1 00:00:01,200 --> 00:00:07,350 As you all know, that the use of mobile devices has skyrocketed in the last few years and the trend 2 00:00:07,350 --> 00:00:13,500 is growing, according to IDC, the smartphone market is already larger than the PC market, which leads 3 00:00:13,500 --> 00:00:16,110 to mobile device management or MDM. 4 00:00:16,290 --> 00:00:19,950 So what is MDM U.S. ability to manage any device? 5 00:00:20,040 --> 00:00:21,270 So it can be a phone? 6 00:00:21,480 --> 00:00:22,650 It can be a tablet. 7 00:00:22,770 --> 00:00:24,810 Or it can be even a laptop. 8 00:00:25,290 --> 00:00:27,710 Any mobile device from a central location. 9 00:00:27,720 --> 00:00:28,030 Right. 10 00:00:28,380 --> 00:00:34,770 So an example of that is Cisco Miraki and other companies that actually provide a central policy enforcement 11 00:00:34,770 --> 00:00:36,590 and management of these devices. 12 00:00:36,600 --> 00:00:42,210 And basically, the goal is actually to protect those devices, not only by providing badges, but also 13 00:00:42,210 --> 00:00:44,790 by providing policies from your central location. 14 00:00:45,060 --> 00:00:47,780 Like in this case, it is Miraki in the cloud. 15 00:00:47,790 --> 00:00:48,150 Right. 16 00:00:48,450 --> 00:00:54,150 So from Cloud, you can manage devices within your organization, perhaps not installing the application 17 00:00:54,570 --> 00:01:00,600 and maybe that was camera enabled so you can actually specify the policies on how you want to manage 18 00:01:00,600 --> 00:01:01,440 those devices. 19 00:01:01,770 --> 00:01:07,170 Additionally, some of these devices are actually talk to other devices in the network, like the eyes 20 00:01:07,170 --> 00:01:11,240 or identities service engine to end for their policies. 21 00:01:11,430 --> 00:01:17,460 Let's say you have an unmanaged tablet, perhaps actually you don't want this tablet to accessing to 22 00:01:17,460 --> 00:01:19,200 a server in your organization. 23 00:01:19,410 --> 00:01:25,980 So there is policy that can be sent to a switch on firewall to actually block tablet from connecting 24 00:01:25,980 --> 00:01:31,860 to sensitive data or sensitive systems of your company and then allow tablet to actually connect to 25 00:01:31,860 --> 00:01:34,000 the Internet or vice versa. 26 00:01:34,140 --> 00:01:38,790 This tablet only connects to some resources and it would not connect to the Internet. 27 00:01:38,790 --> 00:01:39,160 Right. 28 00:01:39,420 --> 00:01:41,190 So possibilities are endless. 29 00:01:41,460 --> 00:01:47,820 You can modify policies to block some applications or allow some content to transfer to Internet or 30 00:01:47,820 --> 00:01:51,180 to communicate any other devices within the organization.