Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World
|
|
- Phyllis Cook
- 8 years ago
- Views:
Transcription
1 Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile management tools to rein in security for the growth of BYOD. Mobile devices are rapidly permeating most organizations, and securing those that are employee-owned is a top issue. Mobile is becoming a fundamental element of computing, both in terms of support and in its integration with software strategies. This emerging trend is still rapidly evolving, and today s enterprises face growing pains as the change encompasses them. This note deals with the information security aspects of mobile systems and the bring-your-own-device (BYOD) movement. Topic: Information Security, Mobile Issues: What risks will cloud computing bring to the firm? What are the cloud and networking best practices regarding security? What are the best practices for harnessing the power of mobile computing? Planning Assumption: MDM and MAM will consolidate into integrated mobile management by The percentage of organizations with BYOD programs continues to grow, and Aragon expects 75% of large organizations to support this approach by the end of Government agencies have been slower to accept it than most others, primarily due to HR or legal policy concerns, and for issues regarding security. Although there are circumstances where agencies with classified roles or data must restrict BYOD because of security issues, large non-defense organizations are increasingly open to BYOD approaches and policies. For government agencies especially, BYOD pressures are great. Certainly the benefits are similar to those in private enterprises, with worker demands and technical capability being key drivers. However, government agencies have additional needs that make addressing BYOD a high priority. The growing movement toward telework, guided by the Telework Enhancement Act (TEA), is rapidly expanding the population of workers who access work networks and applications from home or other non-traditional places. The government cloud-first mandate is increasing the pressure on agencies to effectively migrate to cloud solutions, and basic office functions like , document sharing and collaboration are often the first to move. Copyright This publication may not be distributed in any form without Aragon Research s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Nevertheless, Aragon Research provides this publication and the information contained in it "AS IS," without warranty of any kind. To the maximum extent allowed by law, Aragon Research expressly disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Aragon Research and Advisory Services organization and should not be construed as statements of fact. The opinions expressed here-in are subject to change without notice. Although Aragon Research may include a discussion of related legal issues, Aragon Research does not provide legal advice or services and its research should not be construed or used as such. Aragon Research is a private company and its clients may include firms or financial institutions that have financial interests in entities covered by Aragon Research. Further information about the objectivity of Aragon Research can be found at aragonresearch.com
2 Individual workers are also increasingly encouraged to select and acquire their own devices by the federal executive order calling for increased attention to the cost of employee computing devices. Business or agency owned devices typically have stronger security, and usually a policy that restricts personal use. Concerns over breaches or data loss are real, with multiple areas of content exposed (see Note 1). If BYOD is an option, users increasingly opt to use their own phones and tablets. Although IT organizations need to control at least some of the networks, apps and data that users can access, to a great extent users can connect to their work and personal lives with a single device. Dealing effectively with mobile and information security requires a much more robust strategy than it did a few years ago. Providing a single platform with predominantly agency-owned devices and as the main app is no longer viable. IT organizations now face a newly diverse and complex environment armed only with PC-oriented skills and procedures that need to be overhauled for the mobile world. One issue: the two main types of software that manage mobile systems hardware-focused mobile device management (MDM) and software-focused mobile application management (MAM) are on a collision course. Mobile Device Management MDM has been around longer than any other mobile management approach. Initially aimed at helping enterprises control their growing investments in smartphones, MDM became a de facto foundation for managing and securing an increasingly diverse population of devices, carriers and platforms. If an enterprise owns most of the devices that employees use for work, MDM can establish a wide range of policies and controls that allow IT to manage access and security (see Note 2). The main focus of MDM is to control the devices themselves. Features such as configuration control, performance management, and over-the-air troubleshooting characterize MDM tools. The focus is on ensuring effective management of the devices as enterprise assets, and handling situations such as lost or stolen devices. MDM is the best way to secure and lock down devices. However, the device-centric approach exerts tight control, and limits how employee-owned devices can be used on the enterprise network. Note 1: Information at Risk on Mobile Devices Financial information Classified reports and information Personally identifiable information (PII) Employee personnel data Contact data for other employees Task and schedule information about projects Note 2: Essential Mobile Security Features Enforced passwords Device encryption Multi-factor authentication Remote lock & wipe Mobile asset tracking Remote control GPS tracking Page 2
3 As more and more personal devices are used at work, IT needs to manage and secure the enterprise without totally controlling the devices themselves. Mobile Application Management The focus of MAM is on software rather than devices. It builds on the access and distribution role of the enterprise app store. Rather than trying to control the devices, MAM controls the use, configuration and security of the apps in use across the full range of a mobile device portfolio. Software distribution is an essential ingredient of this approach, and an app store is an essential tool for implementing software and content distribution policies. In addition to managing the apps and their distribution to users, MAM allows enterprises to control the access to and use of company data according to defined roles and policies (see Note 3). App-level authentication and access control lets businesses create policies and systems that protect their information while giving each worker the right access to the apps and data that they need. MAM incorporates security, role-based management, and authentication features found in MDM approaches as well. MAM is most useful to businesses that have growing app portfolios and that support BYOD, which tends to create an increasingly diverse universe of disparate mobile devices. MAM is especially needed by enterprises that have embraced or been overrun by personal phones and tablets owned by workers. MAM can differentiate corporate apps and data from personal ones, and can secure and protect corporate assets without erasing or disabling a personal device. Building and applying policies at the app level rather than the device level is an increasingly popular way to manage personal devices used for work. A new class of MAM vendors has emerged to focus on this app-centric approach. Although these MAM vendors distinguish between apps and devices to differentiate their offerings from older MDM products, MDM vendors are expanding their methods to incorporate many of the same capabilities while MAM vendors, in turn, begin to address device issues. As this convergence and consolidation evolves, each enterprise buyer will have to align the strengths of the various technical approaches to its own mobile portfolio and priorities. Note 3: App and Data Security Considerations Application permissions App whitelist and blacklist Automated backup App license tracking and compliance Data download policy and authorization Page 3
4 The Enterprise App Store The enterprise app store is a key ingredient of any approach to managing the mobile environment through software controls. The public app stores have proven highly skilled at helping consumers find and acquire apps, and helping developers distribute and update apps. When enterprises deploy work-related apps, they need to manage distribution, promote user adoption, and control releases and updates in ways that meet their specific needs in a controlled and secure manner. Using some of the same ease-of-use features that have made the public app stores so popular, enterprises can provide similar showcase and distribution capabilities. Enterprise app stores can support a custom mix of mobile devices, and control which apps are available to which employees, including apps developed inhouse as well as those available publicly. The strength of this model is similar to that of a consumer store. A simple app store provides information about the apps, perhaps including feedback from users, and simplifies downloads and updates. Over-the-air (OTA) distribution makes it easy for apps to stay current and maintained, along with the associated data. For IT groups, an app store simplifies life-cycle management. Just uploading apps or updates to the store initiates the process of distribution and refresh, which can occur with or without user participation. A single method can support both company and personal devices on multiple hardware and software platforms, and simple controls can make it impossible to download the wrong version of anything. Paths to Mobile Management Enterprise app stores, MDM and MAM are important ingredients of an effective mobile strategy, but no single approach or product has emerged to address the entire breadth of needs. At the same time, evolving organizational requirements are creating opportunities across the spectrum of capabilities (see Figure 1). Organizations with many internally developed mobile apps can start by focusing on distribution and deploying a private app store. Organizations that need highly secure access to and other apps, as well as tight control over device selection, can use MDM to tightly control the environment, especially for enterpriseowned devices. A complex environment with a broad mix of enterprise-owned and BYOD devices, both public and internally Figure 1: Paths to Mobile Management Page 4
5 developed apps, and the need to separate control over personal and work apps and data will require capabilities across the full range of mobile management tools. Security Securing devices, apps, data and the network are essential elements of a mobile device strategy. For enterprises whose top priority is strict security, MDM provides the strongest controls. In the event of a security breach such as invalid passwords entered, or no system access for set periods of time the entire device can be locked or completely wiped. In this scenario, strong controls over a system s apps and data can be established by individual and by role, and associated with approved devices. Personal v. Professional Personal content on personally owned devices used at work can create a potential legal liability. Allowing users to leverage those devices in the workplace, to access business networks, apps and data, requires both policy and formal consent from the individual (see Note 4). However, when action is needed to secure a breached or lost device, completely locking or wiping the user s device may not be acceptable. In the case of BYOD it is typically unacceptable, or even illegal, to completely wipe a personally owned device and all its apps and data. It can also raise a risk of civil liability if users assert they have lost something irreplaceable. In such situations MAM provides a broader range of approaches than MDM s more draconian options. Controls can be based on user role, individual, and context. Users with security clearances can get access to individual apps and data sources. Encryption can occur at the source (based on existing policy and approach), over the network, or on the individual device. In addition, as in MDM, lost or breached devices can have the agency apps and data wiped, while leaving personal information alone. For some, wiping the personal content is also an option. Some users will be able to perform a self-service lockdown or wipe when they find a device has been lost or stolen - providing even more rapid containment of any security exposure. Protecting and Securing Data Note 4: Consent for BYOD use Responsible for appropriate use Responsible for reasonable security Responsible for information protection Approve remote monitoring Agree to use specified OS and apps Agree not to jailbreak or root device Page 5
6 In addition to the devices and apps, data protection is a critical part of an effective mobile management strategy. Even when users are approved, devices supported, and apps enabled, there will be differences in user access to sensitive data. For some roles, it will be important to never allow access to sensitive data, while others will find it essential to store such data locally on a smartphone or tablet. Whatever the strategy, data security requires attention, and needs to be addressed regarding multiple states where data may exist. When the data is stored and not being accessed it will be stored behind the firewall and typically encrypted. Ensuring appropriate device security and user authentication provides effective control until the data is transmitted to a user-owned device. This connection can be managed in multiple ways, from using SSL and VPN to secure connections, to separating individual apps and their connections to data sources through secure networks. Once accessed, data presented to the user needs to be secured. Decrypted data displayed on a mobile device may be transient (only exists on the display), cached, or stored locally. Each such instance should be addressed, and role-based needs should be understood to ensure appropriate protection. Encrypting cached and locally stored data provides strong security, but will often be insufficient and will need to be supplemented. Mobile devices, particularly those that are personally owned, have a different profile to be managed. The mobile device may be lost or an employee may leave, necessitating action to prevent data loss. In some instances, where the device is lost and the user accepts the need to destroy all its content, a remote wipe feature will suffice. In other cases it may be desirable to wipe data only for a specific application, while leaving other work and personal content untouched. The more options the management system provides, the more granular a solution can be applied to meet the maximum number of possible circumstances and threats. Aragon Advisory In BYOD environments, a mobile security strategy needs to address apps and data as well as devices. Plan to control network access to enable better security management. Ensure that all mobile apps support SSL connections. Page 6
7 Deploy mobile apps via a secure private app store. Buy, do not build, a private app store. Legal and policy issues will differ by organization and geography and must be integral to the BYOD program. security should allow content to be wiped, or the entire device to be wiped, in the case of breach or loss of device. Evaluate data security needs, and the risks associated with potential data loss. Consider tools that can address data security and limit data loss at the device, app and network layers. Bottom Line BYOD is a force that needs to be addressed by every enterprise and agency. Without a policy that bans or restricts their use, individuals will seek every opportunity to leverage their mobile devices and apps at work. In such an environment, agencies need a mobile strategy that addresses security for users, devices, apps and data, and can manage at both the app and device level to meet specific security threats. Page 7
RESEARCH NOTE. Workplace Service. Predictions for Mobile, 2015: Mobile-First Apps and the Imperative to Protect the Enterprise
Authors: Jim Lundy, David Mario Smith Predictions for Mobile, 2015: Mobile-First Apps and the Imperative to Protect the Enterprise Summary: Mobile is poised to continue disrupting the workplace, as mobile-first
More informationManaging Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationManaging Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationSamsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationDeliver Secure, User-Friendly Access to Mobile Business Apps
SAP Brief Extensions SAP Mobile App Protection by Mocana Objectives Deliver Secure, User-Friendly Access to Mobile Business Apps Promote app security for enterprise safety Promote app security for enterprise
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationBYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
More informationAragon Research RESEARCH NOTE. Workplace Service. What is the Future of Web Conferencing?
Aragon Research Author: Jim Lundy What is the Future of Web Conferencing? Summary: Web conferencing is in the midst of a strategic shift from being an isolated application to being part of a larger integrated
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationAndroid for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationperspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationBest Practices for Secure Mobile Access
Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits
More informationBYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker
QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationRESEARCH NOTE. Workplace Service. Hot Vendors in Content Management And Collaboration, 2013
Author: Jim Lundy Hot Vendors in Content Management And Collaboration, 2013 Summary: Content management and collaboration continue to be in high demand in enterprises. Cloud delivery models give IT and
More informationMobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
More informationRESEARCH NOTE. Workplace Service. Hot Vendors in Knowledge and Collaboration, 2014
Author: Jim Lundy Hot Vendors in Knowledge and Collaboration, 2014 Summary: Business people are increasingly looking for software products that help them get their jobs done faster. Our 2014 Hot Vendors
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationBring Your Own Device and Expense Management
Bring Your Own Device and Expense Management A Telesoft Whitepaper Table of Contents About this Whitepaper... 3 Essential Elements for BYOD Policy... 4 Capabilities Needed to Manage BYOD and Expense Management...
More informationWhitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
More informationRESEARCH NOTE. Workplace Service. Why You Need A Technology Toolbox For External Collaboration
Author: Jim Lundy Why You Need A Technology Toolbox For External Collaboration Summary: Selecting technology for external collaboration requires a team of representatives from across the business and from
More informationCA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
More informationThe Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group
The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group 1 Today s Agenda State of Enterprise Mobility Management (EMM) The Rise of Bring Your Own Device (BYOD) Cloud-Enabled
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationFive Best Practices for Secure Enterprise Content Mobility
A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationEnterprise Mobile Management
Enterprise Mobile Management Enterprise Mobile Management Ben Santing, HP Changing Face of Enterprise Mobility Consumerisation has transformed mobility Line between corporate and private blurring Cloud
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More informationBENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
More informationHealthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationToday s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.
Securing Business Mobility Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices Your Device Here. Good supports hundreds of
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationEMBRACING SECURE BYOD
EMBRACING SECURE BYOD Acronis 2002-2014 Introduction The Bring Your Own Device (BYOD) movement has evolved from a buzzword and a trend to a full-fledged corporate phenomenon. Tablets and smartphones have
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More informationtrends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationConnect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW
Connect With My Team in real time Know How Guide to Mobile Device Management READY CONNECT accessreliableshare M ON SECURE SMAR T IND TOOLSNEXT SOLUTION READY Know How Guide to Mobile Device Management...
More informationA Guide to MAM and Planning for BYOD Security in the Enterprise
A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationMobile Application Management: Unlock the Value of Enterprise Mobility
Mobile Application Management: Unlock the Value of Enterprise Mobility Enterprise mobility strategies that are centered on device management are archaic. In today s enterprises, app-centric approaches
More informationEnabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationMobile Security Without Barriers
SAP Mobile Secure Mobile Security Without Barriers Securing your enterprise for all the new and expanding mobile use cases is similar to protecting your home. Merely locking your doors won t suffice. You
More informationRisk and threats everywhere, all the time
Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationThree Best Practices to Help Enterprises Overcome BYOD Challenges
WHITE PAPER Three Best Practices to Help Enterprises Overcome BYOD Challenges Nearly 80% of white-collar workers in the United States use a mobile device for work and approximately 95% of IT organizations
More informationSeparation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices
Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More information6 Pillars for Building a Successful BYOD Program. Protecting corporate assets while increasing employee productivity
6 Pillars for Building a Successful BYOD Program Protecting corporate assets while increasing employee productivity Executive Overview As the Bring Your Own Device (BYOD) movement continues to gain traction
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationW H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored
More informationEnterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER
Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly
More informationRESEARCH NOTE. Workplace Service
Author: Jim Lundy The Perfect Storm in Enterprise Video: Act Now or Get Left Behind Summary: Key shifts in technology, combined with ubiquitous access to video are fueling a new move to enterprise video.
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationBy Kevin Benedict and André Guillemin Netcentric Strategies LLC Publication Date: February 2012 ID Number: NCS022012B
Mobile Middleware Strategies By Kevin Benedict and André Guillemin Netcentric Strategies LLC Publication Date: February 2012 ID Number: NCS022012B Table of Contents 1 Executive Summary 3 1.1 MEAP Background
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationBring Your Own Device. Individual Liable User Policy Considerations
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationUse Bring-Your-Own-Device Programs Securely
Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
More informationEvaluating Mobile Device Management Products
CHOOSING AND MANAGING MOBILE DEVICES Evaluating Mobile Device Products Choosing the best mobile device management product can be tricky. Success requires carefully evaluating product capabilities and matching
More informationBYOD Policy Implementation Guide. February 2016 March 2016
BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...
More information[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
More informationThe Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
More informationNAC Strategies for Supporting BYOD Environments
G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationA guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
More information