From small business to Enterprise, Mobile Device Management (MDM) has become one of the hottest topics facing corporate environments not only because of growing demand generated by business users, but also because of the incredible opportunities mobile devices provide for your business. With everything from deployment to management to security and more facing organizations, MacTech InDepth gives you the opportunity to spend a full day on the topic and identify where you are, what you need to do, and how you are going to get there.
Leon Lincoln, Broad Institute
Currently a System Administrator for the Broad Institute or MIT and Harvard where he designs and implements the Mac computer deployment images, manages the Mac Server environment and assists with supporting both Unix/Linux and Windows systems.With over thirty years experience in doing some form of IT work from his early beginnings in the printing industry where he worked when the Apple Macintosh was first introduced, to working with Publishing companies supporting weekly production of Journals like the New England Journal of Medicine to straight IT work for the past 12 years, Leon has worked with every Mac OS from Apple since 1984 to Present.
Andy Espo, Call Andy! Macintosh Consulting
In 1988, while running a successful event production company, Andy Espo realized his business' need for a computer system. "At that time, the only choices available were DOS and Mac," commented Andy, "It was a pretty easy decision!" With experience in professional audio, video, theatrical lighting and scenery, Andy was determined to add the automation of his own business to his technical repertoire. As his company grew, so too did his reputation for knowing Macs. In 1998, Andy transitioned out of event production and into being the full-time, "Mac-Guy". Now in it's thirteenth year, Call Andy! Macintosh Consulting retains an array of clients in the public relations, marketing, architecture, advertising and design sectors. Andy is an Apple Consultants Network member, and is on the board of the Boston Macintosh Users Group (BMac).
Neil Ticktin, MacTech Magazine
Neil not only emcees the event, but oversees the session chairs and content for each MacTech event. Neil has been the Editor-in-Chief and Publisher of MacTech Magazine since 1992. With both a technical and business background, Neil has authored hundreds of articles including most of MacTech's well known benchmarking articles on productivity applications, virtualization, and performance products.
Alyssa Robinson, Broad Institute
Alyssa Robinson recently joined the Information Security and NetworkInfrastructure team at the Broad Institute, but has worked in networkengineering, Unix system administration and IT security for more thanfifteen years. She got her start in the NOC of her local ISP in highschool , which led her to a computer science degree. She is currentlya student in the Masters of Information Security Management program atSANS and holds a CISSP certification. Late to the game, she got herfirst Mac in 2007.
Cheryl Schneider, The Mac Works
Cheryl Schneider is the Owner of Mac Works. With substantial industry expertise in providing dozens of organizations with needs analysis and project design; management and implementation of hardware, software, server and operating system deployments, and life-cycle management; systems and network security, Mac Works has over 25 years of IT experience integrating multi-vendor and cross-platform solutions, and enriching the knowledge and skills of other IT professionals in the administration, maintenance, monitoring and troubleshooting of networked systems, servers and network infrastructure.
Chris Czel, JAMF
Chris Czel is a Systems Engineer for JAMF Software. He holds several certifications including: Apple Certified Systems Administrator, Final Cut Pro, Aperture, and Xsan Administrator. In Mobile Device Management (MDM), he's a Certified JSS Administrator; and holds his CCNA for Ethernet and Fibre Channel network design, specifically, planning, scoping and management of professional services engagements. Chris' background allows him to relate complex technical ideas to customers in approachable ways via large and small scale demonstration of concepts and technologies.
Christopher Holmes, The Orchard Solutions
Introduced to the world of Apple when he bought his first Mac (Core Duo Black MacBook) in 2006. Since then, this enthusiast turned expert has been on an incredible journey of technological discovery. In 2008 he started his I.T. professional journey by joining the Apple Consultants Network. Christopher now sits on this years ACN Advisory Council. Not long after, he was recruited as CTO by an exciting new startup called The Orchard. Working for an Apple Specialist & Authorized Service Provider has placed him at the center of innovation in the South. For the last two years, Chris has been empowering customers and helping shape the digital frontier for organizations.
Lars Ljungholm, Apple Inc
Technical Sales Engineer experienced in management and account development with a talent for analyzing opportunities and developing winning strategies for revenue growth. Strong business acumen with ability to build executive level relationships and execute a wide range of sales and marketing operations designed to establish market presence and increase profitability. A proven performer who moves easily from vision and planning to implementation and follow-through. Excels in technical environments and brings both passion and expertise in understanding client objectives.
Max Buxton, Call Andy! Macintosh Consulting
Max Buxton has been a full time Macintosh consultant for over fifteen years. Before working as a consultant, Max honed his troubleshooting skills working as a software tester and application engineer for computer software development companies. Upon realizing he enjoyed working with end users as much as the technology, he transitioned to system administration, supporting groups of users and refining his “consulting” chops. In the late 1990 s, Max decided to become an independent consultant and concentrate on what he enjoys most: helping Macintosh users get the most out of their systems. He’s been a certified member of the Apple Consultants Network since 2003.
Rebecca Kraemer, Small Dog Elecronics
Rebecca Kraemer serves as the Director of Information Technology and Consulting at Small Dog Electronics Inc. Small Dog Electronics is an Apple Specialist located in Central Vermont and New Hampshire. Rebecca has enjoyed a career working with Apple products for the past seventeen years. She holds several certifications including Apple Certified Systems Administrator 10.4-10.5, Apple Certified Technical Coordinator 10.4-10.7, Apple Certified Macintosh Technician, Apple Certified Mac Integration 10.7-10.8, Apple Certified in Mobility and more. Rebecca can be seen on Small Dog Electronics' YouTube channel and heard weekly with Don Mayer on their show "Small Dog Speaks" every Thursday at 1pm on WDEV and solo on "Tech Talk with Craig Peterson's" "Ask an Apple Expert" segment every Sunday afternoon on WGIR and WQSO.
Mobile Device Management Overview
Before you can start implementing mobile device management, you have to know what it is. We define MDM for you and explain where to start. What is the MDM landscape? We explain where it came from and who the major players and platforms are. It’s important to know the solutions offered by Apple’s iPhone Configuration Utility (IPCU) and profile manager and also, solutions offered by third parties.
Using MDM: The Glossary You Need to Understand
We go over the terms that you need to know to go forward with mobile device management. We discuss opt-in and enrollment, deployment, Over-the-Air (OTA) Methodology, provisioning profile, configuration profiles, wipe and selective wipe, passcode, lock and unlock, Apple Root Certificate Authority (CA), Apple Push Notification Server (APNS), Public Key Infrastructure (PKI), and Developer Enterprise Program (DEP).
Apple IPCU (iPhone Configuration Utility) and Profile Manager
We go over the profile manager in more detail, explaining configuration profiles and payloads. Understand the components of a server configuration. For deployment, learn the difference of using a wired or Over-the-Air methods. We also go over the management console.
IPCU vs. Third Party Solutions
We go into more detail of whether to choose IPCU or a third party solution. IPCU is the baseline solution, we show you what can be configured and what the user can change. We talk about other platform servers, how they can be controlled, and how they interact with other platforms. It’s important to know when you would use Apple and when you would use a Third Party MDM. We will feature difference examples and show you how to shop for a Third Party Solution.
With applications, it’s good to know how Apple works, because this is their territory. We cover OTA distribution of apps and define best practices. We cover the different components of the App Store and how you can use it. If you have been wanting to know how to develop Apple iOS apps, we will cover the different methods you can emply. Apple isn’t the only ones with apps, we discuss Android, Blackberry, Windows 7, and Symbian and WebOS apps.
Security is a necessity when setting up any system, especially when it has to do with an organization’s internal information. When creating a security strategy, we believe it’s best to design from the beginning, seeing what it is you already have in place and going from there. We show you how to do a threat assessment based on the platforms you support. We help you identify what needs to be protected, what settings to use, and what certificates are needed. We also explain what tracking is and why it’s useful.
WiFi and Network Infrastructure
For Wifi and Network infrastructure, we go over VPN and what settings and components there are. For web security, we explain why security is needed and how to go about setting this up. We explain optimization and bandwidth control and also how to filter content. We also talk about controlling 3G/4G access and if it’s possible.
MDM "Best Practices" and Creating a Strategy
We’ll be going over best practices of MDM and how to create a strategy from the information you have gotten. We show you how to segment your workforce and build flexibility through enabling device diversity. Choosing your investment in a mobile device management solution or a managed service is crucial and we discuss how to do this. For ease of use, we show you how to set up a single Web-based console for all management and security operations. We’ll outline procedures for requesting and obtaining mobile devices, applications, and services and define appropriate use. It’s important to plan support for company and personal devices, we talk about how to protect both. We’ll also define internal and external service support and availability work flow and show you troubleshooting techniques.
These great publications support MacTech Events in a variety of different ways.