The great debate: Corporate vs. personal liability for smartphones and tablet devices in the workplace

Size: px
Start display at page:

Download "The great debate: Corporate vs. personal liability for smartphones and tablet devices in the workplace"

Transcription

1 The great debate: Corporate vs. personal liability for smartphones and tablet devices in the workplace Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive

2 In a recent study sponsored by Dell, 75 percent of companies surveyed had, or were considering, personallyowned devices in their environment. Executive summary Why can t I use my ipad or Android Smartphone at the office? How can we control the costs associated with mobile devices and the related voice and data plans? Do these questions sound familiar? Is your organization considering allowing personally-owned smartphones and tablets to access corporate applications and data? In a recent study sponsored by Dell, 75 percent of companies surveyed had, or were considering, personally-owned devices in their environment. The explosive growth in personal smartphones and tablets has created a strong demand to use personal devices at work. IT management must consider the needs and goals of the business, and carefully weigh the costs and benefits of allowing personally-owned devices as part of an overall mobility strategy. With the consumerization of the mobile device market, the historical approach of providing employees with locked down devices with a two-year refresh cycle may not be the best solution for organizations and their employees. Many organizations are debating the costs and benefits of allowing employees to use personallyowned devices for business needs. While reduced costs and increased employee morale are popular arguments, organizations must consider hidden costs and corporate governance issues. These concerns must be balanced with opportunities for enhanced productivity and improved employee morale when employees select a mobile device of their own preference. Introduction The desktop Internet ramp was just a warm-up act for what we are seeing happen on the mobile Internet. The pace of mobile innovation is unprecedented, I think, in world history. Consumer companies are taking the lead over enterprise companies. It is more important than ever to listen to employees about where to take your IT department. Mary Meeker, Morgan Stanley April 2010 Since the introduction of the iphone in 2007 and subsequently, the ipad and Android-based phones and tablets, the cost for mobile devices has decreased, and most are now purchased by individuals for personal use. The computing power available in these devices has also increased, rivaling the capabilities of traditional PCs from only a few years ago. Most mobile devices now support , multimedia messaging, Internet browsing, and data storage. They have become true computing devices, although still used primarily for content storage and consumption. With app stores in abundance, a variety of consumer- and enterprisefocused applications are available for download. These applications receive very little review for malicious content exposing sensitive corporate information to be copied and stored on servers outside of the organization s control. Enterprise mobility costs are increasing due to the rapid expansion in the number of devices and the resulting voice and data plans. This increase in cost, along with the consumerization of smart mobile devices, is leading organizations to consider a move from the traditional corporate-liable to a personal-liable approach to mobility. We will review the benefits and costs of both strategies and will conclude with some additional topics for consideration as your organization develops its overall enterprise mobility strategy. Corporate-liable approach to mobility devices The traditional, corporate-liable strategy has many advantages, including governance and control of the devices, as well as the potential for an overall reduction in cost to employees and the organization for mobility-related expenses. However, a well-designed corporate-liable program does not preclude access to a variety of mobile platforms that can meet the needs and preferences of employees. 2

3 Benefits of a corporate-liable approach The ability to maintain governance and control over corporate information is one of the most compelling cases for corporate ownership of mobile devices. This ensures that the organization can deploy and enforce key security policies on devices to meet compliance with regulatory or corporate governance requirements. The restriction of access to corporate data and applications through corporate-owned devices will prompt employees to report the loss or theft of a device for timely deletion of all data. The organization can also restrict content on the devices, including third-party applications, to reduce exposure to applications or content that is malicious or contrary to the organization s policies. Finally, by establishing a corporate mobile device catalog, the organization retains control over the device types and operating system versions in use to manage vulnerabilities intrinsic in some mobile platforms. This allows the organization to enforce the deployment of critical operating system and application updates to correct newly-identified vulnerabilities. While cost-reduction is frequently cited as one reason to move to a personal-liability model for mobility, there may be other opportunities to reduce mobility costs. Bulk device purchases, aggressive negotiation with carriers, and mobile expense management solutions can save money. Support and application development costs may be cut by implementing a standardized catalog of devices for employees to choose. Costs of a corporate-liable approach This corporate control comes, literally, at a cost as the organization bears the expenses for devices as well as voice and data plans. The corporation also assumes the asset management costs for mobility devices, including procurement, support, and disposal. Finally, there is the voice and data cost associated with employees personal use of employer-provided mobile devices. In addition to the expense associated with corporate-liable devices, employee morale may suffer when employees are required to use organization-provided devices. Their dissatisfaction may result from using devices that are older or lack the functionality needed. This can lead to reduced productivity or, in extreme cases, attempts to breech security controls to use unauthorized personal devices. The traditional, corporateliable strategy has many advantages, including governance and control of the devices, as well as the potential for an overall reduction in cost to employees and the organization for mobilityrelated expenses. Personal-liable approach to mobility devices Many employees say they would prefer to use their own personal mobility devices for business calls, , and other work. Allowing the use of personally owned devices may boost employee morale and productivity and offer opportunities to reduce mobility-related expenses. However, in some cases the new expenses borne by employees may eliminate the goodwill associated with allowing employee-owned devices into the organization. Benefits of a personal-liable approach Depending on the personal device usage program, organizations may reduce their costs significantly. Many organizations offer their employees a fixed monthly stipend to help offset their monthly voice and data bill. This approach results in predictable mobile expenses for the corporation, and employees become responsible for the costs of their mobile devices and data plans. In this case, the mobility-related asset management expense associated with the acquisition, maintenance, and disposal of devices and the processing of payment for carrier invoices can be reduced or eliminated. In addition to the potential financial savings, organizations might receive other benefits such as being able to recruit and retain tech-savvy workers, who may have a strong attachment to a favorite mobility platform. When using a mobile device they like and with which they are familiar, employees can be more productive when working out of the office. Having a structured approach to personally-liable devices also reduces the likelihood of employees circumventing security controls to use unauthorized devices and allows the organization to implement policy and compliance requirements as a condition of use in the corporate environment. Additionally, organizations may be able to secure reduced monthly costs for service and premiere-level support from the carriers for their employees. 3

4 Many employees say they would prefer to use their own personal mobility devices for business calls, , and other work. Allowing the use of personally owned devices may boost employee morale and productivity and offer opportunities to reduce mobilityrelated expenses. Costs for a personal-liable approach While the personal-liable model offers benefits for both employees and employers, security and governance become more complicated and expensive. When sensitive corporate information is stored on a corporate-owned device, the organization can implement and enforce strict controls on the operating system and other features of the device, such as Wi-Fi and Bluetooth to prevent unauthorized use of that sensitive information. Employees, however, are not likely to allow such an intrusive level of control over their own devices. To meet these compliance requirements, additional security tools, such as Network Access Control and Data Leak Prevention systems, may be required. Other solutions, including secure mobile messaging, mobile device management, and virtualization should be considered for segregation of personal data from corporate data, and to selectively delete corporate data in the event that the employee leaves or is terminated. Additional security measures may be required to mitigate the risks associated with employees installing applications from app stores. These untrusted applications may expose corporate data or infect other devices in the organization s network. In addition to security-related costs, the company might experience additional expenses to support multiple mobility platforms. With a small selection of corporate-liable devices, help desk support is limited to fewer devices. With the wider variety of devices that a personal-liable device program introduces, support costs may increase as more, and higher-skilled, help desk personnel are required. Similarly, application development costs may increase as the organization moves from developing applications for few platforms to a wider range of mobile devices. Dell s Mobile Application Platform helps to produce multi-platform tools that allows for one application to be deployed to a variety of mobile application platforms. Other concerns may be raised by human resources, finance, and corporate counsel. To mitigate risks to the organization, organizations must implement an employee agreement to address topics that include acceptable use of personal devices and corporate access to the employee s device. The financial arrangements relating to stipends or reimbursement of actual expenses should also be included in this employee agreement. Corporate counsel should carefully weigh any record-keeping requirements for SMS text messages or call logs made from mobile devices and evaluate potential legal consequences of capturing this information from employee-owned devices. Finally, employees may discover unexpected expenses associated with using their personal device for work. While their current voice and data plans may be sufficient for personal use, voice and data usage may expand dramatically when employees begin using their phone for work calls and applications. The increase in voice and data costs may be dramatic, especially for employees who travel internationally, where voice and data roaming charges are very expensive. In many cases, a stipend may not be sufficient to cover the increased costs. Alternatively, if the organization reimburses for actual costs, an employee may find that they spend several hours a month separating out their personal costs prior to submitting the bill for reimbursement. They may not be comfortable with providing their personal call detail records. Key considerations for mobility security Whether an organization chooses a corporate- or personal-liable model, or a hybrid, mobility security must be an integral part of an overall enterprise mobility strategy. This strategy should include the platform, applications, and data that will be offered through mobility technology, as well as expected users. It should also include an overall assessment of the organizations risk appetite. Dell s Enterprise Mobility Solutions can assist organizations in fulfilling their mobility strategy, while managing risk to an acceptable level. Mobile Device Management Mobile device management tools allow organizations to enforce corporate policies and validate security settings. Many tools offer an ability to delete all corporate data on the device, as well as data associated with specific applications. Secure Mobile Messaging Secure Mobile Messaging tools allow organizations to store corporate and PIM data in an encrypted container on the device, separate from the data stored in the native device clients. The secure mobile messaging tool provides a method to 4

5 delete enterprise information while not disturbing other information stored on the device. Some secure mobile messaging tools also support message-level encryption that meets U.S. federal government standards. Mobile Application Platform Mobile Application Platforms provide a set of tools for the development of secure multi-platform mobile applications. These applications may be webbased, accessed via secure network connections, as well as applications that run in an encrypted container that prevents unauthorized access from other, malicious applications that may be installed on the device. In addition to these tools, new security policies and procedures may be needed to meet the challenges associated with this new mobility environment. Following are some questions to consider when deciding on what approach works best for your organization: Are there any specific concerns that would preclude the use of employee-owned devices? Information may be subject to Freedom of Information Act requests, or other regulatory or compliance requirements that preclude the use of personally-owned devices. Is there a catalog of devices that would be allowed to access enterprise applications and data? With each new platform supported in the environment, more management complexity is added. Even in a personal-liable or hybrid model, costs may increase as additional versions of enterprise applications must be developed and maintained. Is the organization willing to implement additional security controls to allow a broader range of devices? Not all mobility platforms offer the same intrinsic security capabilities. In some cases, deficiencies in a platform s security posture may be mitigated through the addition of security controls, either on the device or in the corporate network. Additional security measures may be required to mitigate the risks associated with employees installing applications from app stores. These untrusted applications may expose corporate data or infect other devices on the organization s network. Is the corporation willing to accept a short-term increase in risk to allow newer platforms access to data while the device s management and security tools mature? New platforms bring new opportunities and challenges. For each new device, and even operating system version, there may be a period of time when appropriate management and security tools do not exist. For corporate-owned devices, it may be an easy decision to delay upgrades. However, for personally-owned devices, employees may be unwilling to forego the latest updates. How will the organization respond to inappropriate material on a personally-owned device? This question may be one of the most critical and hardest to answer. Who decides what is inappropriate? Under what conditions could the organization examine the personal property of an employee? What are the laws in your jurisdiction, and do they differ whether the employee uses the device for their own convenience compared to when no alternative corporate-liable option is presented? If the risks associated with an all-encompassing personal-liable approach are too high, is there a subset of employees with a lower overall risk profile that might qualify for personally-owned devices? The personal-liable approach need not be all-or-nothing. While some employees or business units may pose too high a risk for using personally-owned devices, other employees may have a reduced risk profile that allows personally-owned devices. Some organizations take the approach that limited access to enterprise applications and data may be available to employees who otherwise would not need a corporate-provided smart phone. 5

6 Summary While a number of organizations consider implementing a personal-liable approach to mobile devices, careful consideration must be given to the benefits and consequences of this new approach. The finance department may view the potential reduction in phone bills as a driving force in transferring the liability for mobility costs to its employees. However, new risks associated with the loss of control over devices may outweigh any potential savings. Employees may be excited about the ability to use their preferred device for work. That enthusiasm will wane quickly when they begin to experience overage charges for their data plan. Human resources and corporate counsel will need to carefully consider the balance between employee privacy, recordkeeping requirements, and the obligation to create a workplace free of the inappropriate content that may be stored on employees devices. While it would be nice if there were a clear winner in the corporate-versus-personal liable debate, the appropriate approach will depend on the needs and risk appetite of your organization. Whether using either approach or both in combination, careful consideration of these topics is essential for a successful enterprise mobility security strategy. Bios Jeff Fawcett is a Security Practice Executive at Dell working with customers at the Strategy, Risk, and Architectural levels related to Mobility Security. He recently was the Director of Symantec s Federal Consulting Group where he also ran the Federal Cyber Threat Analyst Team. Before that he was Director of Altiris Consulting and VP of Consulting for Novell where he helped start their SSO, DirXML, and eprovision practices. A mixed background of 10 years in Consulting, 10 years as a Systems Engineer, and 10 years in Sales provides a unique perspective in the security area. Brandon Swain is a Security Practice Executive and founding leader of Dell s Enterprise Mobility Security Services. He was recently the Chief Information Security Officer for Parsons, a global engineering and construction management firm, where his responsibilities included establishing and maintaining security programs for Parsons projects for US Government projects, as well as commercial projects in the financial services and healthcare sector. Prior to that, he was a consultant Systems Integration and Security consultant for Dell Services. Dell and its affiliates cannot be responsible for errors or omissions in typography or photography. Dell and the Dell logo are trademarks of Dell Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims proprietary interest in the marks and names of others Dell Inc. All rights reserved. August 2011 TheGreatDebate_WP.indd Rev BROB

10 best practice suggestions for common smartphone threats

10 best practice suggestions for common smartphone threats 10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth

More information

BYOD Strategies: Chapter I

BYOD Strategies: Chapter I Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones

More information

A Guide to Consumerization & Building a BYOD Policy June 2012

A Guide to Consumerization & Building a BYOD Policy June 2012 INTRODUCTION iphones, ipads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE

More information

IT Best Practices: Mobile Policies and Processes for Employeeowned

IT Best Practices: Mobile Policies and Processes for Employeeowned IT Best Practices: Mobile Policies and Processes for Employeeowned Smartphones By: Maribel Lopez, Principal Analyst April 2010 Lopez Research 9793 S. Burberry Way Littleton, Colorado 80129 T 617-872-8631

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Bring Your Own Device and Expense Management

Bring Your Own Device and Expense Management Bring Your Own Device and Expense Management A Telesoft Whitepaper Table of Contents About this Whitepaper... 3 Essential Elements for BYOD Policy... 4 Capabilities Needed to Manage BYOD and Expense Management...

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL

BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL WHITEPAPER BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL Corporate-Owned, Business-Only Enterprise Mobility Option for Regulated and High-Security Environments 2 BLACKBERRY COBO: ENTERPRISE MOBILITY

More information

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability

More information

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo.

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo. Embracing BYOD Without Compromising Security or Compliance The Mobile Risk Management Company Sheldon Hebert SVP Enterprise Accounts, Fixmo Sheldon.Hebert@fixmo.com New Realities of Enterprise Mobility

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS

More information

Bring Your Own Device. Individual Liable User Policy Considerations

Bring Your Own Device. Individual Liable User Policy Considerations Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security

More information

Android for Work powered by SOTI

Android for Work powered by SOTI Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Protecting Content and Securing the Organization Through Smarter Endpoint Choices Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops

More information

RUNNING HEAD: BRING YOUR OWN DEVICE 1

RUNNING HEAD: BRING YOUR OWN DEVICE 1 RUNNING HEAD: BRING YOUR OWN DEVICE 1 Bring Your Own Device: The Advantages and Disadvantages of BYOD Network Policies Benjamin Fuller BRING YOUR OWN DEVICE 2 Introduction The world of mobile devices continues

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

Mobile Devices in Healthcare: Managing Risk. June 2012

Mobile Devices in Healthcare: Managing Risk. June 2012 Mobile Devices in Healthcare: Managing Risk June 2012 1 Table of Contents Introduction 3 Mobile Device Risks 4 Managing Risks and Complexities 5 Emerging Solutions 7 Conclusion 7 References 8 About the

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

Corporate Mobile Policy Template

Corporate Mobile Policy Template Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes

More information

WHITE PAPER SPON. The Need for IT to Get in Front of the BYOD Problem. Published October 2012 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. The Need for IT to Get in Front of the BYOD Problem. Published October 2012 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N The Need for IT to Get in Front An Osterman Research White Paper Published October 2012 sponsored by SPONSORED BY SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW Connect With My Team in real time Know How Guide to Mobile Device Management READY CONNECT accessreliableshare M ON SECURE SMAR T IND TOOLSNEXT SOLUTION READY Know How Guide to Mobile Device Management...

More information

Keep Calm and Bring Your Own DEVICE. White paper

Keep Calm and Bring Your Own DEVICE. White paper Keep Calm and Bring Your Own DEVICE White paper Keep Calm and Bring Your Own How a cooperative and self-sealing technology ecosystem makes it safer to BYOD Executive Summary The consumerization of IT and

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

Mobile Security: Controlling Growing Threats with Mobile Device Management

Mobile Security: Controlling Growing Threats with Mobile Device Management Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work

More information

A Mobile Architecture, Not Just a Mobile App

A Mobile Architecture, Not Just a Mobile App A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.

More information

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors

More information

Offer Specifications Dell Email Management Services (EMS): mobilencrypt

Offer Specifications Dell Email Management Services (EMS): mobilencrypt Offer Specifications Dell Email Management Services (EMS): mobilencrypt Services Overview mobilencrypt is an on-the-device email encryption solution that enables mobile users to send and receive encrypted

More information

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

A Real View of Mobile Expenses

A Real View of Mobile Expenses Thought Leadership SERIES OCTOBER 2013 A Real View of Mobile Expenses What do companies need to do to make better business decisions? They need to have access to information that is actionable. No business

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Acronis 2002-2014 BRING YOUR OWN DEVICE

Acronis 2002-2014 BRING YOUR OWN DEVICE Acronis 2002-2014 BRING YOUR OWN DEVICE Introduction With over a billion smartphones and tablets at arms length, a majority of your global workforce already possesses the technology needed to better connect

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

White Paper. Three Steps To Mitigate Mobile Security Risks

White Paper. Three Steps To Mitigate Mobile Security Risks White Paper Three Steps To Mitigate Mobile Security Risks Bring Your Own Device Growth The Bring Your Own Device (BYOD) trend caught on with users faster than IT expected, especially as ios and Android

More information

Risk and threats everywhere, all the time

Risk and threats everywhere, all the time Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance

More information

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT DATASHEET 1 EXECUTIVE SUMMARY Problem: Along with many potential benefits, Bring Your Own Device (BYOD) brings new challenges for the IT department. As

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

BYOD & the Implications for IT:

BYOD & the Implications for IT: BYOD & the Implications for IT: How to Support BYOD without Putting Your Company at Risk NEC Corporation of America www.necam.com Table of Contents Executive Summary... 3 The Onslaught of BYOD: Why Now?...

More information

Commissioned Study. SURVEY: Mobile Threats are Real and Costly

Commissioned Study. SURVEY: Mobile Threats are Real and Costly Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals

More information

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device

More information

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security 2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security Commissioned by ID Experts November 2009 INTRODUCTION Healthcare breaches are on the rise; according to the 2009

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

BYOD: From company-issued to employee-owned devices

BYOD: From company-issued to employee-owned devices Telecom, Media & High Tech Extranet BYOD: From company-issued to employee-owned devices No.20 RECALL A publication of the Telecommunications, Media, and Technology Practice June 2012 Copyright McKinsey

More information

Use Bring-Your-Own-Device Programs Securely

Use Bring-Your-Own-Device Programs Securely Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out

More information

Consumerization Survey Report The Consumerization of IT

Consumerization Survey Report The Consumerization of IT Securing Your Journey to the Cloud Consumerization Survey Report The Consumerization of IT An increasing number of organizations are taking a strategic approach to Consumerization. Learn what they are

More information

Mobile Device Management

Mobile Device Management 1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy

Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy A Custom Technology Adoption Profile Commissioned By Sybase/SAP Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy July 2012 Forrester Surveys Show Surging Demand For Consumerization

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

The flexible workplace: Unlocking value in the bring your own device era

The flexible workplace: Unlocking value in the bring your own device era IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Network Security Report:

Network Security Report: Network Security Report: The State of Network Security in Schools Managing tight budgets. Complying with regulatory requirements. Supporting Internet-based learning technologies. There are many challenges

More information

Enterprise Mobility. Bring Your Own Device (BYOD) Policy Guidebook Questions to Ask and Best Practices to Consider

Enterprise Mobility. Bring Your Own Device (BYOD) Policy Guidebook Questions to Ask and Best Practices to Consider Enterprise Mobility Bring Your Own Device (BYOD) Policy Guidebook Questions to Ask and Best Practices to Consider Bring Your Own Device (BYOD) Policy Guidebook Table of Contents 3 Introduction: How to

More information

White Paper: Collaborative Working 2013

White Paper: Collaborative Working 2013 White Paper: Collaborative Working 2013 2013, igroup ltd. All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER This white paper is for informational purposes only and is provided as is with no warranties

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices

More information

Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3

Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management New solutions for the wireless world If you don t already have a mobility management strategy in

More information

White Paper: The Current State of BYOD

White Paper: The Current State of BYOD CTOlabs.com White Paper: The Current State of BYOD May 2012 A White Paper providing context and guidance you can use Inside: Snapshot of a fast moving trend Summary of recent surveys Considerations for

More information

Successful ediscovery in a Bring Your Own Device Environment

Successful ediscovery in a Bring Your Own Device Environment IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Mobile Data Leakage Prevention

Mobile Data Leakage Prevention Mobile Data Leakage Prevention Three Best Practices for Liberating Users, Not Data A Z E N P R I S E W H I T E P A P E R Contents Mobile Opportunities... 2 Mobile Security Concerns... 2 There is an explosion

More information

The new edge of the network: Preparing your network for the consumerization of IT. Geoff Mattie Global Solutions Architect Dell Inc.

The new edge of the network: Preparing your network for the consumerization of IT. Geoff Mattie Global Solutions Architect Dell Inc. The new edge of the network: Preparing your network for the consumerization of IT Geoff Mattie Global Solutions Architect Dell Inc. The edge of your network is expanding, and your work force expects the

More information

The New Workplace: Supporting Bring your own

The New Workplace: Supporting Bring your own IBM Global Technology Services Thought Leadership White Paper December 2011 The New Workplace: Supporting Bring your own 2 The New Workplace: Supporting Bring your own Contents 2 Consumerization takes

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information