Mobile Madness or BYOD Security?
|
|
- Isaac Robinson
- 8 years ago
- Views:
Transcription
1 Mobile Madness or BYOD Security? How to take control of your mobile devices By Barbara Hudson, Senior Product Marketing Manager The Bring Your Own Device paradigm has rapidly moved from novelty to near inevitability. Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices. BYOD is here to stay, and tomorrow s BYOD will involve even greater diversity in devices, form factors and platforms. In this whitepaper, we briefly assess where BYOD stands, where it s headed, and your core challenges in implementing and managing it. Then, we turn to solutions, helping you build a comprehensive action plan for your BYOD success.
2 BYOD Will Soon Be Everywhere Figure 1 clearly establishes the context for BYOD in today s increasingly diverse, mobile and consumerized environments. Shipments of Apple and Android devices now outnumber Wintel shipments. Global Market Share of Personal Computing Platforms by Operating System Shipments, E Market Share of Personal Computing Platforms by Operating Systems (%) 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% TRS-80 Other 1983 Wintel - 25% Atari Commodore Amiga Wintel - 96% WinTel 2012E Wintel - 35% Apple Android 0% Source: Asymco.com (as of 2011), Public Filings, Morgan Stanley Research, Gartner for 2012E data. 2012E data as of Q3:12. Figure 1. Global Market Share of Personal Computing Platforms by Operating System Shipments, E, Kleiner Perkins Caufield Byers, December 2012 During 2013, Kleiner Perkins expects the global installed base of smartphones and tablets to surpass the installed base of PCs that took decades to build. By 2015, smartphones and tablets in use will outnumber PCs by nearly two to one. According to ipass, the average user now works with 3.5 devices. 1 A new generation of apps has also arrived some sanctioned (or even authored) by IT, many of them unsanctioned. Beyond this, employees are using more cloud-based services, including storage services that can place confidential data outside your control. Some companies have responded by supporting nearly any recent device, app or service. Others support only one or two mobile platforms. Some permit BYOD for executives or certain employees, such as salespeople. Still others offer CYOD users can choose company-owned devices from an approved list. 1. The ipass Global Mobile Workforce Report, March 2012, wballiance.com/wba/wp-content/uploads/downloads/2012/07/ ipass_mobileworkforcereport_q1_2012.pdf A Sophos Whitepaper July
3 BYOD adoption patterns have also varied widely by region, with North America moving forward more rapidly than Europe. The takeaway: just as BYOD can encompass many technologies, so too can it encompass diverse strategies. Business Opportunities, Not Just Problems There are positive reasons to promote BYOD, not merely tolerate it. BYOD improves productivity. According to research by Cisco, companies providing comprehensive BYOD support average nearly three hours of productivity gains per week. 2 Forrester says more than 80% of BYOD adopters base their business case on increased productivity. 3 BYOD promotes business agility. BYOD helps employees collaborate more quickly, efficiently and creatively. BYOD responds to employee demand. Supporting users own devices has been a recruitment selling point. Soon, failing to do so will hinder recruiting and retention. Core Challenges of BYOD Today Wherever you stand with BYOD today, you face several challenges in maximizing its value and mitigating its risks. The core issue is balancing the needs of IT and the organization with users desires to work with the tools they prefer. With out-of-the-box consumerized IT, users power typically grows, while IT s enforcement power tends to shrink. Below are some specific challenges you will face. Mixed ownership. By mid-2011, reports IDC, employees already owned 40.7% of the devices they used to access business applications. 4 On most consumer-oriented devices, users are admins: they choose apps and sites, and can even compromise built-in platform security. Security enforcement. BYOD creates more weak links that can be exploited both internally and externally. In many industries, the urgency of meeting these security challenges is reinforced by tough compliance rules. But even the best BYOD security can t simply be mandated from above. It requires significant user education and buy-in. 2. Comprehensive BYOD Implementation Increases Productivity, Decreases Costs, Cisco Internet Business Solutions Group, May 22, 2013, blogs.cisco.com/news/new-analysis-comprehensive-byod-implementation-increases-productivity-decreasescosts/ 3. Key Strategies to Capture and Measure the Value of Consumerization of IT, Forrester Research, May 2012, trendmicro.com/ cloud-content/us/pdfs/business/white-papers/wp_forrester_measure-value-of-consumerization.pdf 4. IT Hasn t Grasped Consumerization Trend, IDC, cio.com.au/article/393246/idc_it_hasn_t_grasped_consumerization_trend/ A Sophos Whitepaper July
4 Management and governance. Without carefully thought-out governance arrangements, BYOD can quickly run out of control. Effective governance requires IT to actively collaborate across the organization to identify workable solutions. Direct and indirect costs. BYOD often reduces device acquisition costs. However, it can increase direct costs associated with network infrastructure. It also introduces indirect costs associated with managing greater complexity. IT must acquire appropriate tools to simplify, centralize and automate support tasks, ranging from device onboarding to decommissioning. Organizing Your BYOD Action Plan Since BYOD has major implications and since mistakes can be costly and disruptive you need to approach the issue systematically and strategically. It s never too soon to start. It s also never too late. Organizations that have informally supported or tolerated BYOD can bring greater structure and control to their programs. And as new technologies, use cases and risks arise, they must. Planning requires you to understand where you are today, where you want to go, and what you have to do to get there. 5 Key BYOD Elements BYOD challenges can be organized into five buckets: users, devices, apps, infrastructure, and security. For each, you need to ask the right questions, analyze the answers, and map answers to solutions. Of course, all five must be considered in the context of your unique corporate strategy, priorities, legal requirements and culture. Users Even more than most IT services, BYOD is built around users. Start your analysis there by asking: Who is using BYOD? Who wants to use it? What business functions and processes are they using BYOD for? Are users needs limited to , or do they extend to mission-critical systems? What new use-cases are emerging? What data do your BYOD (or potential BYOD) users work with? What problems are users encountering, or likely to encounter? A Sophos Whitepaper July
5 How technically sophisticated and educated are each group of users? What guests must you support? Based on the answers, you can organize users into groups with distinct requirements for BYOD such as salespeople, product support people or executives. You can then prioritize user groups, rather than supporting every user and device all at once. Devices Many BYOD problems are actually issues with mobile devices in general; others are specific to devices your organization doesn t own. To clarify both sets of challenges, ask: Which user-owned devices and platforms are widely used? Which new devices do your people want? What are the unique security and management characteristics of these platforms? What restrictions can you enforce? What happens in case of loss or theft? How often do BYOD device owners change or add devices? Have any platforms or device types presented unique support issues so far? Much of what you can do on a mobile device is dictated by the operating system. For instance, Apple s ios offers robust profiles that enable enterprises to place and upgrade apps remotely, and to selectively remove apps and data. The management infrastructure built into Android devices is currently less mature. Even within individual platforms, capabilities vary by version, and many users own older devices. As of April 2013, 46% of Android devices were still running older versions such as Gingerbread (2.3). 5 Device manufacturers are also addressing the shortcomings of the native Android platform by providing their own versions. Samsung, for example, has managed to achieve near ios-like manageability features with Samsung SAFE devices. Based on the answers to the above questions, you can refine and narrow your list of platforms and devices to support now (or later). You should then make sure that your IT organization has the skills to support those platforms, and identify tools to streamline tasks such as onboarding, device tracking, remote wipe and decommissioning. 5. Android Fragmentation Complicates Enterprise BYOD Support, TechTarget, news/ /android-fragmentation-complicates-enterprise-byod-support A Sophos Whitepaper July
6 Apps and Services If BYOD was really just about devices it would be far easier to manage. But it encompasses an entirely new generation of small, downloadable apps as well as cloud-based services that run on servers you don t control. You need to ask and analyze: Which apps are in use, and which will soon be added (either by users or the organization)? Can you identify and block risky apps? Which app stores do employees use? Can/should these be restricted? Which cloud-based storage services are in use? Which apps and workflows store sensitive data on personal devices? With answers in hand, you can collaborate with users to create acceptable use policies that work for everyone. You can identify requirements for client anti-malware software. And you may wish to seriously consider end-to-end encryption for data where it is stored and while it is in transit. Finally, review possible requirements for mobile application management (MAM) tools that can ban unauthorized app stores and/or create app whitelists and blacklists. Infrastructure Users typically don t notice your network and support infrastructure unless something s going wrong. To keep that from happening, answer these questions: Will you support BYOD with full-time IT staff, dedicated resources and/or managed services? Will you manage BYOD centrally or use a decentralized approach? Will you increasingly rely on video, collaborative tools and other high-bandwidth services? How will you manage Wi-Fi setup, management and performance monitoring, and handle faster rates of change within your network? How will you provide secure mobile access to internal systems where required especially when users are operating on insecure networks such as public Wi-Fi hotspots? Based on the answers to these questions, you can plan to ensure that your wireless network can handle more devices, greater usage and other new stresses. Your solution may include next-generation firewall application control; as well as real-time wireless network reporting and monitoring to identify emerging trends. A Sophos Whitepaper July
7 In connection with wireless network capacity planning, consider traffic shaping to allocate and prioritize bandwidth. To improve both network performance and security, consider capabilities to block or allow individual apps. Finally, clarify the types of problems IT will and won t solve to prevent scarce support staff from being sidetracked by personal technology problems. Security Of course, much of what we ve already discussed touches on security either directly or indirectly. And security is the issue that must be managed well, and can t be managed perfectly. To arrive at the best balance of security and business effectiveness, ask: Which BYOD/mobile security and compliance problems have already arisen (for example, lost devices and data loss)? How do you prevent and remove malware on BYOD devices? Sample Mobile Device Security Policy Download a customizable security policy at Sophos.com What do your users know about mobile security and data protection? What compliance and privacy rules must you follow? Do users co-mingle personal and company data? Based on the answers to these and preceding questions, Sophos recommends that you plan to evolve your security model to: Assume all systems are insecure Follow individual users across each device they work with Focus on securing data from end to end, in storage and in motion On the all-important human side, work with HR and legal counsel to create clear policies addressing security, privacy and the responsibilities of both the company and its employees. Actively educate users about BYOD security. To gain buy-in, show how your security procedures will also protect them personally. Where possible, implement employee agreements permitting you to install security software on user-owned devices that run on the company s network. Especially educate executives who may demand exceptions to security rules, yet have access to data that places the company at highest risk. On the technical side, enforce controls such as passwords and locks via mobile device management (MDM). Seriously consider wider use of end-to-end encryption. Protect Android devices with anti-malware software, and enforce the ongoing presence of anti-malware software through policies. Apply web protection to avoid malicious websites that target mobile users, consider implementing two-factor authentication where appropriate, and deploy remote-wipe capabilities for lost or stolen mobile devices. Finally, carefully plan to develop the new network and security skills IT will need to do all this. A Sophos Whitepaper July
8 Executing Your BYOD Strategy As you integrate what you ve learned in the preceding sections into a plan for deploying or improving BYOD, consider the following: Focus on opportunities to add value, not just reduce risk. Opportunities to drive value from BYOD may include: greater line-of-business process efficiencies; lower costs for equipment, mobile voice service and client application support; faster and more agile responses to customers; and better IT help desk productivity and performance. Consider data and processes holistically, from end to end. Now that it s almost impossible to assume total security anywhere, end-to-end encryption is an increasingly important tool. Don t take on more devices than you can handle. You needn t support every device or app and you probably can t. Consider starting with platforms that have more mature security functionality or wider installed bases. Choose BYOD security solutions that serve both long- and short-term needs. Consider a comprehensive, integrated solution that systematically reduces attack surfaces, and integrates with existing security and policy infrastructures. Ideally, such a solution would encompass data encryption, mobile anti-malware, laptop security, protection for removable media and cloud storage, and data loss protection. Evaluate potential solutions for features, flexibility, scalability, growth, manageability and support. Solutions should support full device and user lifecycles, simplify multiple aspects of management, fully utilize the control exposed by device OS platforms, and automate wherever possible. Automation minimizes the need for hands-on interaction with devices. Expect assistance from a global 24/7 support organization, and instant cloud-based updates in response to new threats. Demand value. Reflecting the skyrocketing number of devices associated with each user, consider solutions that charge per user, not per device. A Sophos Whitepaper July
9 Sophos: Helping You Safely Profit from BYOD Whether you re deploying BYOD for the first time, or evolving your existing BYOD initiative, Sophos can help you every step of the way. Our global security organization is at your service to help you solve BYOD problems today, and to prepare for future threats and opportunities, wherever they may arise. Sophos Mobile Control Sign up for a free trial at Sophos.com United Kingdom Sales: Tel: +44 (0) sales@sophos.com North American Sales: Toll Free: nasales@sophos.com Australia & New Zealand Sales: Tel: sales@sophos.com.au Boston, USA Oxford, UK Copyright Sophos Ltd. All rights reserved. All trademarks are the property of their respective owners. A Sophos Whitepaper 6.13v1.sNA
5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet
5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet Sr. Sales Engineer 1 What we ll talk about What is BYOD? Mobile Revolution, the Post PC era? BYOD: What to consider 1. Users 2. Devices
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationYour Company Data, Their Personal Device What Could Go Wrong?
Your Company Data, Their Personal Device What Could Go Wrong? Top 5 Myths about Mobile Security By Barbara Hudson, Senior Product Marketing Manager Employee use of smartphones and tablets to access corporate
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationProtecting Your Roaming Workforce With Cloud-Based Security
Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers
More informationHealthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationSimple Security Is Better Security
Simple Security Is Better Security How small and medium-sized businesses can benefit from cloud-based security By Tsailing Merrem, Senior Product Marketing Manager Most vendors seem to assume that small
More informationSample Mobile Device Security Policy
Sample Mobile Device Security Policy Using this policy One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers.
More informationManaging BitLocker With SafeGuard Enterprise
Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationEncryption Buyers Guide
Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from
More informationProtecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationKeeping Data Safe When Using Mobile Devices
Keeping Data Safe When Using Mobile Devices Saying yes to people who want to use smartphones and tablets, safe in the knowledge you can keep them secure By Ollie Hart, Head of Public Sector, UK&I Data,
More informationDeciphering the Code: A Simple Guide to Encryption
Deciphering the Code: A Simple Guide to Encryption By Anthony Merry, Director of Product Management - Data Protection A business s success is increasingly dependent on its ability to leverage its data.
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationCREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring
More informationStrengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
More informationDell Bring Your Own Device
Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationSimplifying Branch Office Security
Simplifying Branch Office Security By Udo Kerst, Director Product Management Network Security It is more important than ever to secure your business. Malware, botnets and other malicious programs threaten
More informationWhitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
More informationWHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION
WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION Executive Summary Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationWHITE PAPER. The CIO s guide. management
WHITE PAPER The CIO s guide to building a mobile device management strategy and how to execute on it Executive Summary The explosive growth of employee mobility is driving the rapid adoption of mobile
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationPARTNER LOGO. The. C s. Mobile Device Management
PARTNER LOGO The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationEnrollment System GETTING TO THE BOTTOM OF BYOD... AND COMING OUT ON TOP
Enrollment System GETTING TO THE BOTTOM OF BYOD... AND COMING OUT ON TOP +1 303.647.1495 +44 (01) 161.261.1400 www.cloudpath.net info@cloudpath.net 2014 Cloudpath Networks XPRESSCONNECT ENROLLMENT SYSTEM
More informationThe. C s. of Mobile Device. Management
The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile Device Management
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Mobility has transformed work from a location to an activity. Smartphones, tablets, and laptops enable
More informationWHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT
WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT Executive Summary The explosive growth of worker mobility is driving the rapid adoption of mobile devices
More informationTuesday, June 5, 12. Mobile Device Usage
Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.
More informationEnterprise Mobility Management 101
Instant, Secure and Accountable Enterprise Mobility Management 101 Why a complete Enterprise Mobility Management strategy is crucial in today s mobile-first workplace Executive Summary Mobile devices have
More information6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
More informationIT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
More informationIbrahim Yusuf Presales Engineer at Sophos ibz@sophos.com. Smartphones and BYOD: what are the risks and how do you manage them?
Ibrahim Yusuf Presales Engineer at Sophos ibz@sophos.com Smartphones and BYOD: what are the risks and how do you manage them? Tablets on the rise 2 Diverse 3 The Changing Mobile World Powerful devices
More informationA Guide to MAM and Planning for BYOD Security in the Enterprise
A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.
More informationWelcome to the era of the anywhere worker
Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationA guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
More informationWHITE PAPER. Addressing the Five Requirements of BYOD for Mobile Unified Communications
WHITE PAPER Addressing the Five Requirements of BYOD for Mobile Unified Communications Table of Contents 1. Executive summary...3 2. Mobile Unified Communications in a BYOD environment...4 3. ShoreTel
More informationBYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker
QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationVision on Mobile Security and BYOD BYOD Seminar
Vision on Mobile Security and BYOD BYOD Seminar Brussel, 25 september 2012 Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl +31 610 999 199 1
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationThe Challenge of Mobile Devices in the Enterprise
The Challenge of Mobile Devices in the Enterprise by Joel Isaacson. Copyright 2014 Joel Isaacson joel@ascender.com Mobile in the Enterprise Challenges Mobile platforms are indispensable in the Enterprise.
More informationMobile Device Security: What s Coming Next?
Mobile Device Security: What s Coming Next? By James Lyne, Director of Technology Strategy The mobile device revolution is quite possibly the most significant change in computing since we shifted from
More informationIf you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
More informationMobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
More informationBEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT
More information10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
More informationProviding a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationThree Best Practices to Help Enterprises Overcome BYOD Challenges
WHITE PAPER Three Best Practices to Help Enterprises Overcome BYOD Challenges Nearly 80% of white-collar workers in the United States use a mobile device for work and approximately 95% of IT organizations
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationEasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
More informationENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationThe Bring Your Own Device Era:
The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era
More informationFuture Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.
1 FUTURE FOCUS What s Coming in Enterprise Mobility Management Whitepaper 2 Future Focus: What s Coming in Enterprise Mobility Management (EMM) There s far more power in modern smartphones and tablets
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationW H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationBYOD Security Challenges in Education: Protect the Network, Information, and Students
BYOD Security Challenges in Education: What You Will Learn The influx of personal smartphones and tablets on campus, and the resulting data deluge, imposes a new set of security challenges. This white
More informationEndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationLeveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage
Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where
More informationBring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
More informationThe Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group
The Cloud-Enabled Social Mobile Enterprise Neil Florio, Fiberlink Andrew Borg, Aberdeen Group 1 Today s Agenda State of Enterprise Mobility Management (EMM) The Rise of Bring Your Own Device (BYOD) Cloud-Enabled
More informationMulti-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
More informationKeep Calm and Bring Your Own DEVICE. White paper
Keep Calm and Bring Your Own DEVICE White paper Keep Calm and Bring Your Own How a cooperative and self-sealing technology ecosystem makes it safer to BYOD Executive Summary The consumerization of IT and
More informationEnterprise Mobility Management
Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More information