SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Part I – Mobile Device Management – What it is
                         & Why do we need it?
                                  Presented by Jaymes Marsh
     Copyright © 2002 ACNielsen
          a VNU company
3CX Mobile Device Manager Market Presentation




               •   What Mobile Device Management is
               •   Benefits of Mobile Device Management
               •   Market Size
               •   The Competition
What is Mobile Device Management?




    •   Secures mobile devices
    •   Monitors data usage
    •   Manages applications and data
    •   Find and tracks devices
Benefits of Mobile Device Management




   • Security
      • Stopping sensitive data being exposed
      • Recovering lost & stolen mobile devices
      • Monitoring for rogue apps
      • Controlling apps on devices
Benefits of Mobile Device Management




• Monitor Data Usage
   • Adjust data-plans by reviewing bandwidth usage
   • Prevent high phone bills by monitoring call logs
Benefits of Mobile Device Management




   • App Deployment
      • Save time by installing / removing apps remotely
      • Deploy apps without using the Android Market
      • Save on bandwidth usage by removing unauthorized apps
Benefits of Mobile Device Management

             • Find Devices
                • Recover lost & stolen devices
                    • Stop sensitive data being exposed
                    • Avoid the cost of replacing a device
Benefits of Mobile Device Management




    • Track Devices
       • Supervise staff routes to ensure employees are efficient
       • Make sure employees remain in a certain area
Part II – Market Size – How Big is the Market &
                          Who are the Players?
                                  Presented by Jaymes Marsh
     Copyright © 2002 ACNielsen
          a VNU company
Market Need for MDM


     • IDC estimates 450 million smartphones manufactured in 2011
         • Expected to double by 2013
Market Need for MDM

• Osterman Research shows:
   • 28% of employees in the US in 2011 use company mobile devices
       • Will rise to 33% in 2012
   • Forrester reports 49% of small business owners use smartphones
Cost of Manually Managing Devices in Business




• Gartner reports companies spend $2,500 a year per device
• Timico says 42.5% of companies spend time daily managing devices
   • 14% spend one day per week managing devices
Exponential MDM Market Size
The Competition – Major Names
The Competition – Major Features


                Remote   Remote       Enforce       Find &      App       Monitor Data   Device Group
                 Wipe      Lock   Password Policy    Track   Deployment     Usage        Management

  AirWatch        X        X            X             X          X                            X
    SOTI          X        X            X             X          X             X              X
 MobileIron       X        X            X             X          X                            X
   Virtela        X                                   X          X                            X
Blackberry ES     X        X            X             X          X             X              X
  Absolute        X        X            X             X          X                            X
  Software
  MaaS360         X        X            X             X          X                            X
  Zenprise        X        X            X             X          X
  MobiDM          X        X                          X                                       X
 NotifyMDM        X        X            X             X          X                            X
Sybase Afaria     X        X            X             X          X             X              X
The Competition - Pricing



                               10          25          50          100
          AirWatch          $1,860.00   $2,400.00   $3,300.00   $5,100.00
          SOTI              $660.00         -       $3,300.00   $6,600.00
          MobileIron        $480.00     $1,200.00   $2,400.00   $4,800.00
          Virtela           $600.00     $1,500.00   $3,000.00   $6,000.00
          Absolute          $119.50     $298.75     $597.50     $1,195.00
          Software
          MaaS360               -           -           -           -
          Zenprise              -           -           -       $10,000.00
          MobiDM                -           -           -           -
          NotifyMDM             -           -           -           -
          Sybase Afaria         -           -           -           -
          Blackberry ES     $4,698.00   $5,892.00   $7,298.00   $9,998.00
Real World Examples


   • ComputerWorld – Need better smartphone security practices
      • 2 out of 3 organisations struggle with mobile security
      • 28% of surveyed companies reported a device data breach
Latest news and updates, visit:
                      www.MobileDeviceManager.com/Blog
         www.facebook.com/3CXMobileDeviceManager

Copyright © 2002 ACNielsen
     a VNU company

Weitere ähnliche Inhalte

Andere mochten auch

Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2P
urbanlabs
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 

Andere mochten auch (7)

P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2P
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Peer-to-Peer Lending: Examining the Industry and the Borrower Experience
Peer-to-Peer Lending: Examining the Industry and the Borrower ExperiencePeer-to-Peer Lending: Examining the Industry and the Borrower Experience
Peer-to-Peer Lending: Examining the Industry and the Borrower Experience
 

Ähnlich wie 3CX Microsoft IP Telephone System

Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
Tyler Shields
 
BRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the BerriesBRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the Berries
Tyler Shields
 
The Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIRThe Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIR
Tyler Shields
 
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone AttacksIT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
Tyler Shields
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Tyler Shields
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
 
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile SpywareiSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
Tyler Shields
 
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the BerriesRaleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Tyler Shields
 
GovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The BerriesGovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The Berries
Tyler Shields
 
Lucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits PresoLucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits Preso
AnnNic
 
Mtil Corporate 15 07 11
Mtil Corporate 15 07 11Mtil Corporate 15 07 11
Mtil Corporate 15 07 11
bhavikmeghani
 

Ähnlich wie 3CX Microsoft IP Telephone System (20)

Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
 
BRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the BerriesBRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the Berries
 
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business IntelligenceMICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
MICROSTRATEGY - Sessione introduttiva sulla piattaforma di Business Intelligence
 
2017 Mobility industry trends
2017 Mobility industry trends2017 Mobility industry trends
2017 Mobility industry trends
 
The Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIRThe Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIR
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone AttacksIT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile SpywareiSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
 
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the BerriesRaleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
 
GovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The BerriesGovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The Berries
 
Mobile Monday Sydney - 06/06/2011
Mobile Monday Sydney - 06/06/2011Mobile Monday Sydney - 06/06/2011
Mobile Monday Sydney - 06/06/2011
 
Lucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits PresoLucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits Preso
 
Netbiscuits & device fragmentation
Netbiscuits & device fragmentationNetbiscuits & device fragmentation
Netbiscuits & device fragmentation
 
Introduction to Mobile Marketing for Entrepreneurs
Introduction to Mobile Marketing for EntrepreneursIntroduction to Mobile Marketing for Entrepreneurs
Introduction to Mobile Marketing for Entrepreneurs
 
Why Managing Mobility Matters
Why Managing Mobility MattersWhy Managing Mobility Matters
Why Managing Mobility Matters
 
Mtil Corporate 15 07 11
Mtil Corporate 15 07 11Mtil Corporate 15 07 11
Mtil Corporate 15 07 11
 
Challenges EPs Face Going Mobile
Challenges EPs Face Going MobileChallenges EPs Face Going Mobile
Challenges EPs Face Going Mobile
 

Mehr von buzpbx.com, The Phone System Experts"

Mehr von buzpbx.com, The Phone System Experts" (19)

Corporate overview brochure
Corporate overview brochureCorporate overview brochure
Corporate overview brochure
 
Adtran NetVanta Telephone System
Adtran NetVanta Telephone SystemAdtran NetVanta Telephone System
Adtran NetVanta Telephone System
 
Unified messagingl
Unified messaginglUnified messagingl
Unified messagingl
 
Net vanta 7060_data_sheet
Net vanta 7060_data_sheetNet vanta 7060_data_sheet
Net vanta 7060_data_sheet
 
Net vanta uc product overview presentation
Net vanta uc product overview presentationNet vanta uc product overview presentation
Net vanta uc product overview presentation
 
Ip phones from_adtran
Ip phones from_adtranIp phones from_adtran
Ip phones from_adtran
 
Adtran NetVanta Brochure
Adtran NetVanta BrochureAdtran NetVanta Brochure
Adtran NetVanta Brochure
 
Yealink headset
Yealink headsetYealink headset
Yealink headset
 
T38 g datasheet-yealink
T38 g datasheet-yealinkT38 g datasheet-yealink
T38 g datasheet-yealink
 
T32 g datasheet-yealink
T32 g datasheet-yealinkT32 g datasheet-yealink
T32 g datasheet-yealink
 
T28 p datasheet-yealink
T28 p datasheet-yealinkT28 p datasheet-yealink
T28 p datasheet-yealink
 
Sip t26 p hd
Sip t26 p hdSip t26 p hd
Sip t26 p hd
 
Stp t22 p hd
Stp t22 p hdStp t22 p hd
Stp t22 p hd
 
Stp t20 p ip phone hd
Stp t20 p ip phone hdStp t20 p ip phone hd
Stp t20 p ip phone hd
 
Lcd expansion module exp39
Lcd expansion module exp39Lcd expansion module exp39
Lcd expansion module exp39
 
Sipt18 p datasheet-yealink
Sipt18 p datasheet-yealinkSipt18 p datasheet-yealink
Sipt18 p datasheet-yealink
 
3CX Microsoft IP Telephone System
3CX Microsoft IP Telephone System3CX Microsoft IP Telephone System
3CX Microsoft IP Telephone System
 
Grandstream IP Telephone
Grandstream IP TelephoneGrandstream IP Telephone
Grandstream IP Telephone
 
Barracuda and Cudatel Business Telephone Systems
Barracuda and Cudatel Business Telephone SystemsBarracuda and Cudatel Business Telephone Systems
Barracuda and Cudatel Business Telephone Systems
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

3CX Microsoft IP Telephone System

  • 1. Part I – Mobile Device Management – What it is & Why do we need it? Presented by Jaymes Marsh Copyright © 2002 ACNielsen a VNU company
  • 2. 3CX Mobile Device Manager Market Presentation • What Mobile Device Management is • Benefits of Mobile Device Management • Market Size • The Competition
  • 3. What is Mobile Device Management? • Secures mobile devices • Monitors data usage • Manages applications and data • Find and tracks devices
  • 4. Benefits of Mobile Device Management • Security • Stopping sensitive data being exposed • Recovering lost & stolen mobile devices • Monitoring for rogue apps • Controlling apps on devices
  • 5. Benefits of Mobile Device Management • Monitor Data Usage • Adjust data-plans by reviewing bandwidth usage • Prevent high phone bills by monitoring call logs
  • 6. Benefits of Mobile Device Management • App Deployment • Save time by installing / removing apps remotely • Deploy apps without using the Android Market • Save on bandwidth usage by removing unauthorized apps
  • 7. Benefits of Mobile Device Management • Find Devices • Recover lost & stolen devices • Stop sensitive data being exposed • Avoid the cost of replacing a device
  • 8. Benefits of Mobile Device Management • Track Devices • Supervise staff routes to ensure employees are efficient • Make sure employees remain in a certain area
  • 9. Part II – Market Size – How Big is the Market & Who are the Players? Presented by Jaymes Marsh Copyright © 2002 ACNielsen a VNU company
  • 10. Market Need for MDM • IDC estimates 450 million smartphones manufactured in 2011 • Expected to double by 2013
  • 11. Market Need for MDM • Osterman Research shows: • 28% of employees in the US in 2011 use company mobile devices • Will rise to 33% in 2012 • Forrester reports 49% of small business owners use smartphones
  • 12. Cost of Manually Managing Devices in Business • Gartner reports companies spend $2,500 a year per device • Timico says 42.5% of companies spend time daily managing devices • 14% spend one day per week managing devices
  • 14. The Competition – Major Names
  • 15. The Competition – Major Features Remote Remote Enforce Find & App Monitor Data Device Group Wipe Lock Password Policy Track Deployment Usage Management AirWatch X X X X X X SOTI X X X X X X X MobileIron X X X X X X Virtela X X X X Blackberry ES X X X X X X X Absolute X X X X X X Software MaaS360 X X X X X X Zenprise X X X X X MobiDM X X X X NotifyMDM X X X X X X Sybase Afaria X X X X X X X
  • 16. The Competition - Pricing 10 25 50 100 AirWatch $1,860.00 $2,400.00 $3,300.00 $5,100.00 SOTI $660.00 - $3,300.00 $6,600.00 MobileIron $480.00 $1,200.00 $2,400.00 $4,800.00 Virtela $600.00 $1,500.00 $3,000.00 $6,000.00 Absolute $119.50 $298.75 $597.50 $1,195.00 Software MaaS360 - - - - Zenprise - - - $10,000.00 MobiDM - - - - NotifyMDM - - - - Sybase Afaria - - - - Blackberry ES $4,698.00 $5,892.00 $7,298.00 $9,998.00
  • 17. Real World Examples • ComputerWorld – Need better smartphone security practices • 2 out of 3 organisations struggle with mobile security • 28% of surveyed companies reported a device data breach
  • 18. Latest news and updates, visit: www.MobileDeviceManager.com/Blog www.facebook.com/3CXMobileDeviceManager Copyright © 2002 ACNielsen a VNU company