SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Enterprise Mobility Management
About Mformation
Global Solutions for Seamlessly Managing Mobile Technologies


Pioneer and leading provider of management solutions
for wirelessly connected devices since 1999



Industry leader with over 500 million wireless devices
managed on our platforms globally, including 50+ million
IOS and Android smart devices



50+ leading carrier/service-provider customers, serving
millions of consumers and enterprises




Multi-tenancy architecture, cloud-enabled & deployed





26 wireless patents granted, published, filed

Extensive API portfolio and SDK for third-party
integration
Backed and funded by Clearlake Capital
Strong partner network for a broad mobility management
ecosystem, including strategic working partnerships with
all device OEMs:

OUR VISION
Deliver seamless management solutions for all applications and services, on any
wirelessly connected device, over any network
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

2
Enterprise Mobility Management Vision
We understand the need to simplify mobile management, respond to global mobility trends, reduce
spend, enhance security, and leverage mobile technologies to maximize workforce productivity.
Mobile
Application
Management
(MAM)

Application
Security
Management
Secure
Email/Docume
nt
Management

Device
Management
(MDM)

Wireless
Expense
Management

Provisioning

Procurement

ENTERPRISE
MOBILITY
MANAGEMENT

Device
Replacement
& Retirement

Core Offering
Upcoming Offering
Developing Area
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

3
Enterprise Mobility Challenges &
Opportunities

4
Enterprise Mobility Challenges
Mobile Adoption


6.8 Billion mobile subscriptions globally
(ITU)





7 Billion people in the World (Wikipedia)
42 Million iPads sold in 2 quarters (Apple)
50 Billion connected devices by 2015
(Cisco/Ericcson)




Tablets to out-ship PCs in 2013 (IDC)
10-11% traffic to web sites from tablets
(Monetate)

Enterprise Stats


53% Firms plan to mobile-enable apps in
2013 (Lopez Research survey)



67% of Firms Support BYOD (Lopez Research
survey)



Cloud-based IT solutions will drive 90% of
the market by 2016 (IDC)

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

5
Enterprise Mobility Concerns

(Lopez Research survey 2013)

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

6
EMM Moving to the Cloud
Worldwide EMM Revenue Forecast ($M), 2013 - 2016
$1,800
$1,600

$1,600

$1,400
$1,200

$1,100

$1,000

$990

$800
$600

$400

$780
$540

$500
$252

$200
$0

$75

2013

2014
Total EMM

2015

2016

Cloud-based EMM

Source: Gartner, IDC & Radicati Group forecasts; projections
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

7
Enterprise Mobility Manager

8
Enterprise Mobility Manager –
Key Capabilities For Managing the Mobile Enterprise
ESSENTIALS - Core MDM and MAM Capabilities:










Device inventory and diagnostics
Security management
Streamlined device enrollment
Policy and BYOD management
Mobile application management
Enterprise App Store
Document catalog
REST APIs

ENTERPRISE APPS – Add-on:





Application Security Management (App Containerization)
Secure App Tunnel
Secure Browser
Cloud-based deployment: Mformation Cloud, your private Cloud
Support for iOS, Android, and BlackBerry smartphones and tablets
Intuitive UI and Management Dashboard
True multi-tenant, highly scalable architecture

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

9
Cloud-based Deployment Options
Mformation Shared or Private Cloud
Mformation-hosted Public Cloud

Shared






ENTERPRISE
MOBILITY
MANAGER




Shared cloud environment
Secure, high-availability, multi-tenant
Customizable EMM per customer
Resides in AWS, no software
installation or configuration
Flexible, fast, pay-as-you-grow
deployment
Scales to thousands of
enterprises, with hundreds of
thousands of users

Mformation-hosted “Virtual Private
Cloud”

 Logically isolated section of AWS public



ENTERPRISE
MOBILITY
MANAGER

Private

Virtual
Private Cloud



cloud
Virtual network you define
Software provided as Amazon Machine
Image (AMI)
Mformation installs and configures
system

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

10
Cloud-based Deployment Options
Your Premise, Private Cloud
Your Premise, Private Cloud




VMware underlying technology



vApps run on VMware
vSphere, VMware Infrastructure
(VI), VMware
Workstation, VMware
Fusion, VMware Server, and
VMware Player



High
availability, scalability, backup, li
ve migration



Mformation installs and
configures system

ENTERPRISE
MOBILITY
MANAGER

Software components (servers)
supplied as virtual appliances
optimized for the cloud – vApps

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

11
Proven Multi-Tenant Architecture
Robust, multi-tenant




1000s of tenants (MSPs and/or
enterprises)



Any number of levels
(enterprises, groups)



ENTERPRISE
MOBILITY
MANAGER

1 cloud-hosted instance

100s of millions of
devices, apps, users, transactions

Completely customizable: Branding at all
levels:


Tenant (MSP or Enterprise)



Groups

Consolidated management view


For MSPs: across enterprise
customers



For enterprises: across
offices/departments/workgroups

Benefits:


Simplest, fastest, lowest cost to
implement



No hardware, software, admin or
support costs

Proven architecture, handles thousands of tenants,
hundreds of millions of devices
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

12
Intuitive UI & Management Dashboard
MANAGE YOUR MOBILE ENVIRONMENT
FROM ANYWHERE

o List Devices
o Send Security Policy






UI adaptive for use on
smartphones, tablets, laptops
High-level graphical view of the
groups, users, devices and apps
At-a-glance highlighting of device issues that
require attention
Context-aware; one click access to take
corrective actions for identified device issues
Simple drill-down to view and proactively
manage groups, users, devices, apps and docs

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

13
MSP Dashboard – Accounts
at-a-Glance
MANAGE YOUR CUSTOMER ACCOUNTS SIMPLY AND EASILY



At-a-glance view of your customer accounts – from a smartphone, tablet, or
laptop




License management for each account
Drill down to group, user, device and app details for each enterprise account

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

14
Policy and BYOD Management
ENFORCE YOUR POLICIES, PROTECT
YOUR DATA ON CORPORATE OR BYOD
DEVICES



Set and enforce device security settings
(password
enforcement, encryption, content
restrictions, restrictions on features
such as camera, Bluetooth, Wi-Fi, etc.)



Set and enforce policies for the
configuration of device services
settings (email, Exchange, etc.)

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

15
Policy and BYOD Management


Register devices as corporate or
personal (BYOD) when they are
enrolled



Define specific policies to apply to
corporate or BYOD devices



Set and enforce app whitelist/blacklist
policies



Set and enforce policies for required
apps

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

16
Streamlined Device Enrollment
MULTIPLE ENROLLMENT
METHODS – GET YOU UP
AND RUNNING RAPIDLY



Enroll a single device via
email or SMS through a
link URL or QR code



Enroll multiple devices via
a bulk upload or staged
mass enrollment option



Use Active Directory (AD)
to enroll employee devices



Let your employees selfenroll their devices
through an app on the
Google PlayStore or Apple
App Store

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

17
Device Inventory and Diagnostics
COMPLETE VISIBILITY INTO
YOUR MOBILE ENVIRONMENT



Group devices and users
within a hierarchical control
structure for easy
administration



Configure mobile devices
and applications across
groups and departments

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

18
Device Inventory and Diagnostics
At-a-glance status indicators



At-a-glance device
status to detect
problems
 Enrollment
 Security
 Settings
 Required Apps
 Blacklisted Apps
 Compromised device
 Security breach



Drill down into
details/vital signs



Device user can also
see key details and
status info

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

19
Security Management
DEVICE SECURITY WITH
LESS EFFORT



Set device capability
restrictions



Enforce
password, encryption and
device capability restriction
policies



Locate, lock and wipe lost
or stolen devices



Automatically detect:
 Out-of-compliance devices
 Compromised devices (rooted)
 Security breaches (DM profile
removed, no connection for 30
days)



Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

On the device, a “privacy
advisor” highlights risky
apps that share personal
data

20
Mobile Application Management
RELIABLE, SECURE APP
DELIVERY AND MANAGEMENT
Single repository for both internal
and external (Google
PlayStore, Apple Apps Store, etc.)
apps
Apps can be pushed to devices
over the air; multiple retries ensure
delivery
Required applications can be
automatically pushed at device
enrollment, ensuring key apps are
on employee devices
Detection of blacklisted apps on a
device triggers automatic
notification and is reported on
Dashboard
Absence of required apps is
automatically detected/reported on
Dashboard
Inventory views: app inventory by
group, user; view of devices with
app installed

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

21
Enterprise App Store
CENTRAL, SECURE SOURCE OF
APPROVED ENTERPRISE APPS



Include both internal and external
(Google, Apple, other) apps



App Store on device is secure and
only accessible by defined users



User sees only the apps to which
they are granted access:

 Updates can be highlighted
 Users can see what Apps are installed
 Enterprise can prescribe the list of Apps
per user and group



App updates handled centrally

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

22
Document Management
SECURE DOCUMENT REPOSITORY



Repository on server for
approved, available documents by
group/device type



User sees/can download only
documents to which the are granted
access:

 Enterprise can prescribe the list of
documents per group/user

 Users see only the docs available to
them

 Documents with updates available can
be highlighted

 Secure: read-only access, no
modifications to server docs from device



Document updates are handled
centrally, securely, on the server

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

23
Mobile Application Security –
Seamless, Secure Mobile App Access
SECURE ENTERPRISE
WORKSPACE



Separates corporate from
personal apps on smartphones
and tablets



Secure Container on device
provides shared app access to:
 Authentication
 App Tunnel
 Encryption keys
 Security policies
 Access restrictions
“Containerized” apps share
security, access to enterprise
network/resources
Embedded Secure Browser – for
secure access to Web apps and
Intranet

Secure Browser
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

24
Mobile Application Security –
Simple App Containerization
Containerize in-house or 3rd-party apps to provide them with:







Shared Authentication
Shared App Tunnel (for app-level SSL access)
Shared encryption keys – never stored on device
Shared policy engine – different policies for different users
Restrict sharing (open in, copy/paste…) to just “secure workspace” apps

Deploy to
Users
Unsigned
Native
App

App
Containerization
Tool

Containerized
App

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

25
Mobile Application Security –
Solution Components








Source for security policies for Containerized
apps

Admin Control Panel – Set App security
policies, manage Containers



App Tunnel – App-level SSL tunnel,
eliminates need for device-level VPN and risk
from rogue apps



Secure Container on device

Gateway Server - Provides secure Intranet
access from mobile devices

Access to App Tunnel
Embedded Secure Browser

App Security Admin Control
Panel

Gateway
Server

App Tunnel

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

26
Enterprise APIs
Allows easy integration
of mobility management
functions into existing
IT service management
platforms or external
applications

•

Comprehensive set
of REST APIs –
simplified integration
with any capability

•

Professional services
available to assist in
integration efforts

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

27
Why Mformation’s Enterprise
Mobility Manager

28
Enterprise Mobility Management Market
Growth
LARGE OPPORTUNITY



Total enterprise mobility market - $340
billion by 2017 (ABI Research)



Enterprise MDM (EMM) market - $1.6billion by 2014 (Gartner)



Mobile enterprise management software
market growing at CAGR of 31.8% (IDC)



Market penetration for enterprise MDM is
currently estimated at less than 30
percent. (Gartner)

The EMM market will grow 3 x in 3 years,
as the number of mobile devices in
professional use grows exponentially

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

29
EMM Growth Moving to the Cloud
Worldwide EMM Revenue
Forecast ($M), 2013 - 2016

MAJORITY OF THE EMM GROWTH WILL BE
CLOUD-BASED SERVICES

$1,800




BYOD: Nearly every enterprise will take
action to implement a BYOD program, which
needs a mobility platform for
device, policy, and app management.



The average price per device per month for
EMM functionality only is $4. The opportunity
for managed services on top of this is 1-2x
more per month.



$1,600

A large % of enterprises will prefer to
outsource the platform, operations, and enduser support burden

The mobile device is the new design center
for enterprise application development, a
centerpiece for professional productivity
improvements, and an innovation platform
for customer intimacy.



EMM is a strategic part of the enterprise
infrastructure.

$1,600

$1,400

$1,200
$1,100

$1,000

$990

$800

$780

$600
$400

$252

$200
$0

$540

$500

$75

2013
Total EMM

2014

2015

2016

Cloud-based EMM

Source: Gartner, IDC & Radicati Group forecasts; projections
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

30
The EMM Business Opportunity for the MSP/Service
Provider



EMM means „recurring revenue‟ – the #1 way to improve
MSP valuations



For MSPs offering IT infrastructure services and/or
network services, EMM is a logical adjacency play, that
can leverage existing critical infrastructure ( help
desks, ITSM, etc ).



Many players ( carriers, SIs, SPs, etc. ) are positioning
with EMM service offerings. To lose this space, the MSP
will be exposed to new threats to their core businesses.



Cloud SaaS model lowers the costs and shortens the
time for MSPs to build this new business. Also
synchronizes expenses with revenue.

Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

31
Why Mformation for the MSP/Service
Provider…


Partner-centric

 We are focused on the MSP partner needs, we listen, we adjust
 You get your choice of deployment model – our cloud, your cloud or on-premise



Ideal architecture for MSPs looking to grow – „do it right up front‟

 Hardened proven multi-tenant architecture
 Proven ability to host thousands of unique customers with 100s of thousands of users
 Unequalled scalability and performance – millions of devices supported in 1 instance



Superior value for MSPs

 Fullest suite of mobility management services at the most competitive prices
 Lowest TCO, which only improves as your business grows




Our mobility management expertise – „we will raise your skills and credibility‟
Advanced MSP features that will improve efficiency, effectiveness, and brand

 MSP-branded Dashboard/UI that consolidates management view across thousands of
customers ( tenants ) providing overall operational insight.

 Advanced, streamlined enrollment options to speed the process of bringing large enterprise
customers on board

 Extensive REST APIs to integrate into MSP-branded management platform
 Extensive and easy MSP and individual customer branding
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

32
Why Mformation for the Enterprise…


Minimize risk, enable growth with uniquely scalable, multi-tenant, cloud-based solution








Rapid implementation, reduced complexity and overhead with secure, cloud solution
Multi-tenant platform easily handles the most complex global business structures
Easy, extensive branding to support diverse organizations
Pay as you grow and your mobile needs change

Count on a proven, tested mobility management platform







EMM solution based on a proven platform currently managing more than half a million mobile devices around the
globe

Full suite of mobility management capabilities and experience from the MDM pioneer

Complete security for your mobile workforce, reduced risk to the organization






Ensure device, data and application security with a structured policy management and compliance environment
Secure delivery of apps and docs to employee mobile devices, providing a highly secure data environment for your
mobile workforce

Manage company or BYOD mobile devices, applications, documents from a streamlined, intuitive
dashboard








Any time, anywhere management from laptops, smartphones or tablets lets you focus on leveraging employee mobility
to increase productivity and growth
Embrace BYOD with the ability to manage and secure both corporate and employee personal (BYOD) devices
Reduce the cost of mobility management through better reporting and reduced asset inventory needs
Simplify integration across your mobility and communications systems and frameworks with easy-to-use REST APIs

Global support



24/7 follow-the-sun service and support
Private/Proprietary: Not for disclosure outside Mformation without
prior written permission

33
CONTACT US
If you would like to receive additional information on
our company and our innovative mobility
management solutions, please feel free to contact
us.
MFORMATION SOFTWARE TECHNOLOGIES LLC
379 Thornall Street
Edison, NJ 08837
Tel: +1 732 692 6200
Fax: +1 732 549 7542

www.mformation.com
info@mformation.com
© Copyright Mformation Software Technologies LLC. All rights reserved.

34

Weitere ähnliche Inhalte

Was ist angesagt?

Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationAjay Chebbi
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case studySymplified
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
 
2011 Sales Presentation V6
2011 Sales Presentation V62011 Sales Presentation V6
2011 Sales Presentation V6tina_williams
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLDSECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLDForgeRock
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAMAbhinaw Kumar
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityAndris Soroka
 
Reasons Why Security Testing is Important
Reasons Why Security Testing is ImportantReasons Why Security Testing is Important
Reasons Why Security Testing is ImportantTestingXperts
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 

Was ist angesagt? (20)

Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst Foundation
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case study
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
2011 Sales Presentation V6
2011 Sales Presentation V62011 Sales Presentation V6
2011 Sales Presentation V6
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLDSECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
Reasons Why Security Testing is Important
Reasons Why Security Testing is ImportantReasons Why Security Testing is Important
Reasons Why Security Testing is Important
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 

Ähnlich wie EMM Product Sales Deck

2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS America
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 

Ähnlich wie EMM Product Sales Deck (20)

2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
Samsung SDS IAM & EMM
Samsung SDS IAM & EMMSamsung SDS IAM & EMM
Samsung SDS IAM & EMM
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Custom Mobile Services
Custom Mobile ServicesCustom Mobile Services
Custom Mobile Services
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

EMM Product Sales Deck

  • 2. About Mformation Global Solutions for Seamlessly Managing Mobile Technologies  Pioneer and leading provider of management solutions for wirelessly connected devices since 1999  Industry leader with over 500 million wireless devices managed on our platforms globally, including 50+ million IOS and Android smart devices  50+ leading carrier/service-provider customers, serving millions of consumers and enterprises   Multi-tenancy architecture, cloud-enabled & deployed    26 wireless patents granted, published, filed Extensive API portfolio and SDK for third-party integration Backed and funded by Clearlake Capital Strong partner network for a broad mobility management ecosystem, including strategic working partnerships with all device OEMs: OUR VISION Deliver seamless management solutions for all applications and services, on any wirelessly connected device, over any network Private/Proprietary: Not for disclosure outside Mformation without prior written permission 2
  • 3. Enterprise Mobility Management Vision We understand the need to simplify mobile management, respond to global mobility trends, reduce spend, enhance security, and leverage mobile technologies to maximize workforce productivity. Mobile Application Management (MAM) Application Security Management Secure Email/Docume nt Management Device Management (MDM) Wireless Expense Management Provisioning Procurement ENTERPRISE MOBILITY MANAGEMENT Device Replacement & Retirement Core Offering Upcoming Offering Developing Area Private/Proprietary: Not for disclosure outside Mformation without prior written permission 3
  • 4. Enterprise Mobility Challenges & Opportunities 4
  • 5. Enterprise Mobility Challenges Mobile Adoption  6.8 Billion mobile subscriptions globally (ITU)    7 Billion people in the World (Wikipedia) 42 Million iPads sold in 2 quarters (Apple) 50 Billion connected devices by 2015 (Cisco/Ericcson)   Tablets to out-ship PCs in 2013 (IDC) 10-11% traffic to web sites from tablets (Monetate) Enterprise Stats  53% Firms plan to mobile-enable apps in 2013 (Lopez Research survey)  67% of Firms Support BYOD (Lopez Research survey)  Cloud-based IT solutions will drive 90% of the market by 2016 (IDC) Private/Proprietary: Not for disclosure outside Mformation without prior written permission 5
  • 6. Enterprise Mobility Concerns (Lopez Research survey 2013) Private/Proprietary: Not for disclosure outside Mformation without prior written permission 6
  • 7. EMM Moving to the Cloud Worldwide EMM Revenue Forecast ($M), 2013 - 2016 $1,800 $1,600 $1,600 $1,400 $1,200 $1,100 $1,000 $990 $800 $600 $400 $780 $540 $500 $252 $200 $0 $75 2013 2014 Total EMM 2015 2016 Cloud-based EMM Source: Gartner, IDC & Radicati Group forecasts; projections Private/Proprietary: Not for disclosure outside Mformation without prior written permission 7
  • 9. Enterprise Mobility Manager – Key Capabilities For Managing the Mobile Enterprise ESSENTIALS - Core MDM and MAM Capabilities:         Device inventory and diagnostics Security management Streamlined device enrollment Policy and BYOD management Mobile application management Enterprise App Store Document catalog REST APIs ENTERPRISE APPS – Add-on:    Application Security Management (App Containerization) Secure App Tunnel Secure Browser Cloud-based deployment: Mformation Cloud, your private Cloud Support for iOS, Android, and BlackBerry smartphones and tablets Intuitive UI and Management Dashboard True multi-tenant, highly scalable architecture Private/Proprietary: Not for disclosure outside Mformation without prior written permission 9
  • 10. Cloud-based Deployment Options Mformation Shared or Private Cloud Mformation-hosted Public Cloud Shared     ENTERPRISE MOBILITY MANAGER   Shared cloud environment Secure, high-availability, multi-tenant Customizable EMM per customer Resides in AWS, no software installation or configuration Flexible, fast, pay-as-you-grow deployment Scales to thousands of enterprises, with hundreds of thousands of users Mformation-hosted “Virtual Private Cloud”  Logically isolated section of AWS public   ENTERPRISE MOBILITY MANAGER Private Virtual Private Cloud  cloud Virtual network you define Software provided as Amazon Machine Image (AMI) Mformation installs and configures system Private/Proprietary: Not for disclosure outside Mformation without prior written permission 10
  • 11. Cloud-based Deployment Options Your Premise, Private Cloud Your Premise, Private Cloud   VMware underlying technology  vApps run on VMware vSphere, VMware Infrastructure (VI), VMware Workstation, VMware Fusion, VMware Server, and VMware Player  High availability, scalability, backup, li ve migration  Mformation installs and configures system ENTERPRISE MOBILITY MANAGER Software components (servers) supplied as virtual appliances optimized for the cloud – vApps Private/Proprietary: Not for disclosure outside Mformation without prior written permission 11
  • 12. Proven Multi-Tenant Architecture Robust, multi-tenant   1000s of tenants (MSPs and/or enterprises)  Any number of levels (enterprises, groups)  ENTERPRISE MOBILITY MANAGER 1 cloud-hosted instance 100s of millions of devices, apps, users, transactions Completely customizable: Branding at all levels:  Tenant (MSP or Enterprise)  Groups Consolidated management view  For MSPs: across enterprise customers  For enterprises: across offices/departments/workgroups Benefits:  Simplest, fastest, lowest cost to implement  No hardware, software, admin or support costs Proven architecture, handles thousands of tenants, hundreds of millions of devices Private/Proprietary: Not for disclosure outside Mformation without prior written permission 12
  • 13. Intuitive UI & Management Dashboard MANAGE YOUR MOBILE ENVIRONMENT FROM ANYWHERE  o List Devices o Send Security Policy     UI adaptive for use on smartphones, tablets, laptops High-level graphical view of the groups, users, devices and apps At-a-glance highlighting of device issues that require attention Context-aware; one click access to take corrective actions for identified device issues Simple drill-down to view and proactively manage groups, users, devices, apps and docs Private/Proprietary: Not for disclosure outside Mformation without prior written permission 13
  • 14. MSP Dashboard – Accounts at-a-Glance MANAGE YOUR CUSTOMER ACCOUNTS SIMPLY AND EASILY  At-a-glance view of your customer accounts – from a smartphone, tablet, or laptop   License management for each account Drill down to group, user, device and app details for each enterprise account Private/Proprietary: Not for disclosure outside Mformation without prior written permission 14
  • 15. Policy and BYOD Management ENFORCE YOUR POLICIES, PROTECT YOUR DATA ON CORPORATE OR BYOD DEVICES  Set and enforce device security settings (password enforcement, encryption, content restrictions, restrictions on features such as camera, Bluetooth, Wi-Fi, etc.)  Set and enforce policies for the configuration of device services settings (email, Exchange, etc.) Private/Proprietary: Not for disclosure outside Mformation without prior written permission 15
  • 16. Policy and BYOD Management  Register devices as corporate or personal (BYOD) when they are enrolled  Define specific policies to apply to corporate or BYOD devices  Set and enforce app whitelist/blacklist policies  Set and enforce policies for required apps Private/Proprietary: Not for disclosure outside Mformation without prior written permission 16
  • 17. Streamlined Device Enrollment MULTIPLE ENROLLMENT METHODS – GET YOU UP AND RUNNING RAPIDLY  Enroll a single device via email or SMS through a link URL or QR code  Enroll multiple devices via a bulk upload or staged mass enrollment option  Use Active Directory (AD) to enroll employee devices  Let your employees selfenroll their devices through an app on the Google PlayStore or Apple App Store Private/Proprietary: Not for disclosure outside Mformation without prior written permission 17
  • 18. Device Inventory and Diagnostics COMPLETE VISIBILITY INTO YOUR MOBILE ENVIRONMENT  Group devices and users within a hierarchical control structure for easy administration  Configure mobile devices and applications across groups and departments Private/Proprietary: Not for disclosure outside Mformation without prior written permission 18
  • 19. Device Inventory and Diagnostics At-a-glance status indicators  At-a-glance device status to detect problems  Enrollment  Security  Settings  Required Apps  Blacklisted Apps  Compromised device  Security breach  Drill down into details/vital signs  Device user can also see key details and status info Private/Proprietary: Not for disclosure outside Mformation without prior written permission 19
  • 20. Security Management DEVICE SECURITY WITH LESS EFFORT  Set device capability restrictions  Enforce password, encryption and device capability restriction policies  Locate, lock and wipe lost or stolen devices  Automatically detect:  Out-of-compliance devices  Compromised devices (rooted)  Security breaches (DM profile removed, no connection for 30 days)  Private/Proprietary: Not for disclosure outside Mformation without prior written permission On the device, a “privacy advisor” highlights risky apps that share personal data 20
  • 21. Mobile Application Management RELIABLE, SECURE APP DELIVERY AND MANAGEMENT Single repository for both internal and external (Google PlayStore, Apple Apps Store, etc.) apps Apps can be pushed to devices over the air; multiple retries ensure delivery Required applications can be automatically pushed at device enrollment, ensuring key apps are on employee devices Detection of blacklisted apps on a device triggers automatic notification and is reported on Dashboard Absence of required apps is automatically detected/reported on Dashboard Inventory views: app inventory by group, user; view of devices with app installed Private/Proprietary: Not for disclosure outside Mformation without prior written permission 21
  • 22. Enterprise App Store CENTRAL, SECURE SOURCE OF APPROVED ENTERPRISE APPS  Include both internal and external (Google, Apple, other) apps  App Store on device is secure and only accessible by defined users  User sees only the apps to which they are granted access:  Updates can be highlighted  Users can see what Apps are installed  Enterprise can prescribe the list of Apps per user and group  App updates handled centrally Private/Proprietary: Not for disclosure outside Mformation without prior written permission 22
  • 23. Document Management SECURE DOCUMENT REPOSITORY  Repository on server for approved, available documents by group/device type  User sees/can download only documents to which the are granted access:  Enterprise can prescribe the list of documents per group/user  Users see only the docs available to them  Documents with updates available can be highlighted  Secure: read-only access, no modifications to server docs from device  Document updates are handled centrally, securely, on the server Private/Proprietary: Not for disclosure outside Mformation without prior written permission 23
  • 24. Mobile Application Security – Seamless, Secure Mobile App Access SECURE ENTERPRISE WORKSPACE  Separates corporate from personal apps on smartphones and tablets  Secure Container on device provides shared app access to:  Authentication  App Tunnel  Encryption keys  Security policies  Access restrictions “Containerized” apps share security, access to enterprise network/resources Embedded Secure Browser – for secure access to Web apps and Intranet Secure Browser Private/Proprietary: Not for disclosure outside Mformation without prior written permission 24
  • 25. Mobile Application Security – Simple App Containerization Containerize in-house or 3rd-party apps to provide them with:      Shared Authentication Shared App Tunnel (for app-level SSL access) Shared encryption keys – never stored on device Shared policy engine – different policies for different users Restrict sharing (open in, copy/paste…) to just “secure workspace” apps Deploy to Users Unsigned Native App App Containerization Tool Containerized App Private/Proprietary: Not for disclosure outside Mformation without prior written permission 25
  • 26. Mobile Application Security – Solution Components      Source for security policies for Containerized apps Admin Control Panel – Set App security policies, manage Containers  App Tunnel – App-level SSL tunnel, eliminates need for device-level VPN and risk from rogue apps  Secure Container on device Gateway Server - Provides secure Intranet access from mobile devices Access to App Tunnel Embedded Secure Browser App Security Admin Control Panel Gateway Server App Tunnel Private/Proprietary: Not for disclosure outside Mformation without prior written permission 26
  • 27. Enterprise APIs Allows easy integration of mobility management functions into existing IT service management platforms or external applications • Comprehensive set of REST APIs – simplified integration with any capability • Professional services available to assist in integration efforts Private/Proprietary: Not for disclosure outside Mformation without prior written permission 27
  • 29. Enterprise Mobility Management Market Growth LARGE OPPORTUNITY  Total enterprise mobility market - $340 billion by 2017 (ABI Research)  Enterprise MDM (EMM) market - $1.6billion by 2014 (Gartner)  Mobile enterprise management software market growing at CAGR of 31.8% (IDC)  Market penetration for enterprise MDM is currently estimated at less than 30 percent. (Gartner) The EMM market will grow 3 x in 3 years, as the number of mobile devices in professional use grows exponentially Private/Proprietary: Not for disclosure outside Mformation without prior written permission 29
  • 30. EMM Growth Moving to the Cloud Worldwide EMM Revenue Forecast ($M), 2013 - 2016 MAJORITY OF THE EMM GROWTH WILL BE CLOUD-BASED SERVICES $1,800   BYOD: Nearly every enterprise will take action to implement a BYOD program, which needs a mobility platform for device, policy, and app management.  The average price per device per month for EMM functionality only is $4. The opportunity for managed services on top of this is 1-2x more per month.  $1,600 A large % of enterprises will prefer to outsource the platform, operations, and enduser support burden The mobile device is the new design center for enterprise application development, a centerpiece for professional productivity improvements, and an innovation platform for customer intimacy.  EMM is a strategic part of the enterprise infrastructure. $1,600 $1,400 $1,200 $1,100 $1,000 $990 $800 $780 $600 $400 $252 $200 $0 $540 $500 $75 2013 Total EMM 2014 2015 2016 Cloud-based EMM Source: Gartner, IDC & Radicati Group forecasts; projections Private/Proprietary: Not for disclosure outside Mformation without prior written permission 30
  • 31. The EMM Business Opportunity for the MSP/Service Provider  EMM means „recurring revenue‟ – the #1 way to improve MSP valuations  For MSPs offering IT infrastructure services and/or network services, EMM is a logical adjacency play, that can leverage existing critical infrastructure ( help desks, ITSM, etc ).  Many players ( carriers, SIs, SPs, etc. ) are positioning with EMM service offerings. To lose this space, the MSP will be exposed to new threats to their core businesses.  Cloud SaaS model lowers the costs and shortens the time for MSPs to build this new business. Also synchronizes expenses with revenue. Private/Proprietary: Not for disclosure outside Mformation without prior written permission 31
  • 32. Why Mformation for the MSP/Service Provider…  Partner-centric  We are focused on the MSP partner needs, we listen, we adjust  You get your choice of deployment model – our cloud, your cloud or on-premise  Ideal architecture for MSPs looking to grow – „do it right up front‟  Hardened proven multi-tenant architecture  Proven ability to host thousands of unique customers with 100s of thousands of users  Unequalled scalability and performance – millions of devices supported in 1 instance  Superior value for MSPs  Fullest suite of mobility management services at the most competitive prices  Lowest TCO, which only improves as your business grows   Our mobility management expertise – „we will raise your skills and credibility‟ Advanced MSP features that will improve efficiency, effectiveness, and brand  MSP-branded Dashboard/UI that consolidates management view across thousands of customers ( tenants ) providing overall operational insight.  Advanced, streamlined enrollment options to speed the process of bringing large enterprise customers on board  Extensive REST APIs to integrate into MSP-branded management platform  Extensive and easy MSP and individual customer branding Private/Proprietary: Not for disclosure outside Mformation without prior written permission 32
  • 33. Why Mformation for the Enterprise…  Minimize risk, enable growth with uniquely scalable, multi-tenant, cloud-based solution      Rapid implementation, reduced complexity and overhead with secure, cloud solution Multi-tenant platform easily handles the most complex global business structures Easy, extensive branding to support diverse organizations Pay as you grow and your mobile needs change Count on a proven, tested mobility management platform    EMM solution based on a proven platform currently managing more than half a million mobile devices around the globe Full suite of mobility management capabilities and experience from the MDM pioneer Complete security for your mobile workforce, reduced risk to the organization    Ensure device, data and application security with a structured policy management and compliance environment Secure delivery of apps and docs to employee mobile devices, providing a highly secure data environment for your mobile workforce Manage company or BYOD mobile devices, applications, documents from a streamlined, intuitive dashboard      Any time, anywhere management from laptops, smartphones or tablets lets you focus on leveraging employee mobility to increase productivity and growth Embrace BYOD with the ability to manage and secure both corporate and employee personal (BYOD) devices Reduce the cost of mobility management through better reporting and reduced asset inventory needs Simplify integration across your mobility and communications systems and frameworks with easy-to-use REST APIs Global support  24/7 follow-the-sun service and support Private/Proprietary: Not for disclosure outside Mformation without prior written permission 33
  • 34. CONTACT US If you would like to receive additional information on our company and our innovative mobility management solutions, please feel free to contact us. MFORMATION SOFTWARE TECHNOLOGIES LLC 379 Thornall Street Edison, NJ 08837 Tel: +1 732 692 6200 Fax: +1 732 549 7542 www.mformation.com info@mformation.com © Copyright Mformation Software Technologies LLC. All rights reserved. 34

Hinweis der Redaktion

  1. Go through constituent parts….ProcurementProvisioningMDMApp Mgmt.Service Mgmt.Security Mgmt.Expense mgmt.End user supportDevice
  2. It may look like BYOD is not a top concern, but it is important/extremely important to half the companies surveyed. Some companies see BYOD as an opportunity, while others see it as a security risk and will not embrace it at this time.