© 2017 VMware Inc. All rights reserved.
Unified Endpoint Management
Michal Minařík
System Engineer for EUC
2
Digital transformation is all
about creating new possibilities
for your business.
Digital Transformation Agenda
Business Agility
and Innovation
Exceptional Mobile
Experiences
Protection of Brand
and Customer Trust
Empower
Digital
Workspaces
Transform
Security
Modernize
Data
Centers
Integrate
Public
Clouds
B U S I N E S S O U T C O M E S
S T R AT E G I C I T P R I O R I T I E S
3
4
How VMware Helps
Empower
Digital
Workspaces
A wide variety of
apps results in
inconsistent user
experiences,
security postures,
and support
requirements.
Device proliferation
and multiple device
ownership use-
cases complicate
endpoint
management.
Legacy PC lifecycle
management and
Windows OS
management are
complex, costly,
and restrictive.
Transform
Windows
Delivery
What prevents exceptional mobile experiences?
Consumer-Simple, Enterprise-Secure Mobility
Simplify App
Access and
Management
Unify Endpoint
Management
AirWatch Unified Endpoint Management
5
Single Pane of Glass
Full Lifecycle Configuration
Comprehensive Security Model
6© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Multitenant Architecture with Role-based Access Controls
6
7© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Onboard Devices Quickly And Without IT Hassle
7
Configure devices to be automatically configured during initial power ON
Corporate Owned Devices
Out of Box Enrollment
Enable users to activate work services on devices through a simple workflow
BYOD
End User Self Service
8© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
• Restrictions
• Device layout
• Settings access
• Notifications
• Location services
• Bluetooth
• Branding
Devices
• Public apps
• Enterprise apps
• VPP License management
• DLP and security policies
• App tunneling
Apps
• Corporate email
• Calendar and contacts
• Wi-Fi
• VPN
• Intranet content and file shares
• Intranet apps
Systems
Configure Devices with Apps and Resources
8
9© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Secure the Endpoint and Prevent Data Loss
Device level encryption
Hardware security
Biometric integration
Encryption
Complexity
Expiration
Device and app
Passcode
Jailbroken
Remote wipe
Malware
Compromised
Sharing permissions
Copy / paste
Geofencing
Watermark
Data backups
Data
Wi-Fi
TLS
Siri
Always-on VPN
Whitelist
Blacklist
Tethering
Settings
Configurations
9
10© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Gain Real-time Insights and Remotely Support Users
Dynamic and modular dashboards
Detailed and exportable reports
Comparative industry analytics
Advanced event and device logging
10
Integration to BI tools
End user self-service portal
Remote management and troubleshooting
Remote management
Use cases
12© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Secure Mobile Devices
CONFIDENTIAL
Organizations looking to secure and simplify
company purchased mobile devices with
an asset tracking solution
Knowledge workers in highly regulated
environments where device needs
advanced security controls
12
Key Capabilities:
• Enroll devices into MDM
• Configure email, apps and content, Wi-Fi, VPN
• Enforce device restrictions
• Control device layout
• Telecom management
• Perform a remote lock or wipe
13© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
PC Lifecycle Management
CONFIDENTIAL 13
Organizations deploying Windows 10 and
looking for cloud-based management
solution
Companies enabling Macs whether BYO
or corporate purchased
Organizations or schools leveraging
Chromebooks as a low-cost laptop
Key Capabilities:
• Configuration Management: Configure OS out of the box, whether device is on domain/network or in the cloud
• Software distribution: Package and deliver any app (modern or Win32)
• OS Patch Management: Flexible management of OS updates and patches from the cloud
• Client Health & Security: Enhance security with advanced controls
14© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Line of Business Devices
CONFIDENTIAL 14
Organizations using ruggedized devices
in tough environments where barcode
scanning is critical
Use cases where customer-facing devices
are configured as a kiosk to lock into
certain apps or websites
Scenarios where multiple employees
share a mobile device throughout shifts
Key Capabilities:
• Manage and secure ruggedized devices
• Lock into single or multiple apps or a website
• Enable check in/out mode for devices shared by multiple users
• Restrict access to device settings to prevent tampering or misuse
15© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Wearables and Things
15
Organizations using leading-edge smart
glasses for complex assembly, remote
assistance, or material handling
Companies looking for centralized asset
tracking for printers or other peripheral
devices
Organizations using smart TV displays or
devices like the Surface Hub
Key Capabilities:
• Streamlined device onboarding
• Configure Wi-Fi networks
• Push applications to devices
• Enable asset tracking
16© 2016 VMware Inc. All rights reserved. Confidential – Not for Distribution
Why AirWatchWhy
AirWatch
UEM
16
Proven track record
as industry leader
Comprehensive digital
workspace solution set
Agnostic solution with
broadest ecosystem
Modern UEM platform
simplifying endpoint
management
Thank you