14
•SAM for Mobile Device Management Presenter Name

SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the

Embed Size (px)

Citation preview

•SAM for Mobile Device ManagementPresenter Name

of employees spend at least some portion of their time working outside their office.

Mobility is the new normal

annual growth rate for software as a service (SaaS) delivery model.

66% 30% 80%

of employees use personal devices for work purposes.

What’s driving change?

User Devices Apps Data IT

Top Concerns for Mobile Device Management

Security

Need to manage devices securely, providing access to needed apps and data

Need to protect organization from non-approved app use

Need the ability to selectively wipe corporate data from personal devices to prevent company data from getting into the wrong hands if stolen or employee leaves

Licensing OptimizationUsers may be accessing resources that they are not licensed for, putting the organization at risk of non-compliance

Struggle to understand what devices must be counted and how bring your own devices (BYOD) will affect licensing agreements

Exposure to higher security risks for data theft and leakage, particularly if the device is lost or stolen.

Compromised devices can act as a backdoor to the corporate network.

Properly covering employee-owned devices while minimizing licensing costs employee-owned devices

Simplifying license management while enabling easier ways to track and support compliance

…leading to these top BYOD security risks for the organization

Defining a security policy

Enforcing security policies

Information on devices

Interactions with the cloud

Unmanaged connections to the internal network

Impact of Bring Your Own Devices (BYOD)

BYOD is here to stay…67% of people who use a smartphone for work and 70% of people who use a tablet for work choose the devices themselves

How SAM helps support Mobile Device Management

Leverage mobility to increase your competitive advantage

Increase productivity and security while controlling costs

Be informed: know who is using what and how

Tailor your mobility strategy to meet your organizational needs

Align licensing to actual usage

Become empowered to make the right decisions for the organization with an accurate picture of mobile device use.

MDM SAM Engagement: Step 1

Gather preliminary information about the existing environment, future goals, and security concerns

Organizational Profile

Security Considerations

Operations

Current Licensing Programs

Mobile Device Use

Basic information about the organization

People

Infrastructure

MDM SAM Engagement: Step 2

After establishing an organization’s goals and objectives, the next step is to complete a software review…

Inventory deployed software

Match installations with licenses

...build a detailed report on your current state

Microsoft

MDM SAM Engagement: Step 3

A security assessment of your IT organization will be conducted.

An assessment will determine your current status using generally accepted security controls. The assessment will cover topics such as: Mobile Device and Application Management Mobile Device SecurityMobile Application Security

We will also discuss best ways to balance trade-offs between security controls and usability.

Deployment Considerations

Selecting the right management platform now includes looking at how well it matches your mobile device management needs and objectives for the organization.

Licensing Considerations

User Device Location

Is the user covered by the Microsoft Core Client Access License (CAL) Suite or the Microsoft Enterprise CAL Suite on a per-user basis?

Is the user the single primary user* of the device?

Can the organization easily identify the primary user of the device?

Is the device covered by the Core CAL Suite or Enterprise CAL Suite on a per-device basis?

Is the device running a qualified Microsoft operating system?

Is the device a “qualified device” or a “qualified third-party device”?

Is the device accessing a virtual desktop infrastructure (VDI)?

Is the device owned by the employee or the organization?

Will the user access the software on the corporate premises (on-site)?

Will the user access the software remotely from outside of the corporate premises (off-site)?

Topics covered by SAM Policies and Processes

How much control do you want to maintain

over user-owned devices?

Example policy: The IT department reserves the right to approve accessibility or refuse connectivity for any personal devices that do not meet security and software requirements as defined by corporate policy.

What constitutes acceptable use of

corporate IT resources on user-

owned mobile devices?

How are devices authenticated?

What data and apps can users access?

What are the minimum security controls that are

required?

Can you identify the employees, vendors, and others accessing

organizational resources?

How effective is your security awareness

training?

The Path ForwardNow

Assess

How secure is the IT environment? What licensing is in place?

Mobile Devices

Management

Applications

Operations

Data

Dis

cuss

pro

gra

m &

next

steps

Organizational ObjectivesUnderstand the organization’s culture, and business goals and objectives they hope to achieve

InventoryCollect data on software deployments and gather additional information on the IT environment

Review & ValidateDetect what assets need to be protected and potential areas of risk.

DiscoverPlan

Pro

ject

sco

pin

g &

tech

nic

al

meeti

ng

Where do MDM improvement opportunities

exist?

Review

Are there any licensing issues

to discuss?

Next Steps and Q&A

Questions & AnswersWhat’s on your mind?

Next Steps1. Select project scoping

meeting date

2. Review and approve project plan

3. Get started