The following information is private and not for public consumption. If you are not a potential speaker for MacTech InDepth: Mobile Device Management, please exit this page. (Content copyright 2011. All rights reserved.)


Curriculum for
MacTech InDepth: Mobile Device Management

Speakers: The below is the curriculum designed to give consistency for MacTech InDepth: Mobile Device Management Curriculum.  Divided into individual sessions with times outlined, we’re looking for you to cover all of the items outlined for your session and embellish them with any additional information or resources you think may be important.

In short, we are setting the expectations with attendees by the below curriculum.  If you cover the topics, attendees will be satisfied.

Overview: MacTech InDepth: Mobile Device Management is specifically targeted at the issues facing the proliferation of mobile devices in their network. The event is for any size organization looking to be able to manage mobile devices and protect themselves from the problems of not having controls.  MacTech InDepth: Mobile Device Management’s sessions cover a variety of topics from those in the know about the following topics: all designed to make MacTech InDepth attendees more successful in supporting mobile technologies. See the individual session descriptions below for a break down of each topic.

General: It’s important to realize that each session should focus on the topic of the session.  If you think there’s something relevant to cover, please take a look first to see if it’s covered in one of the other sessions (the sessions build on one another).


Sessions for

MacTech In-Depth: Mobile Device Management Seminar

Session Title: Mobile Device Management Overview

30 minutes

  • Define MDM
    • What it means for other platforms
    • What it means for iOS devices
    • Where to start (setting up MDM)
  • MDM landscape
    • Where did MDM come from
    • Defining the players and platforms
      • Technologies used for management of each platform
      • Limitations of control
      • Scope of management
    • Where is MDM heading
  • Apple’s iPhone Configuration Utility (IPCU) and Profile Manager solutions
    • Set it and forget it vs. on-going management
    • Managing apps
    • Additional tool required
  • Third Party MDM solutions
    • Players and platforms supported
    • Limitations of management
    • What you can expect
  • Managed vs. Hosted
    • Building out the infrasctructure
    • Building Payloads
    • Long-term management
    • Moving from one solution to another
    • Cost breakdown of the two choices

Session Title: Using MDM: The Glossary You Need to Understand

30 minutes

  • Opt-in and Enrollment
    • Who owns the equipment?
    • Who controls the equipment?
  • Deployment
    • One-off Deployment
    • Mass Deployment
      • Minimum and maximum
      • Embedding the initial profile
  • Over-the-Air (OTA) Methodology
    • Define the three types
    • Advantages and limitations of each
  • Provisioning Profile
    • What’s in them
  • Configuration Profiles
    • Defining the options
    • Creative ways to configure
    • Securing
  • Wipe and Selective Wipe
    • What is erased
    • Security of erasure
  • Passcode
    • Do we need them?
    • Simple
    • Complex
  • Lock/Unlock
    • Limitations
  • Apple Root Certificate Authority (CA)
  • Apple Push Notification Server (APNS)
    • Is this needed?
    • Who does it go through?
    • Securing the account
  • Public Key Infrastructure (PKI)
    • How complex do we build it
  • Developer Enterprise Program (iDEP)
    • Does my company need it?
    • Can I get away with no dev account?

Session Title: IPCU vs. Third Party Solutions

45 minutes

  • iPhone Configuration Utility (IPCU): The baseline solution
    • All other solutions use iPCU as a baseline
    • What can be configured
    • What can the user change
  • Other Platform Servers
    • Overview of MDM for other platforms
    • Blackberry Server, Android, Windows 7, Symbian, WebOS
    • Different Platforms have different answers to “Who owns the equipment?”
    • What can/can’t be controlled with each
    • How do they interact with other platforms?
  • When you would use Apple, and when you would use Third Party MDM
    • Dependent on what your organization needs to support
    • Security implications of supporting platforms
    • Dealing with compromised equipment (OS or hardware)
  • Feature difference examples
    • Management levels on each platform
    • When hardware is lost
    • When hardware is stolen
    • When hardware is not returned by staff
  • How to shop for a Third Party Solution
    • Questions to ask vendors
    • Feature sets
    • Organizational needs
    • Looking forward

Session Title: Applications

45 minutes

  • How Apple works
    • It’s their ballgame
    • Scope of development
    • Current limitations
    • Where they are going
  • OTA distribution
    • Defining best practices
    • Security of distribution
    • Security of data and intellectual property
  • App store
    • Free vs. Paid apps
    • Directing toward an audience
    • Selling your app
    • Promoting your app
  • Developing Apple iOS Apps
    • Hiring internally
    • Outsourcing development
    • Types of apps to develop
    • Testing your app
    • Means to distribute
  • Android Apps
    • Building for the market
    • Security and hardening
    • Malware threats
  • Blackberry Apps
    • Platform restrictions
    • Development
    • Cross-platform techniques
  • Windows 7 Apps
    • Looking at the market
    • Development guidelines
    • Support, security and hardening
  • Symbian and WebOS Apps

Session Title: Security

45 minutes

  • Design from the beginning
    • Your current infrastructure
    • Platforms you will support
    • Security currently in place
    • Setting up zones for security
  • Threat Assessment
    • Based on platforms you support
    • Prepare for the unexpected
    • Disaster recovery plan
  • Identifying what you need to protect
    • Intellectual property
    • Business data
    • Personal data
    • Company-owned property
  • Settings
    • Infrastructure hardware
    • Servers and setup
    • Devices
      • iPhones, iPads and laptops
      • Other smart phones
      • Other tablet devices
  • Certificates
    • Types needed
    • When to use each
    • Obtaining
    • Revoking
  • Tracking
    • What is it and why is it useful?
    • What are the problems with tracking
    • Which tools allows for it
    • What you should consider

Session Title: WiFi and Network Infrastructure

45 minutes

  • VPN
    • Settings
    • User control – who gets access
    • Reasons for access
    • Should not be a global policy
    • Should be segregated as appropriate
  • Web security
    • Why is security needed
    • Certificate types
    • Areas of security
    • Types of data to host
    • WebDAV for distribution points
  • Optimization
    • Building out zones for usage
    • Locking down services
    • Determine needs to for each zone
    • Needs based on hardware required
  • Bandwidth control
    • Services allowed
    • Technologies available
    • Assessing Technologies currently in use
    • Technologies that are the biggest hogs of bandwidth
    • How to avoid saturation
  • Content filtering
    • Limiting risk to your organization
    • Filtering based on zones
    • Security
  • Controlling 3G/4G access: Is it possible?
    • Cost of data plans
    • Forcing WiFi when available
    • Capping usage or setting limits
    • Which tools support control

Session Title: Apple IPCU (iPhone Configuration Utility) and Profile Manager

60 minutes

  • Configuration Profiles
    • Defined
    • Options available
    • What settings should be pushed
    • Optional settings to help workflows
  • Payloads
    • Apps and data
    • Individual vs. Company data
    • Signing and encrypting
  • Server configuration
    • Certificates in place
    • Building out the server
    • Services needed
    • Additional options are dependant or your organizations needs
    • Testing
    • Securing and hardening
  • Deployment
    • Physical access to devices
    • Wired vs. Over-the-Air
    • Limitations of each
    • Re-deploying
  • Management console
    • Access controls
    • Limited administration
    • Pushing out changes
    • Pushing out apps
    • Pushing out data
    • Remote wipe and restores

Session Title: MDM “Best Practices” and Creating a Strategy

60 minutes

  • Segmenting your workforce
    • Assessing real needs vs. wants
    • Creating workable groups
    • Setup payloads based on group
    • Licensing of apps
    • Pushing out new apps and data
  • Building flexibility through enabling device diversity
    • Leveraging other platforms
    • Device security concerns
    • Platform concerns
    • Support concerns with multiple devices
  • Choosing your investment in a mobile device management solution or a managed service
    • Costs for building out infrastructure
    • Costs for building out MDM server
    • Costs for staff to maintain MDM server
    • Challenges with hosted MDM solutions
    • Switching to/from hosted MDM
  • Utilizing a single Web-based console for all management and security operations
    • Not all options available through https interface
    • CLI required for many advanced options
    • Creating multiple instances of MDM console
  • Outlining procedures for requesting and obtaining mobile devices, applications, and services
    • Costs associated
    • Security concerns
    • Acquiring
    • Confirming delivery
  • Defining appropriate use
    • Set usage policies
    • Monitor all aspects
    • Corrective action
  • Planning support for company vs. personal devices
    • Defining the SLA
    • Allocating resources
    • Providing additional help and resources
  • Defining internal and external service support and availability work flow
    • Current staffing needs
    • Future staffing needs
    • External support staff
    • Disaster planning and recovery
  • Troubleshooting techniques
    • OS level support
    • Device level support
    • Server support
    • MDM support
    • Infrastructure support