DOC PREVIEW
NU MSIT 458 - Mobile Device Management

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1OverviewSlide 3Bring Your Own Device OpportunitySlide 5Bring Your Own Device – Mobile SecurityNext-Gen Multi-OS Mobile Device ManagementCompetitive OutlookSlide 9MobileIron iPhone, iPad & iPod ServicesMobileIron Blackberry Value-Added ServicesMobileIron Full MDM Services for WinMO, & SymbianBring Your Own Device Security ControlsCost AnalysisSlide 15What Does It All Mean?Slide 17!! Are we under attack !!Personal Consumer devices continue to invade *Corporate enterprise – just wanting to plug in*Mobile Device ManagementOverview•The main devices for corporate productivity used to be the desktop or laptop computer. •RIM’s BlackBerry opened the door for smartphones as business tools.•Employees began bringing their own non-BlackBerry devices into work, and demanding that they be able to connect them with corporate resources•Mobile device management as a hub for managing a variety of corporate and personal•Security is a focus of most MDM vendors. •Mobile devices are increasingly application platforms. •Mobile technology will continue to change rapidlyHow It Got Here Where It’s GoingWe must continue to focus on solutions that offer us Enforced Passwords, Device Wipe, Remote Lock, Audit trail/logging, Jailbreak detection, Software Distribution with Application downloading, updating and verification support, external memory blocking and configuration change history.We must continue to focus on solutions that offer us Enforced Passwords, Device Wipe, Remote Lock, Audit trail/logging, Jailbreak detection, Software Distribution with Application downloading, updating and verification support, external memory blocking and configuration change history.Northwestern University Graduate Team – Praxiteles. 2012Bring Your Own Device is seen to be complex, expensive, and dangerous especially for Data SecurityIf employees are using their own devices, legitimate questions include:•How can IT protect the corporate data from corruption, misuse, or theft?•How can efficient use of company-owned applications be supported on a device with non-standard configuration? •How can the employee install a needed application even when their device uses a different operating system or operating system version?•Who is responsible for taking care of his or her asset; •How can the organization protect centrally located data if it can’t ensure that a device is properly secured? Northwestern University Graduate Team – Praxiteles. 201231/13/191/13/19Bring Your Own Device OpportunityNorthwestern University Graduate Team – Praxiteles. 20125Typical Network Security ArchitectureSecurity Network ArchitectureTypical Components•Gateway firewalls•Dual gateway firewalls•Internal firewalls•Gateway anti-malware•Endpoint anti-malware•Dual Internet connections•Segmented networks•Tiered networks•Virtual Private Networks (VPN)•Intrusion detection & prevention•Content filtering•Data Leakage Protection (DLP)•Network Access Control (NAC)•Endpoint encryption•Enhanced authentication•Security management technologiesRisk Tolerance: LowPresence of Sensitive Data: YesRemote Users: YesHours of Operation: 24/7Online Business: YesBring Your Own Device – Mobile SecurityNext-Gen Multi-OS Mobile Device ManagementEnterprise Services•Real-Time Smartphone Inventory Dashboard – Multi-OS•Advanced Security & Management–Configure, Secure & Manage Smartphone & iPad (OTA)•Application Mgmt & Distribution –Real-time inventory, In-house App Store•Generate Actionable Alerts based on Policy –SIM change, Intl roaming,…•Employee Owned phone –Data boundary, Self Governance,…•iPhone/iPad•Android •Blackberry•Windows Mobile•Symbian7Competitive OutlookSolutionThree Services of MobileIron Virtual Smartphone PlatformEnterprise End-UserVirtual Smartphone PlatformControl Cost(Telecom)Reduce wireless bills thru visibility into usage and quality Control Chaos(IT)Secure and manage mobile devices, data, and appsExpand Experience(User)Deliver new services and move accountability to the userSmartphone Mission ControlProactive Business IntelligenceCooperativeMobilityAdvancedManagementAdvancedManagementMobile Activity IntelligenceMobile Activity IntelligenceMyPhone@WorkMyPhone@Work•Device management •Security •Access control •Enterprise data boundary (selective wipe, privacy)•Remote control•Enterprise app store •Activity analysis(voice, SMS, data traffic)•Int’l roaming monitor•Service quality analysis•Alerts and actions•Activity and quality•Privacy controls•Enterprise app store•Self-management9MobileIroniPhone, iPad & iPod ServicesSecure at ScaleSecure at ScaleManage AppsManage AppsControl CostControl CostIntegrate iPhone into IT Operations•Provision at scale•Configure and secure devices•Obtain real-time inventory•Determine operational & security state of devices•Revoke enterprise resources and settingsManage Enterprise Apps End-to-End•Gain real-time visibility into installed apps (iOS 4)•Recommend App Store applications to end-users•Distribute in-house applications over-the-air (iOS 4)Manage Enterprise Apps End-to-End•Determine which devices are internationally roaming (iOS 4)•Generate alerts based on IT policy•Measure and record connection quality and speed (Cellular and Wi-Fi)•Report performance and dropped calls on map10MobileIronBlackberry Value-Added ServicesAdvanced TroubleshootingAdvanced TroubleshootingControl Cost and QualityControl Cost and QualityEmployee Self-GovernanceEmployee Self-GovernanceAdvanced Help Desk & App Mgmt tools •Provision at scale•Configure and secure devices•Obtain real-time inventory•Determine operational & security state of devices•Revoke enterprise resources and settingsReal-time Business Intelligence•Activity analysis (voice, SMS, data traffic)•Generate alerts based on Telecom policy (minutes usage and International roaming)•Report performance and dropped calls on map•Billing plan integration Employee Self-Portal •Employee Self-registration•Up-to-date view of usage by end user•Enterprise App Store•SMS search and history•Enterprise sociograph•Find-my-phone mapping11MobileIronFull MDM Services for WinMO, & SymbianSmartphone Mission ControlSmartphone Mission ControlControl Cost & Quality Control Cost & Quality Employee Self-governanceEmployee Self-governanceNext-Gen MobileDevice Management •Device Management•Remote Control/Access to


View Full Document

NU MSIT 458 - Mobile Device Management

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Mobile Device Management
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Mobile Device Management and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Mobile Device Management 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?