SlideShare ist ein Scribd-Unternehmen logo
1 von 58
Making Mobile Manageable
Francis Sullivan
CTO & Co-Founder
BYOD
Spiceworks with MDM
Spiceworks Mobile Apps
Agenda
• Increased Popularity
• User Buys First for Personal Use
• Require Corporate Access
• Email, helpdesk, …
• Devices Come and Go with Employees
BYOD Trends
• Impacts on Your IT Network
• IP Address Exhaustion
• Wireless Network Overload
• Confidentiality Concerns
• Who has Access to What?
Bring Your Own Device
• Just Ignore this Trend
• It probably won’t catch on!
Approaches to Manage BYOD
Use Spiceworks
• Tightly Integrated MDM
• Android, iOS, Windows Phone
Approaches to Manage BYOD
Inventory
Software
Monitor
Manage – with MaaS360
Manage
Neil Florio
VP Marketing, Fiberlink
OTA Configuration Management
• Email profiles
• Passcode
• Wi-Fi/VPN
• Device features
• App compliance
• Roaming settings
• Device groupings
14
Policy Enforcement
• Automated action on non-compliant events
15
BYOD Privacy Settings
• Disable collection of personal information
16
Mobile App Management
• Enterprise App Catalog
• App security & compliance
management
• Distribute and update apps
• Remove managed apps
• Volume Purchase Program
• App Cloud for hosting &
distribution
17
Secure Document Sharing
• On device Doc Catalog container
• Centralized distribution management
• User-based authentication for access
• Alert users on new or updated content
• Cut/paste restrictions & view only
• Versioning & time-based expirations
• Integration with SharePoint
• Doc Cloud for hosting & distribution
18
Remote Help Desk Support
• Reset passcode
• Locate lost device
• Buzz lost device
• Selective wipe
• Full device wipe
• Send message
• Change policy
• Remove control
19
User Self Service Portal
20
MaaS360 Mobility Intelligence™
21
MDM Activation
• Beta 1 will drop in a few weeks
• Devices will migrate to production version
• Demo at the SpiceBar
Spiceworks 7.0 with MDM
Spiceworks with MDM - MaaS360
Inventory Monitor Manage
Spiceworks Mobile
• iPhone
– Apple App Store
• Android Phones
– Google Marketplace
– Direct download from Spiceworks
Help Desk View
• See and respond to all of your trouble
tickets
• Create new tickets, close and re-open
existing ones
• Add and edit ticket description and details
• Assign tickets and set priorities, due date
& more
Inventory View
• See all the hardware & software on your
network
• Identify if any issues exist with your assets
• Open a ticket for any assets that need
attention
People View
• Quickly get contact info for your end
users
• View and update important user details
(Active Directory)
• Take and upload pictures of users to
their profiles
Community
• See the day’s most popular IT
discussions
• Talk-shop with and get advice from
other IT pros
• Track the IT-topics you care about the
most
Community
• Full community access
• See your messages
• Community now mobile friendly
Spiceworks Mobile HD
– iPad Tablets
– Android Tablets
– HTML5 browser access
• for other mobile tablet devices
Main Page
Ticket Interface
Adding a Response
Editing a Ticket
Browsing Inventory
Inventory Disk Usage
Inventory View – Edit Attributes
People View
People View – Associate Devices
Community
Coming Soon
Spiceworks Mobile
Direct Community Access
• Printable codes for
each asset
• Updates last qrcode
scan time attribute
QRCode Integration
More Mobile Work
• Push notifications on tickets, alerts
• Integrate ticket filters from desktop
• Win8/Surface
Spiceworks Mobile Feature
Requests?
Francis Sullivan
francis@spiceworks.com
twitter: @fxs
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILouis-Martin Landry
 
SOTI MobiControl
SOTI MobiControlSOTI MobiControl
SOTI MobiControlMobileWorxs
 
Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy (Avraham) Blumenthal
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)Bitglass
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...ashoksankar
 
Mva configure mobile devices for office 365
Mva configure mobile devices for office 365Mva configure mobile devices for office 365
Mva configure mobile devices for office 365Sonja Madsen
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2James Sutter
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Azurati SharePoint2Go - BYOD ready mobile sharepoint
Azurati SharePoint2Go - BYOD ready mobile sharepointAzurati SharePoint2Go - BYOD ready mobile sharepoint
Azurati SharePoint2Go - BYOD ready mobile sharepointRonan Lavelle
 
Third Place - Closing the Loop
Third Place - Closing the LoopThird Place - Closing the Loop
Third Place - Closing the LoopMedusabusiness
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMike Brannon
 
Design Considerations When Building Cross Platform Mobile Applications
 Design Considerations When Building Cross Platform Mobile Applications Design Considerations When Building Cross Platform Mobile Applications
Design Considerations When Building Cross Platform Mobile ApplicationsSuperConnect
 

Was ist angesagt? (20)

LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
 
SOTI MobiControl
SOTI MobiControlSOTI MobiControl
SOTI MobiControl
 
Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility Solutions
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Mva configure mobile devices for office 365
Mva configure mobile devices for office 365Mva configure mobile devices for office 365
Mva configure mobile devices for office 365
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Azurati SharePoint2Go - BYOD ready mobile sharepoint
Azurati SharePoint2Go - BYOD ready mobile sharepointAzurati SharePoint2Go - BYOD ready mobile sharepoint
Azurati SharePoint2Go - BYOD ready mobile sharepoint
 
Third Place - Closing the Loop
Third Place - Closing the LoopThird Place - Closing the Loop
Third Place - Closing the Loop
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Design Considerations When Building Cross Platform Mobile Applications
 Design Considerations When Building Cross Platform Mobile Applications Design Considerations When Building Cross Platform Mobile Applications
Design Considerations When Building Cross Platform Mobile Applications
 

Andere mochten auch

Spiceworks Basics 2: Help Desk & Reporting
Spiceworks Basics 2: Help Desk & ReportingSpiceworks Basics 2: Help Desk & Reporting
Spiceworks Basics 2: Help Desk & ReportingSpiceworks
 
An Introduction to The Spiceworks Help Desk & User Portal
An Introduction to The Spiceworks Help Desk & User PortalAn Introduction to The Spiceworks Help Desk & User Portal
An Introduction to The Spiceworks Help Desk & User PortalSpiceworks
 
Spiceworks Basics 1: Inventory, Troubleshooting, Monitoring & Alerts
Spiceworks Basics 1: Inventory, Troubleshooting, Monitoring & AlertsSpiceworks Basics 1: Inventory, Troubleshooting, Monitoring & Alerts
Spiceworks Basics 1: Inventory, Troubleshooting, Monitoring & AlertsSpiceworks
 
Spiceworks Intro
Spiceworks IntroSpiceworks Intro
Spiceworks Introground047
 
Travel Photographer Society 2017: Featured Entries (2)
Travel Photographer Society 2017: Featured Entries (2)Travel Photographer Society 2017: Featured Entries (2)
Travel Photographer Society 2017: Featured Entries (2)maditabalnco
 
Thoughts On Giving...
Thoughts On Giving...Thoughts On Giving...
Thoughts On Giving...OH TEIK BIN
 

Andere mochten auch (6)

Spiceworks Basics 2: Help Desk & Reporting
Spiceworks Basics 2: Help Desk & ReportingSpiceworks Basics 2: Help Desk & Reporting
Spiceworks Basics 2: Help Desk & Reporting
 
An Introduction to The Spiceworks Help Desk & User Portal
An Introduction to The Spiceworks Help Desk & User PortalAn Introduction to The Spiceworks Help Desk & User Portal
An Introduction to The Spiceworks Help Desk & User Portal
 
Spiceworks Basics 1: Inventory, Troubleshooting, Monitoring & Alerts
Spiceworks Basics 1: Inventory, Troubleshooting, Monitoring & AlertsSpiceworks Basics 1: Inventory, Troubleshooting, Monitoring & Alerts
Spiceworks Basics 1: Inventory, Troubleshooting, Monitoring & Alerts
 
Spiceworks Intro
Spiceworks IntroSpiceworks Intro
Spiceworks Intro
 
Travel Photographer Society 2017: Featured Entries (2)
Travel Photographer Society 2017: Featured Entries (2)Travel Photographer Society 2017: Featured Entries (2)
Travel Photographer Society 2017: Featured Entries (2)
 
Thoughts On Giving...
Thoughts On Giving...Thoughts On Giving...
Thoughts On Giving...
 

Ähnlich wie Making Mobile Manageable

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Datakidozen
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)kidozen
 
Mobile device management
Mobile device managementMobile device management
Mobile device managementMalin De Silva
 
Which OBIEE Mobile Solution is Right for my Organization
Which OBIEE Mobile Solution is Right for my OrganizationWhich OBIEE Mobile Solution is Right for my Organization
Which OBIEE Mobile Solution is Right for my OrganizationOAUGNJ
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Datakidozen
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility kidozen
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 

Ähnlich wie Making Mobile Manageable (20)

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Data
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Which OBIEE Mobile Solution is Right for my Organization
Which OBIEE Mobile Solution is Right for my OrganizationWhich OBIEE Mobile Solution is Right for my Organization
Which OBIEE Mobile Solution is Right for my Organization
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Data
 
Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility Mobile Data Management, The Next Frontier of Enterprise Mobility
Mobile Data Management, The Next Frontier of Enterprise Mobility
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 

Mehr von Spiceworks Ziff Davis

Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
 
Milking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthMilking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthSpiceworks Ziff Davis
 
Bang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessBang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessSpiceworks Ziff Davis
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Spiceworks Ziff Davis
 
Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierSpiceworks Ziff Davis
 
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. Spiceworks Ziff Davis
 
US Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologyUS Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologySpiceworks Ziff Davis
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshareSpiceworks Ziff Davis
 

Mehr von Spiceworks Ziff Davis (20)

Are You an IT Geek?
Are You an IT Geek?Are You an IT Geek?
Are You an IT Geek?
 
Windows Server 2003 Lifecycle
Windows Server 2003 LifecycleWindows Server 2003 Lifecycle
Windows Server 2003 Lifecycle
 
5 Signs You're Up to Spice!
5 Signs You're Up to Spice!5 Signs You're Up to Spice!
5 Signs You're Up to Spice!
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Hiring Managers Tell All
Hiring Managers Tell AllHiring Managers Tell All
Hiring Managers Tell All
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Milking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthMilking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worth
 
Managing the mobile takeover
Managing the mobile takeoverManaging the mobile takeover
Managing the mobile takeover
 
Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk
 
Beancounters: Friend or Foe?
Beancounters: Friend or Foe? Beancounters: Friend or Foe?
Beancounters: Friend or Foe?
 
Bang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessBang on tips for running a successful IT service business
Bang on tips for running a successful IT service business
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!
 
Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life Easier
 
Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!
 
Top 3 demand gen challenges
Top 3 demand gen challengesTop 3 demand gen challenges
Top 3 demand gen challenges
 
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
 
The IT Buyer's Path to Purchase
The IT Buyer's Path to PurchaseThe IT Buyer's Path to Purchase
The IT Buyer's Path to Purchase
 
You've got email!
You've got email!You've got email!
You've got email!
 
US Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologyUS Presidents and the Evolution of Technology
US Presidents and the Evolution of Technology
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Making Mobile Manageable

Hinweis der Redaktion

  1. You can take the approach that mobile won’t catch on…
  2. Well, probably not a good idea. Remember the slope of the mobile adoption graph that Scott showed you?
  3. Spiceworks works with what you have, and grows with what you will manage in the future.
  4. Tightly integrated into Spiceworks.Full inventory for all device types – Android, iOS and Window. Both phones & tablets.And its got all the functionality you’ve come to expect from Spiceworks Inventory …HW settings, storage & configurationFull software inventor including OS’, installed apps, etc.And because its integrated into SW we can tie it all into Active Directory and People View
  5. Full software inventor including OS’, installed apps, etc.Full reporting.
  6. Installed Applications,Jail-broken Devices,Disabled Passcodes,Out of date Software ,Storage / Data Thresholds
  7. What about Management? Its not something all of you need but we wanted to be able to provide it as well through our partner – MaaS360 by FiberlinkWipe, Lock, Password Reset, Push Software, Manage policies, and even locate. If you click the Manage dropdown, you can see the extended features that you will have access to once/if you decide you want those features. If you click on the unlock menu item, you will be taken to the signup page
  8. The premium features are provided by MaaS360, and here is Neil Florio, VP Marketing for Fiberlink to walk you through these premium features.
  9. In addition to enrollment into MaaS360 over-the-air (OTA) in minutes, OTA configuration management of policies, profiles and settings are just as fast and easy.You can customize robust device, app and document policies for specific device groups, such as by OS platform (e.g. iOS, Android) or corporate vs. employee-owned, as well as for user groups, such as Executives, Sales, Finance, etc.A comprehensive list of settings and profiles can be configured in these policies:Passcode settings with configurable quality, length and durationEmail, Calendar, Contacts, Wi-Fi and VPN profilesDevice encryption mandatesDevice restrictions for specific features, apps and content ratings. Some examples of iOS device features that can be controlled include camera, FaceTime, Siri, iCloud, Screen Capture, iTunes, YouTube, Game Center, Safari, Voice Dialing, etc.App compliance allows for creating a blacklist or whitelist of apps as well as required apps by your organizationRoaming settings can restrict data and/or voice roaming of mobile devices
  10. MaaS360 provides dynamic, end-to-end security and compliance to continuously monitor devices, be alerted to noncompliance events and/or take automated action.Automated enforcement actions include Alert Administrator, Alert User and Administrator, Block (same as Lock Device to enable the Lock screen with required passcode), Restrict Device (same as Selective Wipe) and Wipe (Full).Some of the enforcement rules that can be configured include:Enforce MDM management – ensure devices are enrolled in MDM and management has not been disabled or removed by the userMinimum OS version – ensure devices are up-to-date with minimum required OS versions to enable proper device securityRemote wipe support – ensure devices support remote wipe capabilitiesSIM change – monitor and alert when a SIM card is changed in a deviceEncryption support – ensure devices support designated levels of encryptionApplication compliance – ensure devices are in compliance with app management policiesJailbreak/Root detection – ensure devices are not jailbroken or rootedRestrict Corporate Resources for Blocked Devices – ensure devices blocked on your mail server can not access other corporate resources such as Wi-Fi or VPN
  11. BYOD (Bring-Your-Own-Device) trends are transforming businesses by reducing IT procurement and support costs and increasing employee productivity and satisfaction. However, users are increasingly concerned with losing their privacy if they use their own personal devices for work.In a recent survey conducted by Harris Interactive and Fiberlink, 82% of respondents consider the ability to be “tracked” an invasion of their privacy. In addition, 76% would not give their employer access to view what apps are installed on their personal device.MaaS360 allows businesses to block the collection of selected personal data - such as location and installed applications. This can be very important for some customers, especially in certain regions of the world where attitudes toward personal privacy are extremely strong. In some areas and industries, IT managers may not be allowed to track personal information (such as the user’s location and installed applications) even on corporate owned devices.MaaS360 can restrict the collection of personal information on a single device, all devices or device group (e.g. Executives, Sales, etc.). Information collection of app inventory, location, IP address and SSID can be disabled by the IT administrator according to your internal policies.
  12. In this mobile age, mobile apps on smartphones and tablets provide great value to organizations by increasing employee productivity and satisfaction.MaaS360 provides an easy to use, on-device enterprise app catalog with full operational and security lifecycle management to distribute, update, manage and secure mobile apps on both personal and corporate-owned devices. This allows organizations to separate business apps from personal apps with the ability to remove any business app and its associated data individually or as part of a selective or full remote wipe.You will be able to leverage a private, customizable enterprise app catalog for iOS, Android and Windows Phones devices. From a secure, web-based portal, public apps and in-house developed apps can be easily added to a catalog and instantly distributed over-the-air (OTA) to all users, groups of users or even individual devices. Users can view and install available apps, and be alerted when apps are updated or added.The MaaS360 AppCloud gives you the option and capability of hosting and distributing your enterprise mobile apps on a globally optimized app distribution network. The MaaS360 AppCloud reduces network load and increases app performance for users. You’ll achieve instant scalability and be able to add a layer of authentication and authorization prior to app downloads for additional security.Encompassing MaaS360 Mobile App Management are robust app security and compliance capabilities.Configure app security policies to create a blacklist or whitelist of apps as well as required apps by your organizationAutomate enforcement of rules for out-of-compliance devices including Alert Administrator, Alert User and Administrator, Block (same as Lock Device to enable the Lock screen with required passcode), Restrict Device (same as Selective Wipe) and Wipe (Full)Restrict native apps on devices, such as YouTube, Safari, Siri, etc.View detailed reports of app compliance events and remediation actionsMaaS360 supports app Volume Purchase Programs (VPP) by allowing the purchase of bulk app licenses by automatically uploading redemption codes. MaaS360 tracks provisioning, manages licenses and monitors compliance, eliminating the need for manual VPP management.
  13. Emailing documents to mobile devices can be a source of data leakage. However, employing heavyweight email security can compromise the native user experiences that employees find most valuable with their smartphones and tablets. Enabling mobile collaboration and enhancing employee productivity anytime, anywhere doesn’t have to compromise sensitive document and data security.MaaS360 Document Management delivers a robust set of capabilities for the lifecycle management to distribute, update, manage and secure documents on mobile devices.You will be able to leverage a private, customizable enterprise document catalog for iOS and Android devices. From a secure, web-based portal, documents, such as PowerPoint presentations, Word documents, PDF documents, Excel spreadsheets, audio, image, and video files, can be easily added to your own catalog and instantly distributed over-the-air (OTA) to all users, groups of users or even individual devices. Users can view, edit and share available documents, and be alerted when documents are updated or added.The MaaS360 Doc Cloud gives you the option and capability of hosting and distributing your documents in the Cloud on a globally optimized content distribution network. The MaaS360 Doc Cloud reduces network load and increases performance for users.MaaS360 Document Management delivers robust document security and compliance capabilities.Set policies on a document-by-document basis that can restrict sharing of documents by sandboxing them in the document catalogLeverage native device encryption to ensure corporate data remains secureAutomate enforcement of rules for out-of-compliance devices including Alert Administrator, Alert User and Administrator, Block (same as Lock Device to enable the Lock screen with required passcode), Restrict Device (same as Selective Wipe) and Wipe (Full)Remotely wipe any distributed documents from devicesView detailed reports of documents, users and devices of compliance events and remediation actionsIntegrated Document Collaboration: MaaS360 enables IT to leverage existing Enterprise document and file sharing environments (e.g. SharePoint and Box) by giving users secure access to sites, libraries or folders on their mobile devices. Integration with these popular collaboration tools allows administrators to automatically give users access to the required sites. Advanced security capabilities include enforcing authentication to access folders, limiting access to a restricted set of sites (or sub-sites), and restricting documents to be shared or opened in 3rd party applications for data loss prevention.Some popular use cases by customers include:Distributing quarterly financial documents to the Board of DirectorsUpdating the product and marketing materials frequently for sales teams to ensure everyone is on the same page of latest features and competitive informationSharing company-wide information such as training materials and HR policiesEnsuring tablets in retail stores have the most up-to-date product and inventory lists
  14. MaaS360 enables remote, central management of mobile devices to help IT organizations to streamline help desk support.The unified MDM web-based portal provides the ability to diagnose and resolve device, user or app issues in real-time, offering complete IT visibility and control and ensuring optimum employee productivity.Comprehensive mobile device management capabilities include:Access device views to diagnose and resolve issuesReset forgotten passcodesLocate lost or stolen devicesBuzz a lost device to create a loud, high-pitched sirenSelectively or fully wipe a deviceSend messages to devicesUpdate configuration settings in real-timeRemove MDM control
  15. MaaS360 allows you to help users help themselves with a self-service portal that provide basic, but commonly used mobile device management actions to more efficiently support your organization.Users will be able to:Lock their own deviceReset their passcodeLocate deviceWipe deviceView their action history with their deviceView their device and network informationView their current security and compliance state
  16. MaaS360 provides a whole new level of centralized visibility into and control over mobile devices, apps and data. The MaaS360 Mobility Intelligence dashboards deliver interactive, graphical summary reports of your mobile IT operations and compliance empowering IT to report in real-time across the entire organization. Through these dashboards, you can drill down to detailed reports and lists to take specific action.Detailed hardware and software inventory reportsConfiguration and vulnerability detailsIntegrated Smart Search capabilities across any attributeCustomizable watch lists to track and receive alerts
  17. Thanks Neil. With that as a backdrop, I want to walk you through enabling MDM in your Spiceworks Installation when 7.0 comes out.From a variety of places, such as this getting started link, Spiceworks will walk you through the steps needed to let your desktop support mobile devices.
  18. The first time you set things up, you pick one as the proof point that everything is working. Once you get past here, you can bulk enable the rest of your devices or enable them one by one – your choice.
  19. If you don’t have Apple devices, the rest of the setup is pretty straight forward. For the Apple case though, we have to take extra steps to setup their certificates.
  20. This first involves steps to validate who you are in order to set up a trust relationship with Apple.
  21. Then a “cross signing request” is issued
  22. You are then promoted to upload this CSR request to the Apple service which will be used to create your installation certificate at Apple.
  23. and then finally we import your Apple certificate into your MDM installation so that it can act on your behalf to manage your devices.Like I said previously, these steps for Apple are obviously not required if you don’t want to manage any Apple IOS devices.
  24. After this, you are ready to enroll your first device.
  25. And there you go. You have one device pending enrollment and a fairly empty looking dashboard. Don’t worry though, soon you will add other devices and it will look more like…
  26. And here we are after enrolling several devices.
  27. So that does it for discussing MDM and Spiceworks 7.0. Now to switch gears and talk about our suite of Spiceworks Mobile applications.
  28. You heard Tabrez talk about our new mobile friendly community. Well, it works today but the main community home page will be the default destination once our next mobile release drops.
  29. Works with default and custom attributes