SlideShare a Scribd company logo
1 of 26
@Waterstonsltd
www.waterstons.com
Mobile Device Management
and BYOD – The Major Players
Charlie Hales and Ian Craggs
23rd May 2014
Agenda
@ Overview from previous seminars
@ Who are the Major Players?
@ Cisco Meraki
@ AirWatch Demo
Overview from Seminar 1
@ What is Mobile Device Management
@ Strategy
@ What is a Mobile Device?
@ Mobile Device Management vs Mobile Application Management
@ What is BYOD
@ What can MDM/BYOD do for business?
@ Where is your Data?
@ Acceptable usage policy
@ Defining the right solution from your requirements
Defining the right solution
@ What do you want to manage on the device?
@ Types of devices
@ PIN
@ Remote Wipe/Selective Wipe
@ Data
@ Apps
@ Device/App Encryption
Defining the right solution
@ What do you want to manage on the device?
@ Integration with enterprise
applications
@ Multi user profiles
@ Separation of personal and work
data
@ Internet access
@ Advanced features
@ Data usage
@ GPS tracking
Overview from Seminar 2
@ Use what you already have
@ Windows device possibilities
@ Exchange
@ SCCM overview
@ Intune
The Major Players
AirWatch
@ Recently purchased by VMWare
@ Market Leader
@ SaaS or on premise
@ Strengths
@ Enterprise integration
@ Secure Content Locker
@ Flexible pricing
@ Weaknesses
@ Direct implementation and post technical support
@ Some fragmentation across device types
MobileIron
@ One of the Market Leaders
@ Strengths
@ Good product development, launces and support
@ Usually first to market with integrated solutions
@ Proven vision and track record
@ Weaknesses
@ Mainly an on premise solution although a SaaS solution has been released
recently
@ Level 1 support direct with MobileIron
Citrix
@ If you already have an investment in Citrix this may be for you
@ One of the market leaders
@ Strengths
@ Strong, broad enterprise offering
@ Deep understanding of application and mobility needs across smartphones,
tablets, Macs and PC’s
@ Weaknesses
@ Pushing cloud a bit too much although also offers on premise
@ XenMobile only available through two licence options
@ Limited small/midsize business offering
Good Technology
@ In the leaders quadrant
@ Strengths
@ Security
@ Large Market share in Financial sectors, defence, public sector
@ Broad spectrum of management capabilities
@ Weaknesses
@ Sometimes negative user experience due to restrictions
@ Can be expensive compared to others
@ Mainly on premise solution (SaaS is available but very limited)
@ No integration with Blackberry unless purchased with BoxTone offering
Cisco Meraki
@ Started in 2006
@ Purchased by Cisco in 2012 for a small $1.6 billion
@ Cloud managed networking
Access Points
Switches
Firewalls
Cisco Meraki
@ Mobile Device Management
@ Strengths
@ Free to use!
@ No licence restriction, deploy to as many as you like!
@ Support Windows, iOS, Android, OS X, Chrome
@ Weaknesses
@ Limited features compared to other MDM vendors
@ IT resourceful when rolling out to a large number of mobile devices
Cisco Meraki
@ Deployment
@ IOS & Android Devices
@ Go to m.meraki.com and enter your unique enrolment number
@ Download the Meraki SM app
@ Using the Apple Configurator (iOS only)
@ Email/SMS the registration URL and enrolment number
@ Windows Devices
@ Download and install Windows installer (MSI)
@ OS X
@ Download PKG package and install
@ Go to m.meraki.com and enter your unique enrolment number
@ Chrome
@ Enable API on the Chrome OS device
@ Link with your Google account
Cisco Meraki
@ Windows Management
Cisco Meraki
@ Windows Management
@ Process list – Kill a process
@ Remote command line utility
@ Screenshot an end users screen
@ Remote Desktop
@ Power control – Reboot/Shutdown
@ Send notification
@ Software inventory and remote uninstall of an application
Cisco Meraki
@ IOS/Android Management
Cisco Meraki
@ Out of the box, device management
Cisco Meraki
@ Any other features? Yes!
@ Create policies for;
@ Application management
@ Enable a passcode
@ Disable webcam
@ Disable Siri, FaceTime, iMessage (iOS only)
@ Deploy WIFI and/or VPN settings
@ Geofencing….!
@ Alert if a device has gone beyond a specified boundary based upon its GPS location
or AP authentication
Cisco Meraki
@ In Summary
@ No MDM deployed in your corporate network? Meraki MDM is better then
nothing! Plus its free! And everyone loves free stuff
@ When used with its cloud managed networking, MDM provides a greater
level of visibility of your network
@ Well developed product for IOS devices but limited for other devices
@ Large IT overhead deploying MDM agent across a large number of devices?
@Waterstonsltd
www.waterstons.com
Airwatch Demo
Summary
@ Define requirements first
@ System fundamentals
@ What devices will be used
@ Use what you already have if possible?
@ Who are the Major Players?
@ Cisco Meraki
@ AirWatch Demo
Upcoming Events….
@ Office 365 – Cloud or no, you should know how it will shape your
organisations future. Friday 6th June 11.45am.
@ Beyond Intelligence: The Business Insights Maturity Model. Friday
20th June, 11.45am.
@ http://www.waterstons.com/Events/
@Waterstonsltd
www.waterstons.com
Questions?
Keep in Touch….
charlie.hales@waterstons.com
Ian.craggs@waterstons.com
http://www.waterstons.com
@WaterstonsLtd

More Related Content

What's hot

Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device ManagmentMTG IT Professionals
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
Mobile device management
Mobile device managementMobile device management
Mobile device managementMalin De Silva
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 

What's hot (20)

Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
BYOD
BYODBYOD
BYOD
 

Similar to Mobile device management and byod – major players

Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesJorge Gil Peña
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefNuno Alves
 
Distributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdfDistributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdfTerry Power
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystmfrancis
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesJPINFOTECH JAYAPRAKASH
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphoneschennaijp
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiJoachim Ritter
 

Similar to Mobile device management and byod – major players (20)

Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
Distributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdfDistributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdf
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
cloudcomputing(bashu).ppt
cloudcomputing(bashu).pptcloudcomputing(bashu).ppt
cloudcomputing(bashu).ppt
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGi
 

More from Waterstons Ltd

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Waterstons Ltd
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike WaterstonWaterstons Ltd
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraWaterstons Ltd
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project ManagerWaterstons Ltd
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond IntelligenceWaterstons Ltd
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...Waterstons Ltd
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...Waterstons Ltd
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...Waterstons Ltd
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessWaterstons Ltd
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...Waterstons Ltd
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for EnterpriseWaterstons Ltd
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementWaterstons Ltd
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The CloudWaterstons Ltd
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationWaterstons Ltd
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime CommunicationsWaterstons Ltd
 

More from Waterstons Ltd (16)

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike Waterston
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint Era
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project Manager
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond Intelligence
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications Success
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for Enterprise
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service Management
 
Mobile for business
Mobile for businessMobile for business
Mobile for business
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The Cloud
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime Communications
 

Recently uploaded

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Mobile device management and byod – major players

  • 1. @Waterstonsltd www.waterstons.com Mobile Device Management and BYOD – The Major Players Charlie Hales and Ian Craggs 23rd May 2014
  • 2. Agenda @ Overview from previous seminars @ Who are the Major Players? @ Cisco Meraki @ AirWatch Demo
  • 3. Overview from Seminar 1 @ What is Mobile Device Management @ Strategy @ What is a Mobile Device? @ Mobile Device Management vs Mobile Application Management @ What is BYOD @ What can MDM/BYOD do for business? @ Where is your Data? @ Acceptable usage policy @ Defining the right solution from your requirements
  • 4. Defining the right solution @ What do you want to manage on the device? @ Types of devices @ PIN @ Remote Wipe/Selective Wipe @ Data @ Apps @ Device/App Encryption
  • 5. Defining the right solution @ What do you want to manage on the device? @ Integration with enterprise applications @ Multi user profiles @ Separation of personal and work data @ Internet access @ Advanced features @ Data usage @ GPS tracking
  • 6. Overview from Seminar 2 @ Use what you already have @ Windows device possibilities @ Exchange @ SCCM overview @ Intune
  • 8. AirWatch @ Recently purchased by VMWare @ Market Leader @ SaaS or on premise @ Strengths @ Enterprise integration @ Secure Content Locker @ Flexible pricing @ Weaknesses @ Direct implementation and post technical support @ Some fragmentation across device types
  • 9. MobileIron @ One of the Market Leaders @ Strengths @ Good product development, launces and support @ Usually first to market with integrated solutions @ Proven vision and track record @ Weaknesses @ Mainly an on premise solution although a SaaS solution has been released recently @ Level 1 support direct with MobileIron
  • 10. Citrix @ If you already have an investment in Citrix this may be for you @ One of the market leaders @ Strengths @ Strong, broad enterprise offering @ Deep understanding of application and mobility needs across smartphones, tablets, Macs and PC’s @ Weaknesses @ Pushing cloud a bit too much although also offers on premise @ XenMobile only available through two licence options @ Limited small/midsize business offering
  • 11. Good Technology @ In the leaders quadrant @ Strengths @ Security @ Large Market share in Financial sectors, defence, public sector @ Broad spectrum of management capabilities @ Weaknesses @ Sometimes negative user experience due to restrictions @ Can be expensive compared to others @ Mainly on premise solution (SaaS is available but very limited) @ No integration with Blackberry unless purchased with BoxTone offering
  • 12.
  • 13. Cisco Meraki @ Started in 2006 @ Purchased by Cisco in 2012 for a small $1.6 billion @ Cloud managed networking Access Points Switches Firewalls
  • 14. Cisco Meraki @ Mobile Device Management @ Strengths @ Free to use! @ No licence restriction, deploy to as many as you like! @ Support Windows, iOS, Android, OS X, Chrome @ Weaknesses @ Limited features compared to other MDM vendors @ IT resourceful when rolling out to a large number of mobile devices
  • 15. Cisco Meraki @ Deployment @ IOS & Android Devices @ Go to m.meraki.com and enter your unique enrolment number @ Download the Meraki SM app @ Using the Apple Configurator (iOS only) @ Email/SMS the registration URL and enrolment number @ Windows Devices @ Download and install Windows installer (MSI) @ OS X @ Download PKG package and install @ Go to m.meraki.com and enter your unique enrolment number @ Chrome @ Enable API on the Chrome OS device @ Link with your Google account
  • 17. Cisco Meraki @ Windows Management @ Process list – Kill a process @ Remote command line utility @ Screenshot an end users screen @ Remote Desktop @ Power control – Reboot/Shutdown @ Send notification @ Software inventory and remote uninstall of an application
  • 19. Cisco Meraki @ Out of the box, device management
  • 20. Cisco Meraki @ Any other features? Yes! @ Create policies for; @ Application management @ Enable a passcode @ Disable webcam @ Disable Siri, FaceTime, iMessage (iOS only) @ Deploy WIFI and/or VPN settings @ Geofencing….! @ Alert if a device has gone beyond a specified boundary based upon its GPS location or AP authentication
  • 21. Cisco Meraki @ In Summary @ No MDM deployed in your corporate network? Meraki MDM is better then nothing! Plus its free! And everyone loves free stuff @ When used with its cloud managed networking, MDM provides a greater level of visibility of your network @ Well developed product for IOS devices but limited for other devices @ Large IT overhead deploying MDM agent across a large number of devices?
  • 23. Summary @ Define requirements first @ System fundamentals @ What devices will be used @ Use what you already have if possible? @ Who are the Major Players? @ Cisco Meraki @ AirWatch Demo
  • 24. Upcoming Events…. @ Office 365 – Cloud or no, you should know how it will shape your organisations future. Friday 6th June 11.45am. @ Beyond Intelligence: The Business Insights Maturity Model. Friday 20th June, 11.45am. @ http://www.waterstons.com/Events/

Editor's Notes

  1. Security, including FIPS 140-2 crypto libraries, end-to-end Advanced Encryption Standard (AES) encryption, multiple-factor authentication and multiple certificate management systems. Broad spectrum of management capabilities, including application security and management functions, offered through Good Dynamics and AppCentral, and Good Share for file synchronization and sharing, integrated with email (as a result of the Copiun acquisition).
  2. Manage all your network devices all over the world from a “single pain of glass”