When talking about Mobile devices inundating the enterprise, the largest blindspot is devices that walk into the door where the user has the ability to connect the device to Exchange without IT’s help. We helped solve that problem a year ago through our agentless discovery. Here, we extend our agentless integration ability by allowing the administrator to set policy on which devices can enter the system. For those of you familiar with LANDesk Management Suite, think of what we did last year as “Unmanaged Device Discovery” and this is an extension to that capability. We expect that most administrators will set the “Allow Only Managed devices to connect” and then new devices, once brought under management through a simple self-service enrollment process that I will talk about on the next slide, can be automatically allowed to connect. Other administrators may want to say that only certain device types that we know are secure can connect, such as ones that can do encryption natively (such as iOS4 and Android 3.x devices) but not necessarily require them to be managed.
When talking about Mobile devices inundating the enterprise, the largest blindspot is devices that walk into the door where the user has the ability to connect the device to Exchange without IT’s help. We helped solve that problem a year ago through our agentless discovery. Here, we extend our agentless integration ability by allowing the administrator to set policy on which devices can enter the system. For those of you familiar with LANDesk Management Suite, think of what we did last year as “Unmanaged Device Discovery” and this is an extension to that capability. We expect that most administrators will set the “Allow Only Managed devices to connect” and then new devices, once brought under management through a simple self-service enrollment process that I will talk about on the next slide, can be automatically allowed to connect. Other administrators may want to say that only certain device types that we know are secure can connect, such as ones that can do encryption natively (such as iOS4 and Android 3.x devices) but not necessarily require them to be managed.