Document 7212222

Download Report

Transcript Document 7212222

Unified Endpoint Management and Security
Mobile Device Management
Typical Business Challenges
How do I minimize IT operating expenses, without sacrificing
productivity or security?
How do I manage endpoints and mobile devices and
provide end-user support without diverting my IT staff
from more strategic revenue generating initiatives?
How can I easily manage and enforce our polices
when employees are using mobile devices?
How do keep my mobile workers better
connected to our applications and systems?
How can I effectively inventory and manage all
the corporate and personal devices that have
access to our business systems?
How do I capitalize on the productivity gains
of enabling a BYOD strategy without losing
control of security policies or exposing our
systems to increased security threats?
Gartner Endpoint Security Predictions
Predicts 2013: Endpoint Security Becomes Even More Important for
Infrastructure Protection as the number and types of devices
accessing enterprise resources explode.
Key Findings
• Malware authors typically attack the easiest and most prevalent
targets. Mobile devices offer a range of possibilities along these
two scales.
• Most organizations are removing URL blocks and permitting most
employees to access external social media from corporate-owned
and managed endpoints and networks.
Published: 29 November 2012
Gartner MDM Recommendations
What to look for in Mobile Device Management Software
Recommendations
• Use MDM technologies, including containers, for securing enterprise
data and enabling support for mobile content and users.
• Evaluate providers on technical critical capabilities and business
factors, such as geographic reach, customer support and financial
viability.
• Define and create mobile policies, continue to segment mobile users,
and add support based on security, data, app, location and cost
requirements..
Critical Capabilities for Mobile Device Management Software
Published: 23 May 2013
Unified Endpoint Management and Security
• Simplifies the management, improves performance, and protects all
endpoints on your network – desktop, laptop and mobile
• Minimize disruptions in your day-to-day business operation
• Delivers a service with security features woven throughout every
aspect of our offering.
• Managed by Industry-certified professionals, utilizing best-in-class
tools, and the latest technology
Endpoint Management Core Components
• Endpoint Security for all PCs/Macs in your environment
• EarthLink Core Protection Suite (CPS) helps ensure your PCs/Macs are
kept current with virus and spyware definition updates and critical
security patches for faster, smarter endpoint protection.
• View the health of all managed endpoints on your network from a single
pane of glass.
• As threats emerge, EarthLink CPS enables rapid remediation
• Automating time-intensive tasks across complex networks, lets you can
control costs while reducing risk and supporting your compliance
requirements.
Endpoint Offerings for Mac & PC
EP Security
EP M&S
Unified Endpoint Management & Security Offerings
SaaS Anti-Malware (Anti-Virus/Spyware) Protection
P
P
SaaS Patch Management
P
P
SaaS Tools Self-healing for CenterBeam
P
P
SaaS Asset Tracking (Dashboard)
P
P
Event Notification (Notify Only)
P
P
Event Management (Receive, Log, Classify & Track)

P
Incident Management & Remediation

P
SaaS Software Distribution

P
SaaS Automated Hard Drive Defragmentation

P
CenterBeam Continuous Configuration (C3) Management

P
24x7 Staffed Monitoring as a Service (MaaS)

P
24x7 Staffed Helpdesk w/Case Tracking & Reporting

P
Legend
Data Protection (Streaming Offsite Backup & Recovery)


P
Included
Web Content Filtering



Optional

N/A
Benefits Unified Endpoint Management & Security
• Control all policies and security uniformly across all desktop and
mobile devices
• Cost certainty (scale up/down to meet your business needs)
• Always current capabilities (ability to add new users, support diverse
new operating systems, leverage best-in-breed tools)
• Enhance security posture
• 24x7 monitoring & remediation
• Asset tracking & reporting via an online dashboard
• Around the clock access to subject matter experts for your staff
• Performance optimization (keep all endpoints working at optimal
speed)
• Easily distribute software applications
Mobile Device Management
• The “bring your own device” (BYOD) revolution, makes it more
important than ever to integrate device management into your
enterprise management structure. Taking a holistic approach and
managing, on a single pane of glass, mobile devices alongside your
servers, desktops and laptops ensures consistent application of your
corporate security policies across all endpoints that access your
network.
Mobile Device Management
• Protect your mobile devices as they access more and
more sensitive applications and data.
• Protect your organization from unauthorized or corrupted devices.
• Detect security threats such as rooted or jail-broken devices and
automatically take countermeasures.
• Automatically identify non-compliant devices.
• Configure and enforce password policies, encryption, virtual private
network (VPN) access and camera use.
• Selectively wipe only corporate data such as calendar, email, contacts
and enterprise-managed applications when a device is lost or stolen.
• Control non-compliance by disabling access to enterprise resources
such as email and applications, or by issuing user notifications until
corrective actions are implemented.
• Discover and understand which mobile devices employees and others
connected to the network are using.
10
Mobile Device Management
iOS
Android
Windows
Mobile Device Management Services
24x7 Staffed Monitoring as a Service (MaaS)
P
P
P
Helpdesk w/Case Tracking & Reporting
P
P
P
Incident Management
P
P
P
Password policies, full device wipe
P
P
P
Deny email access, user notification
P
P
P
Remote lock/unlock, jailbreak & root detection
P
P
Application inventory, whitelisting, blacklisting
P
P
Enterprise app store
P
P
Track devices and locate on map
P
P
Selective wipe
P
Device encryption
P
Configuration of Email, VPN, WiFi
P
SaaS Asset Tracking (Dashboard)
P
P
P
** Functionality varies by Manufacturer and Device OS, and is limited by the MDM APIs of the Manufacturer **
11
Mobile Device Management Benefits
• Provide visibility and policy management
via a single pane of glass
• Address business and technology issues
of security, complexity and bring your own device
(BYOD) in mobile environments
• Manage enterprise and personal data separately with
capabilities such as selective wipe
• Leverage a single infrastructure to manage all enterprise
devices— smartphones, tablets, desktops, laptops and
servers
• Support devices on Apple iOS, Google Android, and
Microsoft Windows Phone platforms
12
End-user Helpdesk Support Options
• 24x7 Live IT Support for Unified Endpoint Management and
Security or Mobile Device Management
• North American-based single point-of-contact for all of your users
IT-related issues
• Staffed by highly trained customer care specialists, who would
generally be considered Level 2 support agents
• Certifications in Microsoft®, Apple® and mobile device technologies
• Available in 13 different languages to support global work force
• Very first person you talk to will likely be able to resolve your issue
• And if not, subject matter experts are standing by
14
EarthLink Advantages
Enterprise Class Solutions
• Integrating desktop/laptop and mobile device endpoint management
into a unified environment with consistent policies and controls
• Visibility, control and management of all your endpoints via one
console
• Fully managed by certified experts who maintain and manage the
solutions implemented
• Helpdesk support to keep your end-users productive
• No CAPEX or internal IT support required
• Award winning service
Support Team
of the Year –
Computer
Software &
Services
Category
Outstanding
achievement
in customer
satisfaction
2013 IBM Tivoli
Award:
Excellence in
delivering
exceptional
business value
14