Mobility Impact on the Enterprise

Size: px
Start display at page:

Download "Mobility Impact on the Enterprise"

Transcription

1 BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device (CYOD), Bring Your Own App (BYOA), Corporately Owned Personally Enabled (COPE). Trendy acronyms and hype aside the fact is that mobility and cloud services are changing the way we work and IT organizations must adapt. If we must use an acronym to describe the new work environment, I choose BWTD (Bring Work to Devices) and managing and securing this world is the focus of this article. Whether it s VoIP, Unified Communications, Cloud Computing or Big Data, whenever there is an emerging technology trend we can expect the accompanying marketing hype, a multitude of definitions along with conflicting statistics and projections. BYOD is no exception and statistics and projections depend entirely on the context and how it is defined. For the purposes of this article I will limit the use of the term BYOD to describe mobile devices that are being used for both corporate and personal purposes, regardless of who owns the device. Device Ownership Initially at least, BYOD was about non-corporately assigned devices being used by employees for work functions. So let s address the question of device ownership first. Who owns the devices is of course relevant and the implications associated with policy, security, personal vs. corporate liability and compensation must all be addressed. Device ownership considerations must be part of an overall and well defined mobility strategy. However, in the context of managing and securing the mobile work environment, the question of who owns the device is a relatively minor aspect of a sound mobility strategy. There are several ownership models each with their own pros, cons, and considerations. The most appropriate model depends on the specifics of the organization. Again, ownership is not the most significant issue. Rather, the management and security of mobile devices that are accessing corporate resources is what must be addressed. This is true even if all the devices are corporately owned and locked down for corporate use only. There are many ownership options that can be applied with respect to device and service plans. Considerations include security, privacy, company policy, tax laws, company culture, demographics, and many more; the specifics of which will be discussed in a future article. Many organizations initially embraced BYOD believing that it would lower costs. Many articles and papers on the topic still claim cost savings as a primary benefit. However, there are plenty of examples where the cost savings were not realized and many organizations have since retracted their BYOD program; that is, employee-owned devices for work. Mobility Impact on the Enterprise The bad news is that BYOD will add complexity and increase security risks in the mobile enterprise. The security risks are real and must be managed. On a couple of occasions clients have told me that we don t allow BYOD. However, casual observations revealed that personal devices were being used in the enterprise whether they were allowed or not. BYOD is happening whether you like it or not. You can either embrace the trend or become a victim of it.

2 The good news is that BYOD can bring tangible benefits to your organization and its employees while adequately managing the associated risks. Over the course of the last few years multiple new Mobile Device Management (MDM) vendors have emerged that provide a rich set of management and security capabilities. In addition, mobile device manufacturers have acknowledged the corporate requirements and continue to integrate robust security and management functionality into their operating systems. Enterprise Mobility Strategy In order to reap the benefits of the mobile enterprise while managing the associated complexity and risks, a sound BYOD strategy is required. The goal of the strategy should be to balance the business benefits with the associated risks. This balance can be tricky. For example, a strategy that secures the device at the expense of ruining the personal experience will not yield the desired results. However, striking the appropriate balance is achievable with a well thought out plan. BYOD should not be addressed in isolation. Rather, it should be a subset of an overall mobility strategy and should be treated like any other strategic IT initiative which includes discovery, analysis and implementation, and starts with identifying the vision and the business objectives. IT organizations that assume leadership and are proactive with respect to BYOD are more likely to be able to influence and control the mobile environment. Approach As with any other project one of the first and most critical steps is to identify your sponsors and stakeholders. When it comes to enterprise mobility, sponsorship can often be found with senior leaders who may already be pressuring IT organizations to deploy and support devices and applications before IT is ready to support them. Stakeholders will likely include parties not normally associated with other IT initiatives. Enterprise mobility has the potential of impacting the entire organization and beyond. At the very least, you should consult: Users, HR, Finance, Legal, Operations and Support and Security. Also, don t forget your customers and your partners who likely have expectations on how they will interact with your organization from a mobility perspective. Discovery Your strategy should be based on a solid understanding of your current environment. With enterprise mobility, assumptions on your current state can be dangerous. While your organization may not have a BYOD program and perhaps prohibits the use of personal devices to access corporate resources, it doesn t mean that it s not happening; in fact it probably is! Begin by reviewing the devices, operations systems and Apps that are being used. Look beyond the corporately approved devices and Apps. If non-approved devices and Apps are being used, there may very well be legitimate drivers for their use that will have to be considered. Identify and categorize your mobile user population and identify the resources they require. Identify the user roles and the sensitivity of the data they will be accessing. This exercise will help to determine who is allowed to access what resources, from what device and operating system and from where. Yes, we are talking about mobile devices here so the location from which corporate data is being accessed may indeed be a factor. For example, it may not be acceptable to allow a mobile device access to schematics associated with a nuclear facility outside of specific confines within the campus.

3 Example User Matrix Devices Example User Matrix A solid understanding of your user population and the access they require will play a role in determining which devices and operating systems you will support and for which purpose. For example, a clerk that needs only access may be allowed a broader range of acceptable device choices than a salesperson that needs direct access to sales and financial databases. Other considerations for supported devices will include: The capabilities and limitations associated with your management tools. In-house expertise and the level of support you will provide. The ability of the device to support the specific Apps that will be required to access the corporate resources. Cost Contrary to what many believe, according to Cisco IBSG Horizons Survey Report, more than 80% of BYOD cost is not related to devices. Your financial analysis should consider all of the capital and operational costs that will be required to support your mobility strategy. Considerations will include: Infrastructure which includes wired and wireless network capacity (bandwidth) and capabilities such as VLAN segmentation and Wi-Fi Access Point density; Management tools including MDM, and detection and enforcement tools to control devices at the network access layer; Operations and Support; Training; and, Devices and service plans. Mobility Policy

4 One of the most important aspects of successfully deploying BYOD is the mobility policy. To ensure success the mobility policy must precede the technology decisions. Defining the policy will require consultation with your users, HR and Legal among others. The key is to strike the right balance between user demands, cost and risk while ensuring that it protects the organization from liability and litigation. Your mobility policy should define Acceptable Use. This aspect of the policy should spell out personal use restrictions which could include rules with respect to voice and data usage, travel plans, SMS and Apps. The policy should spell out user responsibilities with respect to reporting a lost or stolen device. On the topic of lost devices, the policy must make users aware of the actions that will be taken when a device is lost. For example, will the organization perform a partial or full wipe of the device including any personal information or media? Even if the policy states that a device-wipe will delete personal data and the user has agreed, it doesn t mean that such an event won t cause a problem. Therefore serious considerations should be given to the ability to support dual persona and selective wipes. Payment and reimbursement policies for devices, service plans and personal use must be part of the policy. In addition, define your replacement policy and related financial aspects if a device must be replaced because it was lost, stolen or accidentally damaged. The mobility policy will help to guide many of the technology decisions that will follow. From a user population perspective, the policy will set the proper expectations and define rules which can then be monitored and enforced, and if necessary, used to justify corrective actions. All of the users should understand the policy and agree. Keep the acceptance document simple with a few checkboxes and ask your users to sign it. Management Tools Any strategy or policy that doesn t account for human behaviour is flawed. Policy and user agreements are not enough and you must have the tools to monitor and enforce compliance. You will need tools to manage these aspects at the operating system, App, and network layers. While this may change in the future, today a variety of tools will be required to manage these different aspects. MDM Enterprise security features continue to be incorporated into devices by their manufacturers. However, for the foreseeable future, MDM solutions must be considered as part of an enterprise mobility strategy if you intend to allow personal and corporate use beyond simple and web access. Even in simple and low sensitivity environments, MDM solutions may offer beneficial security, monitoring and compliance functionality. According to IDG Enterprise s 2013 Consumerization of IT in the Enterprise survey, only 28% of 1,621 IT leaders have invested in an MDM solution. In my view, this means that many enterprises are at risk of experiencing security breaches or data loss. MDM solutions are available in both premise and cloud based service delivery models. However, owning an MDM solution is only part of the story and these platforms must be properly configured and managed. While ActiveSync is good start for many organizations it is not enough and lacks some of the features that are considered basic with MDM products. For example, with ActiveSync it is not possible to perform a selective wipe, so that if a device must be wiped for some reason, all of the data on that device will be deleted, including any personal data. There have been examples where the deletion of personal data has resulted in litigation.

5 For more information on the potential shortcomings of ActiveSync relative to MDM products, you can refer to this paper by MaaS360: Understanding the Role of Exchange ActiveSync in Mobile Device Management that can be found at While the paper is promoting a specific solution, it nevertheless provides an excellent summary of what ActiveSync can and cannot do. There are currently many MDM vendors and there will likely be further consolidation in this space over the next couple of years. Gartner MDM Magic Quadrant The leading MDM vendors offer a host of rich features that allow organizations to effectively secure the mobile environment while preserving the user experience while allowing simultaneous corporate and personal use. When selecting an MDM platform, organizations should look for these basic capabilities: Dual persona (sandbox / containers);

6 Ability to encrypt all traffic in transit and at rest; Prevent exporting documents to other Apps; Prevent copy and paste (for example from a corporate to a personal App); Self-service features such as provisioning and device wipe; Automated enrollment; Full and selective device wipe; Control over device functions such as Bluetooth, cameras, cell or Wi-Fi radios; Ability to integrate with existing directory services; Support for multi-factor authentication; Over the Air (OTA) configuration; and, Enforcement of geographic and network restrictions. Apps Apps management will be a key component of any mobility strategy, and the world of mobility raises many new issues that must be considered. Let s start with the question of how to distribute the Apps. If your MDM platform has advanced dual persona capabilities you may allow users to install any App they choose for personal use. However, you will likely want to control the source and type of Apps that users can install for corporate use. One option is to host your own App store with corporate Apps that you have approved. A second issue is the security implications of the allowed Apps. If you choose to permit consumer Apps, make sure that you understand the security implications. For example, many Apps will collect data of one form or another, so ensuring that Apps used for accessing corporate resources do not compromise security will require a fair amount of due diligence in order to understand what the App might be doing in the background. Apps may introduce unanticipated risks. For example, if you ask SIRI on Apple s iphone to read your , the content of that is uploaded to their data centres where it is processed and then played back on the device. What happens to the data? Is the information stored? If so where, for how long, for what purpose and who has access? While you may not care if the read is an invitation to the Christmas party, these are legitimate issues that must be understood before you allow SIRI to read s with high sensitivity. The same applies to Apps that access contacts, calendars or any of the functions on the device such as cameras and microphones. Another issue is cost. With some recent exceptions, App licenses have not been transferable, and while most mobile Apps are relatively inexpensive, the costs can still add up quickly. Recently, Apple introduced Managed Distribution for App Store Volume Purchase Program (VPP) for Business and Education which, among other things, allows purchasers to revoke Apps from users when no longer needed, and reassign the licenses to different users. Apps and App development may also influence the types of devices you will allow in your mobile enterprise. Some corporate services may only be compatible with Apps on specific operating systems. If you will be developing your own Apps, will you create Apps that can work across multiple platforms such as HTML5 or will you develop Apps for a single operating system? Finally, there is the topic of App development. There likely will come a time when there will be a need to create an App for a specific purpose that can t be sourced off the shelf. The mobility strategy must consider the organization s capabilities in this area and whether it will develop in-house or outsource. Operations and Support

7 The number of mobile devices, operating systems and Apps entering the enterprise environment will likely continue to rise. This proliferation of devices has the potential to substantially increase the effort required to support and administer mobility. Assess your support and day to day administration capabilities and consider these in the context of your mobile strategy. You may have to limit what you allow and the speed of deployment based on your support capabilities. Look for ways to limit the level of support you will need to provide by encouraging a self-service model. Some things to consider include providing training and associated documentation, a mobility webpage with a corporate wiki, FAQ and links to vendors sites and other external resources. Day to day administration of the mobile fleet can also be a burden. Activities such as provisioning and decommissioning devices, importing and exporting numbers, replacing broken or lost devices, device repair and first level support may require a full time resource for organizations with a large number of mobile devices. Considering these aspects as you formulate your mobility strategy may result in a decision to outsource some or all of these aspects. Expense Management As stated earlier, most of the cost associated with BYOD is unrelated to devices. Unless you have the appropriate tools and resources or assistance from an expense management firm, your mobility costs may quickly spiral out of control. In addition, managing the associated reporting and accounting aspects may consume the time of skilled resources that should be focused on more strategic activities. The challenges associated with managing expenses include: contract compliance, detecting errors and retrieving the associated credits, and detecting inappropriate usage charges. Deployment Depending on the size of your organization it might be a good idea to start with a proof of concept or a deployment that is limited in scale and the associated services. If you elect to limit the initial deployment make sure that you select a representative sample of the user population, the devices, operating systems, Apps and the information that will be accessed. Whether you fully deploy or not, ensure that you have identified the metrics by which you can measure success. Finally, mobility is changing at a rapid pace. Thus it is important to periodically reassess your enterprise mobility environment. Conclusion Whether we are ready or not, BYOD is a growing phenomenon in today s organizations. However, as I hope the above article shows, who owns the device is not the most important factor. It is simply one aspect to be considered in developing a comprehensive approach to the management and security of any mobile device that accesses your corporate resources.

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information

BYOD: What s Your Strategy?

BYOD: What s Your Strategy? : What s Your Strategy? Eric Panknin IT Manager epanknin@dmj.com What is BYOD? Building a Strategy Policy Considerations Mobile Security Solution Implementation and Training Maintain Discussion and Experiences?

More information

ios Enterprise Deployment Overview

ios Enterprise Deployment Overview ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work

More information

Managing Mobility in the BYOD Era:

Managing Mobility in the BYOD Era: Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected

More information

BENEFITS OF MOBILE DEVICE MANAGEMENT

BENEFITS OF MOBILE DEVICE MANAGEMENT BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management

More information

ios Education Deployment Overview

ios Education Deployment Overview ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Empowering Students with Mobility and BYOD Technology

Empowering Students with Mobility and BYOD Technology Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility

More information

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in

More information

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Deep Dive BYOD, COPE & MDM

Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD

More information

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in

More information

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile

More information

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era Sco$ Gordon CISSP- ISSMP Vice President, ForeScout June 14, 2012 2012 ForeScout, Page 1 Bring Your Own Device BYOD Many

More information

A Guide to Consumerization & Building a BYOD Policy June 2012

A Guide to Consumerization & Building a BYOD Policy June 2012 INTRODUCTION iphones, ipads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These

More information

The Holistic Guide to BYOD in Your Business Jazib Frahim

The Holistic Guide to BYOD in Your Business Jazib Frahim The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology Policy Checklist Name of Policy: Purpose of Policy: Directorate responsible for Policy Name & Title of Author: Does this meet criteria of a Policy? Trade Union consultation? Equality Screened by: Date

More information

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation The Central Florida Chapter of The Florida Government Finance Officers Association 2/7/2014 K. Adam Glover,

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

BYOD Strategies: Chapter I

BYOD Strategies: Chapter I Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

Three Best Practices to Help Government Agencies Overcome BYOD Challenges WHITE PAPER This paper discusses how IT managers in government can address the challenges of the new Bring-Your-Own-Device (BYOD) environment as well as best practices for ensuring security and productivity.

More information

Mobile Device Usage and Agreement Policy

Mobile Device Usage and Agreement Policy Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Three Best Practices to Help Enterprises Overcome BYOD Challenges WHITE PAPER Three Best Practices to Help Enterprises Overcome BYOD Challenges Nearly 80% of white-collar workers in the United States use a mobile device for work and approximately 95% of IT organizations

More information

Technical Note. ForeScout MDM Data Security

Technical Note. ForeScout MDM Data Security Contents Introduction........................................................................................................................................... 3 Data Security Requirements for BYOD..................................................................................................................

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which

More information

Use of Mobile Apps in the Workplace:

Use of Mobile Apps in the Workplace: Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged

More information

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic

More information

iphone in Business Mobile Device Management

iphone in Business Mobile Device Management 19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device

More information

The Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle

The Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle The Evolution of TEM to CLM: How to Deliver Value through Effective Management across your Communications Lifecycle Presented by Gary Langfitt, President of Expense Management Services Carl Friedholm,

More information

http://www.velocis.in Extending Collaboration to BYOD Devices

http://www.velocis.in Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

Preparing your network for the mobile onslaught

Preparing your network for the mobile onslaught IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile

More information

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013 The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee

More information

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception

More information

MDM Mobile Device Management

MDM Mobile Device Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Bring Your Own Devices (BYOD) Information Governance Guidance

Bring Your Own Devices (BYOD) Information Governance Guidance Bring Your Own Devices (BYOD) Information Governance Guidance 1. Purpose The purpose of this document is to provide guidelines that will support organisations considering whether to enable the use of Bring

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

What Is BYOD? Challenges and Opportunities

What Is BYOD? Challenges and Opportunities Wor k s pac es Mobi l i t ysol ut i ons Bl uewi r esol ut i ons www. bl uewi r e. c o. uk What Is BYOD? Challenges and Opportunities What is BYOD How Secure is Your BYOD Environment? Bring your own device

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

Building a Mobile Information Management Strategy

Building a Mobile Information Management Strategy The SIMS Partnership Transforming Transforming health health care care delivery delivery Building a Mobile Information Management Strategy The Approach Taken by UHN to Balance Both Security and Practice

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

Bring Your Own Devices (BYOD) Information Governance Guidance

Bring Your Own Devices (BYOD) Information Governance Guidance Bring Your Own Devices (BYOD) Information Governance Guidance 1. Purpose The purpose of this document is to provide guidelines that will support organisations wishing to enable the use of Bring Your Own

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

BYOD Enabling Technologies

BYOD Enabling Technologies BYOD Enabling Technologies Bryan Padgett 1 Our Vision for BYOD AGILEX PROPRIETARY 2 The BYOD Challenge Platform Diversity U.S. Smartphone Platform Market Share, December 2014 Source: comscore MobiLens

More information

Enterprise Security with mobilecho

Enterprise Security with mobilecho Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

EMBRACING THE AGE OF MOBILITY

EMBRACING THE AGE OF MOBILITY Embracing The Age Of Mobility & The Byod Workplace buzz-worthy acronym or a workplace trend that will eventually fade; it s part of the complete restructuring of the conventional way we ve worked up to

More information

Mobile Checklist: Preparing for Building an Enterprise App

Mobile Checklist: Preparing for Building an Enterprise App Mobile Checklist: Preparing for Building an Enterprise App Unlike fleeting consumer apps, enterprise mobile applications for a business are transformative. Forward-thinking organizations are eager to take

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

BYOD in the Enterprise

BYOD in the Enterprise BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security whitepapers@contextis.co.uk October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515

More information

A Mobile Architecture, Not Just a Mobile App

A Mobile Architecture, Not Just a Mobile App A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

Enterprise Mobility Management

Enterprise Mobility Management Grading Your Solution Series: Enterprise Mobility Management An EMM Best Practices Checklist Introduction Enterprise Mobility Management (EMM) is a strategic focus for today s enterprises. While BYOD and

More information

BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland sduernbe@cisco.com CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags) perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise

More information

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing

More information

Bring Your Own Device and Expense Management

Bring Your Own Device and Expense Management Bring Your Own Device and Expense Management A Telesoft Whitepaper Table of Contents About this Whitepaper... 3 Essential Elements for BYOD Policy... 4 Capabilities Needed to Manage BYOD and Expense Management...

More information

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia Taking Charge with Apps, Policy, Security and More October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia http://pinterest.com/visualoop/byod-infographics/ vs. NSFW PSFW NSFW Security & Compliance

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Deploying iphone and ipad Apple Configurator

Deploying iphone and ipad Apple Configurator Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions

More information

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information