SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Mobile Device Management (MDM):
Dual Persona
1
Business Life
Company Container
http://www.vectortemplates.com/raster-batman.php
Personal Life
Personal Container
Wayne Enterprise Policy Management Layer
Carrier Service Management Layer
Samsung Knox
Mobile Device Management (MDM): Dual
Persona
What :
o Dual persona enabler
o Separates: Usage into Corporate and Individual billing categories
o Containers: Device security for mobile business data / mobile access
o Policy control management
o Roaming policy
o Video blocking
o Lock out device from enterprise if compromised
How :
o Knox Enterprise Mobility Management (EMM) and handset software client
o MVNO partner for proof of concept testing and business trial
Differentiators :
o Grab share of market – Expand to Business offerings
o Grow Revenue – Incremental Enterprise Revenue Streams on top of personal plans
2

Weitere ähnliche Inhalte

Ähnlich wie Dual Persona example

Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesJorge Gil Peña
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1pStéphane Roule
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1pStéphane Roule
 
Mobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelMobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelNirmal Misra
 
Mobile Device Management - Product Study
Mobile Device Management - Product StudyMobile Device Management - Product Study
Mobile Device Management - Product StudySrinivasan M.S
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comPhD Assistance
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ssGraham Chalk
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9Motty Ben Atia
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psAccenture
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 

Ähnlich wie Dual Persona example (20)

Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p
 
Mobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelMobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next Level
 
Mobile Device Management - Product Study
Mobile Device Management - Product StudyMobile Device Management - Product Study
Mobile Device Management - Product Study
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 

Dual Persona example

  • 1. Mobile Device Management (MDM): Dual Persona 1 Business Life Company Container http://www.vectortemplates.com/raster-batman.php Personal Life Personal Container Wayne Enterprise Policy Management Layer Carrier Service Management Layer Samsung Knox
  • 2. Mobile Device Management (MDM): Dual Persona What : o Dual persona enabler o Separates: Usage into Corporate and Individual billing categories o Containers: Device security for mobile business data / mobile access o Policy control management o Roaming policy o Video blocking o Lock out device from enterprise if compromised How : o Knox Enterprise Mobility Management (EMM) and handset software client o MVNO partner for proof of concept testing and business trial Differentiators : o Grab share of market – Expand to Business offerings o Grow Revenue – Incremental Enterprise Revenue Streams on top of personal plans 2