Mobility Impact on the Enterprise
|
|
- Shon Leonard
- 8 years ago
- Views:
Transcription
1 BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device (CYOD), Bring Your Own App (BYOA), Corporately Owned Personally Enabled (COPE). Trendy acronyms and hype aside the fact is that mobility and cloud services are changing the way we work and IT organizations must adapt. If we must use an acronym to describe the new work environment, I choose BWTD (Bring Work to Devices) and managing and securing this world is the focus of this article. Whether it s VoIP, Unified Communications, Cloud Computing or Big Data, whenever there is an emerging technology trend we can expect the accompanying marketing hype, a multitude of definitions along with conflicting statistics and projections. BYOD is no exception and statistics and projections depend entirely on the context and how it is defined. For the purposes of this article I will limit the use of the term BYOD to describe mobile devices that are being used for both corporate and personal purposes, regardless of who owns the device. Device Ownership Initially at least, BYOD was about non-corporately assigned devices being used by employees for work functions. So let s address the question of device ownership first. Who owns the devices is of course relevant and the implications associated with policy, security, personal vs. corporate liability and compensation must all be addressed. Device ownership considerations must be part of an overall and well defined mobility strategy. However, in the context of managing and securing the mobile work environment, the question of who owns the device is a relatively minor aspect of a sound mobility strategy. There are several ownership models each with their own pros, cons, and considerations. The most appropriate model depends on the specifics of the organization. Again, ownership is not the most significant issue. Rather, the management and security of mobile devices that are accessing corporate resources is what must be addressed. This is true even if all the devices are corporately owned and locked down for corporate use only. There are many ownership options that can be applied with respect to device and service plans. Considerations include security, privacy, company policy, tax laws, company culture, demographics, and many more; the specifics of which will be discussed in a future article. Many organizations initially embraced BYOD believing that it would lower costs. Many articles and papers on the topic still claim cost savings as a primary benefit. However, there are plenty of examples where the cost savings were not realized and many organizations have since retracted their BYOD program; that is, employee-owned devices for work. Mobility Impact on the Enterprise The bad news is that BYOD will add complexity and increase security risks in the mobile enterprise. The security risks are real and must be managed. On a couple of occasions clients have told me that we don t allow BYOD. However, casual observations revealed that personal devices were being used in the enterprise whether they were allowed or not. BYOD is happening whether you like it or not. You can either embrace the trend or become a victim of it.
2 The good news is that BYOD can bring tangible benefits to your organization and its employees while adequately managing the associated risks. Over the course of the last few years multiple new Mobile Device Management (MDM) vendors have emerged that provide a rich set of management and security capabilities. In addition, mobile device manufacturers have acknowledged the corporate requirements and continue to integrate robust security and management functionality into their operating systems. Enterprise Mobility Strategy In order to reap the benefits of the mobile enterprise while managing the associated complexity and risks, a sound BYOD strategy is required. The goal of the strategy should be to balance the business benefits with the associated risks. This balance can be tricky. For example, a strategy that secures the device at the expense of ruining the personal experience will not yield the desired results. However, striking the appropriate balance is achievable with a well thought out plan. BYOD should not be addressed in isolation. Rather, it should be a subset of an overall mobility strategy and should be treated like any other strategic IT initiative which includes discovery, analysis and implementation, and starts with identifying the vision and the business objectives. IT organizations that assume leadership and are proactive with respect to BYOD are more likely to be able to influence and control the mobile environment. Approach As with any other project one of the first and most critical steps is to identify your sponsors and stakeholders. When it comes to enterprise mobility, sponsorship can often be found with senior leaders who may already be pressuring IT organizations to deploy and support devices and applications before IT is ready to support them. Stakeholders will likely include parties not normally associated with other IT initiatives. Enterprise mobility has the potential of impacting the entire organization and beyond. At the very least, you should consult: Users, HR, Finance, Legal, Operations and Support and Security. Also, don t forget your customers and your partners who likely have expectations on how they will interact with your organization from a mobility perspective. Discovery Your strategy should be based on a solid understanding of your current environment. With enterprise mobility, assumptions on your current state can be dangerous. While your organization may not have a BYOD program and perhaps prohibits the use of personal devices to access corporate resources, it doesn t mean that it s not happening; in fact it probably is! Begin by reviewing the devices, operations systems and Apps that are being used. Look beyond the corporately approved devices and Apps. If non-approved devices and Apps are being used, there may very well be legitimate drivers for their use that will have to be considered. Identify and categorize your mobile user population and identify the resources they require. Identify the user roles and the sensitivity of the data they will be accessing. This exercise will help to determine who is allowed to access what resources, from what device and operating system and from where. Yes, we are talking about mobile devices here so the location from which corporate data is being accessed may indeed be a factor. For example, it may not be acceptable to allow a mobile device access to schematics associated with a nuclear facility outside of specific confines within the campus.
3 Example User Matrix Devices Example User Matrix A solid understanding of your user population and the access they require will play a role in determining which devices and operating systems you will support and for which purpose. For example, a clerk that needs only access may be allowed a broader range of acceptable device choices than a salesperson that needs direct access to sales and financial databases. Other considerations for supported devices will include: The capabilities and limitations associated with your management tools. In-house expertise and the level of support you will provide. The ability of the device to support the specific Apps that will be required to access the corporate resources. Cost Contrary to what many believe, according to Cisco IBSG Horizons Survey Report, more than 80% of BYOD cost is not related to devices. Your financial analysis should consider all of the capital and operational costs that will be required to support your mobility strategy. Considerations will include: Infrastructure which includes wired and wireless network capacity (bandwidth) and capabilities such as VLAN segmentation and Wi-Fi Access Point density; Management tools including MDM, and detection and enforcement tools to control devices at the network access layer; Operations and Support; Training; and, Devices and service plans. Mobility Policy
4 One of the most important aspects of successfully deploying BYOD is the mobility policy. To ensure success the mobility policy must precede the technology decisions. Defining the policy will require consultation with your users, HR and Legal among others. The key is to strike the right balance between user demands, cost and risk while ensuring that it protects the organization from liability and litigation. Your mobility policy should define Acceptable Use. This aspect of the policy should spell out personal use restrictions which could include rules with respect to voice and data usage, travel plans, SMS and Apps. The policy should spell out user responsibilities with respect to reporting a lost or stolen device. On the topic of lost devices, the policy must make users aware of the actions that will be taken when a device is lost. For example, will the organization perform a partial or full wipe of the device including any personal information or media? Even if the policy states that a device-wipe will delete personal data and the user has agreed, it doesn t mean that such an event won t cause a problem. Therefore serious considerations should be given to the ability to support dual persona and selective wipes. Payment and reimbursement policies for devices, service plans and personal use must be part of the policy. In addition, define your replacement policy and related financial aspects if a device must be replaced because it was lost, stolen or accidentally damaged. The mobility policy will help to guide many of the technology decisions that will follow. From a user population perspective, the policy will set the proper expectations and define rules which can then be monitored and enforced, and if necessary, used to justify corrective actions. All of the users should understand the policy and agree. Keep the acceptance document simple with a few checkboxes and ask your users to sign it. Management Tools Any strategy or policy that doesn t account for human behaviour is flawed. Policy and user agreements are not enough and you must have the tools to monitor and enforce compliance. You will need tools to manage these aspects at the operating system, App, and network layers. While this may change in the future, today a variety of tools will be required to manage these different aspects. MDM Enterprise security features continue to be incorporated into devices by their manufacturers. However, for the foreseeable future, MDM solutions must be considered as part of an enterprise mobility strategy if you intend to allow personal and corporate use beyond simple and web access. Even in simple and low sensitivity environments, MDM solutions may offer beneficial security, monitoring and compliance functionality. According to IDG Enterprise s 2013 Consumerization of IT in the Enterprise survey, only 28% of 1,621 IT leaders have invested in an MDM solution. In my view, this means that many enterprises are at risk of experiencing security breaches or data loss. MDM solutions are available in both premise and cloud based service delivery models. However, owning an MDM solution is only part of the story and these platforms must be properly configured and managed. While ActiveSync is good start for many organizations it is not enough and lacks some of the features that are considered basic with MDM products. For example, with ActiveSync it is not possible to perform a selective wipe, so that if a device must be wiped for some reason, all of the data on that device will be deleted, including any personal data. There have been examples where the deletion of personal data has resulted in litigation.
5 For more information on the potential shortcomings of ActiveSync relative to MDM products, you can refer to this paper by MaaS360: Understanding the Role of Exchange ActiveSync in Mobile Device Management that can be found at While the paper is promoting a specific solution, it nevertheless provides an excellent summary of what ActiveSync can and cannot do. There are currently many MDM vendors and there will likely be further consolidation in this space over the next couple of years. Gartner MDM Magic Quadrant The leading MDM vendors offer a host of rich features that allow organizations to effectively secure the mobile environment while preserving the user experience while allowing simultaneous corporate and personal use. When selecting an MDM platform, organizations should look for these basic capabilities: Dual persona (sandbox / containers);
6 Ability to encrypt all traffic in transit and at rest; Prevent exporting documents to other Apps; Prevent copy and paste (for example from a corporate to a personal App); Self-service features such as provisioning and device wipe; Automated enrollment; Full and selective device wipe; Control over device functions such as Bluetooth, cameras, cell or Wi-Fi radios; Ability to integrate with existing directory services; Support for multi-factor authentication; Over the Air (OTA) configuration; and, Enforcement of geographic and network restrictions. Apps Apps management will be a key component of any mobility strategy, and the world of mobility raises many new issues that must be considered. Let s start with the question of how to distribute the Apps. If your MDM platform has advanced dual persona capabilities you may allow users to install any App they choose for personal use. However, you will likely want to control the source and type of Apps that users can install for corporate use. One option is to host your own App store with corporate Apps that you have approved. A second issue is the security implications of the allowed Apps. If you choose to permit consumer Apps, make sure that you understand the security implications. For example, many Apps will collect data of one form or another, so ensuring that Apps used for accessing corporate resources do not compromise security will require a fair amount of due diligence in order to understand what the App might be doing in the background. Apps may introduce unanticipated risks. For example, if you ask SIRI on Apple s iphone to read your , the content of that is uploaded to their data centres where it is processed and then played back on the device. What happens to the data? Is the information stored? If so where, for how long, for what purpose and who has access? While you may not care if the read is an invitation to the Christmas party, these are legitimate issues that must be understood before you allow SIRI to read s with high sensitivity. The same applies to Apps that access contacts, calendars or any of the functions on the device such as cameras and microphones. Another issue is cost. With some recent exceptions, App licenses have not been transferable, and while most mobile Apps are relatively inexpensive, the costs can still add up quickly. Recently, Apple introduced Managed Distribution for App Store Volume Purchase Program (VPP) for Business and Education which, among other things, allows purchasers to revoke Apps from users when no longer needed, and reassign the licenses to different users. Apps and App development may also influence the types of devices you will allow in your mobile enterprise. Some corporate services may only be compatible with Apps on specific operating systems. If you will be developing your own Apps, will you create Apps that can work across multiple platforms such as HTML5 or will you develop Apps for a single operating system? Finally, there is the topic of App development. There likely will come a time when there will be a need to create an App for a specific purpose that can t be sourced off the shelf. The mobility strategy must consider the organization s capabilities in this area and whether it will develop in-house or outsource. Operations and Support
7 The number of mobile devices, operating systems and Apps entering the enterprise environment will likely continue to rise. This proliferation of devices has the potential to substantially increase the effort required to support and administer mobility. Assess your support and day to day administration capabilities and consider these in the context of your mobile strategy. You may have to limit what you allow and the speed of deployment based on your support capabilities. Look for ways to limit the level of support you will need to provide by encouraging a self-service model. Some things to consider include providing training and associated documentation, a mobility webpage with a corporate wiki, FAQ and links to vendors sites and other external resources. Day to day administration of the mobile fleet can also be a burden. Activities such as provisioning and decommissioning devices, importing and exporting numbers, replacing broken or lost devices, device repair and first level support may require a full time resource for organizations with a large number of mobile devices. Considering these aspects as you formulate your mobility strategy may result in a decision to outsource some or all of these aspects. Expense Management As stated earlier, most of the cost associated with BYOD is unrelated to devices. Unless you have the appropriate tools and resources or assistance from an expense management firm, your mobility costs may quickly spiral out of control. In addition, managing the associated reporting and accounting aspects may consume the time of skilled resources that should be focused on more strategic activities. The challenges associated with managing expenses include: contract compliance, detecting errors and retrieving the associated credits, and detecting inappropriate usage charges. Deployment Depending on the size of your organization it might be a good idea to start with a proof of concept or a deployment that is limited in scale and the associated services. If you elect to limit the initial deployment make sure that you select a representative sample of the user population, the devices, operating systems, Apps and the information that will be accessed. Whether you fully deploy or not, ensure that you have identified the metrics by which you can measure success. Finally, mobility is changing at a rapid pace. Thus it is important to periodically reassess your enterprise mobility environment. Conclusion Whether we are ready or not, BYOD is a growing phenomenon in today s organizations. However, as I hope the above article shows, who owns the device is not the most important factor. It is simply one aspect to be considered in developing a comprehensive approach to the management and security of any mobile device that accesses your corporate resources.
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More informationBYOD: What s Your Strategy?
: What s Your Strategy? Eric Panknin IT Manager epanknin@dmj.com What is BYOD? Building a Strategy Policy Considerations Mobile Security Solution Implementation and Training Maintain Discussion and Experiences?
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationManaging Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationIMPLEMENTING YOUR BYOD MOBILITY STRATEGY
IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationIT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
More informationBENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
More informationios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
More informationBring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com
Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in
More informationBYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationTotal Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com
Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security
More informationDECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationDeep Dive BYOD, COPE & MDM
Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD
More informationAchieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert
Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in
More informationAragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World
Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationNetwork and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era
Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era Sco$ Gordon CISSP- ISSMP Vice President, ForeScout June 14, 2012 2012 ForeScout, Page 1 Bring Your Own Device BYOD Many
More informationA Guide to Consumerization & Building a BYOD Policy June 2012
INTRODUCTION iphones, ipads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These
More informationThe Holistic Guide to BYOD in Your Business Jazib Frahim
The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationPolicy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology
Policy Checklist Name of Policy: Purpose of Policy: Directorate responsible for Policy Name & Title of Author: Does this meet criteria of a Policy? Trade Union consultation? Equality Screened by: Date
More informationIndustry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation
Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation The Central Florida Chapter of The Florida Government Finance Officers Association 2/7/2014 K. Adam Glover,
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationCREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationBYOD Strategies: Chapter I
Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones
More informationONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationThree Best Practices to Help Government Agencies Overcome BYOD Challenges
WHITE PAPER This paper discusses how IT managers in government can address the challenges of the new Bring-Your-Own-Device (BYOD) environment as well as best practices for ensuring security and productivity.
More informationMobile Device Usage and Agreement Policy
Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationBuilding Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh
Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in
More informationThree Best Practices to Help Enterprises Overcome BYOD Challenges
WHITE PAPER Three Best Practices to Help Enterprises Overcome BYOD Challenges Nearly 80% of white-collar workers in the United States use a mobile device for work and approximately 95% of IT organizations
More informationTechnical Note. ForeScout MDM Data Security
Contents Introduction........................................................................................................................................... 3 Data Security Requirements for BYOD..................................................................................................................
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM
ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which
More informationUse of Mobile Apps in the Workplace:
Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged
More informationMobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda
Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic
More informationiphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
More informationThe Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle
The Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle Presented by Gary Langfitt, President of Expense Management Services Carl Friedholm,
More informationhttp://www.velocis.in Extending Collaboration to BYOD Devices
Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationI D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment
I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise
More informationSamsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
More informationPreparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
More information2011 Forrester Research, Inc. Reproduction Prohibited
1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile
More informationThe Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
More informationSeparation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices
Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception
More informationMDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationBring Your Own Devices (BYOD) Information Governance Guidance
Bring Your Own Devices (BYOD) Information Governance Guidance 1. Purpose The purpose of this document is to provide guidelines that will support organisations considering whether to enable the use of Bring
More informationBYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationWhat Is BYOD? Challenges and Opportunities
Wor k s pac es Mobi l i t ysol ut i ons Bl uewi r esol ut i ons www. bl uewi r e. c o. uk What Is BYOD? Challenges and Opportunities What is BYOD How Secure is Your BYOD Environment? Bring your own device
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationBuilding a Mobile Information Management Strategy
The SIMS Partnership Transforming Transforming health health care care delivery delivery Building a Mobile Information Management Strategy The Approach Taken by UHN to Balance Both Security and Practice
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationBring Your Own Devices (BYOD) Information Governance Guidance
Bring Your Own Devices (BYOD) Information Governance Guidance 1. Purpose The purpose of this document is to provide guidelines that will support organisations wishing to enable the use of Bring Your Own
More informationWhat Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
More informationBYOD Enabling Technologies
BYOD Enabling Technologies Bryan Padgett 1 Our Vision for BYOD AGILEX PROPRIETARY 2 The BYOD Challenge Platform Diversity U.S. Smartphone Platform Market Share, December 2014 Source: comscore MobiLens
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationDevice Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
More informationEMBRACING THE AGE OF MOBILITY
Embracing The Age Of Mobility & The Byod Workplace buzz-worthy acronym or a workplace trend that will eventually fade; it s part of the complete restructuring of the conventional way we ve worked up to
More informationMobile Checklist: Preparing for Building an Enterprise App
Mobile Checklist: Preparing for Building an Enterprise App Unlike fleeting consumer apps, enterprise mobile applications for a business are transformative. Forward-thinking organizations are eager to take
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationEmbracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
More informationBYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security whitepapers@contextis.co.uk October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
More informationA Mobile Architecture, Not Just a Mobile App
A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
More informationEnterprise Mobility Management
Grading Your Solution Series: Enterprise Mobility Management An EMM Best Practices Checklist Introduction Enterprise Mobility Management (EMM) is a strategic focus for today s enterprises. While BYOD and
More informationBYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD
BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland sduernbe@cisco.com CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationperspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
More informationSample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing
More informationBring Your Own Device and Expense Management
Bring Your Own Device and Expense Management A Telesoft Whitepaper Table of Contents About this Whitepaper... 3 Essential Elements for BYOD Policy... 4 Capabilities Needed to Manage BYOD and Expense Management...
More informationTaking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia
Taking Charge with Apps, Policy, Security and More October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia http://pinterest.com/visualoop/byod-infographics/ vs. NSFW PSFW NSFW Security & Compliance
More informationSetting BYOD Policy: A New Partnership for IT and HR
Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70
More informationDeploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
More informationLeveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage
Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationEnterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen
Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More information