Explore the current trends in mobile technology. Understand how the workforce harness these tools. Ryan dissects the complex demands of the mobile workforce. Compare the wants and needs of users to enterprise security concerns. Analyze the benefits of Enterprise Mobility Management (EMM) platforms. Learn what it takes to setup and manage an EMM tool.
- Unlike the personal computer, mobile devices infiltrated the home before they stormed the office, creating a disarming familiarity. This didn't set off alarm bells warning of the new age of IT. This trap caught businesses big and small. Organizations struggled to untangle themselves from assumptions set by 30 years of desktop and server management. All mobility programs are designed around users, devices, applications, and data.
None of these are new to IT managers. However, mobility redefines the management process. In the past, users were managed through directory services designed around the company's organizational chart. This resulted in management by group identity. The strength of this approach is the ability to manage large groups of people quickly. To maintain order and identity, the organization needs clearly defined divisions and strong policy measures. However, organization structures have begun to flatten, making the org chart less effective when it comes to the functional identity of its workforce, therefore, an organization's IT managers must find new ways of defining users and devices that allow for a more flexible workforce.
Similarly, the landscape for work critical applications has changed. Organizations used to purchase expensive applications that required training and resources to maintain. In most cases, no more than 10% of the application's available options were utilized, pointing to a huge inefficiency in the application space. Mobile applications have turned this on its head since they are designed to conquer a precise job with minimal resources.
Mobile applications are not acquired through expensive agreements and distributed through management after months of testing. Instead, they're distributed through app stores, meaning loss of application control and more frequent application failures. All of these changes have meant that organizational data is expanding in a moment of technological chaos. The entry points to an organization's information have increased exponentially just as the landscape to securely manage users, devices, and applications is being redefined, leaving organizations vulnerable, chaotic, and confused.
Instead of a predetermined top-down defining of an organization's technology, mobility requires a flexible, quick-responding, bottom-up approach. For now, I need to determine five things. First, can I determine the job to be done by the devices I will hire? Second, what devices will be in my environment? Third, do I have a list of all of the users that will be in my mobility program? Fourth, do I have a list of the applications the devices will require to accomplish their job? And finally, do I have a security matrix written for a mobile workforce? It's important to work through these questions in detail.
Ignoring these questions before I design my mobile platform will mean hours of cleanup or even abandoning the platform later.
Ryan is the director of enterprise mobility management at MOBI and supports Fortune 100 clients around the world. Here he shares the key components of any enterprise mobility management (EMM) strategy, focusing on Microsoft Intune. Learn what's different about the Windows 10 mobile operating system and why and how businesses manage Windows devices with Intune. Explore Intune infrastructure management and best practices pertaining to design, identity, security, updates, applications, content, and more. Along the way, he'll help you design and implement smart security policies, configure monitoring and services like Windows To Go, and provisioning user accounts.
Note: This course maps to the Plan and Implement a Microsoft Intune device management solution domain of the Microsoft exam 70-697: Configuring Windows Devices.
- Preparing for a mobile program
- Managing mobile devices, users, and data
- Building mobile user awareness
- Understanding mobile security issues
- Activating Enterprise Mobility Suite (EMS)
- Configuring and deploying device policies
- Configuring monitoring and alerts
- Designing file and power policies
- Configuring Windows To Go, Windows sync, Wi-Fi direct, and device encryption
- Supporting Intune deployments
- Provisioning user accounts
- Managing Intune groups