ENTERPRISE MOBILITY. IT CONSUMERIZATION Social Media Cloud Services Mobile Devices

  • Published on

  • View

  • Download

Embed Size (px)


  • Slide 1
  • Slide 2
  • IT CONSUMERIZATION Social Media Cloud Services Mobile Devices
  • Slide 3
  • Slide 4
  • Slide 5
  • THE BIG IDEA One will be able to communicate, collaborate with business colleagues, agents and clients, As well as access corporate computing and data resources securely on a mobile device with a seamless user experience
  • Slide 6
  • Social Collaboratio n CRM Content Management Mobile Administration Android Enterprise Mobility Mobile Office Architecture Mobile busines s Objects Emails, Calendar, CRM, Project BI/Analytics, Video/Audi o Business appsBusiness apps
  • Slide 7
  • Slide 8
  • OFFICE-ON-THE-GO Mobile Virtualization
  • Slide 9
  • DESIGN SOLUTION A multi-layered approach Outer ideals are built upon inner requirements BYO D M V MAM MIM MDM
  • Slide 10
  • WHY BYOD? $avings Leverage the power of consumerization in mobile tech Convenience and Productivity of Employees Increasing pace of innovation Hardware becomes obsolete at a faster pace New capabilities added often BYOD
  • Slide 11
  • Slide 12
  • MOBILE VIRTUALIZATION- AN ENABLING TECHNOLOGY Standard platform on heterogeneous devices Secure employee-owned devices connecting to company network. and accessing corporate resources. Manage and provision all mobile end-points and desktop from a single interface. Mobile Virtualizatio n
  • Slide 13
  • MOBILE VIRTUALIZATION ADVANTAGES Integrate with Your Infrastructure Broad Hardware Support Broad Application Support Lowest Total Cost of Development Use existing applications Develop future apps for a single environment An ever-increasing concern with the pace of technological innovation and fragmentation Lowest Total Cost of Management Heterogeneous devices centrally managed as a single platform
  • Slide 14
  • MOBILE ADMINISTRATION Any mobile solution must address these core requirements of mobile administration: MDM MAM MIM
  • Slide 15
  • MDM Mobile Device Management Policy enforcement and management Access control policies specify rules about which users can authenticate to a device and perform operations on that device Password requirements on devices Inventory management Registering devices, assigning devices to groups, centralized dashboard reporting and billing tracking MDM MAM MIM
  • Slide 16
  • Mobile Information Management Security management Creates a secure sandbox around sensitive dataaround sensitive data Data exists separately from private information and apps Data is protected at rest with encryption, data is protected in transit, and data access is controlled so only work apps can access enterprise data. Allows only approved applications to access or transmit data MDM MAM MIM
  • Slide 17
  • Mobile Application Management Controls which users can access which applications on which devices Maintain security and infrastructure integrity through application blacklisting and whitelistingblacklistingwhitelisting All applications selected and managed centrally Security and consistency is ensured MDM MAM MIM
  • Slide 18
  • TYING IT ALL TOGETHER VMWare Horizon Mobile Manager & Windows Ecosystem An MDM approach to BYOD that goes BeYOnD MDM Extends naturally to MAM & MIM, provided by virtualized platform (Mobile OS) of choice
  • Slide 19
  • HORIZON MOBILE MANAGER A USERS PERSPECTIVE Running VMware MVP makes subtle changes to the Android OS interface. Android phones notification bar: youll see events for two mobile virtualization partitions both the work and personal data. Appear in different colors to differentiate between the events that occur in each partition. When you respond to a notification, the Mobile Virtualization Platform hypervisor intelligently switches the phone to the appropriate partition and application.
  • Slide 20
  • HORIZON MOBILE MANAGER Initially Android-only, now on iOS IT administrators will be able to create an iOS workspace, which is a collection of applications and data and services, set policies on that workspace and be able to secure and manage it Unmodified native iOS apps can be added to the workspace and they will automatically inherit the security policies defined by IT Android and iOS powered 85% of all smartphones shipped in the second quarter of 2012 (2Q12) (IDC)
  • Slide 21
  • WINDOWS ECOSYSTEM In the business world, Microsoft is a mature and proven technology.
  • Slide 22
  • COMMUNICATION FEATURES Email, contacts, calendar, and tasks Outlook Lync Calendar
  • Slide 23
  • SOCIAL COLLABORATION As of September 2012, Facebook has over one billion active users,one billion active more than half of them using Facebook on a mobile device.mobile device
  • Slide 24
  • CONTENT MANAGEMENT Sharepoint (inhouse) Office 365 + Skydrive (off-premise/cloud options)
  • Slide 25
  • MOBILE ADMINISTRATION MDM Several ways to wiping or locking a phone in the case of security breach InTune + System Center 2012 MAM Company Hub Blacklist and Whitelisting of applications Sideloading*** of preselected apps MIM IRM (Information Rights Management)
  • Slide 26
  • Slide 27
  • ASSESSMENT User Experience Scalability Security Speed to Market Cost Productivity
  • Slide 28
  • Slide 29
  • COMPARISON WITH CITRIX In the Citrix approach your business apps will sit side by side with your personal apps.(MAM) could be legal issues for companies that want to remote wipe a device In the VMware approach they are completely separate environments.(MDM) Businesses could also play for a phone/data plan that is only used if you are on the business side thus allowing a separate phone/data plan for the personal side
  • Slide 30
  • TCO external costs are the more obvious, but enterprises that let employees expense their service plans need to factor in the loss of bulk buying plans from the carriers. The internal costs are more opaque and can include: mobile device management and security software, wireless networks and access control systems, help desk and IT operations, and general IT, administration and training. BoxTone estimates that these costs total $1,500 per user per year.
  • Slide 31
  • ROI Productivity employees tend to work more hours when a BYOD policy is implemented. Good Technology estimates that the average employee works seven more hours per week social media tools could add as much as $1.3 trillion to the U.S economy if fully embraced, increasing knowledge worker productivity by an average of 20 to 25 percentsocial media tools improved communication and collaboration benefits cited in the report can be powerfully driven by mobility
  • Slide 32


View more >