Developing a Mobile Security Strategy
|
|
- Sheena Bradley
- 6 years ago
- Views:
Transcription
1 Developing a Mobile Security Strategy Webinar for the institutions in the University of Texas System Kieran Norton Principal, Deloitte & Touche LLP April 2012
2 Webinar Essentials Session is currently being recorded, and will be available on our website at If you wish to ask questions: Click on the Raise Hand button. The webinar administrator will un-mute you at the appropriate time. Note: Remember to turn down your speaker volume to avoid feedback. Questions may also be typed in the GoToWebinar Question panel. CPE credit is available for this webinar for attendees who attend the live webinar. Please request credit by sending an to the UT Systemwide Compliance Office at Please provide your feedback in the post-session survey. 1
3 Table of Contents Problem Statement 2 Background 3-5 Mobile Ecosystem and Risk Landscape 6-12 Strategic Approach Bring Your Own Device (BYOD) Technology and Vendor Considerations Key Takeaways Appendix
4 Problem statement Summary observations from the security assessments related to mobile devices: Lack of appropriate policies/guidance and procedures related to the use of mobile devices; e.g., PDAs, tablets, etc. Proliferation of mobile devices with access to networks and applications, and no capability to track or inventory. Increased risk of unauthorized exposure of sensitive information through mobile devices (e.g., patient information, proprietary research data, etc.) resulting in adverse impacts to UTS and the institutions, such as financial penalties, legal implications and damaged public image. 3
5 Background
6 The mobility landscape Mobile computing has been growing at a staggering rate across all age groups, income groups, industries, geographies and cultures and is widely expected to continue its exponential growth rate over the next five years. Current mobile landscape 1 Expected growth 1 Mobile cellular subscriptions surpassed 5B in 2010 (Gartner) 83% of US population owns cellphones; 35% of these are smartphones (Pew Research) More than 410M smartphone devices have been sold globally so far (Forrester) Nearly 18M tablets were sold in 2010 (IDC) Approximately 470M smartphones will be sold globally in 2011 (IDC) Approximately 980M smartphones will be sold globally in 2016 (IMS) By 2015, global mobile data traffic volume will be approximately 25 times 2010 volume (FCC) Tablets will reach one-third of US adults by 2015 (Forrester) Tablet unit sales to total around 54.8M in 2011 and top 208M in 2014 (Gartner) Mobility and mobility services are not only gaining ground among consumers but also among enterprises 1 Note: Please refer Appendix for statistic references 5
7 Adoption of mobility trends At a high level, entities go through three stages of adoption for mobility. Mobility-Centric Innovation: Business Impact/Number of Mobile Apps Mobile Veneer: Mobile access to existing apps No mobile app development Result: Poor user experience (UX) and negligible productivity, customer satisfaction or revenue gains Mobilize Existing Applications: Develop new graphical user interfaces (GUIs) on top of existing business logic Result: Acceptable UX and noticeable productivity, CRM & revenue gains Develop completely new apps that leverage mobility benefits Result: User-centered UX and new productivity, CRM and revenue opportunities Stage 1 Stage 2 Stage 3 Though mobility offers wide range of products and services, it has its own set of security vulnerabilities due to the changing threat landscape 6
8 Mobile ecosystem and risk landscape
9 Mobile security: Threat overlay on mobility ecosystem 8
10 Mobility risk categories Enabling mobility is a balance of technology, return on investment and risk. These need to be aligned with business needs and strategies. When considering developing mobile solutions, or fine tuning an existing solution, it is necessary to gain an understanding of the risks associated with mobility. These risks fall into four main categories: Mobility risk categories 4. Infrastructure & Device 3. Legal & Regulatory 1. Operational 2. Technology & Data Protection What makes mobile devices valuable from a business perspective portability, usability and connectivity to the internet and corporate infrastructure also presents significant risk. New risks have been introduced at the device, application and infrastructure levels requiring changes in corporate security policy and strategy. 9
11 1. Operational 4. Infrastructure & Device 3. Legal & Regulatory 1. Operational 2. Technology & Data Protection Mobility poses unique risks and existing security and IT support resources and infrastructure cannot be extended to cover mobile devices and applications without significant investment - in developing new skills, technical capabilities, operational processes and deployment of a mobility infrastructure. A. Executives, users and customers are driving mobility decisions; operational risk considerations are not driving mobile security strategy B. Security controls can negatively impact usability, causing friction with employees and slowing adoption C. Increasing support demands may in turn outpace resource skill sets and technical capabilities D. Varied mobile OS implementations make it difficult to deploy a singular security solution E. Existing operational processes may not be efficiently designed or mobile-ready which can hinder expected productivity In one Deloitte case study, implementation of significant security controls led to 20% of the company s mobile device users voluntarily opting out of the corporate program... however it is unlikely users stopped using a mobile device 10
12 2. Technology and data protection 4. Infrastructure & Device 3. Legal & Regulatory 1. Operational 2. Technology & Data Protection Mobile devices are valuable from a business perspective due to internet connectivity, access to corporate infrastructure as well as mobile/cloud based applications. These benefits also result in greater potential exposure for the enterprise with risks introduced at the device, application and infrastructure levels. A. End users may have the ability to modify device security parameters thus weakening the security controls B. Devices and memory cards are not encrypted by default or configured appropriately thus leading to potential data leakage/loss C. With use of cloud based applications, data protection becomes increasingly complex D. Many organizations are not able to enforce mobile OS patching and updating which may result in vulnerable devices E. Users often install unapproved applications or applications containing malware which poses information security risks As an example, 58 malicious apps were uploaded to an app store and then downloaded to around 260,000 devices before the app store pulled the apps 11
13 3. Legal and regulatory 4. Infrastructure & Device 3. Legal & Regulatory 1. Operational 2. Technology & Data Protection Security requirements may be complex, particularly if the organization operates in regulated industries. Employment labor laws, HIPAA requirements, privacy requirements, e-discovery requirements, etc., may impact the overall mobile strategy. A. Employees using use corporate devices for personal purposes and vice versa may give rise to significant data privacy issues B. The bring your own device trend raises ethical and legal questions around monitoring, device wiping, etc., upon employee termination C. Corporate usage of mobile devices by hourly employees can/will raise concerns around overtime labor law considerations D. Regulatory requirements to address e-discovery, monitoring, data archiving etc., can be complex and difficult to implement E. Data ownership and liability for corporate and employee owned devices used for business purposes is yet to determined In the Massachusetts data protection law (MA 201), responsibilities for protecting information on employee-owned devices used to access company resources may apply equally to the enterprise and the individual 12
14 4. Infrastructure and device 4. Infrastructure & Device 3. Legal & Regulatory 1. Operational 2. Technology & Data Protection The diversity of device options and underlying operating system/application platforms introduces a myriad of security risks and challenges. A. Mobile device attacks and varying attack vectors increases the overall risk exposure (extending the enterprise risk profile) B. Multiple choices in the devices, OS platforms, apps, etc., requires companies to employ diverse technologies expanding the attack surface C. Third party apps installed on corporate devices may contain vulnerabilities caused by developer mistakes or re-packaged malware D. Securing of mobile transmissions and channels is complex given a varied protocol landscape & the newer communication channels E. Mobile devices are easily lost or stolen in comparison with other IT assets (e.g., laptops) and remote wipe efforts frequently fail According to a recent survey, 36% of consumers in the US have either lost their mobile phone or had it stolen 13
15 Strategic approach
16 Strategies for tackling mobile risks Defining a Mobile Security Approach After gaining an understanding of the key risks that affect your business, the next step is determining and defining your approach to a mobile security solution deployment. When determining the right approach, it is important to understand your specific use cases and incorporate your key business drivers and objectives. Device centric Data centric Application centric Example controls Mobile device management (MDM) Strict device policy enforcement Local data encryption Secure containers/partitions Minimal device data footprint Communications encryption Virtualization Data integrity Developer training System development life cycle Primary or multi-platform IDE Application distribution & maintenance 15
17 Deployment decisions Key decision points that drive strategy and the resulting architecture Bring-Your-Own vs. Corporate Provided Manage Security In-House vs. Outsource Security 3 rd Party Tools vs. Native Platform Tools Application Management vs. Application Guidance Full Data Access vs. Restricted Data Access 16
18 Mobility reference architecture Strategy Development Applications Development (Design, Implement, Test) Business Analysis (Opportunity ID, Business Case) Cross-Platform Dev Creative/UX/UI Design Native Development Enterprise Mobility Infrastructure App concept to development Mobile Enablement Strategy/Roadmap Sybase SUP, HTML5, Adobe Objective C (ios), Java Mobile Solution Architecture End-to-end Network Design Mobility Readiness Assessment Industry Regulatory/Compliance/ Security Analysis Enterprise Systems Integration ERP, Web/Ecommerce and Legacy Systems Mobile Middleware Integration Mobile Analytics Feedback Reporting/BI/DW Enablement Data Mgmt Cloud and Social Enterprise Integration Business Strategy Security Mobile application security Mobile security policy and governance Security Mobile security strategy and architecture Mobile device and operations security Business Strategy App Concept to Development Mobile Device Management Enterprise App Store Deployment, Distribution, Management, Operations Product Mgmt Enablement IT Governance Operational / Organizational Readiness Support Readiness Mobility Infrastructure Enterprise Integration Strategy Security, Privacy & Compliance Note: Products listed for the above technology product vendors are their respective property. 17
19 Bring Your Own Device (BYOD)
20 BYOD considerations Employees increasingly want to use their favorite mobile device for personal and business use. They want to store personal data and install games on devices they are also using to access enterprise applications and data. If employees purchase their own device and plan, this can reduce telecom costs, however it creates several business challenges and security risks. Key Considerations Bearing of device costs and associated usage fees Support considerations associated with highly differentiated OS s, platforms, hardware/devices, apps, etc. Employee usage monitoring and device oversight Legal, regulatory and privacy risk mitigation associated with corporate data made available on mobile devices IT staffing and skill set requirements to support corporate issued and/or employee owned devices 19
21 Bring-Your-Own vs. Corporate Provided Bring Your Own PROS CONS Device and possibly line costs incurred by employee Meets user desire to choose the device they like most, have a single phone number, etc. Addresses increased demand by employees to connect personal devices to corporate networks Limited device oversight and control Increased challenges with enforcing legal and regulatory requirements Device and data ownership questions Requires support for diverse platforms, OSes, devices; may negatively impact app strategy Varied device service fees, lack of purchasing leverage (when chargeback/subsidies allowed) Corporate Provided PROS Tighter device oversight and control, more heterogeneous device environment (app strategy) Streamlining devices, platforms and OSes simplifies IT support Direct relationship with carrier may be advantageous from a monitoring and security perspective Device costs and service fees negotiated with service providers; increased purchasing power CONS Cost of providing devices and service fees High employee demand for broader diversity in devices can lead to lower satisfaction and adoption May require potential increase in IT support staffing and skill set requirements Privacy considerations with monitoring of employee usage and activity, etc. 20
22 Technology and vendor considerations
23 Mobile device and app management Technology Key Features Example Vendors Microsoft Exchange ActiveSync (EAS) Mobile Device Management (MDM) Mobile Application Management (MAM) Over-the-air sync on mobile devices to existing Exchange Server infrastructure for , contacts, calendar data, and more Basic device management capabilities including allowing/blocking devices, and enforcing password requirements Secure enrollment of mobile devices to be managed Wireless configuration and updating of device settings Monitoring and enforcing compliance with corporate policies Secure mobile application distribution Monitoring and enforcing compliance with app policies Reporting on approved/rogue apps EAS is a native tool included with Microsoft Exchange Server. If an organization has an existing Exchange infrastructure they have access to EAS and its capabilities Good Technology MobileIron AirWatch Zenprise Many others Apperian Appcelerator App47 Nukona Mocana MobileIron* AirWatch* Zenprise* * MAM functionality included with primary MDM offering Note: Products listed for the above technology product vendors are their respective property.
24 Secure containers and mobile virtualization Technology Key Features Example Vendors Secure Container Solutions Secure area on device for housing enterprise data and applications Container content is encrypted and separated from rest of device Allows more granular control of enterprise data (e.g., remote wipe container only) Good Technology Sky Technology Mobile Virtualization Allows multiple mobile operating systems to run simultaneously on a single device Personal and corporate content is separated with each running in its own virtual device VMWare Open Kernel Labs Red Bend Software Note: Products listed for the above technology product vendors are their respective property.
25 Key takeaways
26 What are early adopters doing? Taking an organization and user-centric approach 1. Understand the specific mobility use cases 2. Understand key mobility risks that affect the organization and its constituents 3. Incorporate key business drivers and objectives 4. Implement security controls through both policy and technology 5. Enable, not disable adoption of new innovations (it s not stopping here ) Define Mobile Security Requirements Architect & Design Technology Acquisition & Deployment
27 Appendix
28 Appendix A: References Current mobile landscape Mobile cellular subscriptions surpassed 5B in 2010 (Gartner) obile_and_contextaware_bran_ pdf?li=1 83% of US population owns cellphones; 35% of these are smartphones (Pew Research) More than 275 million iphones and BlackBerrys and 135 million Android devices have been sold globally (Forrester) streaming_of_smartphones/q/id/60762/t/2 Nearly 18 Million Tablets were sold in 2010 (IDC) million-tablets-12-million-e-readers-shipped-in- 2010/ Other MA reg.pdf Lost phone survey cle.jsp?prid= _01 Expected growth Approximately 470M smartphones will be sold globally in 2011 (IDC) Approximately 980M smartphones will be sold globally in 2016 (IMS) Smartphones-a-Year-by-2016-IMS-Research- Says shtml By 2015, global mobile data traffic volume will be approximately 25 times 2010 volume (FCC) s341/ns525/ns537/ns705/ns827/vni_hyperconn ectivity_wp.html Tablets will reach one-third of US adults by 2015 (Gartner) _commerce_may_soon_trump_mobile/q/id/5909 6/t/2 Tablet unit sales to total around 54.8 million next year and top 208 million in 2014 (Gartner) &objid=260&mode=2&pageid= &resid= &ref=QuickSearch&sthkw=milanesi 27
29 How Deloitte can help
30 Deloitte mobile security services Deloitte can assist you in creating a secure delivery framework for your mobility initiatives from inception to ongoing operation. We can help you set the proper risk balance between control, efficiency and user experience. Our security and privacy specific services include: Deloitte s mobility security services Mobile security strategy & architecture Mobile infrastructure security Mobile application security testing Mobile security policy management Incident investigation & response Mobile security risk assessment Mobile device & operations security Secure SDLC for mobile applications Mobile security training & awareness Mobile device forensics We also leverage the resources of the Deloitte Center for Security & Privacy Solutions that conduct original research and develop substantive points of view to help executives make sense of and profit from emerging opportunities on the edge of business and technology. 29
31 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation. Member of Deloitte Touche Tohmatsu Limited
Securing Enterprise Social Media and Mobility Apps
The Dbriefs Technology Executive series presents: Securing Enterprise Social Media and Mobility Apps JR Reagan, Principal, Deloitte & Touche LLP Kieran Norton, Principal, Deloitte & Touche LLP August 4,
More informationMobility, Smart Devices, BYOD Do You Have a Solution & Strategy?
Steven Scheurmann- Sales Leader, Asia Pacific & Japan, Endpoint & Mobility 스마트보안 Mobility, Smart Devices, BYOD Do You Have a Solution & Strategy? Mobile is an enterprise priority Growth in Internet Connected
More informationBEST PRACTICES: DEPLOYING SPOK MOBILE WITH ENTERPRISE MOBILITY MANAGMENT. spok.com
SM BEST PRACTICES: DEPLOYING SPOK MOBILE WITH ENTERPRISE MOBILITY MANAGMENT 1 DEPLOYING SPOK MOBILE WITH ENTEPRISE MOBILITY MANAGMENT Scalability and adoption are significant challenges that IT professionals
More informationMOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper
MOBILIZING ORACLE APPLICATIONS ERP An Approach for Building Scalable Mobility Solutions A RapidValue Solutions Whitepaper TABLE OF CONTENTS Executive Overview Typical Architecture for Mobilizing Oracle
More informationCLINICAL MOBILITY SERVICES
HOW WE DO IT. CLINICAL MOBILITY SERVICES CDW Healthcare clinical mobility services give streamlined care a go : Custom-designed solutions to meet your unique needs, now and into the future Improved security,
More informationSecuring Capabilities in the Cloud: Security and Privacy in the Evolution of Cloud Computing
The Dbriefs Technology Executive series presents: Securing Capabilities in the Cloud: Security and Privacy in the Evolution of Cloud Computing Vikram Bhat and Irfan Saif, Deloitte & Touche LLP June 2,
More informationInsurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014
Insurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014 State of Information Security by Deloitte & Touche LLP May 20, 2014 As used in this document, Deloitte means Deloitte & Touche
More informationSmart About Smart Devices: An Introduction to MobileIron
Smart About Smart Devices: An Introduction to MobileIron Agenda: Smartphones in the enterprise What are the core challenges? How does MobileIron address them? How does MobileIron work? (demo) Q&A / next
More informationPOINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION. A RapidValue Solutions Whitepaper
POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION A RapidValue Solutions Whitepaper Executive Summary Enterprise mobility has transformed the way businesses engage with customers,
More informationEnterprise Mobility: Are You Ready?
Enterprise Mobility: Are You Ready? of time, money and labor in deploying web-based, business-critical desktop applications. In recent years, the IT landscape has expanded to include a multitude of mobile
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
UEM1798BU The ROI Driver: Transition from Cost Center to Business Driver with AirWatch for Windows 10 VMworld 2017 Content: Not for publication Jason Roszak #VMworld #UEM1798BU Disclaimer This presentation
More informationSOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY. Overview of CA Management Cloud for Mobility
SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY Overview of CA Management Cloud for Mobility CA Management Cloud for Mobility from CA Technologies enables companies to create and manage their mobile environments,
More informationTechnology, Innovation and Future Priorities. CIO Survey Summary : Australia
Technology, Innovation and Future Priorities CIO Survey Summary : Australia Tim Dillon Associate Vice President End User & Mobility Research IDC Asia Pacific July 2011 Copyright 2011 IDC. Reproduction
More informationEnterprise Mobility Suite
Enterprise Mobility Suite (EMS) MEEC-Team David Pearlman-Director Enterprise Mobility US Education David.Pearlman@microsoft.com 74% of higher education CIOs say mobility and BYOD has increased as strategic
More informationMid-market technology trends: Leveraging disruption to drive value The Dbriefs Private Companies series Anthony Stephan, Principal, Deloitte
Mid-market technology trends: Leveraging disruption to drive value The Dbriefs Private Companies series Anthony Stephan, Principal, Deloitte Consulting LLP Chris Jackson, Senior Manager, Deloitte Consulting
More informationMEETS MOBILE MAINFRAME. Access information anytime, anywhere
MAINFRAME MEETS MOBILE Access your Adabas & Natural and mainframe applications from anywhere TABLE OF CONTENTS 1 Introduction 1 Access information anytime, anywhere 2 Secure integration with mainframe
More informationSecuring macos in the modern work era
Securing macos in the modern work era Global enterprises have entered a new era of modern work, one where individuals need to make well-informed decisions on the fly, using the tools they know and love
More informationMOBILIZING HEALTHCARE WITH VMWARE AND GOOGLE
SPONSORED BY WHITE PAPER MOBILIZING HEALTHCARE WITH VMWARE AND GOOGLE Mobility plays a significant role in enabling healthcare organizations to provide excellent patient care and improved financial outcomes.
More informationGroupLogic extends mobile sync support with new activecho product
GroupLogic extends mobile sync support with new activecho product Analyst: Chris Hazelton Kathleen Reidy 27 Mar, 2012 GroupLogic has released activecho, which is aimed at the mobile file-sharing and -synchronization
More informationBUSINESS DRIVERS AND USE CASES REVISED 5 NOVEMBER 2018
BUSINESS DRIVERS AND USE CASES REVISED 5 NOVEMBER 2018 Table of Contents Business Drivers and Use Cases Addressing Business Requirements Use Cases GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture
More informationNew Technology: Mission Impossible?
New Technology: Mission Impossible? Trainer: Ryan Peasley, MCSA, Consultant 1 Session Mission Understand current technology trends (cloud, mobile, social) Discuss technology challenges our agencies face
More informationIT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
More informationCloud Object Storage And The Use Of Gateways
Cloud Object Storage And The Use Of Gateways Live Webcast September 26, 2017 10:00 am PT SNIA Legal Notice The material contained in this presentation is copyrighted by the SNIA unless otherwise noted.
More informationThe Roadmap to a Digital Enterprise through Mobility
The Roadmap to a Digital Enterprise through Mobility How to craft a mobility strategy to maximize employee productivity, streamline operations, and build an efficient business. Executive Summary As mobile
More informationSecurely Enabling the Enterprise of Things
Securely Enabling the Enterprise of Things Trust in BlackBerry Almost every product in Blackberry s bag of tricks directly or by extension is addressing the challenges of managing a diverse set of IoT
More informationSECURE MOBILE USERS PLANNING - MOBILE DEVICE MANAGEMENT (MDM) SCENARIOS COMPARISON
PAGE 2 IN CEE SECURE MOBILE USERS PLANNING - MOBILE DEVICE MANAGEMENT (MDM) SCENARIOS COMPARISON FEB 2017 IGOR SHASTITKO About Consalta Every business deserves an opportunity to grow! We support IT companies
More informationWHITE PAPER. Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content
WHITE PAPER Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content This paper highlights what is the need of Enterprise Mobility Management
More informationPolicy Outsourcing and Cloud-Based File Sharing
Policy Outsourcing and Cloud-Based File Sharing Version 3.3 Table of Contents Outsourcing and Cloud-Based File Sharing Policy... 2 Outsourcing Cloud-Based File Sharing Management Standard... 2 Overview...
More informationIntroduction. Copyright 2013 AnyPresence Inc., All rights reserved. 2
Introduction The rapid and broad proliferation of smartphones in the general marketplace and the mainstream adoption of mobile computing as a workforce paradigm, have enterprises focusing significant development
More informationDevice deployment, customisation and ongoing management
Device deployment, customisation and ongoing management Photo by Hal Gatewood on Unsplash The way in which digital devices are set up (deployed), customised and managed is crucial to ensure they provide
More informationENTERPRISE MOBILITY Strategy and Execution Approach. A RapidValue Solutions Whitepaper. RapidValue Solutions
ENTERPRISE MOBILITY Strategy and Execution Approach A RapidValue Solutions Whitepaper RapidValue Solutions Contents Driver s of Enterprise Mobility 04 Current Landscape Mobile 1.0 Mobile 2.0 Mobile 3.0
More informationSeven Ways to Create an Unbeatable Enterprise Mobility Strategy
Seven Ways to Create an Unbeatable Enterprise Mobility Strategy A practical guide to what business and IT leaders need to do NOW to manage their business s mobile future By Arun Bhattacharya, CA Technologies
More informationWorkspace ONE. Insert Presenter Name. Empowering a Digital Workspace. Insert Presenter Title
Workspace ONE Empowering a Digital Workspace Insert Presenter Name Insert Presenter Title Every dimension of our lives is GOING DIGITAL 2 Consumerization is driving DIGITAL TRANSFORMATION Modern Workforce
More informationSAP Mobility Platform. Gerhard Henig, SAP AG
SAP Mobility Platform Gerhard Henig, SAP AG Legal disclaimer The information in this document is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This document
More informationNew Business Models and Strategies for Leveraging Technology. Paul Baguley, Principal, Contract Compliance Services, KPMG
New Business Models and Strategies for Leveraging Technology Paul Baguley, Principal, Contract Compliance Services, KPMG 1 New Business Models & Strategies for Leveraging Technology Paul Baguley, Principal,
More informationSean P. McDonough National Office 365 Solution Manager Cardinal Solutions Group
Sean P. McDonough National Office 365 Solution Manager Cardinal Solutions Group 2 A little about me Sean P. McDonough National Office 365 Solution Manager Responsible for business productivity (primarily
More informationUNB s Mobility Strategy (Approved Feb. 23, 2016)
UNB s Mobility Strategy 2016-2017 (Approved Feb. 23, 2016) The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT Management Suite 7.1 from Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and
More informationTop. Reasons Enterprises Select kiteworks by Accellion
Top 10 Reasons Enterprises Select kiteworks by Accellion Accellion Enterprise Customers Include: Top 10 Reasons Enterprises Select kiteworks kiteworks by Accellion is the leading private cloud content
More informationHYBRID CLOUD MANAGEMENT WITH. ServiceNow. Research Paper
HYBRID CLOUD MANAGEMENT WITH ServiceNow Research Paper 1 Introduction The demand for multiple public and private cloud platforms has been increasing significantly due to rapid growth in adoption of cloud
More informationEngaging Your Mobile Customers While Protecting Sensitive Data
WHITE PAPER OCTOBER 2014 Engaging Your Mobile Customers While Protecting Sensitive Data Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: ENGAGING YOUR MOBILE CUSTOMERS WHILE PROTECTING
More informationManaging FTI Data Compliance. Addressing Publication 1075
Managing FTI Data Compliance Addressing Publication 1075 Introduction Daniel Gabriel, Manager, Security & Privacy Deloitte & Touche LLP Daniel has over nine years of experience providing ERP security and
More informationVMWARE WORKSPACE ONE + MICROSOFT OFFICE 365 : ENABLING MORE SECURE COLLABORATION. A Solution for Balancing Productivity with Protection
WHITE PAPER JULY 2016 VMWARE WORKSPACE ONE + MICROSOFT OFFICE 365 : ENABLING MORE SECURE COLLABORATION A Solution for Balancing Productivity with Protection Table of Contents Introduction 3 The Evolution
More informationSECURE SSO TO OFFICE 365 & OTHER CLOUD APPLICATIONS WITH A CLOUD-BASED AUTHENTICATION SOLUTION
SECURE SSO TO OFFICE 365 & OTHER CLOUD APPLICATIONS WITH A CLOUD-BASED AUTHENTICATION SOLUTION ADVICE FOR SIMPLIFYING & SECURING YOUR DEPLOYMENT Evan O Regan, Director of Product Management for Authentication
More informationINTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE
INTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE Aligning Your Windows-Based Infrastructure for a Digital Workspace In today s enterprise, applications come in many different shapes and sizes.
More informationSecure app and data delivery for a mobile financial services workforce
Secure app and data delivery for a mobile financial services workforce Secure, anywhere, any device productivity to transform the customer experience. Mobility can enable greater productivity for financial
More informationCFO meets M&A: Value creation in the digital age The Dbriefs Driving Enterprise Value series
CFO meets M&A: Value creation in the digital age The Dbriefs Driving Enterprise Value series Lukas Hoebarth, Principal, Deloitte Consulting LLP Nnamdi Lowrie, Principal, Deloitte Consulting LLP Carina
More informationQuantifying the Value of Software Asset Management
1 Executive Summary Over the past few decades, employees have come to rely more and more heavily on software solutions to automate and enhance a variety of core business activities from sales order entry
More informationGO BEYOND MOBILE DEVICE MANAGEMENT WITH A DIGITAL WORKSPACE WHITE PAPER
GO BEYOND MOBILE DEVICE MANAGEMENT WITH A DIGITAL WORKSPACE WHITE PAPER Table of Contents On Its Own, Mobile Device Management Can t Deliver on Modern Demands 3 Two Challenges, Two Solutions 3 Mobile Device
More informationCopyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Managed Services Printing & Personal Systems Hartmut Husemann, Sales Director Printing PPS Germany Trends Shifting budgets 70 85% IT Assets devoted to ongoing support 1 Consumerization of IT 74% of
More informationThe State of Mobile Security in CIO Executive Interview
The State of Mobile Security in 2014 CIO Executive Interview Mark Sunday, CIO of Oracle Corporation, interviewed Amit Jasuja, Senior Vice President of Product Development for Oracle s Java, Mobile Security,
More informationPLM Mobility. Author Karthikeyan WHITE PAPER
PLM Mobility Author Karthikeyan WHITE PAPER June 2012 TABLE OF CONTENTS Abbreviations 3 Introduction 4 Mobility Trends 4 Challenges on Mobility for a Manufacturing Company 5 Mobility for Manufacturing:
More informationDay & Zimmermann Mike Friess & Vishi
Mobility @ Day & Zimmermann Mike Friess & Vishi Day & Zimmermann Inc. Annual revenue: $2.7 billion Privately held conglomerate Founded in 1901 25,000 employees in 150 locations globally Headquartered in
More informationWebalo for Mobile IT (MobileIron)
for 1 Webalo Platform for enterprise mobility Service Clients Data Connectors Administrative Website It s EASY To signup To build apps To deploy To manage It s FAST, SIMPLE & SECURE 2 Webalo for Mobile
More informationAnywhere Access to ERP Applications with Parallels RAS. White Paper Parallels Remote Application Server 2018
Anywhere Access to ERP Applications with Parallels RAS White Paper Parallels Remote Application Server 2018 Table of Contents Introduction... 3... 3 Centralized Management Reduces Cost and Complexity...
More informationTopics and Trends. A presentation by Vonya Global Vonya Global LLC Duplication without written consent from Vonya Global is not permitted.
Topics and Trends A presentation by Vonya Global Presenter Steve Randall Partner Vonya Global Internal Audit co-sourcing and outsourcing firm based in Chicago with international capabilities, representation
More informationFuture-proof your mobility strategy with Dell Enterprise Mobility Management
Future-proof your mobility strategy with Dell Enterprise Mobility Management Change is the only constant in the mobile workforce landscape. Changes in mobile device technology are leading the way. Smartphone,
More informationIBM United States Software Announcement , dated July 26, 2016
IBM United States Software Announcement 216-013, dated July 26, 2016 IBM MaaS360 launches four new suites, offering key enterprise mobility management capabilities in purpose-focused bundles to improve
More informationLeveraging Technology to Achieve Excellence in Customer Service
Leveraging Technology to Achieve Excellence in Customer Service BILL PATCHETT Manager Of Revenue Accounting, Salt River Project BARBARA ZICKLER Regional Sales Director, Paymentus Public Utility for Electric
More informationTough Math for Desktop TCO
Top 6 reasons to use a Remote Desktop and RemoteApps Tough Math for Desktop TCO In their fight to reduce IT budgets, small- and medium-sized businesses have to answer one tough question: how do we reduce
More informationAchieving True Enterprise Mobility:
December 2011 Achieving True Enterprise Mobility: MDM Is Only Half the Battle Sponsored by Fiberlink Contents Introduction 1 Security, Scale, and Simplicity 1 A Tale of Two Mobile Management Paradigms
More informationSERVICES AND CAPABILITIES. Technology and Management Consulting
SERVICES AND CAPABILITIES Technology and Management Consulting RSM overview Fifth largest audit, tax and consulting firm in the U.S. Over $1.6 billion in revenue 80 cities and more than 8,000 employees
More informationIBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers
Service Description IBM MaaS360 (SaaS) This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of the Cloud
More informationMobile Application Management
Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...
More informationMOBILITY STRATEGY CONNECTIVITY SECURITY DIGITAL CLOUD MOBILITY
MOBILITY STRATEGY CONNECTIVITY SECURITY DIGITAL CLOUD MOBILITY Introduction Our 5 strategic pillars CONNECTIVITY Secure, reliable networks and internet access SECURITY Protected and available services
More informationADVENT ONE. The Dynamic Demands of IoT in a Connected World
ADVENT ONE The Dynamic Demands of IoT in a Connected World Modern consumers have come to expect online, self-service and intuitive transacting in an on-demand world. We shop online, bank online and expect
More informationCreate Experiences. Build Customers. Drive Sales.
Create Experiences. Build Customers. Drive Sales. This page has been intentionally left blank In every market, in every minute, digital raises the bar Your customers are always connected. They know your
More informationGTC Southwest Texas on the Go
GTC Southwest Texas on the Go Carol Morgan Sr. Vice President OFFICES St. Louis (HQ) Atlanta Chicago Dallas Minneapolis July 12-13, 2012 Hilton Austin Austin, TX Daugherty at a Glance Consistent delivery
More informationSAP Product Road Map SAP Identity Management
SAP Product Road Map SAP Identity Management Road Map Revision: 2016.09.15 Customer Template Revision: 20160104 v4.1 Legal disclaimer The information in this presentation is confidential and proprietary
More informationFostering Business Consumption With Automation & Orchestration Of IT Services. Antoine Acklin Head of Consulting, Australia & New Zealand
Fostering Business Consumption With Automation & Orchestration Of IT Services Antoine Acklin Head of Consulting, Australia & New Zealand 1 IT AS A SERVICE 62% 70% BUSINESS LEADERS IT LEADERS Business leaders
More informationCarving The Path For Cloud Transition
Carving The Path For Cloud Transition Praveen Mayalur, Specialist Leader The Potential of Cloud Scalability and Reliability On demand scalability for capacity Leverage secure & certified data protection
More informationMOVE YOUR BUSINESS FORWARD.
MOVE YOUR BUSINESS FORWARD. Move to QuickBooks Online. David Williams Hooker s Sweet Treats Selby Tax and Accounting #1 QuickBooks Online is the cloud accounting solution for small businesses. 1 Get on
More informationEnterprise mobility management (EMM)
Enterprise mobility management (EMM) mobilitymanagement Do you have a high number of geographically dispersed remote or field workers who use mobile devices? Do you need to monitor and track the devices
More informationUnified Endpoint Management: the Next Step in the Evolution of Device Management
Unified Endpoint Management: the Next Step in the Evolution of Device Management First came MDM, then EMM. Now, if you aren t looking at the world of Unified Endpoint Management, you're falling behind.
More informationComparing Alternatives for Business-Grade File Sharing. intermedia.net CALL US US ON THE WEB
for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 sales@intermedia.net intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business
More informationMOVE YOUR DIGITAL EXPERIENCE FORWARD
MOVE YOUR DIGITAL EXPERIENCE FORWARD An Adobe Experience Manager Perspective perficientdigital.com We re living in the Age of the Customer, where balance of brand power has shifted from businesses to the
More informationAN EMM CHECKLIST FOR CIOs. Factors to Consider When Choosing an EMM Solution. Whitepaper
1 AN EMM CHECKLIST FOR CIOs Factors to Consider When Choosing an EMM Solution Whitepaper 2 An EMM Checklist for CIOs As you decide on an Enterprise Mobility Management (EMM) solution, there are dozens,
More informationBENEFITS OF AN EFFECTIVE OUTSOURCING STRATEGY. March 1, 2017
BENEFITS OF AN EFFECTIVE OUTSOURCING STRATEGY March 1, 2017 RSM overview Fifth largest audit, tax and consulting firm in the U.S. Over $1.6 billion in revenue 80 cities and more than 8,000 employees in
More informationENABLE DIGITAL - % COMPLETE ENGAGED WORKFORCE - % COMPLETE
Each commitment listed below consists of one or more projects, and has at least one performance measure. Every year, targets are established to track progress towards the measure(s). The status shown on
More informationHarnessing the power of GIS
Harnessing the power of GIS Geospatial World Forum May 25, 2016 2 The changing geospatial landscape Historical perspective Copyright 2016 2016 Deloitte Development LLC. LLC. All All rights rights reserved.
More informationSupercharge your Financials Planning Analysis and Close Reporting with Mobility
Supercharge your Financials Planning Analysis and Close Reporting with Mobility Session ID: 10651 Prepared by: Ramke Ramakrishnan, Grant Thornton LLP @ramker18 Your presenter Ramke Ramakrishnan Principal
More informationStrategic Plan
Information Technology Strategic Plan 2019-2021 Presented by Darin King Vice Chancellor for Information Technology/CIO Strategic Plan 2019-2021 Contents Executive Summary... 3 Goals...4 GOAL ONE...4 GOAL
More information5 Tips for Improving Collaboration
5 Tips for Improving Collaboration Introduction 2 As a business leader, you re constantly anticipating and responding to the evolving needs of your employees. Because of that, you may be under pressure
More informationUnlock the benefits of mobility to work faster, better, and smarter
Unlock the benefits of mobility to work faster, better, and smarter Potential benefits Mac OS, Windows 10, ios, and Android management available Multi-OS Security Effective data security and compliance
More informationEnterprise Mobility Suite Managing Byod And Company Owned Devices It Best Practices Microsoft Press
Enterprise Mobility Suite Managing Byod And Company Owned Devices It Best Practices Microsoft Press ENTERPRISE MOBILITY SUITE MANAGING BYOD AND COMPANY OWNED DEVICES IT BEST PRACTICES MICROSOFT PRESS PDF
More informationSATURN th Annual SEI Architecture Technology User Network Conference
14 th Annual SEI Architecture Technology User Network Conference MAY 7 10, 2018 PLANO, TEXAS Charles Chow 1 Agenda Why Function As a Service (FaaS) Matters? Serverless Architecture and FaaS Based ERP Implementation
More informationIBM Tealeaf Customer Experience on Cloud
Service Description IBM Tealeaf Customer Experience on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and
More informationDeloitte Discovery Advisory Enabling an agile response to discovery, investigatory, and regulatory requests
Deloitte Discovery Advisory Enabling an agile response to discovery, investigatory, and regulatory requests 2018 Deloitte Discovery Advisory The Deloitte approach Deloitte Discovery Advisory The Deloitte
More informationORACLE COMMUNICATIONS UNIFIED COMMUNICATIONS SUITE
ORACLE COMMUNICATIONS UNIFIED COMMUNICATIONS SUITE Oracle Communications Unified Communications Suite is used by enterprises and service providers to improve employee productivity in a cost effective manner.
More informationSAP Business One OnDemand. SAP Business One OnDemand Solution Overview
SAP Business One OnDemand SAP Business One OnDemand Solution Overview SAP Business One OnDemand Table of Contents 4 Executive Summary Introduction SAP Business One Today 8 A Technical Overview: SAP Business
More informationHillarys: Making a Window Statement with Mobile Solutions from SAP
2012 SAP AG. All rights reserved. Picture Credit Hillarys Blinds Ltd., Nottingham, United Kingdom. Used with permission. Hillarys: Making a Window Statement with Mobile s from SAP Partner Company Hillarys
More informationI D C M a r k e t S c a p e : W o r l d w i d e E n t e r p r i s e S o c i a l S o f t w a r e V e n d o r A n a l y s i s
E X C E R P T I D C M a r k e t S c a p e : W o r l d w i d e E n t e r p r i s e S o c i a l S o f t w a r e 2 0 1 2 V e n d o r A n a l y s i s Vanessa Thompson Michael Fauscette Amy Konary Global Headquarters:
More informationDeloitte Leading Practices Solution for Utilities (DLeaPS-U) Empowering innovation at the core
Deloitte Leading Practices Solution for Utilities (DLeaPS-U) Empowering innovation at the core Empowering innovation at the core Addressing digital needs Rapidly transform your business with a modern ERP
More informationPlan, Deploy and Configure Microsoft InTune
Plan, Deploy and Configure Microsoft InTune 5 Day Course AUDIENCE IT Pros that have experience with Windows 10 use, deployment and management Experience with any optional ios or Android devices. FORMAT
More informationEmpower your field technicians. A smarter approach to managing field assets using mobile tools
Empower your field technicians A smarter approach to managing field assets using mobile tools Empower your field technicians A smarter approach to managing field assets For many organizations, the workforce
More informationIBM Tealeaf Customer Experience on Cloud
Service Description IBM Tealeaf Customer Experience on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients
More information5 Tips for Improving Collaboration
5 Tips for Improving Collaboration Introduction 2 As a business leader, you re constantly anticipating and responding to the evolving needs of your employees. Because of that, you may be under pressure
More informationMapping the Divide between OT and IT Industrial Controls and Security Barriers January 29, Imagination at work.
Mapping the Divide between OT and IT Industrial Controls and Security Barriers January 29, 2014 Imagination at work. What s driving the convergence? 2 Individual vs. Ecosystem What Happened When 1B People
More informationCloud content management for your business
AT&T Box AT&TCloud content management Cloud content management for your business Potential benefits Retail: Enable retail personnel access to the latest product collateral via smartphones and tablets for
More informationSOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business
SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT CA Technologies allows you to accelerate mobile innovation for customers
More information