterprises
• Covers corporate and end user devices
• Includes anything that is mobile (could
include laptops, and non-windows devices).
Enabler for users to access internal systems
securely from any device and anywhere
• Enables BYOD
Part of Overall Strategy
• Build upon and integrate with existing policies
– Desktop
– Flexible and remote working
– Application
• Do you just use Windows devices?
• Need to manage any type of device?
• Any data management/classification in place
currently?
Part of Overall Strategy – Many
Devices, one solution?
Client Management MDM
Source Gartner
Virtualisation
What are mobile devices?
What are mobile devices?
This?
What are mobile devices?
This?
What are mobile devices?
This?
What are mobile devices?
Or this?
What are mobile devices?
It can be any of these!
What are mobile devices?
But also these!
Mobile Device Management vs
Mobile Application Management
MAM
• App delivery
• App security
• App updating
• User authentication
• User authorization
• Version checking
• Push services
• Reporting and tracking
MDM
• All previous plus…
• Remote Configuration
• Security –including identifying
compromised devices
• Backup/Restore
• Network Usage and Support
• Mobile asset tracking and
management
• Remote Lock and Wipe
• Device Provisioning
• Software Installation
• Troubleshooting and Diagnostic
Tools
• Policy Application
• Logging and Reporting
• Remote Control and Administration
What is BYOD?
• Save money
– Reduce costs
– Enable Flexible working
– Increase Productivity
– Increase Job satisfaction
• Reduces risk and increase Security
– Where is your data?
– Consider this also for existing laptops
What can MDM/BYOD do
for business?
Survey
• Who doesn’t have a smartphone?
• Who has a BlackBerry?
• Who uses their own smartphone for work
purposes?
• Is it managed by work?
• Are you sure?
BYOD Business Survey
Fully embrace
and support
12%
Embrace, but
user self support
39%
Limited BYOD
Strategy
21%
Trialing BYOD
18%
Do not support
BYOD 10%
Source: zkresearch.com
Where is your Data?
ICO Website
ICO Website
ICO Website
Data Classifications
Information
Category
Description Example Information Assets
Public Information which is or can be made public. Advertisements
Public web content
Proprietary Information which is restricted to internal access and protected from
external access. Unauthorised access could cause a drop in customer
confidence, could influence operational effectiveness, cause financial loss
or provide gain for competitors.
Internal presentations
Performance data
Source code
Proprietary knowledge
Confidential Information received from Customers, or sensitive information about
Customers and Staff.
Customer Data
Customer intellectual property
Customer documents
Customer backups
Internal reports
Restricted Highly sensitive information
Limited access to specific individuals
Passwords
HR & Payroll
Backups
Card Data
DPA Information
Data Classifications
Category Public Proprietary Confidential Restricted
Description: Prevent easy access without prolonged or
determined access to the device
Prevent access even with prolonged and
determined access to device
As per confidential and access is
restricted to specific individuals
Physical Media or Device
Printed Media ok In possession of staff or customer In possession of staff or customer, within
property
Held in the safe or secure ICT Server
room
Mobile Phone ok PIN Coded PIN Coded & Remote Wipe not normally acceptable
Laptop / Tablet ok User authentication Authentication & Encryption not normally acceptable
Portable Storage ok Encryption Encryption Held in a safe
PC ok User authentication Physically Secured within property or
Encrypted
Physically secured within property
Cloud Storage ok Encrypted Encrypted not normally acceptable
Encryption
• Device Encryption
– Technology and Device dependant
– The latest Windows devices will work with internal
PKI or external Certs
– IOS devices will work with Apple provided Certs
which can be imported into most MDM solutions
– Android has limitations
• Application encryption
– Managed through application development and
provisioning
Design your BYOD Acceptable Use
Policy
• Privacy
• Who pays for what
• Third Parties
• Work vs Play
– Out of hours
– During hours
• Company responsibilities for personal data
• Licencing
• HR
• Device Disposal
• Litigation
Defining the right solution
• What do you want to manage on the
device?
– Types of devices
– PIN
– Remote Wipe/Selective Wipe
– Apps
– Device/App Encryption
Defining the right solution
• What do you want to manage on the device?
– Integration with enterprise
applications
– Multi user profiles
– Separation of personal and work
data
– Internet access
– Advanced features
• Data usage
• GPS tracking
Example of device functionality
Content removed when
retiring a device
Windows 8.1 Windows Phone 8 iOS Android
Company apps and
associated data installed by
using Configuration
Manager and Windows
Intune
Uninstalled and sideloading
keys are removed.
In addition any apps using
Windows Selective Wipe
will have the encryption key
revoked and data will no
longer be accessible.
Uninstalled and data
removed.
Uninstalled and data
removed.
Apps and data remain
installed.
VPN and Wi-Fi profiles Removed. Not applicable. Removed.
VPN: Not applicable.
Wi-Fi: Not removed.
Certificates Removed and revoked. Not applicable. Removed and revoked. Revoked.
Settings Requirements removed. Requirements removed. Requirements removed. Requirements removed.
Management Client
Not applicable.
Management agent is built-
in.
Not applicable.
Management agent is built-
in.
Management profile is
removed.
Device Administrator
privilege is revoked.
Example for SCCM and Intune
Lots of solutions available
• Dependant on requirements
• Leverage what you already have if possible
• Exchange Active Sync
• SCCM with Intune
• Other MDM providers
– Apple device manager (IOS 7.1 still will have
limitations though)
– SaaS or on-premise
– Some examples. Good Technology, Citrix,
MobileIron, AirWatch (VMWare recent purchase)
Summary
• Develop the right strategy
• Define the requirements
• What can MDM/BYOD do for your
business?
• Data Classification Policy
• Acceptable usage policy
• Defining the right solution
• Choose the solution
Future Seminars
• Use what you already have to enable MDM
and BYOD on 25th April
• MDM and BYOD technology providers and
solutions on 23rd May
• ‘Joining the dots’ of your applications and
systems – The benefits of system integration
on 14th March
Questions?
Keep in Touch….
charlie.hales@waterstons.com
nigel.robson@waterstons.com
http://www.waterstons.com
@WaterstonsLtd

Más contenido relacionado

La actualidad más candente

Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Summit 7 Systems
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device ManagmentMTG IT Professionals
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology MobileWorxs
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILouis-Martin Landry
 

La actualidad más candente (20)

Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
 
Byod
ByodByod
Byod
 

Destacado

Beyond App Store - Distribution of iOS Applications
Beyond App Store - Distribution of iOS ApplicationsBeyond App Store - Distribution of iOS Applications
Beyond App Store - Distribution of iOS Applicationslet's dev GmbH & Co. KG
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013Andris Soroka
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Mobility at Work: Mobile Device Management
Mobility at Work: Mobile Device ManagementMobility at Work: Mobile Device Management
Mobility at Work: Mobile Device Managementdigitallibrary
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)Lacoon Mobile Security
 
Deploying windows 10 in the Enterprise
Deploying windows 10 in the EnterpriseDeploying windows 10 in the Enterprise
Deploying windows 10 in the EnterpriseRonni Pedersen
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 

Destacado (9)

Beyond App Store - Distribution of iOS Applications
Beyond App Store - Distribution of iOS ApplicationsBeyond App Store - Distribution of iOS Applications
Beyond App Store - Distribution of iOS Applications
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Mobility at Work: Mobile Device Management
Mobility at Work: Mobile Device ManagementMobility at Work: Mobile Device Management
Mobility at Work: Mobile Device Management
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Deploying windows 10 in the Enterprise
Deploying windows 10 in the EnterpriseDeploying windows 10 in the Enterprise
Deploying windows 10 in the Enterprise
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 

Similar a Preparing for Mobile Device Management & Bring your Own Device

Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 

Similar a Preparing for Mobile Device Management & Bring your Own Device (20)

Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 

Más de Waterstons Ltd

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Waterstons Ltd
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike WaterstonWaterstons Ltd
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraWaterstons Ltd
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project ManagerWaterstons Ltd
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond IntelligenceWaterstons Ltd
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...Waterstons Ltd
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...Waterstons Ltd
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...Waterstons Ltd
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessWaterstons Ltd
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...Waterstons Ltd
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for EnterpriseWaterstons Ltd
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementWaterstons Ltd
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The CloudWaterstons Ltd
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationWaterstons Ltd
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime CommunicationsWaterstons Ltd
 

Más de Waterstons Ltd (16)

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike Waterston
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint Era
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project Manager
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond Intelligence
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications Success
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for Enterprise
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service Management
 
Mobile for business
Mobile for businessMobile for business
Mobile for business
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The Cloud
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime Communications
 

Último

VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...Suhani Kapoor
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaUnited Arab Emirates
 
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up NumberCall Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up NumberMs Riya
 
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...nagunakhan
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...Call Girls in Nagpur High Profile
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...Pooja Nehwal
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...nagunakhan
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...ranjana rawat
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一ga6c6bdl
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...Pooja Nehwal
 
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gayasrsj9000
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...ur8mqw8e
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile servicerehmti665
 

Último (20)

VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
 
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up NumberCall Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
 
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
 
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile service
 
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
 

Preparing for Mobile Device Management & Bring your Own Device

  • 1. Mobile Device Management and BYOD Charlie Hales and Nigel Robson 28th February 2014
  • 2. Agenda • What is Mobile Device Management • Strategy • What is a Mobile Device? • Mobile Device Management vs Mobile Application Management • What is BYOD • What can MDM/BYOD do for business? • Where is your Data? • Acceptable usage policy • Defining the right solution • Some solutions available
  • 3. What is Mobile Device Management? • Secures, monitors, manages and supports mobile devices of multiple operating systems, service providers and enterprises • Covers corporate and end user devices • Includes anything that is mobile (could include laptops, and non-windows devices). Enabler for users to access internal systems securely from any device and anywhere • Enables BYOD
  • 4. Part of Overall Strategy • Build upon and integrate with existing policies – Desktop – Flexible and remote working – Application • Do you just use Windows devices? • Need to manage any type of device? • Any data management/classification in place currently?
  • 5. Part of Overall Strategy – Many Devices, one solution? Client Management MDM Source Gartner Virtualisation
  • 6. What are mobile devices?
  • 7. What are mobile devices? This?
  • 8. What are mobile devices? This?
  • 9. What are mobile devices? This?
  • 10. What are mobile devices? Or this?
  • 11. What are mobile devices? It can be any of these!
  • 12. What are mobile devices? But also these!
  • 13. Mobile Device Management vs Mobile Application Management MAM • App delivery • App security • App updating • User authentication • User authorization • Version checking • Push services • Reporting and tracking MDM • All previous plus… • Remote Configuration • Security –including identifying compromised devices • Backup/Restore • Network Usage and Support • Mobile asset tracking and management • Remote Lock and Wipe • Device Provisioning • Software Installation • Troubleshooting and Diagnostic Tools • Policy Application • Logging and Reporting • Remote Control and Administration
  • 15. • Save money – Reduce costs – Enable Flexible working – Increase Productivity – Increase Job satisfaction • Reduces risk and increase Security – Where is your data? – Consider this also for existing laptops What can MDM/BYOD do for business?
  • 16. Survey • Who doesn’t have a smartphone? • Who has a BlackBerry? • Who uses their own smartphone for work purposes? • Is it managed by work? • Are you sure?
  • 17. BYOD Business Survey Fully embrace and support 12% Embrace, but user self support 39% Limited BYOD Strategy 21% Trialing BYOD 18% Do not support BYOD 10% Source: zkresearch.com
  • 18. Where is your Data?
  • 22. Data Classifications Information Category Description Example Information Assets Public Information which is or can be made public. Advertisements Public web content Proprietary Information which is restricted to internal access and protected from external access. Unauthorised access could cause a drop in customer confidence, could influence operational effectiveness, cause financial loss or provide gain for competitors. Internal presentations Performance data Source code Proprietary knowledge Confidential Information received from Customers, or sensitive information about Customers and Staff. Customer Data Customer intellectual property Customer documents Customer backups Internal reports Restricted Highly sensitive information Limited access to specific individuals Passwords HR & Payroll Backups Card Data DPA Information
  • 23. Data Classifications Category Public Proprietary Confidential Restricted Description: Prevent easy access without prolonged or determined access to the device Prevent access even with prolonged and determined access to device As per confidential and access is restricted to specific individuals Physical Media or Device Printed Media ok In possession of staff or customer In possession of staff or customer, within property Held in the safe or secure ICT Server room Mobile Phone ok PIN Coded PIN Coded & Remote Wipe not normally acceptable Laptop / Tablet ok User authentication Authentication & Encryption not normally acceptable Portable Storage ok Encryption Encryption Held in a safe PC ok User authentication Physically Secured within property or Encrypted Physically secured within property Cloud Storage ok Encrypted Encrypted not normally acceptable
  • 24. Encryption • Device Encryption – Technology and Device dependant – The latest Windows devices will work with internal PKI or external Certs – IOS devices will work with Apple provided Certs which can be imported into most MDM solutions – Android has limitations • Application encryption – Managed through application development and provisioning
  • 25. Design your BYOD Acceptable Use Policy • Privacy • Who pays for what • Third Parties • Work vs Play – Out of hours – During hours • Company responsibilities for personal data • Licencing • HR • Device Disposal • Litigation
  • 26. Defining the right solution • What do you want to manage on the device? – Types of devices – PIN – Remote Wipe/Selective Wipe – Apps – Device/App Encryption
  • 27. Defining the right solution • What do you want to manage on the device? – Integration with enterprise applications – Multi user profiles – Separation of personal and work data – Internet access – Advanced features • Data usage • GPS tracking
  • 28. Example of device functionality Content removed when retiring a device Windows 8.1 Windows Phone 8 iOS Android Company apps and associated data installed by using Configuration Manager and Windows Intune Uninstalled and sideloading keys are removed. In addition any apps using Windows Selective Wipe will have the encryption key revoked and data will no longer be accessible. Uninstalled and data removed. Uninstalled and data removed. Apps and data remain installed. VPN and Wi-Fi profiles Removed. Not applicable. Removed. VPN: Not applicable. Wi-Fi: Not removed. Certificates Removed and revoked. Not applicable. Removed and revoked. Revoked. Settings Requirements removed. Requirements removed. Requirements removed. Requirements removed. Management Client Not applicable. Management agent is built- in. Not applicable. Management agent is built- in. Management profile is removed. Device Administrator privilege is revoked. Example for SCCM and Intune
  • 29. Lots of solutions available • Dependant on requirements • Leverage what you already have if possible • Exchange Active Sync • SCCM with Intune • Other MDM providers – Apple device manager (IOS 7.1 still will have limitations though) – SaaS or on-premise – Some examples. Good Technology, Citrix, MobileIron, AirWatch (VMWare recent purchase)
  • 30. Summary • Develop the right strategy • Define the requirements • What can MDM/BYOD do for your business? • Data Classification Policy • Acceptable usage policy • Defining the right solution • Choose the solution
  • 31. Future Seminars • Use what you already have to enable MDM and BYOD on 25th April • MDM and BYOD technology providers and solutions on 23rd May • ‘Joining the dots’ of your applications and systems – The benefits of system integration on 14th March

Notas del editor

  1. Blured line – mobilily is already part of the major workforces, it is no longer a question of whether to do/alow it or not, it is more which devices/OS’s are supported
  2. NR
  3. Not either or.. Highlight Myths MDM Corp – MAM BYOD – it’s not necessarily the case Apps need to be developed
  4. Bring your own device (BYOD) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC)) refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications.[1] The term is also used to describe the same practice applied to students using personally owned devices in education settings http://en.wikipedia.org/wiki/BYOD
  5. CH
  6. BYOD is happening! Mobility is already part of the major workforces, it is no longer a question of whether to do/allow it or not, it is more which devices/OS’s are supported 10% who do not support are probably still being bypassed!
  7. Emails Laptops Devices USB Direct Access/VPN Work folders (New to Windows 8) From the “cloud”. E.g. Office 365/Google Apps Rights Management Data classification User policies help, but without technology to enforce user error or misuse can still happen
  8. DPA penalties and the ICO (Information Commissioners Office) – up to £500,000 and can lead to prison sentances http://ico.org.uk/enforcement/fines
  9. NR
  10. http://www.microsoft.com/en-gb/business/community/hints-and-tips/design-your-byod-acceptable-use-policy Lawyers are still arguing over the intricacies of BYOD Acceptable Use Policies (AUP). In truth, it is probably impossible to define a watertight legal framework at this moment. However, even the smallest company can benefit from identifying the challenges and mitigate them by having clarity on paper where possible. Our experts, Cesare Garlati (CG) and Jessica Keyes, Ph.D. (JK) offer this powerful Top Ten as a starting point: Privacy (CG). Mobile Device Management tools are the software which secure company information when it’s on a mobile device, whether connected to the company network or not. That’s fine when it’s a company computer, but what if you’re monitoring traffic on an employee’s PC? Without clear rights and responsibilities, this represents an invasion of privacy, or possibly even hacking. Who pays for what? (JK). When an employee uses their own device for both work and play, overages of both phone and data usage can easily occur. Who pays for what must be clearly spelled out. Your policy should precisely define which categories the business will cover, and which not. This will also indemnify you against any potential fringe benefit tax issues. Third Parties (CG). Personal devices are often shared around the family – think of the laptop or tablet which Dad shares with the kids, for example. Even a watertight acceptable use policy can’t be signed on behalf of other family members. Your employees cannot be held responsible for their kids’ use of a family device: if that affects your attitude to data, then it also ought to affect your attitude to BYOD. Work v. Play: what we do after hours (JK). The fundamental challenge of BYOD is differentiating between work activities and what employees do when off the clock. As ever, on a company-purchased device, AUPs can clearly define what users may do. On an employee-owned device, things are much less clearly defined. There are plenty of situations where an employee may be using their device, in their own time, and therefore the relevance of their actions may only be apparent because the company has been able to discover it at a later date; a discovery which would not have been possible if the home/work gulf had not been breached. What, for example, if an employee makes a defamatory or discriminatory remark on a social network, or even in a private email? Work v. Play: what we do in work (JK). The same issues apply on the job. Even on their own device, it’s unacceptable for an employee to engage in harassment, or to compromise workplace safety (for example by texting whilst driving). Company responsibility for personal data (CG). Garlati notes that his own son woke up one morning and, in an understandably desperate bid to play Angry Birds, tried multiple passwords on a tablet and thus triggered the Remote Wipe security function. That’s a great security tool, rightly mandated by the company to protect its data. But when the wipe occurred, what about all the personal photos etc. on the machine? It is arguable that the business could be responsible for them – even if the wipe was caused by a genuine thief! Licensing (CG). Home computers usually include home-use licensing of software. If that software is then used for commercial purposes, not only is the employee breaching the terms of their license, but the company can be accountable as an accessory to the license infringement. Microsoft offers licenses of Office software under Office 365 Small Business Premium to resolve precisely this problem. Your HR Conduct (JK). The electronic record of an employee’s device usage may be used against you- especially after acrimonious terminations. It could, for example, show that an employee is working all hours of the day and night (even without your knowledge) – which might bring up issues of liability for unrecorded overtime, or minimum wage problems. Device Disposal (CG). It’s an employee’s right to dispose of their old property however they want. There are apocryphal stories of phones left on planes and in taxis ending up on eBay. Businesses must, of course, require Remote Wipe functions to be activated, and an AUP should also include the condition that company data is rigorously removed before planned disposal. Litigation (CG). Finally, if your company should find itself mired in litigation, the court can seize devices for ‘e-discovery’; i.e. the hunt for electronic evidence; even if it’s a personally owned device. Your employee probably won’t get it back soon, if at all; and their personal content will likely be exposed.
  11. http://www.macrumors.com/2014/02/17/ios-7-1-mdm/
  12. CH