Enterprise Mobility Management: completing the EMM story

Similar documents
Voice. The lost piece of the BYOD puzzle.

Smart guide to mobile call recording for MiFID II

Thinking beyond data security: a comparison of the main mobile strategies

Voice. The lost piece of the BYOD puzzle.

Should you be mixing business and pleasure? smart guide to the costs and risks of allowing business and personal calls on one phone

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

XenApp, XenDesktop and XenMobile Integration

Enterprise Mobility Management

Office 365 Business The Microsoft Office you know, powered by the cloud.

Bring Your Own Device. Peter Silva Technical Marketing Manager

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Symantec Endpoint Protection Cloud (SEPC)

BYOD: BRING YOUR OWN DEVICE.

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

SECURE, CENTRALIZED, SIMPLE

white paper SMS Authentication: 10 Things to Know Before You Buy

Securing Today s Mobile Workforce

Mobile investment toolkit: Device selection considerations

RHM Presentation. Maas 360 Mobile device management

Enterprise Mobility Management Buyers Guide

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

An overview of mobile call recording for businesses

3-Part Guide to Developing a BYOD Strategy

Five Reasons It s Time For Secure Single Sign-On

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced.

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Identity Management as a Service

Trustlook Insights Q BYOD Trends & Practices

The security challenge in a mobile world

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Bring Your Own TVH. Kalman Tiboldi CBIO

Bring Your Own Device (BYOD) Policy

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

BRING YOUR OWN DEVICE (BYOD)

Managing Devices and Corporate Data on ios

ForeScout ControlFabric TM Architecture

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Enterprise Product Guide

TeleWare Re:Call FAQ for Resellers

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

The Device Has Left the Building

Curatrix. How can Curatrix Communications help your business? Communications. Connecting your Business

Five Tips to Mastering Enterprise Mobility

device management solution

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

The State of the Trust Gap in 2015

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM

Logicalis What we do

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

What Dropbox Can t Do For Your Business

Next Generation Authentication

MiCloud Enterprise. Mobile-Ready, Customer-Focused, Cloud-Driven Communications

Mobile Security using IBM Endpoint Manager Mobile Device Management

Rethinking MDM in a BYOD World

Six steps to control the uncontrollable

Phil Schwan Technical

Unified Communications. What are the Key Benefits of Replacing PBX with Cloud Based Solutions?

EBOOK. Mobile Experience Virtualization: Extend Virtualized Windows Apps to Mobile

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Transform your network and your customer experience. Introducing SD-WAN Concierge

Managing Windows 8.1 Devices with XenMobile

Google Identity Services for work

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

NFON Whitepaper: Integrating Microsoft Lync (Skype for Business) with Telephony

ICX Features for Users

Application management in Nokia: Getting the most from Company Apps

WELCOME TO MYTOMCHAT.COM. World-Mobile Solutions Ltd, UK

OmniJoin.com. Secure web conferencing from Brother

MDM and beyond: Rethinking mobile security in a BYOD world

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

Microsoft IT deploys Work Folders as an enterprise client data management solution

From the past to the future: how to make the move from ISDN to SIP

Secure Network Access for Personal Mobile Devices

The Connected Worker and the Enterprise of Things

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Transform your network and your customer experience. Introducing SD-WAN Concierge

INDIA The Changing Face of the Workplace: Going Light and Mobile

Connect. Bringing fixed and mobile communications together - anytime, anywhere

SecureDoc: Making BitLocker simple, smart and secure for you. Your guide to encryption success

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Embracing the Mobile Imperative

UNIVERGE DESKTOP TELEPHONES

BYOD: A Risk analysis grid for large corporates Corix Partners

UNIVERGE DESKTOP TELEPHONES.

Cloud Security: Constant Innovation

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

How Next Generation Trusted Identities Can Help Transform Your Business

Communicate anywhere, anytime, on any device

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Bring Your Own Device

Transcription:

Enterprise Mobility Management: completing the EMM story

Contents BYOD & EMM 3 Enterprise Mobility Management what is it? 4 Accessing corporate systems, apps 5 and data with EMM Apps in the container 6 But what about mobile voice calls? 7 The EMM voice challenge 8 smartnumbers mobile for Good 9 Find out more 10 Enterprise Mobility Management: completing the EMM story 2

BYOD & EMM The consumerisation of IT in the last decade has led to many in today s mobile workforce expecting to be able to use their personal devices for work, with the IT department left to deal with the issues and risks that this presents. This trend of workers using their own devices for work is known as bring your own device, or BYOD. The pros and cons of BYOD are well understood by business leaders, and whilst much has been written both for and against it is generally agreed that BYOD is set to continue growing, as personal technology becomes ever more ubiquitous. It s no wonder then that businesses are increasingly embracing Enterprise Mobility Management (EMM) to secure, provision, audit and support business use of personal mobile devices. By enabling workers to securely access business systems, applications and data from their mobile devices, employers and staff benefit from staff being able to work anywhere, at any time. This does not imply that staff are expected to work longer hours, but that they are empowered to work smarter improving work life balance and increasing staff satisfaction and productivity. Enterprise Mobility Management: completing the EMM story 3

Enterprise Mobility Management what is it? EMM solutions help organisations securely integrate mobile devices with their IT systems and policies frameworks. There are four core EMM technical categories that help IT organisations achieve this. Organisations may use some or all of them depending on their requirements: Mobile device management (MDM): MDM provides inventory, OS configuration management, mobile app provisioning and de-provisioning, remote wipe, and remote viewing/control for troubleshooting. Mobile application management (MAM): MAM applies management and policy control functionality to individual applications, necessary when the OS does not provide adequate management or security capability or when organisations elect not to install an MDM agent on the device. MAM can also provide analytics capabilities to help administrators and application owners understand usage patterns. Mobile identity: EMM tools use one or a number of technologies to ensure that only trusted devices and users can access business applications. EMM tools are increasingly using contextual information such as location and time to help inform access decisions. Mobile content management (MCM): MCM enables users to store, access and distribute content from their mobile devices. Enterprise Mobility Management: completing the EMM story 4

Accessing corporate systems, apps and data with EMM Regardless of which EMM technical categories are employed, and which device or devices are being used, access to corporate systems, applications and data must be simple, rapid and secure, without changing the native user experience of the device. A solution to this is to secure the data using container technology. Containers can deliver this simplicity, speed and security by giving the user access to corporate systems and data which are available through a secured container on the mobile device. This ensures the sensitive data is safe by keeping corporate data encrypted and separated from personal data on the device, whilst ensuring a good user experience. Enterprise Mobility Management: completing the EMM story 5

Apps in the container For a worker to be truly productive when working remotely, the organisation should mobilise as many business systems as possible and offer third-party productivity apps. Apps are typically split between core apps which are available from all EMM vendors, and secured/certified third party apps which vary across vendors. Core apps are typically: Essential functionality such as email, contacts and calendar File share and synch, allowing checkout, edit, annotate and upload Instant messaging from the corporate address book A secure web browser to access intranets and private content Full access to the CRM system. EMM providers also offer a growing range of certified third-party apps to enable a wide range of additional functionality to assist mobile workers. These include apps to provide secure functionality such as: Document editing Document signing Secure mobile printing Time tracking and recording Expenses management And a whole lot more! One of the key functions of EMM is that if the mobile device is mislaid, lost or compromised, or the employee leaves the company, any or all of these business apps and data can be remotely wiped without any impact on the device owner s personal data. Enterprise Mobility Management: completing the EMM story 6

But what about mobile voice calls? Voice calls, and increasingly mobile calls, are a critical part of any business. In the past, businesses typically provided a corporate mobile phone to employees so that the business number was owned by the business, and when staff changed roles or left the business the mobile phone and therefore the mobile number - could simply be given to their replacement. Calls made on the corporate phone were billed to the business, and contacts stored on the business phone were kept separate from personal contacts. When not at work, the phone could be turned off, and missed calls and voicemails could be dealt with on the next working day. But with the rise of BYOD, and EMM to separate business and personal apps and data on mobile devices, none of this makes sense. Staff no longer expect to carry two mobiles they expect to be able to use their own - and to have systems in place to accommodate this. Furthermore, they don t always want to expose their personal number for business. Enterprise Mobility Management: completing the EMM story 7

The EMM voice challenge When a user dials a contact directly from any app within the EMM environment, the number will be dialed from their personal mobile number, which may for a wide range of reasons not be appropriate. Calls made from the user s personal number will present the user s personal CLI instead of the business one, will probably need to be expensed, and most likely will result in future calls from the contact being made to the users personal number, and if the staff member changes roles or leaves, the contact may be lost. None of this is ideal. What is needed is a mobile voice service that presents the users business mobile number instead of their personal one. This number should be used when the user dials directly from any application inside the container, and should use a corporate contact directory to store business contact numbers instead of the contacts directory on the mobile phone. With smartnumbers mobile for Good, this is now possible. Enterprise Mobility Management: completing the EMM story 8

smartnumbers mobile for Good Resilient has recently partnered with Good Technology, one of the world s leading EMM providers, to provide a second, Good Dynamics secured, mobile number from any personal mobile. From inside the Good EMM container, smartnumbers mobile integrates with other Secured by Good apps, so calls and SMSs made from any corporate contacts directory inside the container or directly from an email signature will be made from the business mobile number instead of the personal one. A smartnumber is more than just a mobile number though. It provides a range of features not available on regular business mobiles such as call recording on demand, call delegation for when the user is busy or unavailable, and call redirection to any phone for when out of signal or battery, whilst the native user experience of the phone outside of the container remains unchanged. Calls made from the number are charged directly to the business and if the employee changes role or employer the smartnumber can be transferred to their replacement. For the first time, Good EMM users can have a complete separation of business and personal use on one device including voice and SMS. The EMM story is now complete. Enterprise Mobility Management: completing the EMM story 9

About Resilient This smart guide was created by Resilient, the company behind smartnumbers, a range of communications services that deliver mobility, continuity and compliance to public and private sector organisations. smartnumbers are trusted by 7 of the top 10 global investment banks, 50% of the UK s blue light services, and over 40,000 Ministry of Defence personnel. The services are available directly from Resilient and also from BT. This smart guide is not intended to be a source of legal advice, and should not be relied on as such. Phone 020 3379 9000 or visit www.resilientplc.com trusted communications mobility continuity compliance