Thinking about an MDM Solution…Now What?
Wednesday, March 21, 2012
11:20AM - Noon EDT www.temia.org
The views expressed in this presentation are meant to reflect the majority of our
members, but they may not be reflective of all members.
TEMIA Member Companies
Today’s Speakers
4
Erik M. Eames
Managing Director
Wireless Analytics
978-762-0900 x111 office
603-817-6300 cell
Fernando M. Oliveira
VP of Client Services
Wireless Analytics
978-762-0900 x115 office
978-360-1040 cell
About TEMIA n The purpose of TEMIA is to promote the value of TEM
through education and marketing
n TEMIA’s mission is to expand the size of the TEM market globally and develop open industry standards to augment service quality and performance
n Members work together for growth of the industry while still competing for business
5
Mobile Device Management n The explosion of mobile devices and operating systems
have changed the rules of the game for the enterprise. q Device Management q Device Security q Employee Mobile Productivity q Device Provisioning q Ongoing Mobility Support
n Companies that offer MDM solutions have multiplied as smartphones have flooded the enterprise.
6
AirWatch Good Technology Mobile Iron Blackberry Enterprise Server HP Mobiquant Technologies Boxtone IBELEM NoDfy Technology Capricode JAMF SoIware Pointsec Mobile Security CommonTime Kaspersky Odyssey SoIware Dell LANDesk Smith Micro SoIware Excitor MaaS360 SOTI F-‐Secure Mcafee Sophos Mobile Control FancyFon SoIware MicrosoI Exchange. Sybase Afaria
Fixmo MformaDon Symantec Fromdistance Mobile AcDve Defense Zenprise
Selecting An MDM Solution n What is Mobile Device Management?
q It is more than just a piece of software q Enterprises need to approach an MDM Strategy from a holistic
approach: • Mobile Visibility – beyond security • Device Management – beyond remote wipe • Reporting – beyond active directory • Cost Management – beyond MDM license costs • Help Desk Support – beyond connectivity • Policy Management – beyond compliance
• MDM should address the complete security and oversight of a device inside an organization from selecting new devices, to provisioning, securing and managing existing devices, and finally to decommissioning end-of-life devices.
7
People, Process, Technology To develop and implement a successful MDM program, one should identify the key people, process and technology needed within your organization.
8
Level of Effort with MDM Solution
Mobile IT Resource Requirements
q The resources required to run a mobile IT offering are different from the resources traditionally required to run a desktop service.
q Mobile devices have little in common with desktop systems both in terms of technology, features, and user experiences.
q Mobile device expertise and skills are essential to deploying a successful MDM program.
q The roles recommended for successful enterprise-grade mobile IT services are listed below:
• Mobile System Engineer • Mobile Device Expert • Mobile Security Expert • Mobile Applications Developer
9
Level of Effort by Device OS
10
Platform/Devices Strengths Weaknesses Outlook
RIM: Blackberry
Offered by all US and international carriers Slow in reaching OS parity w/
competitors • Has suffered a dramatic loss
in market and mindshare. • Recent device and OS7
release has narrowed the gap between Apple and Android.
• The upcoming migration to QNX will be critical for the platform.
BES/Security In competition w/ Apple, Google,
and Microsoft
Device Pricing QNX Migration is risky and
"jerky"
User Friendly Keyboard, BMI Playbook has been a flop
Apple: iOS
Hardware and Software Design and Features Apple is overly controlling
• Meets most enterprise requirements.
Clear OS & Device Strategy Limited Device Selection
Minimal Malware
Security Encrytion. App Security.
Offered by all US and international carriers
Google: Android
Hardware and Software Design and Features
Has not met most security requirements
• Has surpassed Apple in innovation and time to market.
• Androids openness has been it's strength (and it's weakness (malware, OS fragmentation, no "corporate standard" device.
• At this time Google has not articulated a strategy to overcome corporate security concerns.
Relatively unified phone and table strategy Open model has lead to
increase in Malware
Multiple Device Types, sizes, shapes, etc OS and UI Fragmentation
Offered by all US and international carriers
App availability and minimal App requirements
4G Support
Microsoft: Windows Phone Innovative Software Design
Has met most enterprise security requirements
• The slowness to market, lack of carrier support, and Microsoft's lack of enterprise strategy have so far made Windows Phones an also-ran.
Limited Carrier Support
Strategic Partnership w/ Nokia Current Tablet strategy is weak
Live Polling Question
11
MDM Deployment Process n A successful MDM implementation should follow a careful
device deployment process.
q The Build and the Roll-Out phases are important, but the Sustain phase will determine the program success
q The solution should allow IT to configure, monitor, and control data & access on multiple OSs and devices
MDM Deployment Process Build Roll-Out Sustain
Device/OS Selection Device Provisioning End-user Management Solution Testing Device Registration and
Configuration Device Retirement
MDM Choice/Approval
12
Stakeholders & Resources Stakeholder
Responsibili;es
Es;mated Time Commitment
Execu;ve Sponsor
• Secure adequate funding for the program • Free up organiza;onal resources as necessary • Ensure stakeholders stay engaged • Approve business requirements and proposed solu;on • Develop business plan and jus;fica;on
Legal • Iden;fy and resolve regulatory compliance gaps and issues • Determine corporate vs. employee liability for devices and data • Review new/revised policies and end user agreements
Human Resources
• Create/revise privacy, en;tlement, and acceptable use policy and end user agreements • Produc;vity and efficiency improvements • Recruit staff needed to develop/maintain the BYOD program • Handle internal communica;ons and marke;ng of the program
Finance • Develop reimbursement/s;pend policy • Develop plan for telecom expense management • Nego;ate with carriers on pooled/discounted rates, early termina;on fee waivers, upgrade
allowances, number por;ng, unlocked devices, interna;onal roaming rates, value added services, bill on behalf of, account management
IT Security • Determine device security requirements, including: § Encryp;on § Password policy (PIN, ;meout, allowed failed aXempts) § Remote wipe § Security policy configura;on and enforcement § Data protec;on (data loss preven;on, data separa;on, data classifica;on, digital rights
management) § Policy enforcement (no;fy user, suspend/revoke access, remove corporate data, disciplinary
ac;on (with HR))
IT Opera;ons • Monitor costs to ensure program meets cost maintenance or reduc;on goals • Provide ;ered service offerings • Determine Help Desk vs. end user responsibili;es • Provide training for Help Desk and end users
13 A Successful MDM Program Requires Coordinating Among Many Stakeholders
MDM Implementation Checklist OrganizaDonal Commitment Please place an 'x' in the appropriate column Strong Moderate Weak Non-‐existent Comments Execu;ve-‐level sponsorship
Key stakeholder (decision-‐makers) commitment to project
Stakeholder consensus on goals
Stakeholder agreement to balance security/cost concerns with end user experience
Technical literacy of workforce
IT Readiness Please place an 'x' in the appropriate column Ready Planned None N/A Comments IT Resources
Device experts
Device tes;ng
Sufficient Staffing Please place an 'x' in the appropriate column Ready Planned None N/A Comments MDM Implementa;on
Design infrastructure: <list name(s)>
Implement infrastructure: <list name(s)>
Exchange Administrator: <list name(s)>
Network Administrator (FW and LB): <list name(s)>
PKI and Cer;ficate Administrator: <list name(s)>
Design processes: <list name(s)>
Documenta;on: <list name(s)>
Communica;ons: <list name(s)>
Training: <list name(s)>
Opera;ons and maintenance: <list name(s)>
Develop and implement device lifecycle process
Develop and implement new Help Desk processes
14
Wireless Analytics, LLC
MDM Program Implementation
n End-user communication is critical to program success q Welcome letter introducing the program to users. q Copy of the End User mobile device agreement. q Getting started instructions with a basic device tutorial and links
to online training resources. q Registration instructions for connecting devices to corporate
resources and configuring security. q FAQ and support guide for troubleshooting common problems
with links to support resources.
15
Mobile Security Policy
n It is important to review, update and communicate all critical aspects of an enterprise security policy when implementing an MDM solution q Device Security Policy q Encryption Security Policy q PIN Lock Policy q Application Security Policy q End-user Policy Awareness and Training
16
Mobility Strategies
q User preferences are starting to dictate device choice • Device capabilities, functions and applications • Needs to be flexible and adaptable to new solutions • High service availability • Protect Intellectual property and litigation rights to equipment • Minimize operating costs
q Cost of ownership is higher than expected • Infrastructure needed • Upgradability • Scalability • Single point of failure • Device support • MDM solution must meet the needs of the both IT and the employees
q Application management becomes more important • App Design and Governance
• Apps not appropriate on personal devices for security reasons • Policies will vary as will user expectations
• User prohibited from social apps on corporate device • User will NOT accept that type of policy on personal device
n Bring Your Own Device (BYOD)?
17
Summary - Best Practices
n Best practices for creating a successful MDM program should address a broad spectrum of challenges in order to increase program success:
q Balance security, compliance, legal liability, and cost concerns with a posi;ve user experience
q Engage stakeholders early and keep them involved throughout the project so that decisions can be made in a ;mely fashion
q Acquire and test all devices and OSs you are considering and only allow those that meet your requirements
q Build a team of experts that can support all aspects of the program – from implementa;on to ongoing maintenance
q Measure and demonstrate the results and value of the MDM program to the business and on the boXom line.
18
Complete Solution Mobility Management for Enterprises
Carrier Lifecycle Expense Analysis
19
Live Polling Question
20
Join TEMIA for Future Webinars n Plan Globally, Deliver Locally: Finding the Smart Balance
for Your Organization’s International Mobile and Fixed TEM Needs Register: http://tiny.cc/9i1hbw
n Participate in our Brief survey on billing: Enterprise: http://tiny.cc/czw3aw Solutions Providers: http://tiny.cc/42ehbw
n Learn More About Our Webinars Online
21