Enterprise Mobility Management EMM Rishabh Sinha MDM Team
Enterprise Mobility Management (EMM) Rishabh Sinha MDM Team 51610766
Content 1. 2. 3. 4. 5. 6. 7. 8. 9. What is EMM? History/ How it came to picture Uses/ mobility Stategy. Why is it becoming popular? MDM is not enough! MDM BYOD EMM other features(MAM, MCM, MEM) AIRWATCH vs other Venders.
What is an EMM? Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing the increasing array of mobile devices, wireless networks, and related services to enable broad use of mobile computing in a business context. What is meant by enterprise mobility? Enterprise mobility is the trend toward a shift in work habits, with more employees working out of the office and using mobile devices and cloud services to perform business tasks. The term refers not only to mobile workers and mobile devices, but also to the mobility of corporate data.
History/ How it came to picture? Five years ago the enterprise was dominated by Blackberry, formerly known as RIM. In 2010 Blackberry had 43% U. S. smartphone market share. The popularity of Blackberry in the business world created a pressing need for mobile device management (MDM), which was created to enable IT full access and control to manage employee mobile devices. MDM was broadly accepted in the early days of enterprise mobility when companies bought Blackberry phones for their employees en masse.
Overview. q Enterprise mobility management (EMM) is an all-encompassing approach to securing and enabling employee use of smartphones and tablets. In addition to addressing security concerns, a strong EMM strategy also helps employees be more productive by providing them with the tools they need to perform work-related tasks on mobile devices. q EMM typically involves some combination of mobile device management (MDM), mobile application management (MAM) and mobile content management (MCM). MDM focuses on locking down mobile devices, while MAM focuses on controlling which users can access which applications and MIM focuses on allowing only approved applications to access corporate data or transmit it.
Uses/ Mobility Stategy § Security § Email § Devices § Workspace § Apps § Browsing § Content § BYOD
Why?
Why is it becoming popular?
q Why EMM, Why not just MDM? ? MDM alone isn’t enough!!!
EMM vs MDM • When Bring Your Own Device (BYOD) was making a dramatic entrance with enterprises a few years ago, Mobile Device Management (MDM) seemed an effective counterbalance to the security concerns posed by the influx of new devices. But just a few short years later, it’s clear that MDM alone isn’t enough to address all the concerns in an enterprise mobility program. In response, the market has moved to a new acronym du jour, Enterprise Mobility Management (EMM). Where MDM limited admins to managing at a device level, EMM solutions expand the capabilities of IT to set up policies on an application and information level. And because it wouldn’t be business software if there weren’t an acronymed accompanying every single software feature, the terms describing EMM features are best divided into these categories: •
• Mobile Application Management (MAM) management of devices from application level, like putting a wrapper around an app or configuring how applications access information, both from the business network and from other apps on the device • Mobile Identity Management (MIM) functions like role-based access that apply context such as geo-fencing to determine not only who’s using the device, but also where they’re using it from • Mobile Content Management (MCM) oversight and control at a content level, which can include copy and paste restriction and access to business content repositories like Sharepoint
• Along with MDM, these three categories help articulate the broad reach of EMM for managing mobility. However, this multi-layered approach isn’t a concession to additional complexity, but rather a method for centralizing the management of mobile devices for IT admins.
Now, lets come to a very important aspect of EMM that is Mobile Device Management(MDM)
Mobile device management (MDM) is the administrative area dealing with deploying, securing, monitoring, integrating and managing mobile devices, such as smartphones, tablets and laptops, in the workplace. The intent of MDM is to optimize the functionality and security of mobile devices within the enterprise, while simultaneously protecting the corporate network.
Definition: Mobile device management software allows distribution of applications, software allows administrators to oversee mobile devices as easily as desktop computers and provides optimal performance for users. MDM tools should include application management, file synchronization and sharing, data security tools, and support for either a corporate-owned or personally owned device. data and configuration settings and patches for such devices.
Ideal, MDM
The ideal mobile device management tool: • • • Is compatible with all common hand held device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary. Can deploy next-generation hardware, operating platforms and applications quickly. Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.
MDM Challenges
MDM Challenges: • SECURITY & COMPLIANCE ENFORCEMENT • REDUCE SUPPORT COST OF MOBILE ASSETS • PROVIDE APPLICATION & PERFORMANCE MANAGEMENT • PROVIDE BETTER BUSINESS CONTINUITY • MAKE EMPLOYEES MORE PRODUCTIVE & MORE SATISFIED
From a Technology Perspective:
MDM from a Technology Perspective: • SOLUTIONS THAT PROVIDE COORDINATED VISIBILITY & CONTROL OVER ALL DEVICES & OPERATING SYSTEMS. • ENFORCE PASSCODE PROTECTION, ENCRYPTION, & SECURITY UPDATES • CONTROL NETWORK & APPLICATION SETTINGS • REMOTELY LOCATE, BLOCK, OR WIPE (FULL & SELECTIVE) DEVICES THAT HAVE BEEN LOST, STOLEN, OR ARE NO LONGER AUTHORIZED. • SECURE EMAIL, MESSAGING, & BROWSING • WHITELISTING & BLACKLISTING • BE EASY TO USE, CENTRALLY MANAGED, AND QUICK TO DEPLOY
Vendors
MDM Vendors in Market: • • MDM Considerations. Air. Watch by VMware. Amtel MDM. Black. Berry BES 10. • • CA Technologies MDM. Citrix Xen. Mobile. Dell EMM. Good Technology MDM.
BYOD, is new cost effective feature of EMM
What is the BYOD? Bring your own device (BYOD) is an IT policy where employees are allowed or encouraged to use their personal mobile devices—and, increasingly, notebook PCs—to access enterprise data and systems. There are four basic options, which allow: Unlimited access for personal devices.
Why Organizations prefer BYOD.
BYOD has the potential for big cost savings because organizations don't waste money on corporate phones. Plus, when an employee can work from and use a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity.
Risks involved.
What are the Concerns? • The sensitive data present on a device that is lost, stolen or in the possession of someone who leaves the company. • An infected personal device connecting to the corporate network. • Malicious apps downloaded by an user. • Theft of data via uploading to a personal device.
Other features of EMM • MAM • MCM • MEM
Mobile application management (MAM).
• Mobile application management (MAM) describes software and services responsible for provisioning and controlling access to internally developed and commercially available mobile apps used in business settings on both company-provided and “bring your own” smartphones and tablet computers. • Mobile application management provides granular controls at the application level that enable administrators to manage and secure app data. MAM differs from mobile device management(MDM), which focuses on controlling the entire device and requires that users enroll their device and install a service agent. • While some enterprise mobility management(EMM) suites include a MAM function, their capabilities may be limited in comparison to standalone MAM solutions because EMM suites require a device management profile in order to enable app management capabilities.
Mobile content management (MCM).
• • • Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices. The main component of a mobile content management system is a file storage and filesharing service. Some services are entirely based in the cloud; others take a middleware approach that connects existing data repositories, such as network file shares, to a mobilefriendly front end.
• MCM should also incorporate identity management, giving IT and/or business leaders control over end user access to specific sets of data. • MCM products offer additional security features for endpoint devices. An example is Air. Watch's Secure Content Locker, which uses secure storage containers to protect data downloaded to a mobile device.
Mobile Email management (MEM).
• • Mobile email management (MEM) ensures your corporate emails are containerized using advanced proprietary/free encryption algorithms. MEM ensures all emails remain inside the secure container, so that attackers get encrypted data even if they try to compromise the device data using USB cable on a system. Heavy restrictions on clipboard, attachments and trusted domains can be enforced. Nothing can move in-out of the secure container as clipboard is disabled. Even the attachments are downloaded and saved inside the secure container. To view the attachments there is secure document reader as well as secure document editor available in MDM solutions. Adding trusted domains will ensure that data from corporate email is not leaked to malicious/suspicious domains.
Air. Watch is an Atlanta-based provider of enterprise mobility management (EMM) software and standalone management systems for content, applications and email.
Why vmware?
Why vmware is better than others:
Gartner reviews on Airwatch • • Gartner recognizes Air. Watch as a Leader positioned HIGHEST in ability to EXECUTE and furthest in completeness of VISION for Enterprise Mobility Management. This is the sixth consecutive year Air. Watch is recognized as a LEADER.
Thank you
- Slides: 45