SlideShare a Scribd company logo
Mobilizing your Enterprise:
  The Why and The How
Agenda
The Why?
 Mobilizing your Apps – The ‘In Thing’
 Do All Corporations Watch Over BYOD?
 The BYOD Effect
 Security Concern for Enterprises

The How?
 How do I Provide Mobile Access to Enterprise
  IT Apps?
 Security Best Practices
      • Encryption
      • Proxy Server
      • Authentication

                Here’s how SolarWinds Mobile Admin can help…
 Mobilizing Your Enterprise: The Why and The How   - Slide 2 -
Mobilizing your Apps – The ‘In Thing’
 The BYOD revolution has started

  Percentage of Corporations Issuing Mobile
  Devices to Access the Corporate Network




                  Source: Survey jointly conducted by SolarWinds & Network World
                        Respondents: 400 IT pros from different companies


Mobilizing Your Enterprise: The Why and The How   - Slide 3 -
Do All Corporations Watch Over BYOD?
 Employee-owned personal mobile devices peaking
         How many corporations know about personal
          mobile devices on the corporate network?



                                                                     59.3% respondents
                                                                            say
                                                                   “No device restrictions
                                                                      when it comes to
                                                                      employee-owned
                                                                       devices on the
                                                                   corporate network..!!”




                  Source: Survey jointly conducted by SolarWinds & Network World
                        Respondents: 400 IT pros from different companies


Mobilizing Your Enterprise: The Why and The How   - Slide 4 -
The BYOD Effect
                                                                        The BYOD effect:
                                                                       Certainly a boon..!!
                                                                   Increased Employee
                                                                    Productivity
                                                                   Faster response times to
                                                                    solve issues
                                                                   Flexibility to work remotely
                                                                   After-hours support can be
                                                                    offered
                                                                   Personalized work interface
                                                                    for users
                                                                   Improved employee morale
                                                                    and job satisfaction



                  Source: Survey jointly conducted by SolarWinds & Network World
                        Respondents: 400 IT pros from different companies


Mobilizing Your Enterprise: The Why and The How   - Slide 5 -
Security Concern for Enterprises
 Potential for loss of confidential information via personal
  devices
 Legal issues and regulatory compliance risks
 Introduction of malware threats
 Management burden associated with supporting diverse
  device types
 Ensuring user authentication, security, and encryption
 Policy formulation and enforcement
 Monitoring and management of Wi-Fi access points




Mobilizing Your Enterprise: The Why and The How   - Slide 6 -
How Do I Provide Mobile Access to Enterprise IT Apps?

   Does my current app support mobile access?
   Do I need to hire a developer or can I buy something off-
    the-shelf?
   What are the hardware and software requirements for
    providing mobile access to the application?
   What mobile devices does the application support?
   What kind of security do I need?
   How do I effectively monitor and manage my apps
    remotely?




  Mobilizing Your Enterprise: The Why and The How   - Slide 7 -
Security Best Practices
1. Encryption
         Depending on the type of wireless handheld devices used, mobile
         device encryption can be classified as
         » Encryption using Blackberry Enterprise Server for Blackberry
         » Encryption with VPN (iOS and Android devices)
         » Encryption with HTTPS (iOS, Android and BlackBerry devices)


2. Using proxy to secure your firewall

3. Authentication




Mobilizing Your Enterprise: The Why and The How   - Slide 8 -
1. Encryption
 Encryption Using BlackBerry Enterprise Server
         » all your data is sent over the Mobile Data Service (MDS).
         » automatically encrypted using Triple Data Encryption Standard (TDES or
           3DES).
         » While TDES provides the highest industry standard encryption, you can also
           choose additional layers of encryption.
         » All versions of the BlackBerry Enterprise Server use TDES as the default
           encryption for all data.


 The BlackBerry Enterprise Server 4.1 allows you to choose between
  using TDES and Advanced Encryption Standard (AES), or both.

 While TDES and AES are generally recognized as the most robust
  encryption methods available today, the US Government has also
  certified TDES and AES as compliant with Federal Information
  Processing Standards (FIPS).


Mobilizing Your Enterprise: The Why and The How   - Slide 9 -
1. Encryption (contd.)
 Encryption with VPN for Apple iOS & Android
         »     You can encrypt Apple iOS and Android devices with a Virtual Private
               Network (VPN).
         »     If you use a VPN, all your data is sent over the VPN, and is, by default,
               automatically encrypted.


 Encryption with Hypertext Transfer Protocol – Secured (HTTPS)
         »     Regardless of using the above 2 encryptions, you can also add a layer of
               encryption with Hypertext Transfer Protocol – Secured (HTTPS).
         »     HTTPS is HTTP encrypted with Transport Layer Security (TLS).
         »     Here all data transmitted between the application server and the wireless
               handheld is encrypted.




Mobilizing Your Enterprise: The Why and The How   - Slide 10 -
2. Using Proxy to Secure your Firewall
 If a common proxy service is not used
         » then all SSH/Telnet and RDP/VNC servers must have the appropriate
           firewall configuration.

 If you have a common server for mobile platform integration, a proxy
  service can be used.
         » This helps to lock down your firewall to have fewer openings for users’
           without permission to access servers.

 The proxy service proxies SSH/Telnet and RDP/VNC traffic.

 The mobile app clients authenticate transparently to the proxy
         » if the appropriate rights and permissions have been configured.

 The proxy service can enable access to SSH/Telnet and RDP/VNC
  servers through a central port rather than having to configure access
  to each individual server.


Mobilizing Your Enterprise: The Why and The How   - Slide 11 -
3. Authentication
 Ensure only the users with permission can access the
  company infrastructure
         » Mobile App Login
                • Windows based – user name & password
                • Application specific user name & password

         » Active Directory – only wanted users of the application can
           access it. If you have a central server for mobile application
           access, Active Directory can ensure users get access to the
           applications they need.

         » Device Level Password

         » RSA SecurID/RADIUS




Mobilizing Your Enterprise: The Why and The How   - Slide 12 -
How SolarWinds® Mobile Admin™ can help
  Solve IT issues more effectively (from your mobile device)
   through a single pane of glass

  Support and navigation across 40+ IT management tools

  Diagnose, triage & resolve IT issues in a few clicks from any
   smartphone or tablet

  Delivers real-time alerts and statuses on your Android, iOS, and
   Blackberry devices

  Remote control with SSH, Telnet, VNC, RDP, proxy via Mobile
   Admin Server or direct connect

  Easy to download & deploy, easy to use, & easy on your budget



 Mobilizing Your Enterprise: The Why and The How   - Slide 13 -
Helpful Resources
  For agentless IT management & monitoring from
   any mobile device, we invite you to learn more
         about SolarWinds Mobile Admin


          Watch Video                            See Demo




       Ask Our Community                    Download Free Trial



                  Click any of the links above


                             - Slide 14 -
Author: Jennifer Kuvlesky




    Thank You!

More Related Content

PPTX
New Tool for Automating Exchange Management Tasks
PPTX
How Do I Know My SQL & Virtual Environments Are Ready for SSD?
PPT
Common WSUS Issues in Deployment Operations and Diagnostics
PDF
On designing and deploying internet scale services
PDF
Predicting the Future of Endpoint Management in a Mobile World
PPTX
The Path to Streamlining and Automating Data Center Operations
PDF
Ensuring Rock-Solid Unified Endpoint Management
PPT
How-To: WSUS Reporting Made Easier
New Tool for Automating Exchange Management Tasks
How Do I Know My SQL & Virtual Environments Are Ready for SSD?
Common WSUS Issues in Deployment Operations and Diagnostics
On designing and deploying internet scale services
Predicting the Future of Endpoint Management in a Mobile World
The Path to Streamlining and Automating Data Center Operations
Ensuring Rock-Solid Unified Endpoint Management
How-To: WSUS Reporting Made Easier

What's hot (19)

PDF
Migrating workloads to OpenStack
PDF
How to Migrate Without Downtime
PDF
Mmckeown hadr that_conf
PPTX
System Center Essentials
PDF
Installation
PDF
Presentation managing the virtual environment
PPTX
Introduction to virtualization
PDF
An Introduction to Designing Reliable Cloud Services January 2014
PDF
Effective Patch and Software Update Management
PPTX
SCCM on Microsoft Azure
PDF
15 Vmware interview questions & answers 2018
PPTX
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PDF
Microsoft System Center 2012 R2 Overview - Presented by Atidan
PPTX
Enterprise Management with Microsoft Technologies
PDF
Encontrando la Aguja en el Rendimiento de Aplicaciones
PPTX
So you’ve successfully installed SCOM… Now what.
PPTX
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...
PPTX
Top 3 Reasons to Move Existing Applications to the Cloud
PPTX
The Most Underutilized Configuration Management Features
Migrating workloads to OpenStack
How to Migrate Without Downtime
Mmckeown hadr that_conf
System Center Essentials
Installation
Presentation managing the virtual environment
Introduction to virtualization
An Introduction to Designing Reliable Cloud Services January 2014
Effective Patch and Software Update Management
SCCM on Microsoft Azure
15 Vmware interview questions & answers 2018
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Enterprise Management with Microsoft Technologies
Encontrando la Aguja en el Rendimiento de Aplicaciones
So you’ve successfully installed SCOM… Now what.
XenApp Virtualization Success - How to Eliminate Storage and Networking Bottl...
Top 3 Reasons to Move Existing Applications to the Cloud
The Most Underutilized Configuration Management Features
Ad

Similar to Mobilizing Your Enterprise, Why & How? (20)

PDF
Presentatie mc afee emm 2011
PPTX
Mobilemonday b2b mobco
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PPTX
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
PDF
The Mobile Way Brochure
PDF
Webinar: Mobile Device Management
PDF
Mobile device management
PPTX
Bcs presentation zacharias_enislidis
PDF
Ajax World West I Phone Summit
PPTX
Mobile advisor zenprise-pitch - lars
PDF
Ibm solutions for the mobile enterprise
PDF
Flexible workstyle windows roadmap for solution day matthew hardman
PPTX
Enterprise mobility and cloud
PDF
IBM mobile strategy at Innovate 2012
PDF
Five_Steps_to_Consumerization
PDF
Securing mobile devices 1
PDF
Securing mobile devices_in_the_business_environment
PPTX
UXT Chicago - Designing Mobile Apps for Enterprise Use
PPTX
Enterprise Mobility Trends, Components, Implementation
PPTX
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Presentatie mc afee emm 2011
Mobilemonday b2b mobco
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
The Mobile Way Brochure
Webinar: Mobile Device Management
Mobile device management
Bcs presentation zacharias_enislidis
Ajax World West I Phone Summit
Mobile advisor zenprise-pitch - lars
Ibm solutions for the mobile enterprise
Flexible workstyle windows roadmap for solution day matthew hardman
Enterprise mobility and cloud
IBM mobile strategy at Innovate 2012
Five_Steps_to_Consumerization
Securing mobile devices 1
Securing mobile devices_in_the_business_environment
UXT Chicago - Designing Mobile Apps for Enterprise Use
Enterprise Mobility Trends, Components, Implementation
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Ad

More from SolarWinds (20)

PPTX
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
PPTX
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
PPTX
Government Webinar: Alerting and Reporting in the Age of Observability
PPTX
Government and Education Webinar: Full Stack Observability
PPTX
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
PPTX
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
PPTX
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
PPTX
Government and Education Webinar: Simplify Your Database Performance Manageme...
PPTX
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
PPTX
Government and Education Webinar: Leverage Automation to Improve IT Operations
PPTX
Government and Education Webinar: Improving Application Performance
PPTX
Government and Education: IT Tools to Support Your Hybrid Workforce
PPTX
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
PPTX
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
PPTX
Government and Education Webinar: Zero-Trust Panel Discussion
PPTX
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
PPTX
Government and Education Webinar: SQL Server—Advanced Performance Tuning
PPTX
Government and Education Webinar: Recovering IP Addresses on Your Network
PPTX
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
PPTX
Government and Education Webinar: Conquering Remote Work IT Challenges
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
Government Webinar: Alerting and Reporting in the Age of Observability
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Improving Application Performance
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Conquering Remote Work IT Challenges

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Monthly Chronicles - July 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Network Security Unit 5.pdf for BCA BBA.

Mobilizing Your Enterprise, Why & How?

  • 1. Mobilizing your Enterprise: The Why and The How
  • 2. Agenda The Why?  Mobilizing your Apps – The ‘In Thing’  Do All Corporations Watch Over BYOD?  The BYOD Effect  Security Concern for Enterprises The How?  How do I Provide Mobile Access to Enterprise IT Apps?  Security Best Practices • Encryption • Proxy Server • Authentication Here’s how SolarWinds Mobile Admin can help… Mobilizing Your Enterprise: The Why and The How - Slide 2 -
  • 3. Mobilizing your Apps – The ‘In Thing’  The BYOD revolution has started Percentage of Corporations Issuing Mobile Devices to Access the Corporate Network Source: Survey jointly conducted by SolarWinds & Network World Respondents: 400 IT pros from different companies Mobilizing Your Enterprise: The Why and The How - Slide 3 -
  • 4. Do All Corporations Watch Over BYOD?  Employee-owned personal mobile devices peaking How many corporations know about personal mobile devices on the corporate network? 59.3% respondents say “No device restrictions when it comes to employee-owned devices on the corporate network..!!” Source: Survey jointly conducted by SolarWinds & Network World Respondents: 400 IT pros from different companies Mobilizing Your Enterprise: The Why and The How - Slide 4 -
  • 5. The BYOD Effect The BYOD effect: Certainly a boon..!!  Increased Employee Productivity  Faster response times to solve issues  Flexibility to work remotely  After-hours support can be offered  Personalized work interface for users  Improved employee morale and job satisfaction Source: Survey jointly conducted by SolarWinds & Network World Respondents: 400 IT pros from different companies Mobilizing Your Enterprise: The Why and The How - Slide 5 -
  • 6. Security Concern for Enterprises  Potential for loss of confidential information via personal devices  Legal issues and regulatory compliance risks  Introduction of malware threats  Management burden associated with supporting diverse device types  Ensuring user authentication, security, and encryption  Policy formulation and enforcement  Monitoring and management of Wi-Fi access points Mobilizing Your Enterprise: The Why and The How - Slide 6 -
  • 7. How Do I Provide Mobile Access to Enterprise IT Apps?  Does my current app support mobile access?  Do I need to hire a developer or can I buy something off- the-shelf?  What are the hardware and software requirements for providing mobile access to the application?  What mobile devices does the application support?  What kind of security do I need?  How do I effectively monitor and manage my apps remotely? Mobilizing Your Enterprise: The Why and The How - Slide 7 -
  • 8. Security Best Practices 1. Encryption Depending on the type of wireless handheld devices used, mobile device encryption can be classified as » Encryption using Blackberry Enterprise Server for Blackberry » Encryption with VPN (iOS and Android devices) » Encryption with HTTPS (iOS, Android and BlackBerry devices) 2. Using proxy to secure your firewall 3. Authentication Mobilizing Your Enterprise: The Why and The How - Slide 8 -
  • 9. 1. Encryption  Encryption Using BlackBerry Enterprise Server » all your data is sent over the Mobile Data Service (MDS). » automatically encrypted using Triple Data Encryption Standard (TDES or 3DES). » While TDES provides the highest industry standard encryption, you can also choose additional layers of encryption. » All versions of the BlackBerry Enterprise Server use TDES as the default encryption for all data.  The BlackBerry Enterprise Server 4.1 allows you to choose between using TDES and Advanced Encryption Standard (AES), or both.  While TDES and AES are generally recognized as the most robust encryption methods available today, the US Government has also certified TDES and AES as compliant with Federal Information Processing Standards (FIPS). Mobilizing Your Enterprise: The Why and The How - Slide 9 -
  • 10. 1. Encryption (contd.)  Encryption with VPN for Apple iOS & Android » You can encrypt Apple iOS and Android devices with a Virtual Private Network (VPN). » If you use a VPN, all your data is sent over the VPN, and is, by default, automatically encrypted.  Encryption with Hypertext Transfer Protocol – Secured (HTTPS) » Regardless of using the above 2 encryptions, you can also add a layer of encryption with Hypertext Transfer Protocol – Secured (HTTPS). » HTTPS is HTTP encrypted with Transport Layer Security (TLS). » Here all data transmitted between the application server and the wireless handheld is encrypted. Mobilizing Your Enterprise: The Why and The How - Slide 10 -
  • 11. 2. Using Proxy to Secure your Firewall  If a common proxy service is not used » then all SSH/Telnet and RDP/VNC servers must have the appropriate firewall configuration.  If you have a common server for mobile platform integration, a proxy service can be used. » This helps to lock down your firewall to have fewer openings for users’ without permission to access servers.  The proxy service proxies SSH/Telnet and RDP/VNC traffic.  The mobile app clients authenticate transparently to the proxy » if the appropriate rights and permissions have been configured.  The proxy service can enable access to SSH/Telnet and RDP/VNC servers through a central port rather than having to configure access to each individual server. Mobilizing Your Enterprise: The Why and The How - Slide 11 -
  • 12. 3. Authentication  Ensure only the users with permission can access the company infrastructure » Mobile App Login • Windows based – user name & password • Application specific user name & password » Active Directory – only wanted users of the application can access it. If you have a central server for mobile application access, Active Directory can ensure users get access to the applications they need. » Device Level Password » RSA SecurID/RADIUS Mobilizing Your Enterprise: The Why and The How - Slide 12 -
  • 13. How SolarWinds® Mobile Admin™ can help  Solve IT issues more effectively (from your mobile device) through a single pane of glass  Support and navigation across 40+ IT management tools  Diagnose, triage & resolve IT issues in a few clicks from any smartphone or tablet  Delivers real-time alerts and statuses on your Android, iOS, and Blackberry devices  Remote control with SSH, Telnet, VNC, RDP, proxy via Mobile Admin Server or direct connect  Easy to download & deploy, easy to use, & easy on your budget Mobilizing Your Enterprise: The Why and The How - Slide 13 -
  • 14. Helpful Resources For agentless IT management & monitoring from any mobile device, we invite you to learn more about SolarWinds Mobile Admin Watch Video See Demo Ask Our Community Download Free Trial Click any of the links above - Slide 14 -