SlideShare una empresa de Scribd logo
1 de 10
September 28, 2012




            BYOD & MDM


                                          BYOD & MDM
                                          How Mobile Device Management solution enable ‘Bring
                                          Your Own Device’ Strategy for your business




20 Enterprise, 4th Floor, Aliso Viejo, CA 92656                                    www.ust-global.com
BYOD & MDM
    Tipping Points Passed for
          Critical Technologies
                              2010                  2011          2012             2013               2014


                                                                                             More mobile
                                 ½ of endpoints             20% of endpoints
           Mobile                                                                             OS devices
                                   are mobile                   are BYO
                                                                                               than PCs
                                      ½ of server
                                                               ½ of server
    Virtualization                   deployments
                                                           workloads are virtual
                                      are virtual

              Video             ½ of users use video in work         Software-based VC           Business
                                                                      passes hardware          video traffic
                                                                                                surpasses
              Voice                                    ½ of business voice is mobile              voice


                                                 More connected                           Traffic from things is
            Things
                                                things than people                        ½ traffic from people
    Information supplied courtesy of Gartner
2       Confidential & Proprietary
BYOD & MDM
    Smartphones Change Indian
    Business & Consumer Strategies

                                      Blurring roles, changing expectations


  Consumers                                                                               Employees

                      Using a paper map
                                Reading books                                 Activities done less
                                                                              since having a
                                 Watching TV
                                                                              smartphone
                        Using a computer
          Taking photos on a camera
   Playing games on a PC / console

                                                0%   10%   20%   30%   40%
Information supplied courtesy of OFCOM, OFCOM copyright, Communications Market Report: UK, 2011
   Confidential & Proprietary
BYOD & MDM

    Key Mobile & Wireless Technologies

       Mobile Consumer                 4G Standard
                                                                                                                           Investment
       Application Platforms                                                                                               Wi-Fi
                                                                                               Mobile Enterprise
                                                                                            Application Platforms          MDM
                                               6LoWPAN
                                                                               Location-Aware Applications
                                                                                                                           Mobile Apps
         Context Delivery
                                                Machine-to-Machine
                                                Communication Services
                                                                                         Location-Aware                    Mobile
                                                                                             Technology
            Architecture                       Mobile Device Management                                                    Security
                                                    Software-Defined
                                                    Radio
            802.11ac                                 Hosted Virtual                   Mobile Enterprise Applications via SaaS
                                                     Desktops
        802.11ad
                                                                            802.11n
                                                                           Network Access Control
                                                                                                           As of August 2011
                            Peak of
                            Inflated        Trough of                                                     Plateau of
                                                                        Slope of Enlightenment
           Technology Trigger               Disillusionment                                               Productivity
                            Expectations
                                                         time
           Years to mainstream adoption:
                                                                                                        obsolete
             less than 2 years       2 to 5 years       5 to 10 years         more than 10 years        before plateau
Information supplied courtesy of Gartner
    Confidential & Proprietary
BYOD & MDM
   Chaos and Opportunity From Mobile Devices
   and Consumerization
                                CIOs WorldwideSay:
 • They will support more than 3 smartphone or tablet
   platforms by 2013.
 • About a quarter of mobile devices used for business
   purposes will be owned by employees.
                                     And Yet…
 • Less than 30% believe that current smartphone and
   tablet strategies will satisfy an auditor.

From "CIO Attitudes Toward Consumerization of Mobile Devices and Applications"
May 2011

   Confidential & Proprietary
BYOD & MDM
   Features & Benefits
Advanced Management                   Mobile Activity Intelligence
Multi-OS Mobile Operations Under      Cut wireless bills using real - time activity
  Control                                monitoring

   Multi-OS management                  Visibility and reporting

   Enterprise Data boundary             Real-time Roaming Control

   Application management               Exception and Abuse Control

   Access Control
                                      My Phone @ Work
   Advanced security                 Self-governance and end -user productivity

   Remote control                       Usage visibility

   Lost phone recovery                  App discovery

   Enterprise services integration      Self service


6    Confidential & Proprietary
BYOD & MDM

Reference Architecture




Confidential & Proprietary
BYOD & MDM

Gartner Magic Quadrant on MDM




Confidential & Proprietary
BYOD & MDM

         BYOD – Case Study
         For India based oil and gas exploration and production company
                               Business Issues                                        Our Solution
                                Ensure safe usage of IPAD’s                           UST Global helped our client with the in-house
                                Need a secure solution to ensure employees             deployment of MDM (Mobile Device Management)
                                 privacy they need while maintaining the required       solution through the McAfee EMM platform
                                 level of corporate protection                         UST Global team also helped our client to define the
                                Define a BYOD Strategy for the enablement of           security policies to monitor compliance for secure access
Client Profile:                  BYOD mobile devices within their enterprise and to     to corporate network with those mobile devices.
 Our client, a Nifty 50         provision mobile devices                              UST Global team executed a proof of concept to evaluate
  company, is one of            Enable highly secure corporate network access          of EMM software and to assess the IT change process to
  the biggest private           Manage the devices remotely once connected to          be in place for Server/Network setup
  sector exploration and         corporate network.                                    UST installed McAfee Enterprise Mobility Management
  production companies                                                                  EMM MDM infrastructure in their DMZ to enable iPAD’s
  in India                                                                              to connect securely to client’s corporate applications
                               Client Benefits                                          from Internet and wireless. We have done iPAD
Highlights:                                                                             provisioning through the EMM platform, but the solution
                                Improved Efficiency and productivity                   scales to accommodate other mobile OS's
 Company IT realized
                                      • Improved the overall productivity and          The BYOD Strategy for the client included the following
   that allowing people
                                         collaboration within the organization.         components:
   to bring and
   manage their own                   • Secure Access to Corporate Network to                • BYOD Deployment Options
   devices would                         access the latest corporate information             • MDM Provider
   significantly                         form anywhere, enabling senior executives
                                         to make smarter decisions that positively           • Plan management
   improve
                                         impacts client’s business                           • Reimbursement Strategy
   productivity and at
   the same time bring          Scalable mobile security architecture                 UST Global have done iPAD provisioning through the
   considerable savings         Improved TCO                                           McAfee’s EMM platform, the solution also scales to
   not having to                                                                        accommodate other mobile OS's.
   manage the devices
   for their employees


9       Confidential & Proprietary
Thank
                                        You


Copyright © 2012 UST Global Inc. All Rights Reserved   www.ust-global.com

Más contenido relacionado

Más de Deepu S Nath

Greetings & Response - English Communication Training
Greetings & Response - English Communication TrainingGreetings & Response - English Communication Training
Greetings & Response - English Communication Training
Deepu S Nath
 

Más de Deepu S Nath (20)

How machines can take decisions
How machines can take decisionsHow machines can take decisions
How machines can take decisions
 
Artificial Intelligence: An Introduction
 Artificial Intelligence: An Introduction Artificial Intelligence: An Introduction
Artificial Intelligence: An Introduction
 
FAYA PORT 80 Introduction
FAYA PORT 80 IntroductionFAYA PORT 80 Introduction
FAYA PORT 80 Introduction
 
How machines can take decisions
How machines can take decisionsHow machines can take decisions
How machines can take decisions
 
Simplified Introduction to AI
Simplified Introduction to AISimplified Introduction to AI
Simplified Introduction to AI
 
Mining Opportunities of Block Chain and BitCoin
Mining Opportunities of Block Chain and BitCoinMining Opportunities of Block Chain and BitCoin
Mining Opportunities of Block Chain and BitCoin
 
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOps
 
Coffee@DBG - TechBites March 2016
Coffee@DBG - TechBites March 2016Coffee@DBG - TechBites March 2016
Coffee@DBG - TechBites March 2016
 
REACT.JS : Rethinking UI Development Using JavaScript
REACT.JS : Rethinking UI Development Using JavaScriptREACT.JS : Rethinking UI Development Using JavaScript
REACT.JS : Rethinking UI Development Using JavaScript
 
SEO For Developers
SEO For DevelopersSEO For Developers
SEO For Developers
 
Life Cycle of an App - From Idea to Monetization
Life Cycle of an App - From Idea to Monetization  Life Cycle of an App - From Idea to Monetization
Life Cycle of an App - From Idea to Monetization
 
Uncommon Python - What is special in Python
Uncommon Python -  What is special in PythonUncommon Python -  What is special in Python
Uncommon Python - What is special in Python
 
Coffee@DBG - TechBites Sept 2015
Coffee@DBG - TechBites Sept 2015Coffee@DBG - TechBites Sept 2015
Coffee@DBG - TechBites Sept 2015
 
Techbites July 2015
Techbites July 2015Techbites July 2015
Techbites July 2015
 
Apple Watch - Start Your Developer Engine
Apple Watch -  Start Your Developer EngineApple Watch -  Start Your Developer Engine
Apple Watch - Start Your Developer Engine
 
Greetings & Response - English Communication Training
Greetings & Response - English Communication TrainingGreetings & Response - English Communication Training
Greetings & Response - English Communication Training
 
Hybrid Mobile App Development - Xamarin
Hybrid Mobile App Development - XamarinHybrid Mobile App Development - Xamarin
Hybrid Mobile App Development - Xamarin
 
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
What’s new for Android Developers in 2015 - Material Design, Android Studio, ...
 
Internet of Things - The new Paradigmn
Internet of Things - The new ParadigmnInternet of Things - The new Paradigmn
Internet of Things - The new Paradigmn
 
Comparing Swift features with Objective C
Comparing Swift features with Objective CComparing Swift features with Objective C
Comparing Swift features with Objective C
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

MDM BYOD - How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business’

  • 1. September 28, 2012 BYOD & MDM BYOD & MDM How Mobile Device Management solution enable ‘Bring Your Own Device’ Strategy for your business 20 Enterprise, 4th Floor, Aliso Viejo, CA 92656 www.ust-global.com
  • 2. BYOD & MDM Tipping Points Passed for Critical Technologies 2010 2011 2012 2013 2014 More mobile ½ of endpoints 20% of endpoints Mobile OS devices are mobile are BYO than PCs ½ of server ½ of server Virtualization deployments workloads are virtual are virtual Video ½ of users use video in work Software-based VC Business passes hardware video traffic surpasses Voice ½ of business voice is mobile voice More connected Traffic from things is Things things than people ½ traffic from people Information supplied courtesy of Gartner 2 Confidential & Proprietary
  • 3. BYOD & MDM Smartphones Change Indian Business & Consumer Strategies Blurring roles, changing expectations Consumers Employees Using a paper map Reading books Activities done less since having a Watching TV smartphone Using a computer Taking photos on a camera Playing games on a PC / console 0% 10% 20% 30% 40% Information supplied courtesy of OFCOM, OFCOM copyright, Communications Market Report: UK, 2011 Confidential & Proprietary
  • 4. BYOD & MDM Key Mobile & Wireless Technologies Mobile Consumer 4G Standard Investment Application Platforms Wi-Fi Mobile Enterprise Application Platforms MDM 6LoWPAN Location-Aware Applications Mobile Apps Context Delivery Machine-to-Machine Communication Services Location-Aware Mobile Technology Architecture Mobile Device Management Security Software-Defined Radio 802.11ac Hosted Virtual Mobile Enterprise Applications via SaaS Desktops 802.11ad 802.11n Network Access Control As of August 2011 Peak of Inflated Trough of Plateau of Slope of Enlightenment Technology Trigger Disillusionment Productivity Expectations time Years to mainstream adoption: obsolete less than 2 years 2 to 5 years 5 to 10 years more than 10 years before plateau Information supplied courtesy of Gartner Confidential & Proprietary
  • 5. BYOD & MDM Chaos and Opportunity From Mobile Devices and Consumerization CIOs WorldwideSay: • They will support more than 3 smartphone or tablet platforms by 2013. • About a quarter of mobile devices used for business purposes will be owned by employees. And Yet… • Less than 30% believe that current smartphone and tablet strategies will satisfy an auditor. From "CIO Attitudes Toward Consumerization of Mobile Devices and Applications" May 2011 Confidential & Proprietary
  • 6. BYOD & MDM Features & Benefits Advanced Management Mobile Activity Intelligence Multi-OS Mobile Operations Under Cut wireless bills using real - time activity Control monitoring  Multi-OS management  Visibility and reporting  Enterprise Data boundary  Real-time Roaming Control  Application management  Exception and Abuse Control  Access Control My Phone @ Work  Advanced security Self-governance and end -user productivity  Remote control  Usage visibility  Lost phone recovery  App discovery  Enterprise services integration  Self service 6 Confidential & Proprietary
  • 7. BYOD & MDM Reference Architecture Confidential & Proprietary
  • 8. BYOD & MDM Gartner Magic Quadrant on MDM Confidential & Proprietary
  • 9. BYOD & MDM BYOD – Case Study For India based oil and gas exploration and production company Business Issues Our Solution  Ensure safe usage of IPAD’s  UST Global helped our client with the in-house  Need a secure solution to ensure employees deployment of MDM (Mobile Device Management) privacy they need while maintaining the required solution through the McAfee EMM platform level of corporate protection  UST Global team also helped our client to define the  Define a BYOD Strategy for the enablement of security policies to monitor compliance for secure access Client Profile: BYOD mobile devices within their enterprise and to to corporate network with those mobile devices.  Our client, a Nifty 50 provision mobile devices  UST Global team executed a proof of concept to evaluate company, is one of  Enable highly secure corporate network access of EMM software and to assess the IT change process to the biggest private  Manage the devices remotely once connected to be in place for Server/Network setup sector exploration and corporate network.  UST installed McAfee Enterprise Mobility Management production companies EMM MDM infrastructure in their DMZ to enable iPAD’s in India to connect securely to client’s corporate applications Client Benefits from Internet and wireless. We have done iPAD Highlights: provisioning through the EMM platform, but the solution  Improved Efficiency and productivity scales to accommodate other mobile OS's  Company IT realized • Improved the overall productivity and  The BYOD Strategy for the client included the following that allowing people collaboration within the organization. components: to bring and manage their own • Secure Access to Corporate Network to • BYOD Deployment Options devices would access the latest corporate information • MDM Provider significantly form anywhere, enabling senior executives to make smarter decisions that positively • Plan management improve impacts client’s business • Reimbursement Strategy productivity and at the same time bring  Scalable mobile security architecture  UST Global have done iPAD provisioning through the considerable savings  Improved TCO McAfee’s EMM platform, the solution also scales to not having to accommodate other mobile OS's. manage the devices for their employees 9 Confidential & Proprietary
  • 10. Thank You Copyright © 2012 UST Global Inc. All Rights Reserved www.ust-global.com

Notas del editor

  1. The mobile / wireless market remains confused and complex and we expect large numbers of new devices, services and applications to emerge through 2015. In mature markets smartphones in particular are driving significant behaviour changes in both consumers and employees. For example:Employees are behaving more like consumers demanding a wider choice of devices, exploiting consumer devices and applications from app stores, and adopting new strategies such as "bring your own" IT. The distinctions between a person's role as an employee and as a consumer are more blurred than ever.Consumer behaviour is changing, online activities are switching from PC and web channels to the mobile channel as smartphones become more popular and affordable. Traditional activities such as watching TV and reading newspapers are declining. The consequence will be major changes in consumer and employee-facing mobility. There are opportunities to innovate and deliver new services and experiences to consumers and to change the way in which devices and applications are supplied to employees. The social changes driven by mobility and smartphones apply particularly to teens who will be the next generation of employees and consumers. Note: survey data is taken from the UK OFCOM Communications Market Report published in August 2011 and is reproduced courtesy of OFCOM.
  2. Investments in mobile and wireless technologies are addressing these problems:Wireless networking technologies are advancing rapidly. The 802.11 family of wireless technologies is providing the highest economies of scale and the most common connection method for new devices. By 2014, 802.11ac-based systems will double the capacity of 802.11n, the current state-of-the-art in Wi-Fi. And it will double again by 2016 with the arrival of 802.11ad. The all-wireless enterprise will become a reality. In the cellular network, 4G technologies, especially LTE, are rapidly rolling out, and as Software Defined Radio matures the ability to move between generations of cellular technologies will accelerate. European organizations should embrace WiFi on the campus, with multi-radio devices and/or personal hotspots as a way to manage the disparity in publiceWiFi availability. Demand for mobile applications delivered on new devices such as tablets has exploded, raising the profile of multiplatform mobile device management, rather than restricting support to a single platform. More platforms means more complexity, and more variability in the management capabilities of the platforms. Add to this a highly splintered marketplace among rising operating systems such as Android, and the result is a new set of Mobile Device Management technologies. Multiplatform mobile app dev, including HTML5 code generation, is now becoming important to many enterprises (mobile enterprise application platforms, mobile consumer application platforms, and mobile enterprise applications via SaaS). 
  3. By year end 2012, respondents to surveys at our CIO Forums expected to support an average of 3.7 smartphone or tablet platforms (where a "platform" is defined as an OS such as Symbian, iOS or Android).They also expected that, on average, over 20% of mobile devices used for business purposes would be owned by employees — with a much higher than average 38% rate in the U.S.More than two-thirds of the respondents were planning to move to thinner client architectures to make it easier to support a wider range of endpoint devices.Respondents were asked whether they believed that their current smartphone and tablet security strategies would satisfy an auditor. Only 27% said it would, just over 40% said it wouldn't and the remainder were unsure.See "CIO Attitudes Toward Consumerization of Mobile Devices and Applications, Gartner, May 2011" (G00212597)..