All right, let's go to get started. Hello everyone. My name is Joe and thanks for joining us for this next installment of the T-Mobile for Business solution series. This is where we update organizations like yours on the evolving landscape of 5G connectivity and how you can leverage new developments to your advantage. Now today's topic explores the need to strengthen enterprise security to protect your businesses, people, and data in our mobile hyper connected world. Now at the end of this webinar, I'm going to share a link to an online resource that contains lots of valuable connectivity information across multiple verticals that you can use right now, today. But right now, let's all imagine a world where cybersecurity is under constant threat, where mobile devices have proliferated, and where data breaches, malware, phishing and E criminals hide in the shadows ready to strike at any moment. OK, we don't need to imagine any of that, right? That's the world we live in right now. Cybercrime is projected to cost businesses $9.5 trillion worldwide this year and rise to $10.5 trillion next year. And with the workforce increasingly working remotely, accessing critical data over a variety of mobile devices and apps, the threat exposures and increased exponentially. Now in order to survive these days, you need layers of security, multiple layers of security. Heck, you practically need a team of Marvel superheroes to keep you safe. I mean come on the names of these E crime groups? They already sound like Marvel villains, right? Wizard Spider, Evil Corp, Dark Basin. I mean, so that's why we're here today to visit with three real world superheroes and explore how they're helping keep your business's mobile ecosystem safe and secure. You know, I'd like to call this team the Digital Defenders, but their real identities actually are Mark Irwin, US Head of Mobile Business Engineering Solutions for Samsung, who actually I've given the superhero name of Cyber Fortress, who uses the Knox security platform to build defenses into devices from the ground up. Our second hero is Mike Burr, Senior Security Consultant for Android Enterprise, who I've given the superhero name of the Cyberseer who uses Android Enterprise solutions to get inside the heads of E criminals. And our third hero is Myron Jones, Senior Security Engineer at T-Mobile, who I've given the superhero name of the Cyber Shield, who uses powerful mobile security solutions delivered across the country's fastest and most reliable 5G network to drive and protect the entire team's efforts. All right, But before we jump in with all them, we're going to take our little housekeeping. All right, First, remember, right below the video screen is a box where you can submit a question. We encourage that feel free to submit questions anytime during the webinar. You will receive a personal response to each of those questions within one or two business days. Also, several times during the webinar, a poll question will appear on your screen. Just select your answers and you're going to see up to the 2nd results. Results that include ongoing on demand sessions. And remember your answers, They won't be seen by any other webinar participants, so you can be completely honest. In fact, you know what? Let's go and try one out. All right, here's your question. What is your organization's biggest security concern regarding mobile devices? Just pick the one that really keeps you up at night and submit. Is it data breaches caused by lost or stolen devices, unsecured Wi-Fi and public hotspots, malicious apps on devices, Inadequate employee awareness or AI data privacy? Now, I know that's a lot to choose from, but just select the one that you feel is the biggest threat to your environment and submit. All righty. Well, let's take a look at the current results here. Well, as insightful as these results are, I'm sure many of you wish I had added another choice. All of the above, right? For sure. All right, so Myron, why don't you go ahead and start us off here? What is the current situation in mobile cybersecurity? Well, let me let me be honest with you here, man, total transparency. There's a lot of challenges that we're running into. You know, there is there's a multi layer challenge. And here's the biggest thing people tend to forget about the mobility device. It's kind of like the, I don't know, you use the Marvel theme. So it's kind of like the hidden character that never gets any screen time. When we think about this, a mobility device is essentially a computer. It, it has a lot of the power of some of today's modern devices that we use on a day-to-day basis. And it the fact that it's with us all the time. I mean, I, I know my life wouldn't be the same without my mobility device. But you know, the one thing that I think a lot of people forget is it needs the same security as that computer that they have. When you're using that device, what do you have access to your e-mail, your, your contacts, your calendar, your customers data, your personal data. There's a lot of information there. And that needs the same type of attention that I think that your PCs and your your internal network needs. And, you know, I got my peers here with me kind of help me help me kind of go through and see what we're doing in the industry. And and, you know, take a look at it from a bunch of different perspectives. But when we look at it holistically, these mobile phones today, they're essentially computers and they need that same type of layer of security. Let's kind of take a look at some of the growing threats that are out there. When we look at this 90K mobile phishing and malicious web attacks happened in Q 1/24/2024 that's double the threats of Q2 Q 1/20/23. Let's think about that. That's a large number of threats that are targeting the mobility device that we have, right? That that that iPad, that cell phone that you got in your pocket. It's, it's being targeted because you think about it, your network infrastructure, you have layers of security, you got added firewalls, things of that nature, but that mobile device is out there lonely. So we're, we're seeing that a lot. 24K and malicious mobile apps were blocked each year, each day in 2024. I know my pals at Google got something to say, got something to say about that. They've been doing an amazing job at blocking these threats, but they're there, they're prevalent. They are something that's going to be a part of our lives, unfortunately for the future to come. 5.5 million mobile malware, adware, ransomware attacks blocked in 2024. I mean, that's a lot, but we can be doing better. Just to kind of give you some some ideas, some figures here, 45% of enterprises leverage mobile threat defense. That's not nearly enough, right? We should be treating these mobile devices like we treat our computers and that's just something that's not happening today. But when you when you look at it from from the perspective that I'm trying to provide you, that mobile device has just as much access, just as much capability as your computer. So it like I said, it definitely deserves the same type of layer security security. And then when we talk about policies and violate violation of those policies, 2.28 million policy by a violating applications were prevented from published in 2023. So I mean, that's a significant amount. And like I said, from, from the hardware to the platform to the network, we're, we're doing our, our best job to, to, to prevent those from happening. But there's always more we can do. So we're going to kind of talk about that today. And you know, Joe, I think you got a poll for us. Well, actually, Mark and Mike, anything you want to ring in before we move on? I mean, I would just add to what Myron said, You know, these are just a few sort of signals from the ecosystem of mobile devices that kind of lend towards, you know, the fact that these things are small, they're easily stolen, They're very easily lost. Unlike a laptop, which is typically in your backpack, your phone is small. It could be lost anywhere. So, you know, I think today we're going to all talk about the various layers they help protect against, you know, the various types of threats from from all different angles, whether it's network lost device, data exfiltration, you name any, you know, malware, whatever it is, we have to have many layers as Myron said to, to protect these devices. Yeah, absolutely. You know, I have to say you, you paint, you know, quite a challenging picture out there actually. You know, it feels like an almost an insurmountable task to actually manage all these threat points. But before we explore how businesses are tackling these challenges, I'm going to ask everyone here another quick question. All right, here it is in your business who makes decisions about managing and securing your mobile devices. Go ahead and select one of these and submit. Do you think decisions are made by the security team, the network team, procurement, or none of the above? I remember no other webinar participant can see your answers. So select the one that best describes your situation and then submit. All right, all right, let's take a look at how you're responding here. Well, results are as expected. You know, it's amazing how many decisions about mobile security being made by departments that don't have the information they really need to make those decisions. No matter how we tackle mobile security issues, a successful approach must include solutions from the network, the platform, and the device. Myra, why don't we start with the network? Well, it's always good to start with the network Joe. Let's talk about it. So we, we here at T-Mobile, we pride ourselves on a secure, innovative network with the, you know, with the, one of the largest 5G networks in the world, right? I mean, but the big thing is how can we make you more capable with that 5G network? How can we allow your field workers to access the data they need and nothing else, right? I mean, I, I hear things all the time like, hey, Mara, we got a good VPN solution, but why give somebody access to the ocean when they only need a bottle of water, right? So we have zero trust architecture. And what that means is essentially, I'm only going to give you what you need, right? We got field workers out in the field. They may need access to a specific database and maybe they're not the most tech savvy people, right? We, we here at T-Mobile, we have the ability to adjust our network to your needs, comprehensive encryption, right? What that means is, is that we have the ability to encrypt, decrypt your data at the network level. So we have a lot of tools at our disposal to help not only secure your, your data, but have unique delivery options, vulnerability management, right? Everybody says, hey, Myron, this must be the most complicated thing in the world. No, no, no, T-Mobile makes it simple. And that's what we pride ourselves on here at T-Mobile, increasing collaboration and security across the board and making it something you can easily deploy from a network level. But you know, we can't do it alone. And that's where I got to pull in one of my type of friend, you know, part of the, I don't want to say Avengers, but superhero lingo right here, right? Some of my platform friends. Maybe I'll get a hand from my Google buddy here to talk about how he can help me from once we get past the network level to adjust that security. Yeah, I appreciate that Myron. You, you, you, you make a good point with all, you know, all those things you said. And I think you see a lot of that flow up into the platform. So, you know, from an Android perspective, which is the platform we're discussing here, we, we're kind of in a unique position where we sit between the network and we use the network obviously without being connected, it's not a lot you can do except maybe play an offline game. But regardless, we provide, we provide a platform and a, and a pretty robust capability built in. So no matter, you know, when you talk about identities, you know, we, we have all the, the capabilities for, you know, any type of identity you may have it. And that includes multi factor as well, like, you know, 2 factor authentication to apps, certificates for accessing, you know, services and then also, you know, a single sign on. So all those kind of play on an Android device quite well. And then you look at the encryption. So we deliver to the ecosystem a basic FIPS validated encryption, right? But some of our partners like Samsung here, they take that to another degree and they amp that up a little more. Now, you know, I want to speak for Mark. He'll, you know, I'll be passing it to him in just a second. But we also have built in threat protection capabilities, right? And we want it to be such that a user doesn't have to worry about all all these complicated controls and if it's on or if it's off. So when a device is managed in a business environment, these things are, are meant to be transparent to the user, but not to the EMM or the management tool that is managing the devices. So we want to make sure that we have that capability for all of our partners to properly manage those devices. And then, you know, lastly, we have a good platform for zero trust. You mentioned that, right. We, we, we surely move into this world where zero trust is key. It is who you are, where you are, what you're trying to get access to. And we provide nearly 100 signals for, you know, for for different types of vendors, Mt DS, ID, PS EM to sort of consume those signals, understand what's happening with their fleet of devices. And then, you know, I'll pass it off to Mark here. Who sorry, Myron, did you have Myron? Did you have a comment? Yeah. I just wanted to, to ping in there. You know, from a platform perspective, are you, are you seeing it be more simplify for them to deploy these features? Because I know from a network level we're trying to make things easier. So that way we get this implemented, you know, universally. Are you guys seeing it same that same, that same type of method? Are you guys using that same type of methodology on a platform level? Of course, and I sort of get handed to that, making it as easy as possible with less friction for both the users to get enrolled and for the admins to set it up. That doesn't mean it's not comprehensive and robust, because it is, but we try and make it as fluid as possible and the easiest possible for both sides, management and users. So, yeah, and I think Mark, you know, Samsung's done a fantastic job of taking what we build in native Android and sort of amplifying that significantly. So I think I'll pass it off to Mark to kind of talk about some of the stuff that Samsung is building. Thanks a lot for that Mike and Myron, good to you for me as well. So you know listen, we work very closely with Google. They make a great platform. We do a lot of things to provide the best in class experience for IT professionals, procurement folks, end users, line of business owners and the idea is to simplify the the end user experience for the devices themselves. What's important is you need to know the where a device comes from, how it got to you, what its current status is, to really understand and have a good picture of what security looks like for your devices. We've built a lot of things into our devices, and I'll dig into it here in a bit. Most importantly, as we've added at the platform level, some hardware things that we do, some software things to make sure that the devices are secure and that they're testing that they're OK and in a secure posture. And then we have a software suite of products that we layer on top of it that allow you to do all the things from easy deployment to easy management and to easy visibility to make sure that your fleet is operating the way that you want it to. No. And I think you made some good points there especially you know what the easy. So we're talking about a multi level approach to mobile workforce security and let's talk about that just briefly. When we look at the Android for enterprise security platform defense grade security from Samsung industry leading 5G technology from T-Mobile, I mean that's a multi layered approach at security. You got it on the hardware, the platform and the soft and the network. Now when I think about that and I and I kind of hit on that just earlier, the one common theme is easy, right, easy to easy to understand, easy to use, easy to deploy, right. We don't I think the big thing that I think scares people about security is maybe I got to hire a whole fleet of engineers to deploy this know a lot of these things are embedded into the operating system, embedded into the hardware and embedded into the network. So I mean that that's what's going to be the common theme here is the multi level approach to security, but the ease of deployment, the ease of dissemination and the ease of use, right? I mean, I guess there's an old methodology, right? If it's hard to do or hard to explain, then it then it's probably doesn't have a lot of value, right? And at the end of the day, I think our team here has hit on some very key points to how we can not all the kind of some of the threats and how we can help, you know, with these, with each unique solution, how we can help layer on some additional security. Joe, I know, I know you're going to go through and summarize some of the things we talked about. I'll go ahead and pass it back to you. Yeah, absolutely. Good stuff. You know, I have to jump in. You know, we are getting to the heart of this webinar now. Myron, you know the three of you represent industry leading tech companies who offer some of those powerful security solutions on the market. So we'd like to do now we'd like to each of you to go through your specific solutions, how they work and most important, how they work together. Again, Myron, we got to start with the network, right? Man, it starts with the network, right? You got to be able to connect to these devices. I mean, everybody knows, right, that the baseline is you're going to have AES security, 256 bit security, right? That, that that's kind of that's kind of industry standard, right. But when you start getting into unique 5G network slicing and being able to deliver specific content to your users, you know, I kind of talked about it earlier, right? I mean, VP NS been out there for decades, right? But but now that's been a point of contention, right? Do I give people access to everything even though they only need one particular application or they need they need access to a few particular websites? And how do you set that up? What does that look like, right? When you look at this? And we're, and I'm looking at the slide here and it says, you know, virtual gateway at the network edge, right? When we, when we look at that, if I don't have to go through a separate application to be able to institute web content filtering, right? My, my, my user only needs access to, to these particular websites. And I want to keep it very specific. When I think about security and I talk about identity and security often I, I think about, hey, what do they have access to, right? I mean that during the work day, if it's a business device, do they need to go to their Yahoo account that may not have the same layer of security that they use on their Microsoft account or their Google account, right? I mean, at the end of the day, I am less worried about the enterprise grade access to those those resources than I am those personal resources that may click a link and affect a device, things of that nature. So being able to apply that security at the edge is crucial to being able to quickly and instantly be able to to mitigate threats, right, identify and mitigate threats. And I think here at T-Mobile, we have some very unique solutions to not only deliver custom, custom access to particular applications. Or, or websites security at the network level, you can prevent threats from happening before they even get to the device. But I think having a solid platform and solid hardware is, is, is the trifecta in being able to disseminate an effective solution for not only your field workers, but your office workers as well. And I think we're going to talk more about that here in just a moment when we talk a little bit more about the platform. But just a question before, before we go, before I pass it off. When you look at your solution and you look at what you have today, just think about that in a smaller platform from a mobility perspective, right? The same type of permissions that you have on your computer, those should be duplicated on your mobility device all the way from your Casby to your zero trust, your, your zero trust methodology, right? No matter if you're in a regulated industry and you have HIPAA, HIPAA requirements. I mean, think about that when you're when you're, when you're texting, when you're sending, when you're sending emails and when you're browsing the web, you want to secure that device as if it was a note on your network. And I think my my pals at Google have some interesting points they want to make from a platform perspective. Yeah, absolutely. Thanks, Myron. Appreciate that. And I love the way you kind of teed that up. Obviously, you know, you kind of hinted to this, but as you can see here, you know, we, we build a lot of things into the Android platform to help build that depth and defence layered policies and, and different types of protections to prevent all the negative bad things that can happen to to a mobile device. But one thing that I want to comment here on is that, and we sort of alluded to this, is that security is, is an absolute must, right? It's table stakes and you need to treat mobile devices in some cases more securely than you would, you know, other types of systems in what we do at Android on the platform layers, because we have so many different areas where security is important, so many different layers. You know, we try our best to satisfy the hundreds of different needs of different customers with different use cases with different deployment models. Some may use, you know, single sign on, some may use VPN, some may use mobile threat detection. All of that we try to take into account. And that's why we have such a, a high degree of, of, of security in every layer and just kind of, you know, explaining that a little bit. So at the hardware layer, you know, Google, in order to be a Google certified device or GMs device or Google Play Protect certified device, we put out something called the compatibility definition document. And about 50 to 60% of that are security requirements. And this is something that our partners like Samsung take and they build their device to those standards. And you know, and Mark will get to this later. I've known Mark for many, many years and he'll get into like all the great goodness, like I say, kind of like the icing on the cake. And it's a thick layer of icing over what we build in the platform. But from a hardware perspective, you know, we, we have things like we mandate that you have to use hardware based key stores now and all the processors on, on Android devices in the most, in most cases have a, an ARM processor. So a lot of those very, you know, like encryption keys and, and generation key and generation and all the encryption algorithms and things like that are done in what's called the trusted execution environment. Again, that's just a hardware requirement that we put in place. And then we have things like verified boot. So all device makers get a what's called a sign in key from Google and then, you know, other OEMs do other things to strengthen that. But that helps us create a root of trust. And as the boot process happens, we have, you know, the base layer of what we call verified boot, which every step of the boot process is cryptographically verified. And then, you know, when we move up into the, the operating system, every single application on an Android device, even services running in the background that you do not see have their own application sandbox. So it is, it is very difficult. Even if one app gets compromised, you need to, you need to stack multiple exploits in most cases to get out of that sandbox to get to any other data. So we, that's 111 part of the operating system. We, we get up to the network security stack and you know, like you mentioned, the network is how we connect. And you know, you might say, well, people might be on Wi-Fi, well they might be, but a mobile device I would argue most of the time is not connected to Wi-Fi. Even when you're in your corporate building, most time you're staying on carrier network, right. So that's why we give all those controls over the network layer, VPN controls, Wi-Fi controls, roaming controls. We do all kinds of things at the Android layer to sort of allow customers to craft the best possible way to get to connect to the network. Not just connect to network, but use what the network provides, right. So T-Mobile, for example, you mentioned Myron has all these great security tools and splicing or slicing all that stuff. You know, we, we, we try and get the data to you securely and then you take it from there. Now when we get to built in security services, this is where we at Google provide things for free to our customers, something like Google Play Protect. This is our anti malware that's running on all Android devices across the globe. There's controls for that, for management capabilities. That is the it's actually the widest deployed anti exploitation and threat protection service in the world, even compared to desktop antivirus systems. It continuously learns with AI and it's just a part of the system. And then updateability like working with the carriers and working with our OEM partners over the over the last couple years we've made it very well, I should say very we've made it much easier for the updates that Google supplies for the OEM's to you know put into their operating system. And then the carriers vetting process to get those updates out has significantly improved where we used to see, you know, three months to get an update out. Now we're seeing OE M's get them out, you know, if not every month within, you know, 30 to 45 days, which is unheard of for Android. And that's just the reality of where we are. And then management controls, right. So we, the Android enterprise, I guess the platform or, or, or a bunch of, you know, the services that make up Android enterprise sort of allow enterprise customers to control all these items and to get signals so they can make good decisions on how to protect and know what the, the, the status of their fleet is. And then lastly, you know, over the years, you know, we've always heard that Androids open. It's the wild, Wild West and that's why it's not secure. But actually the data says something completely different when you look at the visibility that that we, you know, we give to Android and all the types of partners. I don't know if people know this, but you can go to source.android.com and download the full open clear text code for Android 15. People don't really realize that that's how open it is. And because we have all these researchers, academic researchers, you know, white hats, black hats, you know, all these, these people, all of our security vendors helping us make the operating system that much stronger. And by doing that and being very transparent about it and not hiding anything and not like in this black box, walled off garden kind of scenario, we think we've amplified our security to a degree that's just unparalleled. And then, you know, like I said before, our partners, our great partner Samsung, they do a really good job of taking what we build in and sort of just taking that to the next degree. And so, you know, Mark, I, you know, we've talked about this a lot, you and I've known each other for many years. And I think every time I hear you speak and talk about the security stuff that that Samsung does, I just kind of lean forward because it's it's really good stuff. So I'm sure you're going to talk about all this. So I'm just going to hand it over to you. Hey, I appreciate that Mike. And listen, you know security for in customers is very important. We we are selling into the most secure environments. We've made incredible inroads with any major letter agency that you can think of in the US. Fed, Gov, DoD, global financial agencies, retail, healthcare. They're all deeply concerned with security and it's very important to them. Sometimes it can seem troublesome or seemingly expensive to implement good solid security practices, but one security vulnerability is all it takes. 1 exploit and you're going to find out what expense and trouble really are. So it is incumbent upon all of us to take a good hard look at security and make sure we're doing the hard work upfront. Good news is, is that Samsung has taken everything that Mike's just talked about at a platform level. And then we think about the impact not only to Google at the platform level or carriers at the network level, but what we need to do to secure the device. All those partners need to know that the device came at the very beginning from a secure supply chain. Almost all of our devices are built in TAA certified locations and the supply chain is secured from the very beginning. And what that allows us to do is create a security platform with certified software that's capable of a testing once it's up and running that hey, I'm running the way I should be and I'm running the software I should be. And then we layer on a bunch of cloud solutions that allows you to easily deploy and manage and make sure that your fleet of devices are secure. I'll talk a little bit about what that looks like, but in short, when a device comes out of the factory, we store a root of trust in the hardware layer on the device. When the device boots, it checks to make sure that, Oh yeah, the OS that's running on the device is the OS that's supposed to be running. Then we go a step further and we utilize Security Enhanced Android, which was what Mike was talking about earlier, with applications running in their own sandbox instead of using typical Linux permissions for user, group, and other. Everything's very isolated and locked down using policies and and domains for access to various resources on the device. We layer in another functionality called Team, a trust zone integrity monitoring architecture. It allows us to actually watch the device in real time and constantly monitor for significant changes to the OS and the posture of the OS. And what that ultimately does is allows the device to say, hey, I'm OK and it can attest through attestation AP is to our MDM tools, to our cloud tools, to 3rd party MDM tools that the devices running and operating in a secure method. Once the device is up and running, constantly monitoring itself, that's where our Knox suite of services comes into play. And these are all licensed applications. And we do things like we have Knox mobile enrollment. All of your devices get uploaded into a portal and then those devices will self enroll themselves once they're turned on by the end user. This allows you to set policy as a mobile admin and drop ship these things any place they want without ever touching them. And they just get turned on self enroll themselves and get their policies and configurations on the device. Very simple deployment. And then it'll also enroll these devices into Knox manage or Knox Configure as needed. And I'll get into Knox configure in a moment, but Knox Manage is Samsung's MDM solution and it's cloud based and it's incredibly capable of managing our devices and just doing all the things that the corporation would want to do. And then we've got other tools like Knox E Photo. E Photo is the ability to control the software levels on the devices. Imagine that you've got a application that is a mission critical application for your business and an OS comes along and your application hasn't been tested on that OS and it breaks your application. We give you the ability to restrict OS updates and control how and when those OS updates are deployed. Very few folks, if any, are doing this out there in the marketplace. And then we have things like Knox Analytics. Knox Analytics is a tool that we've built, sits in the cloud, in the same platform that allows you to see your entire fleet of devices and look at things like how is battery life being affected by applications on the device or what are my Wi-Fi connections and disconnects look like and really understand how your fleet is operating. These are all tools that are sitting under a single pane of glass that are all hinging on the ability for the device to say, hey, I'm OK now enroll me in your service and utilize your functionalities for the IT admins that need to use you. We've got other products out there too, as well as Knox Configure. Knox, excuse me, Knox Configure is basically like a light MDM and it's a fire and forget. If you want to maybe throw some devices in a kiosk somewhere and you need to set them up once and not continuously manage them, then that's what you would use Knox Configure for. And then we have even something that's, you know, used for at a carrier level or maybe a rental fleet perspective like Knox Guard gives you the ability to lock devices down and then to track these devices and make sure that they're not stolen and even shut them down if they're no payments aren't made or the devices aren't returned on time and those types of things. So we layer a lot of products on top of that Knox platform, but it's all incumbent upon knowing that that device is secure and it's reporting that it's OK. Wow, it's fantastic. Thank you, Mara and Mark. Mike, that is a really great overview how you're actually working together to outflank threat actors out there and create a safe and secure working environment. And of course, I can't wait to hear something about some real world applications of these solutions. But before we do that, a quick reminder, please keep those questions coming. Every question you ask in that box below the video screen will receive a response within one or two business days. All right, you know what, I would like to ask you all one last poll question and it was teased. All right, and it may be a little tough, but here's the question. How confident are you that your current strategy will be successful in securing your people and networks today and in the future? Now, again, no other participant can see your response, so you could be completely honest. So would you say you are very confident, pretty confident, not really confident or not confident at all? Go ahead and select the one you think best describes your confidence level and then submit. All right, well, let's go ahead and take a look at these results. I'll have to say I appreciate your honesty. You know, I am not seeing a whole lot of confidence out there, and that's probably while you're watching this webinar, right? All right, so 2 by 3 Digital Defender superheroes, you've each talked about your combined security solutions. Can you now take us through some specific examples that illustrate how they work in the real world? Mark, can you start? Yeah, I'd be happy to. You know, I spent a lot of time working with customers across every vertical. You know, we're seeing a lot of common themes and most importantly is it's solution based selling these days. We we are going out talking to customers and solving problems and it extends beyond the device in the OS and the security platform into the network, into the mobile carrier and it's across the board for most of these customers. I give you an example, we're working closely with many retailers these days. They're break up their they break up their houses very much the same front of house cash registers, mobile point of sale, back of house receiving, stocking inventory, mobile scanning product, look up things of that nature. All of those are accessing highly sensitive information, potentially PCI information. So even as you're exiting the store doing things like receipt check, all of that is moving into the Mobile World in the regulated industries. Same thing with healthcare. We're working with many vendors today and we're pairing with actual healthcare peripherals, heart monitors, blood pressure monitors, glucose monitors, things that are implanted into people's brains to monitor stroke victims. It's there, it's endless. The things that we have integrated with some of the major manufacturing, excuse me, healthcare manufacturers out there. Obviously when you get into HIPAA and the requirements for security around this and just the process of deploying this and doing it in a way where you're staging and kitting and documenting and meeting medical audits to get these things done. We've, we've managed to work through the expertise to handle these and some of the largest healthcare customers out there, the financial world and we're working closely with some of the largest financial companies in the world today. Bank transformation, branch transformation, replacing computers with mobile devices, running our Decks solution, which is our desktop experience in replacing laptops and desktop PC's. Again, all of this hinges on a highly secure posture and making sure that we're doing things to protect data coming in and out of those devices. Matter of fact, Myron, we were talking a little bit earlier, maybe you want to talk about some of the things you guys are doing at the network level for finance and healthcare to secure communications. Yeah. And, and, and I think security kind of kind of coincides with compliance, right. I, I think when we, when you talk about security, right, being able to deliver like you said that I'll, I'll go back to the retail area. Maybe I need a a specific? Application on those on those Samsung tablets or phones. And I need that data to go over a certain pipe over a certain port. And I don't want to have the each individual retail Rep connect to an individual VPN. Being able to isolate that traffic and push it over a secure tunnel from the network level makes things easy. Maybe I don't want those retail employees checking their e-mail, their personal e-mail and going to websites. Maybe they shouldn't. And I don't want to have to have a lot of extra applications on and being able to do that filtering at the network level, I think is, is very crucial. And you know, from a regulated industry perspective, T-Mobile has solutions that allow you to capture and maintain those, those records like in the financial institutions. And you know, where it's regulated that you keep your text messages at all times. Or you know, HIPAA, maybe you're, maybe you're texting your, your, your clients and you want to be able to prevent data loss prevention, right? So you do that text message, you want to be able to capture that information and prevent one of your end users from sending something they shouldn't. And from a text perspective, so being able to capture that information, retain that information all from a network level without having to implement another software that you have to maintain. I think it's crucial to the industry and to to your individual businesses. I mean, in, in doing that on a device and platform that's one easy to use, easy to deploy. I mean, just going back a little bit, I mean, you guys mentioned some, some things like a zero trust as well as easy to deploy zero touch deployment, right? I don't, I don't know if you mentioned this Mark about KME and being able to load those, those devices and have that instant power on instant deploy those devices. I mean, the big, the big mantra here is that one, security is, is getting easier to deploy, but being able to disseminate those devices from a staging and kitting perspective and, and being able to power those from a powerful network. I think it's crucial to being able to increase security and collaboration across the board. You know, I, I don't, I don't know if Mike has anything he wants to add, but you know, we were talking earlier about some of the things Andrew we're doing. I wonder or if you want to, you know, let, let the let the participants know about any of that. Yeah, thanks Myron. I'll make this quick, but just to comment on what, you know, some of the use cases here, you know, for, for healthcare, one of the things that we're seeing on the Google side is it used to be very, very difficult and and expensive to build custom healthcare devices. For example, you know, insulin pumps or heart, heart monitoring systems or even brain implants that help people with Parkinson's disease. Now what we're seeing is to to sort of secure that these companies are wanting to use Android and these Android devices take for example, you know, a Samsung device. They're pairing those over the latest and greatest Bluetooth connections that are secure. It's not like Bluetooth the old days, but these these are monitoring and managing implants that save people's lives and keep them alive. And so the reason they're choosing those is because they know and they've done extensive studies. Android devices are just that secure. And on the Deck side, you know, there's, I'm Privy to several customers, large customers that have gone mobile only. So in other words, we've got thousands of users, thousands upon thousands of users and specific companies that use Samsung devices only. There's no laptops, there's no desktops. They connect these devices to monitors and keyboards. And they, they partnered with a clamshell company, which I won't mention for when they're moving around. And the reason, the number one reason I had that I was told is that Android devices are more secure than laptop operating systems. You take that for what you feel, but that's what I was told in the guise of security, and I think it's valid. Yeah. And Mark, you want to bring up this law enforcement, we have it there. You got some interesting stories there, right? Yeah, I think it kind of piggy tails pretty well off of what Mike was just talking about. You know, ourselves, T-Mobile, Google, we've had a lot of luck with the law enforcement. A lot of us are very passionate about working with law enforcement and meeting their needs and without using their name. We've got one PD recently who has done exactly what Mike just described. They pulled the terminals out of their cars, they pulled the computers out of their stations and they built docking stations in the the PD facilities. They've expanded to their fire department and they take a Samsung X cover device and they drop it into a docking station in on the cage of the car. When they get in, their monitor, mouse and keyboard are powered with Samsung Decks, They're running all of their computer aided dispatching software, all of their ATAC, all of the things that they need to do to conduct business inside that cruiser on a daily basis, running off of a Samsung device, running a T-Mobile SIM in most of those cases. So there's some really great things going on. All of that hinges on great security and easy deployment and easy management. Well, and Joe, I just want to say one last thing here. I mean, and we've been hitting on this since the beginning of the of the webinar. We always talk about, hey, people are ignoring these small devices just because they don't think they have the power. I think ARM has been those ARM processors have been so successful. They're starting to, they're starting to go into PC's and they've been into Macbooks, right? So when you look at the power of the processing on these devices, they are truly, truly, you know, PC, PC ish, if not PC replacement out there. So they should be treated accordingly. And I think my peers hit it on some very valid points that, you know, hopefully the audience can, you know, take with them and, and and utilize. Yeah, absolutely. You know, I appreciate you all three of you. You know, what we've been hearing is not only is the multi layer mobile security strategy the best way to approach this challenge, but also that T-Mobile, Samsung and Android working together is the best team to make it happen. But I'm also guessing that many people watching and listening are wondering, what do I do now, where do I start? What's my next step and how do I get a superhero name? All right, maybe not that last one, but Myron, can you briefly review the process you all use to define and implement advanced mobile security solutions in businesses across all verticals? Oh, no problem, Joe. I mean, we understand that security can be complex, but we want to simplify that journey for you guys, right? And I think you know, Samsung, Google and T-Mobile, we we've all partnered to be able to bring you these innovative solutions and make your journey very successful. But you want to look at this, you want to align, we want to start with the business outcomes first, right? What are your desired deliverables? We want to anticipate, put together blocks to, you know, to look and see how we can help, you know, increase your security prowess and then adapt. We want to leverage the technology, the expertise of our partners of the network, of the ever changing technology to see how we can not only help you increase your security, but your collaboration and have a better experience for both your internal and external customers. Our team is always here to help. Please reach out to us, you know, engage, comment like Joe said, load up plenty of questions, somebody a follow up with you in one or two business days, but we are here to help you secure your mobile assets. Thank you guys so much for allowing us to speak today. I really appreciate it. Thank you again, Joe. Yeah, fantastic. You know, I appreciate all of you, Myron, Mark and Mike, sharing your experiences with us. For all of you out there, remember answers to all the questions that you've submitted, they're going to be sent to you directly within the next day or so. And you will be receiving a general follow up e-mail that contains links in case you think of more questions after we're done here. And finally, in that lower right quadrant of your screen, you're going to see a magenta box with a heading T-Mobile for Business Engagement Hub. That's a place where you can connect with experts, book meetings, watch how to videos, and so much more about solutions to your current mobile security threats. Open that link and save it. You're going to be glad that you did. Thank you all again for being with us, and we look forward to seeing you again at one of our next webinars. So long, everyone. _1737596394958