Mobile Device Management

Ken Fauerbach

Norma Kenigsberg

Cynthia Guy

Beatrice Richardson

Jim Robertson

Mark Macmurdo

Neptali Martinez

Christopher Penido

Miguel Sandoval

Terrell Johnson

David Mobly

Brenda Mitchell

——————–

Overview

  • Ken: Biometric and password complexity.
  • Miguel: Uses mobile devices and wanted to know more about managing them.
  • Ken: Works at Dental. 1.4K students at Dental. Flood of devices that have invaded the classroom. Wants to know what to do next. Security and compliance concerns are what are driving his interest in the mobile device management. Needs policies to direct user concerns and questions.
  • Terrell: Completed Phase I with libraries to lock down iPads. Users used tools to circumvent physical security controls. Wants to know how to better manage and secure these devices in a centralized manner.
  • Mark MacMurdo: Generally interested in mobile devices./
  • Beatrice: At the Libraries, they manage the computer center and users come with various types of devices. asking for assistance on how to connect to network, access services. Faculty are asking and ordering mobile devices and there’s no way for the Libraries are able to standardize controls for these devices. Central management of devices is critical.
  • Cynthia: +1 to Beatrice’s comments
  • Jim: Improving and securing devices but offering a customized experience. The content is not yet highly sensitive but it may go down that pathway.
  • David: Works at the student health center. Every doctor wants to bring in their iPad. Users CASPER tool to manage devices. Inventory management system is built into CASPER. Student Health Center has devices are locked down to only be used on the NYU Network. Moving to Citrix and BYOD in the future. Thumb drives are just as mobile as everything else. Policy forbids use of mobile devices. Security controls recognize USB keys, flash drives that are not configured for their environment.
  • Brenda: Looking at it from the other perspective. At Stern, people will just bring their own devices. The devices have replaced some of the tools that we currently use and it will continue to take greater importance as the technology evolves. User’s can invest in the technology and the institution will invest in the services and tools that these devices can access.
  • Neptali: Looking at history, IT has matured into letting users use and access the resources that they want to use yet support the University mission. A balanced approach was achieved. Policies have helped us find our way at improving the use of these tools.
  • Norma: I don’t think we can worry about closing the barn door because the animals have long since left. The content on these devices is what is critical to helping us shape our MDM solutions. Group in  ITS is studying the tools that all users should have access to and develop profiles/configurations around it. What kind of content gets put on these devices. How do we safeguard the content on these devices? We welcome any kind of notions about how to do it but the main concern is the data on the devices.

Chief Concerns:

  1. Protection of University Data
  2. Standardized set of tools for platforms
  3. Device agnostic solutions
  4. Trained staff to support these devices
  5. Don’t have the data on the device but have the data accessible anyways

 

The Data is King:

  1. Danny: Everything in place has security controls. Placing filters at the central point of access, folks will have no chose but to adhere to policies. We are device agnostic – devices just need to meet the requirements in order to access the data.
  2. Chris: Look at the bottlenecks and place filters there. Balance personal and University data.
  3. Norma: Look at the breadth of Institutional data, do other groups have different gateways? How do you deal with environment complexity?