MacTech InDepth: Mobile Device Management Chicago 2012
From small business to Enterprise, Mobile Device Management (MDM) has become one of the hottest topics facing corporate environments not only because of growing demand generated by business users, but also because of the incredible opportunities mobile devices provide for your business. With everything from deployment to management to security and more facing organizations, MacTech InDepth gives you the opportunity to spend a full day on the topic and identify where you are, what you need to do, and how you are going to get there.
July 19, 2012
Hotel Allegro-A Kimpton Hotel
171 West Randolph Street
Chicago, IL 60601
Mobile Device Management Overview
Before you can start implementing mobile device management, you have to know what it is. We define MDM for you and explain where to start. What is the MDM landscape? We explain where it came from and who the major players and platforms are. It’s important to know the solutions offered by Apple’s iPhone Configuration Utility (IPCU) and profile manager and also, solutions offered by third parties.
Using MDM: The Glossary You Need to Understand
We go over the terms that you need to know to go forward with mobile device management. We discuss opt-in and enrollment, deployment, Over-the-Air (OTA) Methodology, provisioning profile, configuration profiles, wipe and selective wipe, passcode, lock and unlock, Apple Root Certificate Authority (CA), Apple Push Notification Server (APNS), Public Key Infrastructure (PKI), and Developer Enterprise Program (DEP).
Apple IPCU (iPhone Configuration Utility) and Profile Manager
We go over the profile manager in more detail, explaining configuration profiles and payloads. Understand the components of a server configuration. For deployment, learn the difference of using a wired or Over-the-Air methods. We also go over the management console.
IPCU vs. Third Party Solutions
We go into more detail of whether to choose IPCU or a third party solution. IPCU is the baseline solution, we show you what can be configured and what the user can change. We talk about other platform servers, how they can be controlled, and how they interact with other platforms. It’s important to know when you would use Apple and when you would use a Third Party MDM. We will feature difference examples and show you how to shop for a Third Party Solution.
With applications, it’s good to know how Apple works, because this is their territory. We cover OTA distribution of apps and define best practices. We cover the different components of the App Store and how you can use it. If you have been wanting to know how to develop Apple iOS apps, we will cover the different methods you can emply. Apple isn’t the only ones with apps, we discuss Android, Blackberry, Windows 7, and Symbian and WebOS apps.
Security is a necessity when setting up any system, especially when it has to do with an organization’s internal information. When creating a security strategy, we believe it’s best to design from the beginning, seeing what it is you already have in place and going from there. We show you how to do a threat assessment based on the platforms you support. We help you identify what needs to be protected, what settings to use, and what certificates are needed. We also explain what tracking is and why it’s useful.
WiFi and Network Infrastructure
For Wifi and Netowrk infrastructure, we go over VPN and what settings and components there are. For web security, we explain why security is needed and how to go about setting this up. We explain optimization and bandwidth control and also how to filter content. We also talk about controlling 3G/4G access and if it’s possible.
MDM "Best Practices" and Creating a Strategy
We’ll be going over best practices of MDM and how to create a strategy from the information you have gotten. We show you how to segment your workforce and build flexibility through enabling device diversity. Choosing your investment in a mobile device management solution or a managed service is crucial and we discuss how to do this. For ease of use, we show you how to set up a single Web-based console for all management and security operations. We’ll outline procedures for requesting and obtaining mobile devices, applications, and services and define appropriate use. It’s important to plan support for company and personal devices, we talk about how to protect both. We’ll also define internal and external service support and availability work flow and show you troubleshooting techniques.