Professional Documents
Culture Documents
2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Who Am I? David Pearce Mobility Applications Consultant Company AT&T Territory Northern California and Nevada Focus Mobile applications, device management, application deployment Industry Experience 15 years
2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Mobility?
Security It is imperative that we position Mobile Device Management and wire line security into a cohesive offer. We need to be able to illustrate how we can combine our wireless and wired security offerings into a single solution to maximize ROI. Services Access to services outside the walls of the traditional office is a driving force behind the mobility movement. Its not enough to have voice and data on a device. We now need applications and services access within a secure environment
4
Teri Takai is the former CIO of the State of California and is now CIO for the DOD:
Takai said that mobility should benefit from the shared security work. "We can't do a secure mobility strategy when we are trying to link into so many security frameworks," she said. "By looking at a joint environment, we'll able to deploy mobile devices much more rapidly.
Mobile devices are outside the traditional realm of the protected technology model and its necessary to rethink the take on mobile security. Mobile remote access services, or MRAS, can give end users in the field, the case worker on site or trooper on the highway a secure connection back into the system. MDM, mobile device management, can secure those proliferating endpoints in a number of ways
2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Differentiate your devices from the process: We are in the business of mobilizing processes. The device needs to be secondary.
Identify the State and Gap in the customers universe Be able to articulate those gaps back to the customer Outline the customer process as we know it today Re-engineer the process with a mobility solution set (Not a product!) Illustrate to the customer how the introduction of a mobile solution improves the process Does it improve productivity? Increase Revenue? Reduce expenses?
Process
2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Creating the mobile enterprise is one of the biggest challenges facing IT organizations. The benefits of supporting mobile users and building mobile applications are numerous and include increased productivity and organization flexibility. Cloud Enterprise
In the business model using software as a service, users are provided access to application software and databases. The cloud providers manage the infrastructure and platforms on which the applications run. SaaS is sometimes referred to as on-demand software and is usually priced on a pay-per-use basis. SaaS providers generally price applications using a subscription fee
6
2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Enterprise app stores are not widely in use (an estimated 10 percent of enterprises have their own stores). But enterprises such as CDW and General Electric have implemented private app stores, and smaller niche companies, particularly in the healthcare field, are also looking at private app stores with help from big vendors like Cisco and smaller players such as AppCentral and Virtusa.
2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.