Bring Your Own TVH. Kalman Tiboldi CBIO

Similar documents
Securing Today s Mobile Workforce

Mobile Security using IBM Endpoint Manager Mobile Device Management

The Future of Mobile Device Management

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Bring Your Own Device. Peter Silva Technical Marketing Manager

BYOD Secure Zoning Between Enterprise and Personal Data on Mobile Devices. 14 November 2013 Rozana Rusli Meling Mudin

Welcome to the era of the anywhere worker

Protecting Health Information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Enterprise Mobility Management: completing the EMM story

Maximize your move to Microsoft in the cloud

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

Cloud UC. Program Downloads I WOULD LIKE TO... DOWNLOADING THE CLIENT SOFTWARE

Information Security BYOD Procedure

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Five Tips to Mastering Enterprise Mobility

Mobile Devices prioritize User Experience

BIG IDEAS FOR SmAll BuSInESS:

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Purchase Intentions Spring 2013 EMEA

2013 InterWorks, Page 1

XenApp, XenDesktop and XenMobile Integration

Enterprise Mobility Management

RHM Presentation. Maas 360 Mobile device management

Design and deliver cloud-based apps and data for flexible, on-demand IT

SECURE, CENTRALIZED, SIMPLE

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

The Device Has Left the Building

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

BlackBerry Mobile Voice System

AirWatch for Android Devices for AirWatch InBox

BYOD Business year of decision!

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Google Identity Services for work

2016 BITGLASS, INC. mobile. solution brief

Citrix XenMobile and Windows 10

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10

Use of Mobile Devices on Voice and Data Networks Policy

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

BHIG - Mobile Devices Policy Version 1.0

BELTUG Market Trends Survey Results V-ICT-OR members - August 2015

The office for the anywhere worker!!! Your LCB SOFTPHONE: A powerful new take on the all-in-one for a more immersive experience.

Augmenting security and management of. Office 365 with Citrix XenMobile

Microsoft IT deploys Work Folders as an enterprise client data management solution

2S00012W -Selling the Avaya IP Office Platform Overview. Selling the Avaya IP Office Platform Overview. October, S00012W

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Thinking beyond data security: a comparison of the main mobile strategies

Traditional edocs Implementation

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

Voice+ Package. Reliable, Scalable and Affordable Business Communications

Good Technology State of BYOD Report

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

MObile. end. complexity

2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines

The collaboration app that keeps you connected to everyone and everything

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

Standard mobile phone a mobile device that can make and receive telephone calls, pictures, video, and text messages.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Five Reasons It s Time For Secure Single Sign-On

IBM Lotus Notes Traveler

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

As Enterprise Mobility Usage Escalates, So Does Security Risk

BT Managed Office Communications Server 2007 Release 2. Why complicate what should be perfectly simple?

TeleWare Re:Call FAQ for Resellers

Voice. The lost piece of the BYOD puzzle.

Midsize Collaboration Solution

Unified Communications. What are the Key Benefits of Replacing PBX with Cloud Based Solutions?

Microsoft 365 Business FAQs

How BYOD Impacts Your Business

Systems Manager Cloud-Based Enterprise Mobility Management

Designing Workspace of the Future for the Mobile Worker

Securing Office 365 with MobileIron

70% of professionals will conduct their work on personal smart devices by 2018 (Source: Gartner)

MiCloud Enterprise. Mobile-Ready, Customer-Focused, Cloud-Driven Communications

{ Mobile Printing Send Print Jobs from any Location }

Welcome to Dubai English Speaking School. DESS BYOD Information Pack

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

The State of the Trust Gap in 2015

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Trinity Multi Academy Trust

Connect. Bringing fixed and mobile communications together - anytime, anywhere

Securing Health Data in a BYOD World

ICT-Guideline. Contents. Computer Science Steering group

BYOD... or CYOD? 2 BILLION 5 BILLION. The Choice is Yours MOBILE DEVICES WORLDWIDE BY 2015 MOBILE DEVICES WORLDWIDE BY 2020

MDM and beyond: Rethinking mobile security in a BYOD world

Bring Your Own Device

Voice. The lost piece of the BYOD puzzle.

Enterprise Mobility Management Buyers Guide

Transcription:

Bring Your Own Device @ TVH Kalman Tiboldi CBIO

TVH OVERVIEW PARTS & ACCESSORIES DIVISION EQUIPMENT DIVISION RENTAL DIVISION SERVICE & REPAIR DIVISION 450.000 SKU s 16 mil cross ref. 100.000m² warehouse facilities All parts, All makes! - Not cheap parts but quality parts cheaper! - Your one-stop shop for all your parts & accessories! - The genuine Alternative!

TVH OVERVIEW PARTS & ACCESSORIES DIVISION EQUIPMENT DIVISION RENTAL DIVISION SERVICE & REPAIR DIVISION TVH offers the widest range of internal handling equipment. From hand pallet trucks, stackers, lift tables, hydraulic jacks to lift cranes, hand trolleys and much more

TVH OVERVIEW PARTS & ACCESSORIES DIVISION EQUIPMENT DIVISION RENTAL DIVISION SERVICE & REPAIR DIVISION New and second-hand lift trucks and aerial work platforms. More than 2000 machines permanent on stock

TVH OVERVIEW PARTS & ACCESSORIES DIVISION EQUIPMENT DIVISION RENTAL DIVISION SERVICE & REPAIR DIVISION The TVH Rental Division advises and helps customers make the right choice, both for short-term and long-term projects

TVH OVERVIEW PARTS & ACCESSORIES DIVISION EQUIPMENT DIVISION RENTAL DIVISION SERVICE & REPAIR DIVISION More than 65 specialized on-theroad engineers answer all questions on-site, all over Belgium. In the fully-equipped workshop, more than 60 in-house engineers work on an effective solutions for customers

International presence 2700 employees worldwide 45 companies in 23 countries 600 mil turnover 32 languages

Enterprise Mobility Is Here Business communication Faster decision making Mobile Information System Having the right information Empower employees to be more productive Improved customer services Communication enabled business processes Mobile Unified Communication & Collaboration Enable the power of real-time response 8

Consumerization of IT 9

TVH Goes Mobile Project Mobile Devices Mobile Applications Mobile Business Platform Mobile Communication &Collaboration Mobile ecommerce 10

Introducing new mobile devices Why? Increasing demand for corporate use of Smartphones Mobile Access To Corporate Information Tablet PC s for showcasing TVH Products and Services Bring-Your-Own-Device (BYOD) What we are proposing Choose which operating systems/devices to support Define a Strategy for Mobile Applications Enforce Security for all Mobile Data Implement Enterprise Policy for voice and data usage 11

Mobile Applications Unleashing the power of mobile applications Utility components mail/calendar/contacts Choosing third-party mobile applications Extend internal applications to mobile devices Business process improvement through Mobility Developing in-house mobile applications Native apps versus device-independent applications Less is more functionalities to be deployed Small-form factor Choosing the right tools and platforms Starting with Private Company Appstore 12

Contacts/Agenda/Mail 13

GIRA Facility Server on ipad 14

TVH Products and Services on ipad 15

QlikView BI on mobile devices Using native Apps and Ajax 16

Mobile ecommerce 17

Testing Salesforce on mobile devices 18

Jim s Journal on ipad 19

myequipmentfinder on Samsung Galaxy 20

TVH Routing service

Mobile Communication & Collaboration Mobile Device convergence Dial Via Office Single Business Number Reach Single Business Voicemail Presence Management Web Conferencing using Webex/GoToMeeting VOIP using IAX/SIP clients Collaboration using Lotus Sametime/CUPC Extending TVH wireless network - Home working New contract with Mobile Operators 22

Selected company devices The same devices are used by many of our employees

Factors driving adoption of BYOD Rapid proliferation of smartphones and tablets Ease of working outside the office Business continuity Staff have relevant equipment Attract and retain top talent (any age), GenY, home-based workers Reduce costs Enterprise ready mobile applications Mobility moves to the Cloud 24

Expected benefits from BYOD Improved employee satisfaction Increased worker productivity Greater mobility for workers More flexible work environments Improved business continuity Reduced IT costs Attracting / retaining high quality staff Better quality of devices used by workers Better care and/or longevity of devices Speeding up the rate of technology adoption 25

Major concerns related to BYOD Information security issues, data loss/theft Potential device/support issues Financial risks roaming costs, excessive data consumption Compliance and legal implications Implementation/management costs Implementation of flexible enough policies 26

Security is the major issue Sensitive data on device which is stolen Infected personal device connected to corporate network Malicious apps downloaded by users Theft of data via uploading to a personal device Easy to lose or have stolen Secured network connection - VDI Remote device wiping Controlled access to Internet User and device authentication Centralized data with a good layer of security built in to access Cloud based data / services

Technical solutions we are considering Implementation of Mobile Device Management Cloud based Internet access through zscaler Cloud based utility components Google Apps Desktop Virtualization Application development - Company AppStore Cloud based single-sign-on

Mobile Device Management (MDM) Supporting multiple platforms Android, ios, BlackBerry Centralized IT management for company/private devices Mobile usage visibility Expense management Controlling and optimizing Service Quality TVH App storefront access Mobile device security Connect devices securely to TVH resources Enforce security policies to protect data Encryption of data Role-based access, logging and auditing Remote lock and wipe 29

Mobile Iron MDM What happened? What is happening? Why did it happen? What will happen? What do I want to happen? 30

Having clear policies set in place Mobile device usage must be governed by an acceptable use policy Which BOYD model? Is it truly BYO or company will offer a stipend? Predefined list of allowable devices and applications Policies and contracts that clearly state who owns what data Remote wiping policy if device is infected or stolen Installment of hypervisor or remote-control software Clear rules for user authentication Process and timeline for removing company access, data, and secure software from device when it will no longer be used Support policies that outline when issues will be handled by IT, the end user or the device manufacturer.

How to implement it? Don t just say NO to BYOD Be prepared to give up some control Listen to the end users Consider a pilot program - research and test your approach Define different user profiles Document and communicate a clear set of policies Adopt a reasonable reimbursement Plan your mobile application development policy Plan for a more complex support burden Prepare your helpdesk for the task

Thank you for your time!