SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Enterprise Mobility Management (EMM)
EMM is an evolving organizational trend that deals with the business, as well as technological
context, of the increasing trend of mobile devices usage in routine business operations.
Enterprise mobility is the trend toward a shift in work habits, with more employees working out
of the office and using mobile devices and cloud services to perform business tasks.
The term refers not only to mobile workers and mobile devices, but also to the mobility of
corporate data. Enterprise mobility can improve employee productivity, but it also creates
security risks.
EMM is primarily centered on the enterprise governance, security, management and control of
mobile computing technologies. It encompasses processes and policies across all mobile devices
that have part or a major stake within business processes. EMM’s scope is typically focused on
security, application integration and management, as well as the financial implications of such
solutions.
Enterprise Mobility is about making the company more flexible and more responsive – able to
move locations physically, move between target markets demographically, and move between
business opportunities strategically – in a manner much simpler than before. In this light, the
concept of Enterprise Mobility is not something that narrowly encompasses traditional "mobility
technologies", it also includes managed services, cloud computing, and social media. All of these
things play a role in enabling the anyplace, anytime, anywhere aspirations of a company.
EMM and Cloud Computing
Cloud Computing creates a key challenge in today’s mobile environments, because Cloud-based
environments require a transparent mobile policy management strategy. More corporate data
now resides on mobile devices and is distributed on off-site servers; protecting that data is
becoming a mission-critical priority.
Visibility and control of the myriad ways end-users access and leverage a cloud computing
environment are crucial to ensuring a successful mobile investment.
Security- and cost-conscious organizations are focusing on three critical mobility factors as they
evaluate and deploy cloud computing:
End-User Reliance and Connectivity: Delivering the greatest degree of flexibility to the
mobile workforce depends on providing easy access to cloud-based data and applications
from anywhere at any time.
Access Costs: Today’s mobile workers are accessing cloud-based data and applications
through various technologies while on the road or working from remote locations. Unless
this connectivity is carefully monitored and controlled, the cost of connecting your
mobile workers to your cloud-based environment has the potential to significantly offset
the efficiencies you expect to gain from the cloud computing environment.
Access Security: Despite many organizations having invested in a portfolio of end-point
security solutions and corporate VPNs, data compromise is still a risk because of a
variety of threats.
Mobile Policy Management (MPM) addresses the critical mobility factors listed above
including: cost control, security and end-user connectivity for cloud-based organizations by
providing the following:
Mobile Policy Management: Empowers the organization to automate network selection and
enables IT to pre-define network prioritization policies and assign specific mobile policies to a
given network for cloud and non-cloud data and application access, and maximizes mobile
workforce productivity. The result is a seamless experience that makes remote access and
connectivity transparent to end-users, saving them valuable time when accessing cloud and non-
cloud data and applications.
MPM Reduces End-User Support Costs of Workforce Mobility: Most organizations estimate that
50 to 80% of the support calls made to IT by mobile workers, are related to connectivity or
remote access. Automating the mobile connectivity process for end-users, leads to eliminating
end-user errors, and reduces overall support costs.
MPM Cost-Optimizes Mobile Data Usage: From an enterprise standpoint, leaving network
selection up to the end-user can drive data costs far over budget and create significant cost
liabilities. A MPM platform avoids unbudgeted data costs by enabling IT to define and enforce a
network white list, preventing users from adding unsanctioned communications options.
MPM Eliminates Common Data-Security Threats: These threats persist despite existing security
solutions. MPM platform enables IT to dynamically automate and enforce network-specific
security policies as mobile workers roam between various networks.
New Trends in EMM
According to Gartner’s recent report, the new trends are:
Application-based VPN — Using a VPN for every app transaction can drain battery life and also
increases data traffic for nonbusiness needs. There is a movement to enforce application-based
VPN on business apps to guarantee security.
Data containerization — Companies are assessing the opportunity to separate business data from
personal data, either by application or by putting it into separate workspaces, as a way to increase
data integrity and management, while affording additional privacy to personal data. This is
especially important for BYOD programs.
Identity Management —Use of identity management to enforce segmented policies, and allow,
deny or grant limited access to devices, based on their compliance with these policies.
Productivity and Collaboration—Increasing productivity and collaboration for mobile workers
who use multiple devices by allowing file sharing for internal and external use. Consumer-grade
products are dominant today, but enterprises are evaluating solutions that will afford them
increased data security and management.
App catalog — Companies are looking for solutions that will provide access to secure and
manageable third-party apps commonly found in application markets, but want to be able to add
enterprise policies and controls.
Application provisioning and support —As part of a total mobile software management solution,
enterprises need the ability to provision and support third-party and enterprise mobile
applications. Many want an easier way to support apps across different types of users, with
multiple policy possibilities.
Application virtualization — Also in the app area, companies are assessing the use of mobile
workspace aggregation, where the app would run in the cloud versus on the endpoint. While this
is compelling because it would reduce the need for app customization based on the mobile
platform, it would require an optimization of the app to run in the network as well as require
increased network access. Offline requirements are also important when mobile users are
disconnected, but still need access to data.
The Future of Enterprise Mobility Management
As companies support mobile users, devices and content, the challenge of putting together an
enterprise mobile solution continues. Because of the lack of standardization in mobility and the
fact that users have different mobility profiles and application requirements, there is no one size
fits all when it comes to providing this mobile solution. Today, enterprises often have to sew
together a number of point solutions to enable a mobile solution. Often, those point solutions
come from a non-mobile legacy and are not optimized for mobility, leading to a poor user
experience and an expensive option that is underutilized.
As Enterprise Mobility Management adoption grows, it is expanding out of a pure policy
management function to incorporate an enterprise mobile management and enablement solution.
Many companies see the platform as the main tool to both implement and manage a mobile
solution.
References
http://www.infoq.com/articles/creating-an-enterpise-mobility-strategy
http://searchconsumerization.techtarget.com/definition/Enterprise-mobility
http://www.techopedia.com/definition/29315/enterprise-mobility-management-emm
- Gartner: Magic Quadrant for API Management
http://blogs.citrix.com/2014/04/03/3-top-priorities-for-your-enterprise-mobility-strategy/
http://convergence.sprint.com/blog/post/2010/07/08/what-enterprise-mobility-means.aspx
http://www.cloudbook.net/resources/stories/the-intersection-of-enterprise-mobility-and-cloud-
computing
http://www.alibabaoglan.com/blog/gartners-2013-magic-quadrant-for-mobile-management-
software-solutions/

Weitere ähnliche Inhalte

Andere mochten auch

Media _the_brain
Media  _the_brainMedia  _the_brain
Media _the_brainCMoondog
 
Saúde e-bem-estar-(outubro-2008)
Saúde e-bem-estar-(outubro-2008)Saúde e-bem-estar-(outubro-2008)
Saúde e-bem-estar-(outubro-2008)Carlos Serra
 
5 Questions When Analyzing Your Analytics Options
5 Questions When Analyzing Your Analytics Options5 Questions When Analyzing Your Analytics Options
5 Questions When Analyzing Your Analytics OptionsVoxeo Corp
 
Using Social Media
Using Social MediaUsing Social Media
Using Social Mediarmorriss
 
Marketxdefinition,Xmarketxsegmentationxandxbrandxpositioning
Marketxdefinition,XmarketxsegmentationxandxbrandxpositioningMarketxdefinition,Xmarketxsegmentationxandxbrandxpositioning
Marketxdefinition,Xmarketxsegmentationxandxbrandxpositioningzunni
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3tykl94
 
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...ServiceWave 2010
 
Information health policy 981207
Information health policy 981207Information health policy 981207
Information health policy 981207Jessica Chou
 
20100105 台灣神蕭朝金 1
20100105 台灣神蕭朝金 120100105 台灣神蕭朝金 1
20100105 台灣神蕭朝金 1Aries Chen
 
LID LEED and Policy (24 Feb 2011)
LID LEED and Policy (24 Feb 2011)LID LEED and Policy (24 Feb 2011)
LID LEED and Policy (24 Feb 2011)Jon Barsanti Jr
 
Achieving ROI On Leadership Investment John Bradford
Achieving ROI On Leadership Investment John BradfordAchieving ROI On Leadership Investment John Bradford
Achieving ROI On Leadership Investment John BradfordJohn F. Bradford
 

Andere mochten auch (15)

Media _the_brain
Media  _the_brainMedia  _the_brain
Media _the_brain
 
Saúde e-bem-estar-(outubro-2008)
Saúde e-bem-estar-(outubro-2008)Saúde e-bem-estar-(outubro-2008)
Saúde e-bem-estar-(outubro-2008)
 
Content Strategy
Content StrategyContent Strategy
Content Strategy
 
Syntens Middelburg
Syntens MiddelburgSyntens Middelburg
Syntens Middelburg
 
5 Questions When Analyzing Your Analytics Options
5 Questions When Analyzing Your Analytics Options5 Questions When Analyzing Your Analytics Options
5 Questions When Analyzing Your Analytics Options
 
Using Social Media
Using Social MediaUsing Social Media
Using Social Media
 
Marketxdefinition,Xmarketxsegmentationxandxbrandxpositioning
Marketxdefinition,XmarketxsegmentationxandxbrandxpositioningMarketxdefinition,Xmarketxsegmentationxandxbrandxpositioning
Marketxdefinition,Xmarketxsegmentationxandxbrandxpositioning
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3
 
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Information health policy 981207
Information health policy 981207Information health policy 981207
Information health policy 981207
 
20100105 台灣神蕭朝金 1
20100105 台灣神蕭朝金 120100105 台灣神蕭朝金 1
20100105 台灣神蕭朝金 1
 
LID LEED and Policy (24 Feb 2011)
LID LEED and Policy (24 Feb 2011)LID LEED and Policy (24 Feb 2011)
LID LEED and Policy (24 Feb 2011)
 
Achieving ROI On Leadership Investment John Bradford
Achieving ROI On Leadership Investment John BradfordAchieving ROI On Leadership Investment John Bradford
Achieving ROI On Leadership Investment John Bradford
 
GEPT Week 5
GEPT Week 5GEPT Week 5
GEPT Week 5
 

Mehr von Ahmed Banafa

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergenceAhmed Banafa
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AIAhmed Banafa
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingAhmed Banafa
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet ExplainedAhmed Banafa
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum TeleportationAhmed Banafa
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingAhmed Banafa
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain managementAhmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ahmed Banafa
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain ApplicationsAhmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU Ahmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AIAhmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 

Mehr von Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Enterprise Mobility Management

  • 1. Enterprise Mobility Management (EMM) EMM is an evolving organizational trend that deals with the business, as well as technological context, of the increasing trend of mobile devices usage in routine business operations. Enterprise mobility is the trend toward a shift in work habits, with more employees working out of the office and using mobile devices and cloud services to perform business tasks. The term refers not only to mobile workers and mobile devices, but also to the mobility of corporate data. Enterprise mobility can improve employee productivity, but it also creates security risks. EMM is primarily centered on the enterprise governance, security, management and control of mobile computing technologies. It encompasses processes and policies across all mobile devices that have part or a major stake within business processes. EMM’s scope is typically focused on security, application integration and management, as well as the financial implications of such solutions. Enterprise Mobility is about making the company more flexible and more responsive – able to move locations physically, move between target markets demographically, and move between business opportunities strategically – in a manner much simpler than before. In this light, the concept of Enterprise Mobility is not something that narrowly encompasses traditional "mobility technologies", it also includes managed services, cloud computing, and social media. All of these things play a role in enabling the anyplace, anytime, anywhere aspirations of a company. EMM and Cloud Computing Cloud Computing creates a key challenge in today’s mobile environments, because Cloud-based environments require a transparent mobile policy management strategy. More corporate data now resides on mobile devices and is distributed on off-site servers; protecting that data is becoming a mission-critical priority. Visibility and control of the myriad ways end-users access and leverage a cloud computing environment are crucial to ensuring a successful mobile investment.
  • 2. Security- and cost-conscious organizations are focusing on three critical mobility factors as they evaluate and deploy cloud computing: End-User Reliance and Connectivity: Delivering the greatest degree of flexibility to the mobile workforce depends on providing easy access to cloud-based data and applications from anywhere at any time. Access Costs: Today’s mobile workers are accessing cloud-based data and applications through various technologies while on the road or working from remote locations. Unless this connectivity is carefully monitored and controlled, the cost of connecting your mobile workers to your cloud-based environment has the potential to significantly offset the efficiencies you expect to gain from the cloud computing environment. Access Security: Despite many organizations having invested in a portfolio of end-point security solutions and corporate VPNs, data compromise is still a risk because of a variety of threats. Mobile Policy Management (MPM) addresses the critical mobility factors listed above including: cost control, security and end-user connectivity for cloud-based organizations by providing the following: Mobile Policy Management: Empowers the organization to automate network selection and enables IT to pre-define network prioritization policies and assign specific mobile policies to a given network for cloud and non-cloud data and application access, and maximizes mobile workforce productivity. The result is a seamless experience that makes remote access and connectivity transparent to end-users, saving them valuable time when accessing cloud and non- cloud data and applications. MPM Reduces End-User Support Costs of Workforce Mobility: Most organizations estimate that 50 to 80% of the support calls made to IT by mobile workers, are related to connectivity or remote access. Automating the mobile connectivity process for end-users, leads to eliminating end-user errors, and reduces overall support costs. MPM Cost-Optimizes Mobile Data Usage: From an enterprise standpoint, leaving network selection up to the end-user can drive data costs far over budget and create significant cost liabilities. A MPM platform avoids unbudgeted data costs by enabling IT to define and enforce a network white list, preventing users from adding unsanctioned communications options.
  • 3. MPM Eliminates Common Data-Security Threats: These threats persist despite existing security solutions. MPM platform enables IT to dynamically automate and enforce network-specific security policies as mobile workers roam between various networks. New Trends in EMM According to Gartner’s recent report, the new trends are: Application-based VPN — Using a VPN for every app transaction can drain battery life and also increases data traffic for nonbusiness needs. There is a movement to enforce application-based VPN on business apps to guarantee security. Data containerization — Companies are assessing the opportunity to separate business data from personal data, either by application or by putting it into separate workspaces, as a way to increase data integrity and management, while affording additional privacy to personal data. This is especially important for BYOD programs. Identity Management —Use of identity management to enforce segmented policies, and allow, deny or grant limited access to devices, based on their compliance with these policies. Productivity and Collaboration—Increasing productivity and collaboration for mobile workers who use multiple devices by allowing file sharing for internal and external use. Consumer-grade products are dominant today, but enterprises are evaluating solutions that will afford them increased data security and management. App catalog — Companies are looking for solutions that will provide access to secure and manageable third-party apps commonly found in application markets, but want to be able to add enterprise policies and controls. Application provisioning and support —As part of a total mobile software management solution, enterprises need the ability to provision and support third-party and enterprise mobile applications. Many want an easier way to support apps across different types of users, with multiple policy possibilities. Application virtualization — Also in the app area, companies are assessing the use of mobile workspace aggregation, where the app would run in the cloud versus on the endpoint. While this is compelling because it would reduce the need for app customization based on the mobile platform, it would require an optimization of the app to run in the network as well as require increased network access. Offline requirements are also important when mobile users are disconnected, but still need access to data.
  • 4. The Future of Enterprise Mobility Management As companies support mobile users, devices and content, the challenge of putting together an enterprise mobile solution continues. Because of the lack of standardization in mobility and the fact that users have different mobility profiles and application requirements, there is no one size fits all when it comes to providing this mobile solution. Today, enterprises often have to sew together a number of point solutions to enable a mobile solution. Often, those point solutions come from a non-mobile legacy and are not optimized for mobility, leading to a poor user experience and an expensive option that is underutilized. As Enterprise Mobility Management adoption grows, it is expanding out of a pure policy management function to incorporate an enterprise mobile management and enablement solution. Many companies see the platform as the main tool to both implement and manage a mobile solution. References http://www.infoq.com/articles/creating-an-enterpise-mobility-strategy http://searchconsumerization.techtarget.com/definition/Enterprise-mobility http://www.techopedia.com/definition/29315/enterprise-mobility-management-emm - Gartner: Magic Quadrant for API Management http://blogs.citrix.com/2014/04/03/3-top-priorities-for-your-enterprise-mobility-strategy/ http://convergence.sprint.com/blog/post/2010/07/08/what-enterprise-mobility-means.aspx http://www.cloudbook.net/resources/stories/the-intersection-of-enterprise-mobility-and-cloud- computing http://www.alibabaoglan.com/blog/gartners-2013-magic-quadrant-for-mobile-management- software-solutions/