28
Analyst Briefing September, 2012 Graham Chalk Sr. Product Manager

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss

Embed Size (px)

Citation preview

Page 1: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

Analyst BriefingSeptember, 2012

Graham ChalkSr. Product Manager

Page 2: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

Managed Mobility Services (MMS)

Page 3: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

3

The Future Friendly Enterprise is our brand promise to large businesses across Canada and highlights our commitment to collaborate with customers to deliverthe right solutions to businesses with complex technology needs.

Page 4: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

4

What Guides Us: The Trends Trends and technological innovations that are revolutionizing

the way employees work – and the way customers expect their services to be delivered

– Consumerization of IT

– Changing Work Styles

– Beyond the Firewall

– Changing Customer Expectations

These trends are inextricably linked to our customers’ success and therefore drive our enterprise strategy. We MUST, therefore, keep them top-of-mind as we evolve

Page 5: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

5

Enterprise Trends – Linkage to Mobility

Enterprise Trends Linkage to Mobility Trends

1. Consumerization of IT Growth of Bring-Your-Own-Device programs

2. Changing workstyles Growth of Mobile / Work-at-home workers

3. Beyond the firewall Minimizing risk of data loss on Mobile devices

4. Changing customer expectations Growing importance of Mobile user support

Page 6: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

6

Enterprise Mobile Trends

Tablet / New Smartphone

growth

Bring-Your Own-Device

BYOD&

CYOD

Mobile Device

Application growth

Mobile Device

Control & Security

Page 7: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

7

Trend: Tablet & New Smartphone growthApple (Q4 2011): More iPads were sold than any single manufacturer sold PC’s. 65% year-over-year (‘10-’11) growth in B2B markets.

Business Impact: End user device choice =

Happy productive employees Mounting cost of IT / Help

Desk staff training / retaining

Business Issue: Employee satisfaction /

productivity a key priority Lack of IT / Help Desk

experience with new devices like iPhone / iPad

TELUS Managed Mobility Services (MMS) Help Desk supports new mobile devices, including iOS, Android, Windows Managing the mobile platforms that support these devices

Page 8: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

8

Trend: Consumerization & BYODFact: Majority of Enterprise employees are using their own technology for work purposes.

Business Impact: Executive (iPad / iPhone)

trickle down effect Most Enterprises still have

BYOD questions including: Which devices? Who’s responsible? Who pays? How to minimize risk? How to deliver support? How to control costs?

Business Issue: How to approach

BYOD/CYOD in the Enterprise

Which flavor of BYOD is the best fit for a given Enterprise

TELUS Managed Mobility Services (MMS) Help you build an Enterprise Mobility

Program (EMP) including: Current state assessment MDM evaluation / recommendation Mobile policy development BYOD program design

Page 9: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

9

Trend: Bring-Your Own-Device (BYOD) con’tFact: IT’s workload increases significantly as employees bring their own devices to work.

Business Impact: BYOD could be chaotic

Right technologies selected? Integrated processes? People trained / retained?

Corporate & personal liability Policy & Process to wipe device

BYOD is bigger than you think, incomplete plan = cost overruns

Business Issue: IT without a BYOD plan:

Managing the technology Building the processes Hiring experienced people

Concern with corporate & personal data on one device

IT / Finance require budget certainty for new projects

TELUS Managed Mobility Services (MMS) Help design the technology, policy, procedures, and bus. case for BYOD Offload the burden and security risks to manage it from E2E.

Page 10: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

10

Trend: Mobile Device Application GrowthFact: Majority of IT priorities are now related to increased SmartPhone adoption and/or mobile application support

Business Impact: Right apps for right users will

increase mobile productivity Risks, if apps not controlled

User access to apps Apps data out in the wild

Complexity of IT compounding More devices, platforms, apps Growth of BYOD.

Business Issue: How do we harness the

value of mobile apps? If we go BYOD, won’t

users have access to personal and corporate apps on one device?

TELUS Managed Mobility Services (MMS) Ensure right apps are preloaded and setup for users, right out of the box Ensure users can only access permitted apps by leveraging your MDM

Page 11: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

11

Trend: Mobile Device Control & SecurityTELUS / Vox Mobile research (2012): 17% of Enterprise have MDM in place, while 83% are still budgeting / learning / evaluating MDM.

Business Impact: Balance: IT control & risk to

org with user productivity Enterprise IT / Help Desk

skills / resources to manage MDM + support users

Should Enterprise focus on more strategic projects?

Business Issue: New IT definition

required for “control” on multiple platforms

New MDM platforms are new technologies -require significant Enterprise investment

TELUS Managed Mobility Services (MMS) Monitor manage your MDM servers allowing you to focus on business Help Desk agents trained on latest MDMs ensuring user productivity

*Note: Basic MDM control / security includes: device password enforcement, device wipe / lock, inventory management, jailbreak detection

Page 12: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

12

Trend: Mobile Device Control & Security con’tTELUS Rotman study (2011): Loss of a phone containing corporate data is the top ranked Enterprise security concern.

Business Impact: Enterprise must balance

technology + people + process More than MDM. Consider:

Policy development / compliance / enforcement / management

Data loss prevention policy & process from lost / stolen devices

Network access policy & process (who has access to what)

Data privacy policy & process (corp. data on personal devices)

Business Issue: More focus than ever on

securing mobile devices MDM = basic IT control

and mobile security* If we go BYOD, won’t

users have access to personal and corporate data on one device?

*Note: Basic MDM control / security includes: device password enforcement, device wipe / lock, inventory management, jailbreak detection

Page 13: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

13

Enabling “IT to be the new Department of YES!”

More end-user choice - More device choice, including iOS and Android

Cost control – More cost-effective options for managing Mobile platforms

Operational efficiency - More efficient processes that are fully compliant

Risk reduction - Reduce the security risk and offload the IT burden

Page 14: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

14 - TELUS Restricted and Confidential

TELUS Enterprise Solutions approach to Managed Mobility

Support (appropriate support levels by end-user segment)

Security (policy management, network access controls, data loss prevention, data privacy)

Policy development (usage agreement, legal compliance, approved devices, TCO controls)

Technology alignment (MDM) and device choice (device types, device quantities, services, data)

End-user segmentation (job criticality, location, time sensitivity)

A Balanced Approach

Technology

Process + People

People

Technology + People

Process + People

Page 15: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

15

Why TELUS partnered with Vox MobileFocused on IT for mobility TELUS’ 20 years experience as a trusted provider of Managed Services Complement of Vox Mobile’s 7+ years, MDM vendor agnostic approach,

and focus on IT for mobility

Enterprise mobility experience Vox Mobile’s proven Enterprise Mobility Program (EMP) and blueprint Over 1000 MDM implementations, management of over 100,000 mobile

devices and 900 mobile platform servers, and 85% FCR for helpdesk

Recognized MMS provider Vox Mobile ranked by Gartner as one of only 12 global experts in

managed mobility, 2nd highest rating “product viability”

Together we have the experience, facilities and systems to deliver managed mobile solutions for enterprises with complex needs

Page 16: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

16 - TELUS Restricted and Confidential

What are Managed Mobility Services?

Clear answers

Freedom to focus

Tools you can use

MMS Advise™Which MDM do I choose? How do we do BYOD? Is our corporate data at risk? How will we know?

MMS Acquire™I don’t want to be a mobile phone order shop. Isn’t there a tool our employees could use themselves?

MMS Adapt™How do I get the right device to the right person with everything they need already on it?

MMS Administer™It’s hard to maintain the Technical expertise. I wish someone could just manage our MDM server for us.

MMS Assist™How will we keep up if we go BYOD? There are so many devices for our Help Desk to support.

MMS Analyze™How do we make sense of all our mobility expenses? Finance wants to break it down to the user level.

Page 17: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

17 - TELUS Restricted and Confidential

TELUS MMS, powered by Vox Mobile

A complete selection of individual yet integrated modules customized to an Enterprise client’s (500+ employees) unique needs:

MMS Advise : Analysis of your needs & an enterprise-wide strategy MMS Acquire: Custom portal to funnel all purchases through a single interface MMS Adapt : Configuration and set-up of devices before delivery MMS Administer: 24/7 monitoring and management of your mobile servers MMS Assist : 24/7 single point of contact Help Desk for issues and requests MMS Analyze : Comprehensive expense management services

Page 18: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

18 - TELUS Restricted and Confidential

TELUS MMS Overview - 3 phases

We assume all the tasks and activities associated with managing your enterprise’s mobile devices from procurement to payment.6 individual yet integrated modulesdelivered over 3 phases:

Strategic Analysis - A structured fast-track engagement analyzes your current mobile needs, provides options and recommends solution.

Program Implementation - A fully managed implementation program, from identifying user requirements to provisioning platforms.

Ongoing Management - A 24/7 single point of contact for all your mobile needs to optimizing mobile server performance and managing invoices.

Page 19: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

19 - TELUS Restricted and Confidential

TELUS MMS Overview - MMS Advise™MODULE YOUR CHALLENGES WHAT WE DELIVER

MMS Advise™

Employees want more mobile device choice, but IT isn’t sure how to best deliver it

IT trying to select an MDM platform, but lack the expertise

Enterprise lacks an end-to-end Mobile IT strategy

Analysis of your currentneeds: user segments, policy, process, devices, MDM platform, applications, support.

End-to-end mobile solution strategy to begin the transformation

Page 20: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

20 - TELUS Restricted and Confidential

TELUS MMS Overview - MMS Advise™Enterprise Mobility Workshop: Jump Start your Enterprise Mobility Program (EMP) with a

series of workshops designed to set your strategy and objectives. Choice of workshops specific to your needs: Tablets, Mobile

applications, Risk assessment, and BYOD (Bring Your Own Device).

Transformation and Design (T&D): Collaboration with your operational teams to assist you in

building an Enterprise Mobility Program (EMP) including one or more of: Current state assessmentMDM platform evaluation and recommendationMobile policy and policy communications planMobile risk assessmentMobile program blueprint & roadmap BYOD program design

Page 21: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

21 - TELUS Restricted and Confidential

TELUS MMS Overview - MMS Acquire™MODULE YOUR CHALLENGES WHAT WE DELIVER

MMS Acquire™

Inefficient processes for mobile device Moves / Adds / Changes / Deletions (MACD)

Lack of MACD service levels(e.g. guaranteed response time for request completion)

Too many points contact for service and support

Dedicated portal to funnel your purchases and service requests through a single interface

Process to enforce corporate policies, determine eligibilities and provide enhanced reporting

Coordination by TELUS across different systems / providers

Page 22: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

22 - TELUS Restricted and Confidential

TELUS MMS Overview - MMS Adapt™MODULE YOUR CHALLENGES WHAT WE DELIVER

MMS Adapt™

New mobile devices are not setup / ready for users out of the box

IT requires that certain applications are only available for certain users

Lack of resources / expertise for end-to-end device deployments

Policy enforcement to get right device / apps to right employee

Management of large scale mobile device deployments

End-to-end deployment expertiseincluding procurement, provisioning, configuration, bundling, shipping and support

Page 23: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

23 - TELUS Restricted and Confidential

TELUS MMS Overview - MMS Administer™MODULE YOUR CHALLENGES WHAT WE DELIVER

MMS Administer™

Lack of expertise with new mobile platform technology

Limited operating / capital budgets to grow IT

Desire for IT department to focus on more strategic initiatives

24/7 monitoring / incident ticketing for 1 of 8 leading MDMs

MDM server management** including proactive implementation of updates, patches, bug fixes

Cloud based or on-site solutions that ensure optimal performance and deliver the security you require

Combining TELUS MMS Administer with TELUS Hosting capabilities provides a complete outsourced solution.

Page 24: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

24 - TELUS Restricted and Confidential

TELUS MMS Overview - MMS Assist™MODULE YOUR CHALLENGES WHAT WE DELIVER

MMS Assist™

Too many points of contact for service and support (both IT and users)

Support / Operationsunable to handle the support calls related to expanding device and services market

24/7 SPOC Help Desk supporting all your mobile users and devices

Dedicated toll-free number that can be integrated with your current support desk IVR

Agents trained on the latest technologies and internal processesused by your organization

Customer Policies

Resources & Processes

Diverse Knowledge

Page 25: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

25 - TELUS Restricted and Confidential

TELUS MMS Overview - MMS Analyze™MODULE YOUR CHALLENGES WHAT WE DELIVER

MMS Analyze™

Enterprise mobile usage costs not broken down to the user level

Incomplete view of mobile spending not allowing Enterprise to make more informed business decisions

Comprehensive wireless expense management service to analyze your mobile usage with TELUS making changes on your behalf

Enterprise-wide view of mobility spending across carriers

Analysis and reporting to reduce costs and optimize spending

Page 26: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

26

For more information

www.telus.com/mms

Page 27: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Page 28: Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss

28 - TELUS Restricted and Confidential

Mobile LayersPolicy

Policy

Polic

yPolicy

Process

Process

Proc

ess

Process

Internet / Cloud(external / internal requirements)

Infrastructure(wire and wireless network, corporate and legacy systems)

Application(web apps, APIs, certificates, interfaces with corporate systems)

Device Management(smart phones, tablets, laptops, MDM systems)

End user(Profiles, registration, access)

Corporate Data

Corporate Data

Cor

pora

te D

ata C

orporate Data