The Bring Your Own Device Era:

Size: px
Start display at page:

Download "The Bring Your Own Device Era:"

Transcription

1 The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era of corporate computing is here, and without a doubt, the demand by employees to use their own personal smartphones and tablets to conduct business tasks will continue to grow exponentially in the coming years. Businesses that do not meet this demand run the risk of data breaches and compliance violations. BYOD is part of an evolution commonly referred to as the Consumerization of IT, where end-users insist on interacting with their business and personal applications their way not as dictated by their corporate IT departments. Businesses must balance data security and compliance along with personaldevice management and employee efficiency. However, relatively few companies have deployed mobile-device management platforms and policies that protect against lost or stolen devices, employee attrition, or malware. Without the proper measures in place, BYOD challenges can negate the multiple benefits that can be gained. This white paper presents a framework for successful BYOD implementation and how CIOs and their teams can effectively deploy and manage BYOD platforms. End Users Driving the for BYOD Platforms Requirement The Bring-Your-Own-Device (BYOD) to work phenomenon is already prevalent in many businesses. Although the percentage of employees using personal smartphones and tablets to access corporate applications may still be relatively small, studies estimate personal devices are in use at approximately 75 percent of all companies. Whether or not your company has deployed a BYOD platform and developed usage policies, chances are good that many employees use their personal devices to tap into your corporate applications every day. This can happen via your wireless network, remote access or systems. In some cases, the IT department is not aware of all the personal devices accessing corporate networks. Such companies run a high risk of corporate data breaches and compliance violations. As the popularity of smartphones and tablets grows exponentially, and as employees realize the benefits of instant access to the Internet and wherever they go, they now want to bring personal devices to work with the freedom to also interact with business applications. Employees also want to limit the number of devices they have to carry for business and personal use. This trend, often referred to as the Consumerization of IT, has prompted many enterprises to create a BYOD environment so employees don t have to carry separate devices for work and personal use. Many studies illustrate just how strong the movement is and why all businesses need to consider deploying a BYOD platform and policies right now. For example, Aberdeen reports 75% of all enterprise businesses are currently in the process of deploying a BYOD platform and policies. Gartner predicts 90% of all large enterprises will have completed the effort by But at the same time, it appears many firms may not be ready for BYOD as demonstrated by a SANS survey of 500 IT executives to measure their comfort level in taking on BYOD. In the report, less than 10% of IT executives indicated that they can document all the personal mobile devices connecting to their network. 31% revealed that their companies don t have a BYOD policy.

2 As shown by the data in these analyst reports, the time for organizations to prepare for BYOD has arrived. Those that act proactively before the number of personal-device users accessing the network increases substantially can protect their corporate assets while also capitalizing on the benefits that BYOD offers. Benefits of Adopting BYOD Platform Productivity Increase Total Cost of Ownership Decrease Morale Improvement Corporate Benefits Justify BYOD Platform Deployment The good news for businesses is that in addition to addressing the demands of end-users, adopting a BYOD platform with clearly-defined usage policies also generates multiple benefits: Productivity Increase: With the ability for employees to easily switch from personal applications to corporate applications, businesses are more likely to see increased productivity at night and on weekends outside of traditional working hours especially if the mobile platform creates an easy-to-use, interactive environment. Total Cost of Ownership Decrease: Many employees will opt to use their own personal devices for business purposes; enterprises thus reduce capital expenditures since fewer devices need to be purchased. Businesses also avoid mobiledevice usage and Internet-access data plan costs. End users with their own devices also typically understand how the devices work to a greater degree; they thus do not require as much technical support. Morale Improvement: Giving employees the freedom to bring their own device gives them more control over their computing environment and acknowledges the fact that business life and personal life both sometimes need attention. In addition to keeping current employees happy, the BYOD approach facilitates recruiting and employee retention. Business Challenges Require Specific Controls Along with the benefits of BYOD come several challenges that businesses must address. This is particularly true of companies at which employees have already started using their personal devices before a platform with documented usage policies has been deployed. The problem may be much bigger than companies realize because it s almost impossible to restrict access without very specific controls. Many businesses don t have mechanisms in place with both the visibility and access for the following areas: Policy to Clearly Define Privileges and Expectations The creation of a detailed policy is important so the company and all users are clearly aware of what s allowed and the consequences for violating policies. This includes specifying which devices employees can use and the permission the company retains to wipe corporate data and applications should devices be lost or stolen, or should employees leave the company. At the same time, the policy also needs to clearly state how personal applications will not be accessed and to what lengths the company will go to avoid wiping personal files. Creating BYOD policy can be particularly challenging because many companies are not sure what to allow users to do and which restrictions to deploy. Many policies start out weak because BYOD privileges are usually first granted to senior managers who resist restrictions. This may be good for these end users, but it leaves the network vulnerable as other users are given privileges. Businesses need defined, role-based access rules that provide a framework against which security controls can be built to enforce the policy. Technology to Allow Access While Maintaining Security This involves investing in the design, configuration and deployment of technologies to support BYOD, such as a mobile-device management platform, which allows employees to access data and applications while giving IT control over the devices. The platform must also keep corporate data and applications secure should a device be hacked, stolen or lost Compliance with Industry Regulations For those companies in heavilyregulated industries, such as

3 healthcare and financial services, the BYOD platform and policies must also ensure compliance with industry and government regulations when allowing personal devices to access corporate data particularly personal client information. Without a secure platform in place, users are likely violating regulations and subjecting their companies to major fines. Sufficient IT Resources Businesses will also need to augment their IT staffs with the necessary resources to provide technical support across the wide range of devices that employees are likely to want. This includes iphone and ipad devices from Apple; Android smartphones and tablets from a host of manufacturers; Blackberry devices; and Microsoft Windows Phone devices. Technology Challenges Span Multiple Devices and Operating Systems When deploying a BYOD platform, IT teams face technical challenges to ensure corporate data and applications remain secure; all compliance requirements are adhered to; and that applications perform sufficiently so that employees will want to interact often and not require frequent technical support. These endeavors are much easier said than done, because to truly embrace the spirit of BYOD, businesses need to allow employees to use the device of their choice. Only then can they generate the full extent of BYOD benefits users spending more time interacting with corporate applications. The main technical challenge lies in deploying an environment that allows positive user experiences and enables sufficient application performance while also controlling corporate risk across all the available devices and operating systems. IT must deploy technologies that protect data if devices are lost or stolen, or if an employee leaves the company. At the same time, IT must also respect the personal data and applications stored on employee devices. Without the proper balance, the company will be at risk, or employees will feel they are restricted and won t use the devices to access corporate applications as often as the company would like. BYOD platform requirements also go well beyond the basic capabilities of wireless networks, which were first built primarily for corporate IT, guests visiting the company, or for the few people who needed to move around an office building. With an increasing number of BYOD users now connecting to the wireless network, it s creating a big strain. Wireless networks thus need to be redesigned to handle the performance concerns as BYOD users increase. Support for All Four Major Device Platforms When building a BYOD platform, IT will most likely have to support all four of the major mobile platforms. This includes ios (Apple) and Android devices, which have gained tremendous ground in the corporate space due to explosive consumer-driven adoption. And although BlackBerry has lost market share in recent years, it remains the leading enterprise-mobility platform. Windows Phone devices will also most likely have a strong presence in the mobile-device market. Blackberry devices, which are designed for corporate use, streamline the technical process for ensuring security, compliance and application performance. Unfortunately for IT from the BYOD security perspective, most people now opt for Apple and Android devices, so companies will need to prepare for these consumer-grade devices, which don t offer as much security. For example, ios and Android devices do not come with the same level of security as Blackberry corporate devices and traditional computing devices such as laptops and desktops. Both ios and Android offer encryption and password protection, but these features are easy for users to turn off. Instead of the business having complete control, users can thus

4 Five-Step Process for Deploying a BYOD Platform 1Determine Corporate Priorities 2Create Overall Strategy 3Assess Current Risk, Capabilities and Architectures 4Create a Policy with Standards and Procedures 5Identify Gaps in Security and Compliance add any downloads they want with various levels of configuration. Apple and Google (the developer of Android) will eventually offer devices with higher levels of security, but the market is already flooded with devices that do not stand up to most corporate security and compliance standards. While Google has released OS versions for smartphones and tablets that support full-disk encryption, the majority of devices deployed in the field have not yet adopted these new OS versions. It will be at least a year before this encryption enforcement is prevalent. Android devices present the biggest challenge for IT because Google created these devices with an open operating system. Thus, multiple variations exist across the many device manufacturers, their varying models, and the OS upgrades that occur on a regular schedule. These technical challenges can be overcome, but only if firms deploy an effective mobile device management platform accompanied by a clearlydefined usage policy. Five-Step Process for Deploying a BYOD Platform Before deploying a BYOD platform, companies should first assess their current environment followed by establishing objectives both from a corporate perspective as well as an employee perspective. This should be followed by the establishment of policies to support the desired environment and then the deployment of the necessary technologies and processes to support that environment. Following is an outline of a five-step approach that many companies have adopted to successfully deploy BYOD platforms: 1. Determine Corporate Objectives: This includes deciding which privileges and capabilities to offer to users and the expectations from users in return. Some companies may want to limit the types of devices to be accommodated or the applications that personal devices can access. Others may open the entire system to all devices in order to increase employee productivity to the fullest extent possible. Companies should also consider if they want to offer BYOD capabilities to vendors, business partners, and customers. 2. Create Overall Strategy: This step includes the technologies to deploy and how to secure buy-in from all key stakeholders including senior management, IT and most importantly, the employees. Create a clear vision of the benefits the company expects to derive and the necessity to maintain security, compliance and application performance standards. 3. Assess Current Risk, Capabilities and Architectures: This step should be conducted across all pertinent systems including wireless access, remote access and . This includes measuring the extent to which employee personal devices are already accessing corporate data and applications via these systems as well as the measures currently in place to ensure security, compliance and application performance. 4. Create a Policy with Standards and Procedures: For this step, it helps to refer to best practices already developed by organizations such as SANS (See Appendix A). The policy needs to clearly communicate to employees which devices they can utilize and which privileges they are receiving. The policy also needs to clearly state the consequences of violating the

5 usage guidelines and what will happen to personal applications and data if a device is lost or stolen, or if an employee leaves the company. 5. Identify Gaps in Security and Compliance: Prioritize which technology and process gaps in these areas to close first. Then apply the necessary changes, such as the deployment of a mobile-device management platform, to close those gaps. One of the gaps to consider is the necessary technical support resources to help users with device issues. As is the case with most technology deployments, the process outlined above is one that companies will need to repeat every 6-12 months to verify if the security, compliance, application performance and technical support gaps have remained closed as well as to discover if any new gaps have occurred. Businesses will also find it necessary to react to the new mobile device technologies that will undoubtedly continue to emerge as Apple, Android, Blackberry and Microsoft release new operating systems and as mobile-device manufacturers produce new models. Taking the First Step: An Initial BYOD Readiness Assessment Initial BYOD assessments can present a huge undertaking. A helpful way to start that many companies have taken advantage of is the complimentary Presidio BYOD Mobile Security Readiness Assessment. This online tool takes you through a quick series of questions and delivers an immediate high-level view of your current BYOD readiness and more importantly your immediate risks. This initial assessment also gives you a basic framework and helps prioritize which areas to address first to determine just how quickly you might need to react particularly if security and compliance are at high risk levels. To start assessing your company s readiness for BYOD, simply take a few minutes to complete the Presidio BYOD Mobile Security Readiness Assessment questionnaire. For more information on preparing your company for BYOD, contact Presidio at (800) or visit our website at Cited Resources 1. Aberdeen Group Survey, February Gartner s Top Predictions for IT Organizations and Users, 2012 and Beyond: Control Slips Away, November 23, SANS Mobility/BYOD Security Survey, March 2012 Contact Us: Presidio North 10 Sixth Road Woburn, MA Presidio South 7601 Ora Glen Drive Suite 100 Greenbelt, MD Presidio West 1955 Lakeway Drive Suite 220 Lewisville, TX About Presidio Presidio is the leading provider of Professional and Managed Services for advanced IT solutions. We help our clients leverage technology to better connect with their employees, business partners and customers. We provide an extension to your IT team to drive innovation and reduce the time between technology investments and business impact. More than 2,000 Presidio IT professionals, 1,000 of which are highly certified consulting engineers, are based in 50+ offices across the US. We serve our clients through a unique, local delivery model while capitalizing on our scale as a multi-billion dollar industry leader. We are passionate about driving results for our clients and delivering the highest quality of service in the industry. Experience the Presidio difference.

Protecting Corporate Data in the "BYOD" Environment

Protecting Corporate Data in the BYOD Environment Protecting Corporate Data in the "BYOD" Environment Bring-Your-Own-Device Environments Offer Many Benefits, But Businesses Must Also Insure the Integrity of Corporate Assets Wednesday, August 3, 11 Executive

More information

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Simplifying the Challenges of Mobile Device Security

Simplifying the Challenges of Mobile Device Security WHITE PAPER Three Steps to Reduce Mobile Device Security Risks Table of Contents Executive Overview 3 Mobile Device Security: 3 Just as Critical as Security for Desktops, Servers, and Networks 3 Find the

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW Connect With My Team in real time Know How Guide to Mobile Device Management READY CONNECT accessreliableshare M ON SECURE SMAR T IND TOOLSNEXT SOLUTION READY Know How Guide to Mobile Device Management...

More information

The flexible workplace: Unlocking value in the bring your own device era

The flexible workplace: Unlocking value in the bring your own device era IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM PREPARED BY DANIEL MAYCOCK AND FRED CLARKE SLALOM CONSULTING INTRODUCTION The use of mobile devices in enterprises is

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

The Challenges Posed by BYOD.

The Challenges Posed by BYOD. The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

The New Workplace: Supporting Bring your own

The New Workplace: Supporting Bring your own IBM Global Technology Services Thought Leadership White Paper December 2011 The New Workplace: Supporting Bring your own 2 The New Workplace: Supporting Bring your own Contents 2 Consumerization takes

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

THE REAL BENEFITS OF BYOD

THE REAL BENEFITS OF BYOD THE REAL BENEFITS OF BYOD THE REAL BENEFITS OF BYOD - WHITE PAPER - 01 THE REAL BENEFITS OF BYOD Contents 03 Introduction 04 BYOD: A Business Enabler, Not A Cost Saver 04 Employee Satisfaction, Attracting

More information

Keep Calm and Bring Your Own DEVICE. White paper

Keep Calm and Bring Your Own DEVICE. White paper Keep Calm and Bring Your Own DEVICE White paper Keep Calm and Bring Your Own How a cooperative and self-sealing technology ecosystem makes it safer to BYOD Executive Summary The consumerization of IT and

More information

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

Tablets and PCs Converge: Users Can Have It All with Dell s Venue Pro Tablets. February 2014 TBR

Tablets and PCs Converge: Users Can Have It All with Dell s Venue Pro Tablets. February 2014 TBR Tablets and PCs Converge: Users Can Have It All with Dell s Venue Pro Tablets February 2014 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Contents Introduction... 1 Now Is the Time to Evaluate

More information

BYOD(evice) without BYOI(nsecurity)

BYOD(evice) without BYOI(nsecurity) BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

BYOD: Bring Your Own Device Advantage, Liability or Both?

BYOD: Bring Your Own Device Advantage, Liability or Both? BYOD: Bring Your Own Device Advantage, Liability or Both? S S Scott Summers Laura B. Grubbs Dinsmore & Shohl Louisville, KY The BYOD to Work Movement Dual-Use Devices: used for both personal and company

More information

Mobile Device Management

Mobile Device Management Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,

More information

White Paper: The Current State of BYOD

White Paper: The Current State of BYOD CTOlabs.com White Paper: The Current State of BYOD May 2012 A White Paper providing context and guidance you can use Inside: Snapshot of a fast moving trend Summary of recent surveys Considerations for

More information

BYOD Strategies: Chapter I

BYOD Strategies: Chapter I Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices

More information

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE

More information

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

CIO SURVEY. Sponsored by. The Education Industry in 60 seconds

CIO SURVEY. Sponsored by. The Education Industry in 60 seconds CIO 2013 SURVEY Sponsored by The Education Industry in 60 seconds EXECUTIVE SUMMARY Mobile matters in a big way right now, no matter where you live or work. In higher education, though, IT departments

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

UNB s Mobility Strategy 2016 2017

UNB s Mobility Strategy 2016 2017 UNB s Mobility Strategy 2016 2017 The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative mobile technologies that

More information

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS

More information

NAVIGATE THE UNCHARTERED WATERS OF BYOD WITH A SECURE POLICY

NAVIGATE THE UNCHARTERED WATERS OF BYOD WITH A SECURE POLICY IT INDUSTRY TRENDS NAVIGATE THE UNCHARTERED WATERS OF BYOD WITH A SECURE POLICY Any successful sailing trip must be carefully planned to avoid danger and ensure a safe return. The captain evaluates the

More information

EMBRACING THE AGE OF MOBILITY

EMBRACING THE AGE OF MOBILITY Embracing The Age Of Mobility & The Byod Workplace buzz-worthy acronym or a workplace trend that will eventually fade; it s part of the complete restructuring of the conventional way we ve worked up to

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

How To Develop A Mobile App For Business

How To Develop A Mobile App For Business WHITEPAPER Enterprise Mobility Give your business a big advantage with enterprise mobile applications. Discover all aspects of enterprise mobile applications - benefits, pre-requisites & approach This

More information

A Mobile Architecture, Not Just a Mobile App

A Mobile Architecture, Not Just a Mobile App A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile

More information

BYOD Strategy (Service Mobility) 2014

BYOD Strategy (Service Mobility) 2014 Information Resources BYOD Strategy (Service Mobility) 2014 BYOD Strategy Group Joseph Casabona Lee DeAngelis Adam Edwards Diane Kennedy Calvin Krzywiec (Chair) Timothy Meade Glen Pace Jason Wimmer 1 Summary

More information

SAP White Paper Enterprise Mobility

SAP White Paper Enterprise Mobility SAP White Paper Enterprise Mobility Mobile Content and Document Management Best Practices and Decision Checklist Enterprise-Grade Solutions Give IT Much-Needed Security and Control Over Company Content

More information

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

Three Best Practices to Help Government Agencies Overcome BYOD Challenges WHITE PAPER This paper discusses how IT managers in government can address the challenges of the new Bring-Your-Own-Device (BYOD) environment as well as best practices for ensuring security and productivity.

More information

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 Consumerization of IT Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 1 Agenda What is consumerization of IT? What s the hype? And why now? Media tablets in the enterprise 2 Is

More information

IT Executive and CEO Survey

IT Executive and CEO Survey Mobile Consumerization Trends & Perceptions IT Executive and CEO Survey FINAL REPORT COMPARISONS: WAVES 1 AND 2 PREPARED FOR: TREND MICRO, INC. BY: DECISIVE ANALYTICS, LLC Cheryl Harris, Ph.D. Chief Research

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Maximizing Flexibility and Productivity for Mobile MacBook Users

Maximizing Flexibility and Productivity for Mobile MacBook Users Citrix DesktopPlayer for Mac White Paper Maximizing Flexibility and Productivity for Mobile MacBook Users Windows virtual desktops to go for corporate and BYO Macs 2 Executive Overview The popularity of

More information

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION Executive Summary Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Five Best Practices for Secure Enterprise Content Mobility

Five Best Practices for Secure Enterprise Content Mobility A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device

More information

BOYD- Empowering Users, Not Weakening Security

BOYD- Empowering Users, Not Weakening Security BOYD- Empowering Users, Not Weakening Security Table of Contents Exec summary... 3 Benefits of BYOD... 4 Threats that BYOD Harbours... 5 Malware... 5 Data Leakage... 5 Lost or Stolen Devices... 5 Public

More information

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale. Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in

More information

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

Simplifying Desktop Mgmt With Novell ZENworks

Simplifying Desktop Mgmt With Novell ZENworks Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America jmarton@novell.com Ryan Radschlag Network Manager Hartford Joint #1

More information

White Paper. Three Steps To Mitigate Mobile Security Risks

White Paper. Three Steps To Mitigate Mobile Security Risks White Paper Three Steps To Mitigate Mobile Security Risks Bring Your Own Device Growth The Bring Your Own Device (BYOD) trend caught on with users faster than IT expected, especially as ios and Android

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Storgrid EFS Access all of your business information securely from any device

Storgrid EFS Access all of your business information securely from any device Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

BYOD Policy Implementation Guide. February 2016 March 2016

BYOD Policy Implementation Guide. February 2016 March 2016 BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...

More information

Mobile Madness or BYOD Security?

Mobile Madness or BYOD Security? Mobile Madness or BYOD Security? How to take control of your mobile devices By Barbara Hudson, Senior Product Marketing Manager The Bring Your Own Device paradigm has rapidly moved from novelty to near

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

Mobile Device Support Model

Mobile Device Support Model [Type here] Mobile Device Support Model This document defines the level of support the university offers for mobile devices. Mobile devices are defined as portable handheld devices such as smartphones

More information

The Holistic Guide to BYOD in Your Business Jazib Frahim

The Holistic Guide to BYOD in Your Business Jazib Frahim The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Key Requirements of Enterprise Mobility Management Solutions

Key Requirements of Enterprise Mobility Management Solutions Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:

More information