Join Sean Colins for an in-depth discussion in this video MDM introduction, part of Foundations of Mobile Device Management.
- View Offline
- [Instructor] Let's talk about the concept of mobile device management and how you should think about it as you watch the rest of this course. Mobile device management can be thought of as a trust relationship that is set up between the devices you want to deploy to your users and the systems that you want to use to change the behaviors of those devices. So let's define our terms, first of all, a device, which can be defined as any computer, or tablet, or phone that a user may be given by your organization or bring to your organization.
So what are examples of a device? Well, iPads, iPhones, Android tablets and phones, Windows Phones, Macs, PCs, even Chromebooks can be considered devices, which you can manage in some form to affect their behavior, settings, and security features, among other things. Mobile device management allows you, as an IT administrator, to do things like provide an automatic log-in for a device onto your WiFi network. Perhaps even automatically connecting to a VPN for remote access, maybe accounts so that your users can easily access things like calendars or e-mail or contacts.
Mobile device management can allow you to provide limited whitelisting and blacklisting of websites. Mobile device management can configure your devices to access a proxy server on your network to enhance security. There are literally dozens of different settings you can send to a device using a mobile device management solution. All that's required is that the device enroll in the mobile device management solution, and at that point, as soon as the device shows up in your MDM, it's ready to be managed.
The mobile device management solution can then do all sorts of things to that device, including remotely locking, wiping, and also unlocking the device should that be necessary. With all the power mobile device management gives an organization over the devices that are granted access to that organization's resources, it's no wonder that every large medium and even small-sized organization is interested in deploying a mobile device management solution to manage all of their devices.
Dig into how MDM works on company-owned devices and in one-to-one, BYOD, and shared models. Learn how to enroll devices and manage profiles, and deploy applications to Apple, Android, and Windows devices without user involvement. Explore "over the air" management, security and control best practices, and storage planning. Sean also describes how to remotely wipe and unlock mobile devices, and set important restrictions. Finally, Sean will preview a number of the MDM vendors, including ZuluDesk and AirWatch, so you can choose the right solution for your organization.
- Introducing MDM principles
- Device storage needs
- Device control and unlocking
- Device supervision
- Using MDM to enhance security
- Working with the Apple Volume Purchase Program
- Using apps on Windows devices
- Deploying MDM on Google platforms
- Shopping for an MDM vendor