Enterprise Mobility Suite - Microsoft Office 365

This article is a comprehensive insight into the benefits of Microsoft office 365's Enterprise Mobility Suite. It includes not only lots of information but also several client examples with the associated benefits.

Enterprise Mobility Suite is the complete Mobile Device Management solution and is yet another overlooked application driving amazing value within the Microsoft Office 365 portal. Deployed correctly, it can deliver a corporate wide Mobile Device Management policy. The growing trends in regards to mobile device utilisation are:

  • Approximately 66% of employees use personal devices to carry out work.
  • As much as 18% of all software being acquired in 2017 will be Software as a Service (SaaS).
  • As many as 33% of employees who work from an office, frequently work away from their desks.

The above trends are leading to a growing demand for incorporating resource heavy applications, which not only stretch IT resources and support, but are also opening up huge holes in the potential for data breaches and loss of any security and compliance policies.

The proliferation of devices that employees are working on to carry out their work, is not only extremely difficult to keep track of, it is almost impossible to manage when coupled with the high costs and loss of reputation associated with confidentiality breaches. This can create an area of great concern for all stake holders in an organisation.

In certain sectors such as Financial and Legal, there will be compliance requirements to prove that all devices are included within a proven data security policy.

The reason for these changes in working practices are numerous; people work from home, from cafes, from customer sites, on the road, in the air in fact people can – and do – work from just about anywhere. In fact even when they’re in the office, people don’t expect to be sitting at their desk in order to be productive.

We live in a time when mobility really is the new normal. The cloud-first, mobile-first world is here. People expect to have the ability to work where, when and how they choose. Using the devices they love and the apps they are familiar with.

Mobile Devices: - What’s behind this shift in work practices? As mentioned, there are a couple of mega trends that have taken hold. Firstly, there is the proliferation of consumer devices – sometimes called the consumerization of IT. Users have a lot more devices to choose from.

New form factors. Different platforms. Different sizes, shapes and colours. The net result is that devices become an object of personal choice and users of those devices feel a strong affinity with the devices they use.

Try to force a user to settle for a device they don’t love or stop them from using the device they want and you could be asking for trouble. As it stands, over 60% of devices in the workplace are personally owned.

Applications & data:- Then there is the cloud. People are always connected and there is an app for just about everything. This explosion of low-cost Software as a Service (SaaS) applications means that if a user cannot find a way to do what they want with the tools IT give them, it is very easy and cheap to find their own solutions – and so Shadow IT is born.

Alongside this, apps need data. Very soon users will be finding ways to use not only personal devices but also applications to access corporate data.

Users:- Finally, there is a natural shift as a younger generation, a generation that has grown up in this always-connected world, enter the workforce. Your new college graduates are huge social collaborators already and are bringing those connected, collaboration skills to the workplace, expecting an infrastructure that will support them in how they work.

Whatever the drivers, the shift has created a tension between what users need and what IT is responsible for. 60% of users think that IT is incapable of providing productivity capabilities while Gartner predicts that by 2016, 20% of BYOD projects will fail because IT has imposed too tight a control on personal devices.

What is the role of IT in this new world? Is it to keep users productive? Or secure company assets? To embrace change and turn it into a competitive advantage? Or avoid unnecessary risk? The answer is, of course, all of the above.

The buck really does start and stop with IT. But keeping up with such fast moving and changing trends has its own challenges. IT has had to jump-in and fire-fight on several fronts: from getting unmanaged devices on the corporate network under policy to coming up with strategies to avoid sensitive customer data from falling into the wrong hands. All while keeping users happy…

Let us take a look at what that means for your average user and your average IT administrator.

 

Start with the user. They are always on the road and work from a number of different devices and locations. They need email on their devices – whether that is a PC, tablet or phone. They also want applications. Line of Business applications. Productivity applications and more recently SaaS applications.

 

The user expects to have access to all the applications they need to stay as productive as possible wherever they are. But they also need to be able to work on documents across devices, so they find a way to pull synchronized data from the cloud to be accessed on different devices. And that may mean that they require access to sensitive data while they’re out on the road using a non-corporate device.

For the IT admin, all these scenarios create risk. A certain amount of risk can be tolerated but as user requirements increase, IT has to take action to ensure the risk is maintained at an acceptable level.

This has led to investment in point solutions being deployed to address pain points and risk. However, each point solution adds cost to the business and complexity to IT and as each point solution has to be integrated with the previous point solutions, the impact is amplified with each new solution.

While individual tools to solve individual problems is undoubtedly effective, it may not always be efficient in either cost or time. For example, having one tool to manage PCs and a different tool to manage mobile devices is inevitably going to lead to duplication of certain tasks – and may lead to an inconsistent experience for the end user across different devices.

 

Having one user identity for accessing corporate on-premises applications and a different identity or identities for cloud apps is creating extra work for IT and putting a burden on the user to remember a raft of different login IDs and passwords.

 

By constantly addressing challenges with point solutions, you may be tactically solving a problem, but you are adding cost and complexity to your business. Not just the cost of net new technologies. But also the cost of standing them up, integrating them, staffing and maintaining them.

 

Speedster IT takes a people-centric approach to enterprise mobility – meaning we focus on productivity and efficiency for everyone – IT and users. We look across user devices, data and application – but always centred on the needs of the users.

We use Microsoft’s people-centric IT vision to help organizations enable and embrace the consumerization of IT, addressing the three constant business challenges:

  • Enabling your end users to be as productive as possible by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
  • Helping IT to protect your data by protecting corporate information and managing risk.
  • Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Microsoft Azure.

The following breaks down each of the above areas in more detail:

At Speedster, we recognize the need to balance user demands with IT requirements. The desire for greater access to information, with the need to protect corporate assets. The need to work anywhere and on any device with the need to keep users and devices well-managed.

Our solution for enabling Enterprise Mobility is built on a foundation that builds on existing investments and reducing complexity for both the user and IT. This is based on four components that provide a complete solution for managing the challenges of enterprise mobility:

  • Hybrid Identity
  • Mobile Device and Application Management
  • Access & Information Protection
  • Desktop Virtualization

We believe that by selecting a single vendor who can deliver an end-to-end solution to enable your Enterprise Mobility strategy makes sense for users, for IT and for your business. For simplicity.

Indeed many customers have already experienced success from taking this unified approach to solve a number of different business challenges.

Aston Martin:- Founded in 1913, Aston Martin sports cars are synonymous with luxury, heritage, and authentic craftsmanship.

They were able to build on investments they had already made to manage the laptops and devices of their highly mobile and distributed workforce. They see benefit from managing all devices through a single console:   “It is one more example of how the interoperability of Microsoft products makes our lives easier.” 

Callaway Golf:- Like many companies, Callaway Golf had to cut spending due to the global recession of 2009.

Callaway needed a way to keep sales people productive by proactively manage sales computers and mobile devices. Our unified solution allows Callaway to maintain revenue flow by keeping salespeople’s computers running. 

Mitchells & Butlers:- Established in 1898, Mitchells & Butlers runs many of the United Kingdom’s most famous restaurant and pub brands.

For them empowering enterprise mobility is about efficiency for their IT staff. By taking a unified approach to management they can remotely manage a total of 20,000 corporate and mobile devices with only two people.

So harnessing the power of enterprise mobility can be about cost or time efficiency, about providing a better service or staying at the cutting edge of your industry.

Let us take a deeper look at what Empowering Enterprise Mobility means for your business. Like the companies we just mentioned, identity is not a nice to have – it is at the core of an efficient workforce.

To keep their employees as productive as possible, these companies needed to provide a single identity that works across cloud and on-premises assets. With Identity Federation and Single Sign-On, users have one set of login credentials and passwords. And IT is able to more efficiently manage user identity. Then, should a user ever forget their personal security, they are empowered to reset their own passwords – reducing the burden on IT thus making the user more efficient by being able to resolve the issue quickly.

Users also have the ability to bring new devices into the enterprise, but IT can validate that devices connecting to the network are owned and controlled by individuals with the appropriate credentials. MFA helps to provide a layer of protection.

Finally, Hybrid Identity provides IT with tools for monitoring suspicious activity on the network such as an employee accessing their expenses account from the San Francisco office at 9am and then logging in from Hong Kong 45 minutes later.

Identity is the first part of empowering Enterprise Mobility, but once you have your user identity in place, you can focus on helping your workers to be productive on the devices they use to get their work done.

The Walsh Group Case Study:- The Walsh Group builds skyscrapers, subways, and bridges, and other big things all over the United States. It is also a leader in using technology to construct better. Walsh is busy moving significant chunks of its datacenter environment to Microsoft Azure to reduce IT costs and accelerate IT service delivery.

Building on the identity and access management foundation of Azure Active Directory Premium, employees and contractors have a much simpler application sign-in experience, and Walsh enhances data safety.

Azure Active Directory Premium contains a number of features that Walsh is using to both simplify employee and partner access to applications and better secure data:

  • Employees have single sign-on to all Microsoft and non-Microsoft cloud and on-premises applications from a single screen.
  • Employees can reset their own passwords through the self-service password reset capability in Azure Active Directory Premium. Walsh receives a high number of password-related help-desk tickets, and this feature lets employees easily reset their own passwords and get back to work faster. “Turning on this feature was a very simple process,” Wirtz says. “We also really like the write-back capability, which means that a password reset made in Azure Active Directory is also made in the corresponding on-premises Active Directory.”
  • Wirtz’s team uses the security reporting feature in Azure Active Directory Premium to see which employees are using which applications and devices, from where, and how often. “If my account is based on the west coast and I sign in to a device that is on the east coast, Azure Active Directory detects that and raises an alert that there may be a problem,” Wirtz says. “We deal with sensitive government contracts, so we need to ensure the security of our data. We watch our mobile devices very carefully, and having security reporting like this built into our directory system is great.”
  • The Multi-Factor Authentication capability in Azure Active Directory Premium augments security reporting. After logging on to externally available services by using their user name and password, employees and partners confirm their identity by responding to a phone call or text message.
  • The Walsh IT team also likes the usage reporting feature, which collects data on specific applications that employees use so that the IT staff can better understand the most popular applications and, when appropriate, suggest more secure replacements for user-downloaded applications.

While individual tools to solve individual problems is undoubtedly effective, it may not always be efficient in either cost or time. For example, having one tool to manage PCs and a different tool to manage mobile devices is inevitably going to lead to duplication of certain tasks – and may lead to an inconsistent experience for the end user across different devices.

Having one user identity for accessing corporate on-premises applications and a different identity or identities for cloud apps is creating extra work for IT and putting a burden on the user to remember a raft of different login IDs and passwords.

Our user needs access to apps in order to get her job done. She is a busy woman. And she uses a lot of different apps. She wants one user name and password for all her different apps. (She certainly does not want IT to know that she has post-it notes stashed all over the place because she cannot remember the 30 variations of logins and password combinations across all her apps).

And it really makes no difference to our user if the apps she needs are on-premises or in the cloud. IT is also very busy. And ideally, IT does not want to be spinning up a separate identity layer for every new application that gets on-boarded.

IT also needs a way get a better handle on some of those third-party Saas apps they didn’t even know about. Using Microsoft’s Hybrid ID to build on the investments the company has already made in on-premises AD, our IT pro can synchronize our User’s on-premises identity and password with Azure AD to create a single user identity for her across cloud and on-premises systems.

That means our User can now use the same password for both cloud and on-premises apps. And with AAD Premium, the same credentials can be used for third-party SaaS apps too.

That is not all – if our User forgets a password (and that has happened), she doesn’t need to call the helpdesk – there is a self-service password reset facility. IT can carry on.

But Hybrid Identity is not just about keeping our User happy – although that certainly helps to make everyone’s life easier. It also gives IT some critical tools to make sure only the people who are supposed to be accessing the systems are doing so.

Our User likes to have the latest gadget and as we have already seen, wants to access corporate resources across all her devices. IT can create an added layer of authentication to each new device our User adds, getting the system to send a request for authentication to one of her trusted devices, such as a Multi-factor authentication challenge or being required to register the device.

So, in summary – Hybrid Identity as part of the Microsoft solution for Enabling Enterprise Mobility puts your user at the center of the solution and gives IT an integrated identity management solution that reduces risk across the business.

Device management has increasingly become about new form factors. Most companies have solid solutions for corporately owned PCs, but mobile devices and non-domain joined PCs have brought new challenges. And it is not all about BYOD either.

Increasingly, users have more say over the devices they use for work. Many organizations have a BYOD policy, or indeed, whether they have a policy or not, personally-owned devices are finding their way into the workplace.

The Microsoft solution offers a way to manage those devices in a way that does not impede the end user’s experience when using the device they love and gives users a degree of control over their own devices through the Windows Intune Company Portal.

Users can enroll their devices and then access apps targeted to them by IT, based on their identity. Once enrolled, IT can enforce policies and get a view of inventory or hardware and software across their estate.

If a device is lost or stolen, or someone leaves the company or simply wants to stop using a device for work, they can selectively wipe the device of corporate information and remove it from management. For personally owned devices, these actions can be performed by the user through the Company Portal, or by IT from the administrator console.

And it’s not just mobile devices – nor do we only manage Microsoft platforms. This unified device management includes mobile device management of iOS and Android, as well as Windows Phone 8 and Windows RT. It also manages PCs, so all your devices are covered by one unified management tool.

Flexibility for your users. Devices managed and data protected. Existing investments leveraged.

Empire Today Case Study:- Empire Today built its home furnishings business on fast, efficient shop-at-home convenience, including free, in-home estimates and next-day installation. To solidify its reputation for expedient, professional service, Empire wanted to improve the in-home sales process by providing its 1,200 sales representatives with mobile technology.

These reps carried binders of product information and used paper to draw diagrams, calculate floor space, and create sales contracts for the customer to sign.

They wanted to standardize the sales process and make it easier for reps to enter correct data for calculating material requirements to ensure accurate quotes.

They created a mobile app that would remove the guesswork for the order management team who have to decipher the rep’s faxed instructions.

They needed a way to easily deploy and update the app, including updated state-specific contractual regulations. They also wanted to reduce paper costs. And with more than 1,200 tablets in the hands of sales reps across the United States, Empire needed a mobile device management solution that reduced the support burden on Empire IT staff.

Windows Intune and System Center Configuration Manager 2012 R2 enabled Empire Today to centrally manage a fleet of Nokia Lumia tablets running the Windows RT 8.1 operating system and a touch-enabled app called Precision Quote™ and provided a way to deploy the app and any subsequent updates.

Empire is using its mobile technology solution from Microsoft to achieve a new service paradigm that builds on its reputation for efficient, professional, in-home service. Their competitive strategy depends on having technology that enables their 1,200 staff to be productive with well-managed tablets, so they can improve their in-home sales process and win more business.

Equally, the unified Microsoft approach has helped Empire be more efficient with existing staff. Without the Microsoft solution, they would have had to hire approximately 20 people to support the sales force and the mobile devices.

We have already established who our user is through our Identity work. And we know that she wants access to her apps. And to do that, she uses a range of different devices.

She’s got her PC, of course. But she has also got a couple of tablets – one an iPad and the other a Windows RT device. Our user likes to use the latest devices for both personal and work apps.

She’s also had a number of phones – from iPhones to Android to Windows Phone 8. Some of them were supplied by the company. Some she bought herself.

Our user does not care who owns the device– she just wants to access her work documents on whatever device she happens to be using.

And since some of the devices are her own, she doesn’t really think or care much about management – but she knows that there is some degree of regulation required. So, our user is happy to accept a few corporate policies on her device – as long as they are not too intrusive – to allow her to access the apps and data she needs.

IT needs an efficient way to get each of these devices…many of them not corporately owned…under management. And then they need a way to get all those apps onto our user’s devices.

IT already has System Center Configuration Manager deployed to manage the PCs in the company.

Now, he is able to layer on Windows Intune to manage all the mobile devices in his company too – and through the same single console!

Happily for IT, Intune has a built in Company Portal that he can customize…once users have enrolled their device to Intune, IT can apply policies and can use the identity settings they already have in place to target apps to different users based on their identity and the device type they’re using.

This means that when our user gets a new device, they simply have to enroll it through the Company Portal and the IT policies will be applied to that device. Then our user can view all the apps available and download them onto their device themselves.

And…knowing as we do that our user may lose this device – or simply decide to stop using it at work – the device can be completely or selectively wiped straight from the Company Portal to make sure that sensitive company information does not get into the wrong hands.

And because all this can be done through the self-service Company Portal – there is no need for our User to call IT – another frustrated and costly call averted!

This solution covers more than just mobile devices and managing Microsoft platforms.

Microsoft unified device management includes mobile device management of iOS and Android, as well as Windows Phone 8 and Windows RT. It also manages PCs, so all your devices are covered by one unified management tool

Flexibility for your users. Devices managed and data protected.  Existing investments leveraged.

We have covered user identity and mobile device and application management. But perhaps the reason that the two previous topics are so important is because it is users accessing data on their devices that cause risk to the business.

Data getting into the wrong hands can be costly and embarrassing for a business.

But even small breaches can damage your business or lead to serious consequences, especially in industries with stringent regulation.

Businesses need to keep their data protected wherever possible – striking a balance between user productivity and data protection.

Microsoft’s Access & Information Protection solutions help companies address these challenges.

Let us start with the ultimate goal: users can work from anywhere on their devices with access to their corporate resources. This can be achieved through native applications for the device platform, web-based applications, and through data sync.

You can enable users to register their devices for single sign-on and access to corporate data with Workplace Join. This allows IT to be able to open up access to applications and data that otherwise would not be available, in return for knowing about the device.

Providing users with access to the resources they need to get their job done means ensuring that users can access corporate applications and data wherever they are on their devices. To further protect data, access can be conditional based on the user’s identity, the device the user is using, and whether the user is inside the corporate network or connecting from an external location.

In addition to on-premises resources that need to be accessed, the user is likely to also want to access cloud-based applications and services. So to make this a seamless experience for users, they are provided with a common identity when accessing cloud-based resources, which is enabled by IT through Active Directory Federation Services.

As part of the decision to make corporate resources available to users on the device of their choice, you may want to require additional levels of verification.

An example is requiring the user to register the device that they are using. When a user registers their device, it becomes known and “trusted” to provide device level authentication. Additional security can be provided by IT creating business-driven access policies with multi-factor authentication, based on the content being accessed.

With this Microsoft solution, empowering Enterprise Mobility means starting with the user, giving them an identity that follows them on premises and in the cloud; enabling them to be as productive as possible across a range of devices; but all the while ensuring that data is protected.

Menzies Aviation Case Study:- Menzies Aviation is a global provider of passenger, ramp, and cargo handling services. Through a combination of organic growth, acquisitions, and the development of niche opportunities, Menzies Aviation is now a major force in the international ground handling industry.

Operating at more than 132 airports in 34 countries and supported by a global team of more than 17,000 people, Menzies Aviation serves more than 500 airline customers that handle more than 800,000 flights and 1.7 million tons of cargo annually.

Maintaining a flexible, reliable, and secure IT infrastructure that is necessary to support the company’s global operations is an ongoing challenge. Menzies Aviation accomplishes this with a lean IT team of 70 people, 16 of whom work at two data centres in the United Kingdom.

In the aviation industry, data security is paramount. Menzies Aviation must protect confidential customer information, such as timetables, passenger lists, cargo contents and delivery schedules to ensure passenger and crew safety.

Yet Menzies Aviation employees need to access this information from anywhere—servers, desktop computers, portable laptops, mobile devices, and email stores—and share it appropriately.

The company’s user access policies must comply with strict aviation and government regulations. In a global, rapidly changing environment with high staff turnover, it’s a challenge for Menzies Aviation to control access to information. To meet this challenge, IT staff has to correctly configure the right security policies for a large number of files stored on eight file servers in the data centres.

“Anywhere we can improve our access control mechanism would help us keep our data secure and comply with aviation industry and government regulations,” says Gallington. “We have to make sure that every employee who logs on to any computer can only see the information he or she is supposed to see.”

The company decided to investigate the new identity and access management improvements in the latest Windows operating system from Microsoft. They needed to centrally manage employee identity and access to information based on business and compliance needs.

Menzies Aviation leveraged Active Directory as an integral component of Dynamic Access Control which gave them a more flexible and powerful way to manage employee access to files on New Technology File System (NTFS) volumes.

Instead of managing file security at the individual file level, Menzies Aviation system administrators were able to save time by defining central file-access policies at the domain level that apply to every file server in the domain.

Classification of information is automatically saved with the file itself, so that it is directly available for all applications, including the operating system.

System administrators can use Dynamic Access Control to improve control over access to file data, including unstructured data, regardless of where the information resides. They can also define and configure centralized audit policies in Active Directory that can be applied across multiple servers.

Sitting behind the apps that our user accesses regularly is a bunch of sensitive corporate information.

  • It’s the job of IT to keep information protected at all times
  • Managing who has access is a great starting point
  • And features like selective wipe really help – letting IT wipe corporate data while leaving personal data intact

But while IT wants to make sure our user has everything they need to be productive while they are out of the office (and to avoid getting any extra calls from Jennifer), IT has to ensure that information only resides where it’s supposed to and is only accessed by those with the right authority to do so.

Not so long ago, our user would simply email themself a copy of a sensitive document to her home PC so she could continue to work over the weekend or take it with her on the road.

While her work-ethic was admirable, she had very little regard for data protection compliance

Luckily, IT can now provide our user with a way to sync documents she is working on to a secure, centralized location that she can access with any authorized device.

Where needed, IT can restrict the ability to open, modify, print or forward documents using Microsoft Rights Management Services.

And where necessary, IT can set conditional policies to ensure users only access the information they are authorized to and can also determine on which devices they can access what information.

So our User may be able to get a more sensitive document on her PC while in the office, but won’t be able to access the same document on her iPad at home.

We will focus on how users can use the devices they select and still be able to access the business applications they need to be productive. And we will show how a Microsoft solution helps to provide a consistent experience across all devices.

There are some scenarios where data may be so sensitive you never want it on the device. Or you may have apps that need to be platform agnostic, to avoid compatibility issues. In these instances, Desktop Virtualization can offer better security and more flexibility.

There are several reasons businesses consider desktop virtualization. IT professionals invest in this technology for more efficient management of user devices and enablement of the “Bring Your Own Device” trend whilst still providing enhanced security, and scalability of the solution.

From a user’s perspective accessing the same experience from any device anytime is key. The challenges of course are how to make your corporate applications available regardless of where users are, and to make that data available even on unmanaged devices where you don’t have control over the policies on them.

For example, how can you make sure that these devices have all the latest software updates? How do you make sure when you deliver applications to those devices that it happens in a way that is compliant with your corporate requirements?

There are many different VDI solutions in the market. Microsoft VDI is clearly differentiated from other solutions because it provides IT organizations the performance they need with the fastest payoff or in other words without breaking the bank.

Microsoft has continuously enhanced its VDI solution to deliver great user experiences and empower IT departments and professionals to easily set up and maintain a powerful system.

In today’s world, IT organizations have a big resource challenge. In most cases, the new IT solutions are justified but IT departments are so overloaded to the extent that deploying and managing systems with limited resources becomes a bottleneck.

The more difficult and complicated solutions become, the less sustainable it is for IT organizations to set up and maintain them.

In most cases, high performance solutions are complex. Microsoft VDI solves this issue by providing IT organizations a virtual desktop infrastructure that is powerful, yet easy to setup and maintain.

The solution enables the IT professionals/departments to:

  • Protect against loss and leaks of sensitive corporate data
  • Centrally administer and manage desktops
  • Reduce time to deploy applications and updates

On the user side of the Microsoft solution:

  • Enables users to access corporate apps and data from any device and any location
  • Delivers great user experience without compromising corporate compliance

Three deployment choices: RDS can host either Session based desktops, pooled VM’s or personal VM’s. So customers have the flexibility to deploy the right type of VDI desktop for their users, all from a single platform.

For City of Barcelona, Desktop Virtualization was at the heart of their vision for empowering Enterprise Mobility.

City of Barcelona Case Study:- Barcelona is the capital of Catalonia, Spain, and the second-largest city in the country, with a population of 1.6 million. The City of Barcelona employs approximately 12,000 people

The City of Barcelona sought a desktop virtualization solution that was easy to manage so that it could extend this technology to more employees and use it to deploy new software.

The benefits they were able to reap included:

  • Greater employee productivity
  • Increased IT efficiency
  • Software deployment savings of US$122,000
  • Enhanced security

This case study encapsulates the essence of the Microsoft vision for empowering enterprise mobility, with end users being as productive as possible across a range of devices, data being protected, and IT gaining efficiencies by using a centralized solution.

There are some scenarios wherein IT doesn’t want corporate resources to be stored on the user devices at all. This could be because corporate resources are so sensitive that IT doesn’t want to risk them being saved to or stored on a local device.

Or delivering resources – such as sensitive line of business applications or legacy applications – to a variety of device platforms is no easy task.

Our IT Pro’s team does not have enough time to provide native applications to a growing number of platforms. For these instances, IT uses Desktop Virtualization. With this technology, desktops and applications appear as if they are running locally on user devices where as they are actually centralized back in the datacenter.

Our User is working with her iPad again – she needs access to an app that wasn’t designed for the iPad.

Not to worry, IT can deliver remote desktops and applications to the iPad for our User to use – depending on her needs. She can log on and access her corporate desktop or applications through a protected connection.

Corporate resources are not sent to or stored to our User’s device, so IT can have peace of mind when it comes to safeguarding the corporate desktops and applications.

Desktop Virtualization provides flexibility with different deployment choices. IT can pick and choose different deployment models for different users and needs within the organization.

He can deliver session based desktops, personal or pooled virtual desktops. He can use RemoteApp and just deliver applications from his datacenter or from the Azure cloud.

We’ve all seen how our User is pretty high-octane. She’s on the road a lot. She has a ton of devices. She uses a lot of different apps – some on premises and some cloud-based. But not all of IT’s users are like that.

There are warehouse staff and call-center personnel who don’t need the same rich experience our User needs. For call center workers, IT can use session-based desktops. This helps IT keep data where it’s supposed to be while providing a cost effective solution.

We’ll focus on how users can use the devices they select and still be able to access the business applications they need to be productive. And we’ll show how we help to provide a consistent experience across all devices.

To re-cap, empowering enterprise mobility isn’t just about managing devices. It isn’t just about identity or data protection. It’s a unified, people-centric approach that spans identity, devices, apps and data to ensure that users are as productive as possible, data is protected and cost and complexity is reduced.

…Let’s build on your investments

And for most organizations, aligning to the Microsoft strategy means you can build on top of investments you’re already made.

66% of businesses are already using System Center Configuration Manager. There are 240m user accounts in Azure Active Directory. And we now see 14 billion Azure AD authentications every week.

We’ve already touched upon how almost all companies use Active Directory in their businesses. System Center Configuration Manager is the solution of choice for the majority of enterprises for their PC management, and Windows Intune is growing fast as a natural extension for managing those born-in-the-cloud devices.

What are the next steps for you to further consider Enterprise Mobility?

Work with Speedster IT and Microsoft to set up an Enterprise Mobility Proof of Concept. For a limited time, building on top of your existing investments is even more attractive – the newly launched Enterprise Mobility Suite currently has a discounted offer available when you attach to your Core, E or Bridge CAL Enterprise Agreement.

If you require any further information or indeed would like to have a chat give us a call on 0203 011 1234 or e-mail sales@speedster-it.com.

Related Articles