MacTech InDepth: Mobile Device Management
Boston 2012

From small business to Enterprise, Mobile Device Management (MDM) has become one of the hottest topics facing corporate environments not only because of growing demand generated by business users, but also because of the incredible opportunities mobile devices provide for your business. With everything from deployment to management to security and more facing organizations, MacTech InDepth gives you the opportunity to spend a full day on the topic and identify where you are, what you need to do, and how you are going to get there.

Sept 28, 2012
Location
Royal Sonesta Hotel Boston
40 Edwin Land Boulevard
Boston, MA 02142

Registration at 8:15am (no earlier please).
Full day’s schedule.
Subscribe to iCal calendar.
Special Rate for hotel

Don’t wait. Space is limited. Register today by clicking here.


Sessions Chairs




Leon Lincoln, Broad Institute

Currently a System Administrator for the Broad Institute or MIT and Harvard where he designs and implements the Mac computer deployment images, manages the Mac Server environment and assists with supporting both Unix/Linux and Windows systems. With over thirty years experience in doing some form of IT work from his early beginnings in the printing industry where he worked when the Apple Macintosh was first introduced, to working with Publishing companies supporting weekly production of Journals like the New England Journal of Medicine to straight IT work for the past 12 years, Leon has worked with every Mac OS from Apple since 1984 to Present.


Andy Espo, Call Andy! Macintosh Consulting

In 1988, while running a successful event production company, Andy Espo realized his business’ need for a computer system. “At that time, the only choices available were DOS and Mac,” commented Andy, “It was a pretty easy decision!” With experience in professional audio, video, theatrical lighting and scenery, Andy was determined to add the automation of his own business to his technical repertoire. As his company grew, so too did his reputation for knowing Macs. In 1998, Andy transitioned out of event production and into being the full-time, “Mac-Guy”. Now in it’s thirteenth year, Call Andy! Macintosh Consulting retains an array of clients in the public relations, marketing, architecture, advertising and design sectors. Andy is an Apple Consultants Network member, and is on the board of the Boston Macintosh Users Group (BMac).


Neil Ticktin, MacTech Magazine

Neil not only emcees the event, but oversees the session chairs and content for each MacTech event. Neil has been the Editor-in-Chief and Publisher of MacTech Magazine since 1992. With both a technical and business background, Neil has authored hundreds of articles including most of MacTech’s well known benchmarking articles on productivity applications, virtualization, and performance products.



Sessions



Rob Holz, Call Andy

Rob Holz brings many years of Apple experience to the Call Andy! team. He began using Apple products at the age of two with an Apple IIc. In 2004 Rob was hired by Apple Inc. as a Mac Genius. “It changed my life. It allowed me to build a career that I am passionate about.” While working for Apple, Rob received numerous performance awards and was selected to attend weekly conference calls with the iPod development team to help improve Apple’s #1 selling music player. In 2010 he joined Call Andy! and is excited to be a part of the Apple Consultants Network. He has an extensive background in Pro Video and Audio production and knows the in’s and outs of all of Apple’s product offerings.

Cheryl Schneider, The MacWorks

Cheryl Schneider is the Owner of Mac Works. With substantial industry expertise in providing dozens of organizations with needs analysis and project design; management and implementation of hardware, software, server and operating system deployments, and life-cycle management; systems and network security, Mac Works has over 25 years of IT experience integrating multi-vendor and cross-platform solutions, and enriching the knowledge and skills of other IT professionals in the administration, maintenance, monitoring and troubleshooting of networked systems, servers and network infrastructure.

Max Buxton, Call Andy

Max Buxton has been a full time Macintosh consultant for over fifteen years. Before working as a consultant, Max honed his troubleshooting skills working as a software tester and application engineer for computer software development companies. Upon realizing he enjoyed working with end users as much as the technology, he transitioned to system administration, supporting groups of users and refining his “consulting” chops. In the late 1990 s, Max decided to become an independent consultant and concentrate on what he enjoys most: helping Macintosh users get the most out of their systems. He’s been a certified member of the Apple Consultants Network since 2003.

Lars Ljungholm, Apple Inc.

Prior to working for Apple, Lars Ljungholm owned NorthPoint Solutions. Today, as an Apple Technical Sales Engineer, Lars is experienced in management and account development with a talent for analyzing opportunities and developing winning strategies for revenue growth. His strong business acumen with ability to build executive level relationships and execute a wide range of sales and marketing operations designed to establish market presence and increase profitability. He’s a proven performer who moves easily from vision and planning to implementation and follow-through. Lars excels in technical environments and brings both passion and expertise in understanding client objectives.

Christopher Holmes, The Orchard Solutions

Introduced to the world of Apple when he bought his first Mac (Core Duo Black MacBook) in 2006. Since then, this enthusiast turned expert has been on an incredible journey of technological discovery. In 2008 he started his I.T. professional journey by joining the Apple Consultants Network. Christopher now sits on this years ACN Advisory Council. Not long after, he was recruited as CTO by an exciting new startup called The Orchard. Working for an Apple Specialist & Authorized Service Provider has placed him at the center of innovation in the South. For the last two years, Chris has been empowering customers and helping shape the digital frontier for organizations.

Chris Czel, JAMF Software

Based in the Connecticut area, Chris is an Apple Certified Systems Administrator including being Final Cut Pro certified, Aperature certified, and an Xsan Administrator. He’s got a background in Mobile Device Management, and is a Certified JSS Administrator (CJA), as well as has experience with Ethernet and Fibre Channel network design, his CCNA, and in planning, scoping and management of professional services engagements.


Sessions



Mobile Device Management Overview

Before you can start implementing mobile device management, you have to know what it is. We define MDM for you and explain where to start. What is the MDM landscape? We explain where it came from and who the major players and platforms are. It’s important to know the solutions offered by Apple’s iPhone Configuration Utility (IPCU) and profile manager and also, solutions offered by third parties.

Using MDM: The Glossary You Need to Understand

We go over the terms that you need to know to go forward with mobile device management. We discuss opt-in and enrollment, deployment, Over-the-Air (OTA) Methodology, provisioning profile, configuration profiles, wipe and selective wipe, passcode, lock and unlock, Apple Root Certificate Authority (CA), Apple Push Notification Server (APNS), Public Key Infrastructure (PKI), and Developer Enterprise Program (DEP).

Apple IPCU (iPhone Configuration Utility) and Profile Manager

We go over the profile manager in more detail, explaining configuration profiles and payloads. Understand the components of a server configuration. For deployment, learn the difference of using a wired or Over-the-Air methods. We also go over the management console.

IPCU vs. Third Party Solutions

We go into more detail of whether to choose IPCU or a third party solution. IPCU is the baseline solution, we show you what can be configured and what the user can change. We talk about other platform servers, how they can be controlled, and how they interact with other platforms. It’s important to know when you would use Apple and when you would use a Third Party MDM. We will feature difference examples and show you how to shop for a Third Party Solution.

Applications

With applications, it’s good to know how Apple works, because this is their territory. We cover OTA distribution of apps and define best practices. We cover the different components of the App Store and how you can use it. If you have been wanting to know how to develop Apple iOS apps, we will cover the different methods you can emply. Apple isn’t the only ones with apps, we discuss Android, Blackberry, Windows 7, and Symbian and WebOS apps.

Security

Security is a necessity when setting up any system, especially when it has to do with an organization’s internal information. When creating a security strategy, we believe it’s best to design from the beginning, seeing what it is you already have in place and going from there. We show you how to do a threat assessment based on the platforms you support. We help you identify what needs to be protected, what settings to use, and what certificates are needed. We also explain what tracking is and why it’s useful.

WiFi and Network Infrastructure

For Wifi and Netowrk infrastructure, we go over VPN and what settings and components there are. For web security, we explain why security is needed and how to go about setting this up. We explain optimization and bandwidth control and also how to filter content. We also talk about controlling 3G/4G access and if it’s possible.

MDM “Best Practices” and Creating a Strategy

We’ll be going over best practices of MDM and how to create a strategy from the information you have gotten. We show you how to segment your workforce and build flexibility through enabling device diversity. Choosing your investment in a mobile device management solution or a managed service is crucial and we discuss how to do this. For ease of use, we show you how to set up a single Web-based console for all management and security operations. We’ll outline procedures for requesting and obtaining mobile devices, applications, and services and define appropriate use. It’s important to plan support for company and personal devices, we talk about how to protect both. We’ll also define internal and external service support and availability work flow and show you troubleshooting techniques.

 

Sponsors

MacTech selects key vendors to be a part of the event. Gold and Silver sponsors will be speaking and attending the event, and can talk to you about the solutions they offer. It’s a unique opportunity to make contacts within these companies and get your questions answered. Interested in sponsoring a MacTech event? See our sponsorship page.

 

Media Support

These great publications support MacTech Events in a variety of different ways.