sam for mobile device management presenter name. of employees spend at least some portion of their...
TRANSCRIPT
of employees spend at least some portion of their time working outside their office.
Mobility is the new normal
annual growth rate for software as a service (SaaS) delivery model.
66% 30% 80%
of employees use personal devices for work purposes.
Top Concerns for Mobile Device Management
Security
Need to manage devices securely, providing access to needed apps and data
Need to protect organization from non-approved app use
Need the ability to selectively wipe corporate data from personal devices to prevent company data from getting into the wrong hands if stolen or employee leaves
Licensing OptimizationUsers may be accessing resources that they are not licensed for, putting the organization at risk of non-compliance
Struggle to understand what devices must be counted and how bring your own devices (BYOD) will affect licensing agreements
Exposure to higher security risks for data theft and leakage, particularly if the device is lost or stolen.
Compromised devices can act as a backdoor to the corporate network.
Properly covering employee-owned devices while minimizing licensing costs employee-owned devices
Simplifying license management while enabling easier ways to track and support compliance
…leading to these top BYOD security risks for the organization
Defining a security policy
Enforcing security policies
Information on devices
Interactions with the cloud
Unmanaged connections to the internal network
Impact of Bring Your Own Devices (BYOD)
BYOD is here to stay…67% of people who use a smartphone for work and 70% of people who use a tablet for work choose the devices themselves
How SAM helps support Mobile Device Management
Leverage mobility to increase your competitive advantage
Increase productivity and security while controlling costs
Be informed: know who is using what and how
Tailor your mobility strategy to meet your organizational needs
Align licensing to actual usage
Become empowered to make the right decisions for the organization with an accurate picture of mobile device use.
MDM SAM Engagement: Step 1
Gather preliminary information about the existing environment, future goals, and security concerns
Organizational Profile
Security Considerations
Operations
Current Licensing Programs
Mobile Device Use
Basic information about the organization
People
Infrastructure
MDM SAM Engagement: Step 2
After establishing an organization’s goals and objectives, the next step is to complete a software review…
Inventory deployed software
Match installations with licenses
...build a detailed report on your current state
Microsoft
MDM SAM Engagement: Step 3
A security assessment of your IT organization will be conducted.
An assessment will determine your current status using generally accepted security controls. The assessment will cover topics such as: Mobile Device and Application Management Mobile Device SecurityMobile Application Security
We will also discuss best ways to balance trade-offs between security controls and usability.
Deployment Considerations
Selecting the right management platform now includes looking at how well it matches your mobile device management needs and objectives for the organization.
Licensing Considerations
User Device Location
Is the user covered by the Microsoft Core Client Access License (CAL) Suite or the Microsoft Enterprise CAL Suite on a per-user basis?
Is the user the single primary user* of the device?
Can the organization easily identify the primary user of the device?
Is the device covered by the Core CAL Suite or Enterprise CAL Suite on a per-device basis?
Is the device running a qualified Microsoft operating system?
Is the device a “qualified device” or a “qualified third-party device”?
Is the device accessing a virtual desktop infrastructure (VDI)?
Is the device owned by the employee or the organization?
Will the user access the software on the corporate premises (on-site)?
Will the user access the software remotely from outside of the corporate premises (off-site)?
Topics covered by SAM Policies and Processes
How much control do you want to maintain
over user-owned devices?
Example policy: The IT department reserves the right to approve accessibility or refuse connectivity for any personal devices that do not meet security and software requirements as defined by corporate policy.
What constitutes acceptable use of
corporate IT resources on user-
owned mobile devices?
How are devices authenticated?
What data and apps can users access?
What are the minimum security controls that are
required?
Can you identify the employees, vendors, and others accessing
organizational resources?
How effective is your security awareness
training?
The Path ForwardNow
Assess
How secure is the IT environment? What licensing is in place?
Mobile Devices
Management
Applications
Operations
Data
Dis
cuss
pro
gra
m &
next
steps
Organizational ObjectivesUnderstand the organization’s culture, and business goals and objectives they hope to achieve
InventoryCollect data on software deployments and gather additional information on the IT environment
Review & ValidateDetect what assets need to be protected and potential areas of risk.
DiscoverPlan
Pro
ject
sco
pin
g &
tech
nic
al
meeti
ng
Where do MDM improvement opportunities
exist?
Review
Are there any licensing issues
to discuss?