1 5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry Birds. These tablets, with an entirely new browsing and usability paradigm, are rapidly making inroads into the enterprise, being used, according to Apple, by nearly all of the Fortune Aside from direct acquisition of the devices by the enterprises themselves, end-users are bringing them to work and using them in a variety of ways, intent on increasing productivity and making their work lives and their personal lives more efficient through easily accessible information away from a computer. While ipad presents the potential to bring a wealth of measurable and profitable benefits to the enterprise as well as happier, and, hence, more productive employees, it also brings a number of challenges and risks that threaten to lead to security breaches and compliance violations, regardless of industry. In this white paper, we ll the discuss the top 5 Things you NEED to know about ipads and integrating them into an enterprise environment so you can protect and maximise existing IT and corporate assets, mitigate security and compliance risks, and keep IT in control, all while ensuring employees are happy and at their most productive.
2 1 - ipads are Already in the Enterprise (like it or not) With or without IT s blessing, ipad users are using their devices for work purposes (95% of employees say they use personally purchased devices for work use). 2 That means without a native file system on the device and enterprise security and management capability, users are employing the work around, putting the enterprise and its assets at risk and compromising compliance efforts. Mobile devices are quickly becoming our primary computers And tablets are widely seen as potentially replacing the personal computer. 3 Fred Vogelstein, Wired, May 2011 Forget whether you believe tablets and smartphones will replace the PC. Whether tablets like ipad settle in as an accessory or a replacement for the PC, tablets are not going away and are becoming a crucial port of productivity for enterprise workers as well as consumers. Even if your company institutes a no tablet policy, it s virtually impossible to keep employees from bringing their own devices to work and coming up with their own ways to access files. End-users are forced to either themselves a file or utilise unsecure environments from consumer-based cloud providers like Dropbox to store and access files on ipad. That means uploading corporate data to an unsecure environment, then downloading it onto an ipad, viewing and/or saving it in third-party apps that are unsanctioned, inaccessible and unmanaged by IT, equating to a massive security risk. Enterprises that directly acquire ipads for task workers, intent on deploying enterprise productivity applications on the device from sales force automation to field service, face the same issue as those contending with employees bringing their own devices into the workplace. Whether you re an enterprise embracing the consumerisation of IT and hearing from C-level executives on down that you need to support the ipad for business use, or you are looking at the ipad to deploy specific workforce applications to select employees, you re probably acutely aware of the need to ensure secure access to critical enterprise information and to lock down the device if it poses a threat to your organisation s critical information. The key is to address it upfront with the right solutions. ipad Enterprise Adoption Facts t J1BET TPME JO JTDBM JSTU 2VBSUFS 2012 ( QQMF) t /FBSMZ FWFSZ DPNQBOZ JO UIF PSUVOF 500 JT VTJOH J1BE ( QQMF) t 1.5. J1BET JO VTF JO FEVDBUJPO JOTUJUVUJPOT ( QQMF) Fact: 95% of consumer-purchased devices are used for work (Unisys)
3 2 - Lack of Native File System and Centralised Storage ipad introduces a completely new user mode and browsing experience. A revolutionary UI and paradigm shift in computing usability results in a new way of handling and interacting with files. On ipad, files must either be created on device or transferred to it via individual applications. This poses a game-changing paradigm shift in the way users are accustomed to accessing, editing and transferring files between devices and corporate file servers. ipad does not come with a user accessible file system. When ipad is connected to a computer, it can sync music, videos, and apps through itunes, but a user can t personally copy files over to the device the way they would to a PC s flash drive or other mobile device. ipad provides a way to search the user s music, video, apps, contacts, etc. but does not allow the user to browse or search the actual files stored on the device. ipads also don t have a way to centrally store files anywhere on the device most applications are universes unto themselves, and maintain their own file storage systems that can only be accessed via that individual app. There are a few consumerbased applications, like readers and editing-based applications that allow application-related files to be opened in another application. When this is done, the file is copied to that app s private storage area and then exists in two places on the ipad multiplying versions. That means the unsecure work-arounds are required, putting confidential and critical files, enterprises have spent years, time and money creating, at risk. 3 - No built-in access to corporate file servers Out of the box, ipad is designed to receive files from itunes syncing and through consumer cloud-based services like Apple s icloud. Unlike a Mac or PC, the ipad has no built-in ability to connect directly to a corporate file server, the hub of information for productivity and knowledge-sharing essential to people doing their jobs, regardless of what line of business or job function. Again, the most popular work-arounds, present a security risk to the enterprise as there is no way to ensure consumer and cloud-based file storage services are transferring and storing files under the heightened encryption and passwordprotection required by most enterprises to ensure asset protection, mitigated risk and compliance.
4 4 - Mobile device management provides no capabilities for managing individual applications While some mobile device management (MDM) solutions allow for the provisioning, tracking and remote management of the device as a whole and for specific sanctioned mobile applications to the device, all enterprise applications are accessed through an on-device sandbox provided by the MDM vendor. Typically, within that sandbox are enterprise-focused, often custom-developed applications like field service, asset management, time tracking, sales force automation, and PIM, etc. If corporate documents are part of the predetermined enterprise application workflow such as an installation manual required by a field service rep, or access to equipment history for a technician, those documents are secure and can be locked down within the sandbox. However, once the user exits the MDM sandbox, the device user still cannot access enterprise files that exist on the standard corporate file servers, which may be required for other tasks outside of the predetermined workflow of the task-focused application. In an effort to solve that problem, again, end-users turn to unsecure third-party cloud providers to gain access to corporate files on ipad. Once a user has installed a file-sharing app and moved corporate data into it, that data is almost certainly being stored unencrypted whether on-device or in the cloud and is outside of corporate control. The only way to remove that data is to wipe the entire device. What is required to maintain IT control of corporate files is to take advantage of Mobile File Management (MFM) solutions that can address the security requirements of today s enterprise, which include: On-device search, access, browse and view features which simply place a file browsing and storage system on ipad that is natively lacking for enterprise use; Rapidly deployable server-based software, installable on leading file servers; Centralised server and client management tools designed specifically for IT that allow rapid deployment and configuration of client and server deployments; On-device file encryption; Secure transfer of files through direct, encrypted connections between file servers and the device; Remote wipe capability that is application-specific to MFM; Direct integration with Active Directory for extending security protocols and permissions direct to ipad.
5 5 - Best practices for providing secure file access for the ipad Secure file access for ipad is possible with the help of innovative software developers with experience in streamlining the interactions between divergent operating platforms within the enterprise such as Macintosh computers and Window - based servers. When considering the products available to help securely integrate ipads into the enterprise while allowing users to access their work files with ease, IT departments should ensure the following: File access on-device is password-protected Corporate IT has management tools to ensure rapid configuration and deployment of client and server-based installations Security standards are met for data transfer between server and device through over-the-wire encryption Enterprise files on the ipad are kept encrypted between use Access is controlled using corporate user accounts (aka Active Directory accounts) The ability to , print, and move files to other applications can be limited based on individual enterprise security requirements The device can be remotely wiped of sensitive corporate data in the event the device is lost or stolen. Conclusion ipad is making inroads into the enterprise and its rapid adoption and popularity make it a key productivity enhancer for every worker as mobile employees become the norm, including executives, task workers and knowledge workers. However, its usability and browsing paradigm as well as its lack of native file and storage systems present security challenges for those enterprises desiring integrate them into workflow and IT infrastructure. Until ipad is equipped with the Mobile File Management its rapidly increasing presence in the enterprise presents a bigger and bigger burden for IT departments, whether the tablets are issued by the company or walk in via the employee. Mobile file management needs to be simple to use, secure to access and transfer critical files, integrate with existing security solutions like Active Directory and easily managed by central IT departments. Only then will the enterprise be able to truly unlock the power of ipad as business continues to grow more mobile. 1. According to Apple COO Tim Cook on the company s Jan. 18, 2011 earnings call; ipad Adoption Up 80% in Fortune 100, Rue Liu, BusinessInsider.com, Jan. 18, 2011: 2. $POTVNFSJ[BUJPO PG *5 #FODINBSL 4UVEZw, 6OJTZT $PSQPSBUJPO 2010: 3. 5IF «OESPJE &YQMPTJPO,w SFE 7PHFMTUFJO, 8*3&%,.BZ 2011:
6 About Acronis Acronis helps enterprise and education IT organisations simply and securely integrate diverse computing platforms into enterprise environments, connecting employees to enterprise files, content and assets to facilitate a more productive and efficient work environment. With more than two decades of experience, Acronis leads the marketplace in helping IT organisations effectively and easily manage the integration of Apple products into the enterprise ecosystem. Whether IT organisations are looking to integrate existing Apple assets, purchase additional Apple hardware like Macs and ipads, or want to take advantage of the hardware costs savings that accompany the adoption of IT consumerisation, Acronis enables IT organisations to easily and securely manage the rapid integration of diverse platforms while ensuring resources are optimised. Acronis enables the enterprise to focus on what is really important competitive differentiation, improved employee productivity, mitigated risk and reduced costs. Acronis s proven products ExtremeZ-IP, mobilecho, ArchiveConnect, and MassTransit are in use by some of the world s most innovative companies, including Christie s, International Greetings and Omnicom Group. For additional information please visit To purchase Acronis products, visit or search online for an authorised reseller. Acronis office details can be found at Copyright Acronis International GmbH. All rights reserved. Acronis, mobilecho and the Acronis logo are trademarks of Acronis International GmbH. ExtremeZ-IP is a registered trademark of GroupLogic, Inc. Windows is a registered trademark of Microsoft Corporation. Other mentioned names may be trademarks or registered trademarks of their respective owners and should be regarded as such. Technical changes and differences from the illustrations are reserved; errors are excepted
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your
MOBILE FIRST ENTERPRISE 1 White Paper Mobile-first Enterprise: Easing the IT Burden 10 Requirements for Optimizing Your Network for Mobility 2 MOBILE FIRST ENTERPRISE Table of Contents Executive Summary
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success June, 2013 Contents Executive Overview...4 Business Innovation & Transformation...5 Roadmap for Social, Mobile and Cloud Solutions...7
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
White paper The future of Service Desks - vision Service Desks require strategic consideration and innovation to raise user productivity and to support business goals. Fujitsu has the experience and feedback
Workplace mobility and the small business Explore the global growth of personal communications devices in the workplace 2 1. Background The following white paper examines the findings of the latest Citrix-commissioned
Introduction.... 1 Emerging Trends and Technologies... 3 The Changing Landscape... 4 The Impact of New Technologies... 8 Cloud... 9 Mobile... 10 Social Media... 13 Big Data... 16 Technology Challenges...
Expand your business community in the cloud You ve discovered the power of the cloud great potential for increasing efficiency, collaborating and saving money in the operation of your design-focused business.
white paper Public or Private Cloud: The Choice is Yours Current Cloudy Situation Facing Businesses There is no debate that most businesses are adopting cloud services at a rapid pace. In fact, a recent
BEST PRACTICES WHITE PAPER A path to improving the end-user experience By David Williams, Vice President of Strategy, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
OpenScape Enterprise Discover how to unleash the potential of your virtual teams To achieve business advantage, enterprises are finding new ways of tapping the collective skills, knowledge, expertise and
10 Things Your Next Firewall Must Do Introduction Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices.
Identity and access management as a driver for business growth February 2013 Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still
Reports & Publications Impact of Mobile Technologies on Enterprises: Strategies, Success Factors, Recommendations A study by Stefan Stieglitz and Tobias Brockmann published by the Vodafone Institute for
SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses
OpenText Managed File Transfer Technical Overview Abstract The Email-integrated Manage File Transfer solution from OpenText provides an extensive and well-balanced solution to file-transfer problems. Unbound
Hacker Intelligence Initiative Man in the Cloud (MITC) Attacks 1. Executive Summary In this report, we demonstrate a new type of attack we call Man in the Cloud (MITC). These MITC attacks rely on common
The workplace landscape is changing rapidly as people walk into the office with the expectations and sometimes the tools they carry from home. The requirements for flexibility rise even higher as employees