SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Mobile Device Management
Author: Balag
MDM- The Pain
Mobile Device Management (MDM)
Mobile Device Management (MDM) is a security application used by an IT department to monitor,
manage and secure employee's mobile devices being used in the organization.
The mobile device management tool:
Is compatible with common handheld device operating platforms and applications.
 Can function through multiple service providers.
Can be implemented over the air, targeting specific devices as necessary.
Can be deploy in next-generation hardware, operating platforms and applications quickly.
Why do we need MDM?
 Secure, monitor, manage mobile devices
 Remote distribution of applications, data and configuration settings for all mobile devices in a
network, support costs and business security risks are lowered
 Deploy, manage, block or remove rogue apps on individual or groups of devices
 Reducing the risk of dangerous mobile malware
 Maintaining data plan and call budgets
 Locate and track connected devices in real time via Google Maps
 Configuration and management for backup process of all mobile devices
 User audit such as call logs, call costs, messages sent and received as well as the apps that have
been installed or removed
Market Need for MDM
 International Data Corporation (IDC) estimates 450 million smart phones manufactured in 2011 and
expected to double by 2013
0
200
400
600
800
1000
2011 2013
450
900
Manufactured Smartphone's
Millions
Market Need for MDM
Osterman Research:
 28% of employees in the US in 2011 use company mobile devices which is expected to rise up to 33% in
2012
 Forrester reports 49% of small business owners use Smartphone's
Proportion of North American Employees Using Company Supplied / Funded Smartphone's
0%
5%
10%
15%
20%
25%
30%
35%
2010 2011 2012
23%
28%
33%
The Cost
 Gartner reports companies spend $2,500 a year per device
 Timico says 42.5% of companies spend time daily managing devices
 14% spend one day per week managing devices
Exponential MDM Market Size
 Configuration Management
 Configures Corporate Email Server, Exchange Active Sync, Lightweight Directory Access Protocol
(LDAP)
 Configures Virtual Private Network (VPN), Wi-Fi and Access Points
 Remote Monitoring
 Remote Diagnostics, Remote Access, Device Performance
 Security Management
 Remote Lock, Wipe, Device Locate, Backup, Restore, SD Card Blocking
 Application Management
 Application Tracking, Install, Remove, Update, Configure
 Document Management
 Document Publish, Tracking
 Multi lingual support and Content Management System
 SAAS module Integration
Imperatives
Big Names

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Mobile Device Management - Product Study
Mobile Device Management - Product StudyMobile Device Management - Product Study
Mobile Device Management - Product StudySrinivasan M.S
 
SCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture DecisionsSCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture DecisionsAnoop Nair
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft IntuneSimon May
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Herman Arnedo
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012ebuc
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 

Was ist angesagt? (20)

Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Mobile Device Management - Product Study
Mobile Device Management - Product StudyMobile Device Management - Product Study
Mobile Device Management - Product Study
 
SCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture DecisionsSCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture Decisions
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
IBM Bluemix Overview
IBM Bluemix OverviewIBM Bluemix Overview
IBM Bluemix Overview
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 

Andere mochten auch

AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Mdm Brochure
Mdm BrochureMdm Brochure
Mdm Brochuremartgroot
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013Andris Soroka
 
Präsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule BernPräsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule BernPhilip Büchler
 
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngineGoogle Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngineRoman Kirillov
 
Mobility at Work: Mobile Device Management
Mobility at Work: Mobile Device ManagementMobility at Work: Mobile Device Management
Mobility at Work: Mobile Device Managementdigitallibrary
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSteven Cull
 
C:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd siresC:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd siresMkhitar Sebastatsi
 
Mobile device management GFE
Mobile device management GFEMobile device management GFE
Mobile device management GFEpplester
 
Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible Jürgen Ambrosi
 
CRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro OracleCRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro OracleJürgen Ambrosi
 
AngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue SolutionsAngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue SolutionsRapidValue
 
Crui cloud computing solution for university campus
Crui   cloud computing solution for university campusCrui   cloud computing solution for university campus
Crui cloud computing solution for university campusJürgen Ambrosi
 

Andere mochten auch (18)

AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Mdm Brochure
Mdm BrochureMdm Brochure
Mdm Brochure
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
 
Google cloud endpoints
Google cloud endpointsGoogle cloud endpoints
Google cloud endpoints
 
Präsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule BernPräsentation über Mobile Device Management an der Fachhochschule Bern
Präsentation über Mobile Device Management an der Fachhochschule Bern
 
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngineGoogle Cloud Endpoints: Building Third-Party APIs on Google AppEngine
Google Cloud Endpoints: Building Third-Party APIs on Google AppEngine
 
Mobility at Work: Mobile Device Management
Mobility at Work: Mobile Device ManagementMobility at Work: Mobile Device Management
Mobility at Work: Mobile Device Management
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solution
 
C:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd siresC:\fakepath\inchqan ashxarhd sires
C:\fakepath\inchqan ashxarhd sires
 
Mobile device management GFE
Mobile device management GFEMobile device management GFE
Mobile device management GFE
 
Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible Webinar CRUI Dell: flexilab, computer classroom made flexible
Webinar CRUI Dell: flexilab, computer classroom made flexible
 
CRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro OracleCRUI Ipotesi di Accordo Quadro Oracle
CRUI Ipotesi di Accordo Quadro Oracle
 
AngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue SolutionsAngularJS Project Setup step-by- step guide - RapidValue Solutions
AngularJS Project Setup step-by- step guide - RapidValue Solutions
 
Crui cloud computing solution for university campus
Crui   cloud computing solution for university campusCrui   cloud computing solution for university campus
Crui cloud computing solution for university campus
 

Ähnlich wie MDM- Mobile Device Management

Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
All About Enterprise
All About EnterpriseAll About Enterprise
All About EnterpriseCodal
 
Mobile device management
Mobile device managementMobile device management
Mobile device managementsara stanford
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
Maas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMMaas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMdocallahan
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Mobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsMobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsIRJET Journal
 

Ähnlich wie MDM- Mobile Device Management (20)

Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
All About Enterprise
All About EnterpriseAll About Enterprise
All About Enterprise
 
Custom Mobile Services
Custom Mobile ServicesCustom Mobile Services
Custom Mobile Services
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
BYOD
BYODBYOD
BYOD
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Maas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMMaas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDM
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Mobile Device Management and Their Security Concerns
Mobile Device Management and Their Security ConcernsMobile Device Management and Their Security Concerns
Mobile Device Management and Their Security Concerns
 
Mobi manager mdm
Mobi manager mdmMobi manager mdm
Mobi manager mdm
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 

Kürzlich hochgeladen

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Kürzlich hochgeladen (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

MDM- Mobile Device Management

  • 3. Mobile Device Management (MDM) Mobile Device Management (MDM) is a security application used by an IT department to monitor, manage and secure employee's mobile devices being used in the organization. The mobile device management tool: Is compatible with common handheld device operating platforms and applications.  Can function through multiple service providers. Can be implemented over the air, targeting specific devices as necessary. Can be deploy in next-generation hardware, operating platforms and applications quickly.
  • 4. Why do we need MDM?  Secure, monitor, manage mobile devices  Remote distribution of applications, data and configuration settings for all mobile devices in a network, support costs and business security risks are lowered  Deploy, manage, block or remove rogue apps on individual or groups of devices  Reducing the risk of dangerous mobile malware  Maintaining data plan and call budgets  Locate and track connected devices in real time via Google Maps  Configuration and management for backup process of all mobile devices  User audit such as call logs, call costs, messages sent and received as well as the apps that have been installed or removed
  • 5. Market Need for MDM  International Data Corporation (IDC) estimates 450 million smart phones manufactured in 2011 and expected to double by 2013 0 200 400 600 800 1000 2011 2013 450 900 Manufactured Smartphone's Millions
  • 6. Market Need for MDM Osterman Research:  28% of employees in the US in 2011 use company mobile devices which is expected to rise up to 33% in 2012  Forrester reports 49% of small business owners use Smartphone's Proportion of North American Employees Using Company Supplied / Funded Smartphone's 0% 5% 10% 15% 20% 25% 30% 35% 2010 2011 2012 23% 28% 33%
  • 7. The Cost  Gartner reports companies spend $2,500 a year per device  Timico says 42.5% of companies spend time daily managing devices  14% spend one day per week managing devices Exponential MDM Market Size
  • 8.  Configuration Management  Configures Corporate Email Server, Exchange Active Sync, Lightweight Directory Access Protocol (LDAP)  Configures Virtual Private Network (VPN), Wi-Fi and Access Points  Remote Monitoring  Remote Diagnostics, Remote Access, Device Performance  Security Management  Remote Lock, Wipe, Device Locate, Backup, Restore, SD Card Blocking  Application Management  Application Tracking, Install, Remove, Update, Configure  Document Management  Document Publish, Tracking  Multi lingual support and Content Management System  SAAS module Integration Imperatives