1 00:00:06,450 --> 00:00:08,870 - Let's go over Mobile Device Management. 2 00:00:08,870 --> 00:00:11,130 Right, so MDM. 3 00:00:11,130 --> 00:00:12,120 And basically what it is, 4 00:00:12,120 --> 00:00:15,800 is the ability to manage any device. 5 00:00:15,800 --> 00:00:17,420 So it can be a phone, 6 00:00:17,420 --> 00:00:19,020 it can be a tablet, 7 00:00:19,020 --> 00:00:21,560 or it can be even a laptop, right? 8 00:00:21,560 --> 00:00:24,600 Any mobile device from a central location. 9 00:00:24,600 --> 00:00:28,100 So an example of that is Cisco Meraki. 10 00:00:28,100 --> 00:00:29,760 There's other companies, you know, 11 00:00:29,760 --> 00:00:31,820 like good, that actually provide 12 00:00:31,820 --> 00:00:35,140 that central enforcement, policy enforcement, 13 00:00:35,140 --> 00:00:38,040 and management of these actual devices. 14 00:00:38,040 --> 00:00:41,689 So, basically the goal is actually to protect those devices, 15 00:00:41,689 --> 00:00:46,672 not only by providing patches perhaps in some locations, 16 00:00:46,672 --> 00:00:48,110 and some you actually cannot do that, 17 00:00:48,110 --> 00:00:51,360 but actually enforcing policies from 18 00:00:51,360 --> 00:00:54,000 that central location. 19 00:00:54,000 --> 00:00:57,100 In this case actually Meraki is in the cloud, right? 20 00:00:57,100 --> 00:01:00,200 So from the cloud you actually can manage devices 21 00:01:00,200 --> 00:01:04,440 within your organization that actually can enforce policies 22 00:01:04,440 --> 00:01:07,260 of perhaps not installing an application, 23 00:01:07,260 --> 00:01:11,450 or for that device not to have the camera enabled 24 00:01:11,450 --> 00:01:12,960 in some scenarios, right? 25 00:01:12,960 --> 00:01:16,060 So actually you can specify very granular policies 26 00:01:16,060 --> 00:01:19,470 on how you actually want to manage those type of devices. 27 00:01:19,470 --> 00:01:22,310 Additionally, some of these devices actually talk to 28 00:01:22,310 --> 00:01:26,290 other devices in the network, like the eyes, 29 00:01:26,290 --> 00:01:29,460 the identity service engine to enforce further policies. 30 00:01:29,460 --> 00:01:33,603 So let's say you actually have an unmanaged tablet, 31 00:01:33,603 --> 00:01:36,630 perhaps actually you don't want this tablet 32 00:01:36,630 --> 00:01:40,200 from accessing a server within your organization, right? 33 00:01:40,200 --> 00:01:43,810 So there is policy that can be sent to, 34 00:01:43,810 --> 00:01:47,070 let's say a switch or a firewall to actually block 35 00:01:47,070 --> 00:01:50,320 this device from connecting to sensitive data, 36 00:01:50,320 --> 00:01:53,200 or sensitive systems in the organization, 37 00:01:53,200 --> 00:01:54,440 and then allow them to actually 38 00:01:54,440 --> 00:01:56,090 connect to the internet, for example. 39 00:01:56,090 --> 00:01:58,280 Or vice versa, that this device only 40 00:01:58,280 --> 00:01:59,970 connects to a specific resource, 41 00:01:59,970 --> 00:02:01,550 and it will not connect to the internet. 42 00:02:01,550 --> 00:02:03,520 So the possibilities are endless 43 00:02:03,520 --> 00:02:06,110 you actually can do very granular policies 44 00:02:06,110 --> 00:02:10,710 and from even not allowing specific applications 45 00:02:10,710 --> 00:02:14,210 sending specific content to the internet 46 00:02:14,210 --> 00:02:18,373 or to communicate to any other devices in your organization.