SlideShare ist ein Scribd-Unternehmen logo
1 von 26
@Waterstonsltd
www.waterstons.com
Mobile Device Management
and BYOD – The Major Players
Charlie Hales and Ian Craggs
23rd May 2014
Agenda
@ Overview from previous seminars
@ Who are the Major Players?
@ Cisco Meraki
@ AirWatch Demo
Overview from Seminar 1
@ What is Mobile Device Management
@ Strategy
@ What is a Mobile Device?
@ Mobile Device Management vs Mobile Application Management
@ What is BYOD
@ What can MDM/BYOD do for business?
@ Where is your Data?
@ Acceptable usage policy
@ Defining the right solution from your requirements
Defining the right solution
@ What do you want to manage on the device?
@ Types of devices
@ PIN
@ Remote Wipe/Selective Wipe
@ Data
@ Apps
@ Device/App Encryption
Defining the right solution
@ What do you want to manage on the device?
@ Integration with enterprise
applications
@ Multi user profiles
@ Separation of personal and work
data
@ Internet access
@ Advanced features
@ Data usage
@ GPS tracking
Overview from Seminar 2
@ Use what you already have
@ Windows device possibilities
@ Exchange
@ SCCM overview
@ Intune
The Major Players
AirWatch
@ Recently purchased by VMWare
@ Market Leader
@ SaaS or on premise
@ Strengths
@ Enterprise integration
@ Secure Content Locker
@ Flexible pricing
@ Weaknesses
@ Direct implementation and post technical support
@ Some fragmentation across device types
MobileIron
@ One of the Market Leaders
@ Strengths
@ Good product development, launces and support
@ Usually first to market with integrated solutions
@ Proven vision and track record
@ Weaknesses
@ Mainly an on premise solution although a SaaS solution has been released
recently
@ Level 1 support direct with MobileIron
Citrix
@ If you already have an investment in Citrix this may be for you
@ One of the market leaders
@ Strengths
@ Strong, broad enterprise offering
@ Deep understanding of application and mobility needs across smartphones,
tablets, Macs and PC’s
@ Weaknesses
@ Pushing cloud a bit too much although also offers on premise
@ XenMobile only available through two licence options
@ Limited small/midsize business offering
Good Technology
@ In the leaders quadrant
@ Strengths
@ Security
@ Large Market share in Financial sectors, defence, public sector
@ Broad spectrum of management capabilities
@ Weaknesses
@ Sometimes negative user experience due to restrictions
@ Can be expensive compared to others
@ Mainly on premise solution (SaaS is available but very limited)
@ No integration with Blackberry unless purchased with BoxTone offering
Cisco Meraki
@ Started in 2006
@ Purchased by Cisco in 2012 for a small $1.6 billion
@ Cloud managed networking
Access Points
Switches
Firewalls
Cisco Meraki
@ Mobile Device Management
@ Strengths
@ Free to use!
@ No licence restriction, deploy to as many as you like!
@ Support Windows, iOS, Android, OS X, Chrome
@ Weaknesses
@ Limited features compared to other MDM vendors
@ IT resourceful when rolling out to a large number of mobile devices
Cisco Meraki
@ Deployment
@ IOS & Android Devices
@ Go to m.meraki.com and enter your unique enrolment number
@ Download the Meraki SM app
@ Using the Apple Configurator (iOS only)
@ Email/SMS the registration URL and enrolment number
@ Windows Devices
@ Download and install Windows installer (MSI)
@ OS X
@ Download PKG package and install
@ Go to m.meraki.com and enter your unique enrolment number
@ Chrome
@ Enable API on the Chrome OS device
@ Link with your Google account
Cisco Meraki
@ Windows Management
Cisco Meraki
@ Windows Management
@ Process list – Kill a process
@ Remote command line utility
@ Screenshot an end users screen
@ Remote Desktop
@ Power control – Reboot/Shutdown
@ Send notification
@ Software inventory and remote uninstall of an application
Cisco Meraki
@ IOS/Android Management
Cisco Meraki
@ Out of the box, device management
Cisco Meraki
@ Any other features? Yes!
@ Create policies for;
@ Application management
@ Enable a passcode
@ Disable webcam
@ Disable Siri, FaceTime, iMessage (iOS only)
@ Deploy WIFI and/or VPN settings
@ Geofencing….!
@ Alert if a device has gone beyond a specified boundary based upon its GPS location
or AP authentication
Cisco Meraki
@ In Summary
@ No MDM deployed in your corporate network? Meraki MDM is better then
nothing! Plus its free! And everyone loves free stuff
@ When used with its cloud managed networking, MDM provides a greater
level of visibility of your network
@ Well developed product for IOS devices but limited for other devices
@ Large IT overhead deploying MDM agent across a large number of devices?
@Waterstonsltd
www.waterstons.com
Airwatch Demo
Summary
@ Define requirements first
@ System fundamentals
@ What devices will be used
@ Use what you already have if possible?
@ Who are the Major Players?
@ Cisco Meraki
@ AirWatch Demo
Upcoming Events….
@ Office 365 – Cloud or no, you should know how it will shape your
organisations future. Friday 6th June 11.45am.
@ Beyond Intelligence: The Business Insights Maturity Model. Friday
20th June, 11.45am.
@ http://www.waterstons.com/Events/
@Waterstonsltd
www.waterstons.com
Questions?
Keep in Touch….
charlie.hales@waterstons.com
Ian.craggs@waterstons.com
http://www.waterstons.com
@WaterstonsLtd

Weitere ähnliche Inhalte

Was ist angesagt?

IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 

Was ist angesagt? (20)

Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
BYOD
BYODBYOD
BYOD
 

Ähnlich wie Mobile device management and byod – major players

Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
jasonlan
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Indus Khaitan
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
TheAnfieldGroup
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
mfrancis
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
WSO2
 

Ähnlich wie Mobile device management and byod – major players (20)

Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
Distributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdfDistributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdf
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
cloudcomputing(bashu).ppt
cloudcomputing(bashu).pptcloudcomputing(bashu).ppt
cloudcomputing(bashu).ppt
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGi
 

Mehr von Waterstons Ltd

Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint Era
Waterstons Ltd
 

Mehr von Waterstons Ltd (16)

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike Waterston
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint Era
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project Manager
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond Intelligence
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications Success
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for Enterprise
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service Management
 
Mobile for business
Mobile for businessMobile for business
Mobile for business
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The Cloud
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime Communications
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Mobile device management and byod – major players

  • 1. @Waterstonsltd www.waterstons.com Mobile Device Management and BYOD – The Major Players Charlie Hales and Ian Craggs 23rd May 2014
  • 2. Agenda @ Overview from previous seminars @ Who are the Major Players? @ Cisco Meraki @ AirWatch Demo
  • 3. Overview from Seminar 1 @ What is Mobile Device Management @ Strategy @ What is a Mobile Device? @ Mobile Device Management vs Mobile Application Management @ What is BYOD @ What can MDM/BYOD do for business? @ Where is your Data? @ Acceptable usage policy @ Defining the right solution from your requirements
  • 4. Defining the right solution @ What do you want to manage on the device? @ Types of devices @ PIN @ Remote Wipe/Selective Wipe @ Data @ Apps @ Device/App Encryption
  • 5. Defining the right solution @ What do you want to manage on the device? @ Integration with enterprise applications @ Multi user profiles @ Separation of personal and work data @ Internet access @ Advanced features @ Data usage @ GPS tracking
  • 6. Overview from Seminar 2 @ Use what you already have @ Windows device possibilities @ Exchange @ SCCM overview @ Intune
  • 8. AirWatch @ Recently purchased by VMWare @ Market Leader @ SaaS or on premise @ Strengths @ Enterprise integration @ Secure Content Locker @ Flexible pricing @ Weaknesses @ Direct implementation and post technical support @ Some fragmentation across device types
  • 9. MobileIron @ One of the Market Leaders @ Strengths @ Good product development, launces and support @ Usually first to market with integrated solutions @ Proven vision and track record @ Weaknesses @ Mainly an on premise solution although a SaaS solution has been released recently @ Level 1 support direct with MobileIron
  • 10. Citrix @ If you already have an investment in Citrix this may be for you @ One of the market leaders @ Strengths @ Strong, broad enterprise offering @ Deep understanding of application and mobility needs across smartphones, tablets, Macs and PC’s @ Weaknesses @ Pushing cloud a bit too much although also offers on premise @ XenMobile only available through two licence options @ Limited small/midsize business offering
  • 11. Good Technology @ In the leaders quadrant @ Strengths @ Security @ Large Market share in Financial sectors, defence, public sector @ Broad spectrum of management capabilities @ Weaknesses @ Sometimes negative user experience due to restrictions @ Can be expensive compared to others @ Mainly on premise solution (SaaS is available but very limited) @ No integration with Blackberry unless purchased with BoxTone offering
  • 12.
  • 13. Cisco Meraki @ Started in 2006 @ Purchased by Cisco in 2012 for a small $1.6 billion @ Cloud managed networking Access Points Switches Firewalls
  • 14. Cisco Meraki @ Mobile Device Management @ Strengths @ Free to use! @ No licence restriction, deploy to as many as you like! @ Support Windows, iOS, Android, OS X, Chrome @ Weaknesses @ Limited features compared to other MDM vendors @ IT resourceful when rolling out to a large number of mobile devices
  • 15. Cisco Meraki @ Deployment @ IOS & Android Devices @ Go to m.meraki.com and enter your unique enrolment number @ Download the Meraki SM app @ Using the Apple Configurator (iOS only) @ Email/SMS the registration URL and enrolment number @ Windows Devices @ Download and install Windows installer (MSI) @ OS X @ Download PKG package and install @ Go to m.meraki.com and enter your unique enrolment number @ Chrome @ Enable API on the Chrome OS device @ Link with your Google account
  • 17. Cisco Meraki @ Windows Management @ Process list – Kill a process @ Remote command line utility @ Screenshot an end users screen @ Remote Desktop @ Power control – Reboot/Shutdown @ Send notification @ Software inventory and remote uninstall of an application
  • 19. Cisco Meraki @ Out of the box, device management
  • 20. Cisco Meraki @ Any other features? Yes! @ Create policies for; @ Application management @ Enable a passcode @ Disable webcam @ Disable Siri, FaceTime, iMessage (iOS only) @ Deploy WIFI and/or VPN settings @ Geofencing….! @ Alert if a device has gone beyond a specified boundary based upon its GPS location or AP authentication
  • 21. Cisco Meraki @ In Summary @ No MDM deployed in your corporate network? Meraki MDM is better then nothing! Plus its free! And everyone loves free stuff @ When used with its cloud managed networking, MDM provides a greater level of visibility of your network @ Well developed product for IOS devices but limited for other devices @ Large IT overhead deploying MDM agent across a large number of devices?
  • 23. Summary @ Define requirements first @ System fundamentals @ What devices will be used @ Use what you already have if possible? @ Who are the Major Players? @ Cisco Meraki @ AirWatch Demo
  • 24. Upcoming Events…. @ Office 365 – Cloud or no, you should know how it will shape your organisations future. Friday 6th June 11.45am. @ Beyond Intelligence: The Business Insights Maturity Model. Friday 20th June, 11.45am. @ http://www.waterstons.com/Events/

Hinweis der Redaktion

  1. Security, including FIPS 140-2 crypto libraries, end-to-end Advanced Encryption Standard (AES) encryption, multiple-factor authentication and multiple certificate management systems. Broad spectrum of management capabilities, including application security and management functions, offered through Good Dynamics and AppCentral, and Good Share for file synchronization and sharing, integrated with email (as a result of the Copiun acquisition).
  2. Manage all your network devices all over the world from a “single pain of glass”