Managing non BB Devices.mov


Uploaded by VoxMobileTechnology on 19.09.2010

Transcript:
Hi my name is Gerald Hetrick, I'm the Chief Technology Officer at Vox Mobile
and I've got a question for you. How many time have you been asked today or this week
from from an end-user to connect their iPhone, or their Android, or their iPad device to
their network? They've probably said things like, "It's easy my buddy does it at another
company," or, "The documentation on Apple's website says I can do it pretty easily. Just
turn it on just let me do it." And you know this is a real pressure. If you look at most
of our growing enterprise environments we've got Blackberries, they're here, they're most
in most of our population. We've got iPhones coming out of nowhere. We've got Android devices
being lit up in peoples hands on a day to day basis. Windows Mobile is still around.
The world is changing. Device sterilization is no longer the key IT initiative in the
mobility world. Really, we've got to focus on device control and policy and mobile policy
control across a whole growing set of different types of devices. This is a core challenge
and this is what we want to talk about today. So one of the options is to turn on ActiveSync
or to continue to run Active Sync and its not a horrible option if you just want to
synchronize email. But if you're worried about controlling the devices and the types of data
that's on the devices you've got a little bit of a conundrum on your hands. First, policies
on these devices are not consistent. The policies on an iPhone don't match the policies that
are available on the Android device and quite frankly the policy and the cost different
versions of exchange aren't consistent. You don't really have any reporting. You can't
really go find out whats going on with these policies. Sure there's 3 or 4 you can run
out of exchange and it will give you some data, but its not going to leave you feeling
comfortable that you really know whats happening in your environment. And to take that a step
further, there's no real good management consul. You can't really go anywhere and say I want
to put these users in this group and give them this mobility policy. I want my executives
to have a 10 character password set and I want, and I want everyone else to have a 4
character password set. You really cant do that. And you do that in the BES world today,
so doesn't it seem like if you think its important on the Blackberry side you should think its
important on the non Blackberry side? There is solutions for it. One of the ones we recommend,
or the one we recommend most, is the Good for Enterprise solution from Good Technology.
The best thing about this solution is the pure separation of corporate data from personal
data. As a corporate IT administrator, I can control whats on the device from a corporate
email, calendar, contact perspective and I can let the users manage their own personal
emai,l you know, pictures, iTunes, apps they may have downloaded; I can also wipe my corporate
data if the user leaves the company. I can send a wipe command, feel comfortable the
wipe command is executed, be reported to that the wipe command was executed and know that
the email contact and calendar data and other application data is gone, but I haven't necessarily
touched any of the end-users personal data. So if they leave and they take their iPhone
with them, I'm not going to wipe away the pictures of their family and the apps they
have downloaded. So whats the Good for Enterprise solution look like? Well it looks a lot like
your BES environment. You have devices that are out in your end-users hand connecting
through all the available wireless providers: AT&T, Verizon, Sprint devices across all these
providers will work. You have a NOC. You bought into the NOC strategy from a Blackberry perspective.
Well Good has NOCs around the country. All the data goes through the NOC: you've got
your firewall and your server that sits behind the firewall. No ports open. Its outbound
initiated only and you've got access to all this back-end data, all while being secured
in a separate container on the device. Data enroute, or in transit, secured over an AES
encrypted tunnel just like a Blackberry world. You should be feeling comfortable and able
to sleep at night that your non-Blackberry devices are protected just like your Blackberry
devices. So once again, my name is Gerald Hetrick I'm CTO of Vox Mobile. If you've got
any more questions or concerns please contact us. Otherwise, check back here for more videos
on the same topic. Thanks.