1 Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS
2 Objec&ves Our hope is that this conversa0on will get people thinking about mobile device management: Why is this important? And why is it 0me sensi0ve? How do we get there from here? What do we need to be doing? Why would you want to use MDM socware at SEAS? Why we need end- to- end mobile security management Solu0ons to monitor, control and protect across devices, apps, data and the network. Enrollment Demo and Q&A 2
3 Why do we need to think about this? Why can t we delay? TRENDS, RISKS & CHALLENGES
4 Trends: Personal Mobile Device Use 4
5 Risks and Challenges: An Evolving Landscape
6 Trends: Mobile Devices in the Workplace 6
7 Risks & Challenges: How do we protect Data & Iden88es? Harvard is a high- value target for many such threats 7
8 Risks & Challenges: How do we protect Data & Iden88es? Are Paid Apps Safer Than Free Apps? ios vs. Android Apps? 8
9 Risks and Challenges: What are other schools doing? Some schools are using a MDM vendor, others are leveraging resources they already own. AirWatch clients include Georgetown, Indiana University & UCLA Stanford has developed their own solu0on. Yale also offers an MDM solu0on to their customers. Harvard is BEHIND the curve
10 What do we need to be doing? Why should you use MDM socware? GETTING THERE FROM HERE
11 WHY use MDM? If you don t have a mobile strategy, you don t have a future strategy. Eric Schmidt (Google)
12 WHY use MDM? Allow you to use your mobile device for work purposes while making sure your data is protected. We all lose if your security is compromised. What do mobile devices bring to the table? How does the use of mobile devices ENABLE the pedagogy at Harvard? These are no longer just status symbols...they are useful devices. These are the func0ons that you want to embrace, enable, and foster How could the use of mobile devices INHIBIT the pedagogy or even HARM the school?
13 Security is the main reason companies hesitate to embrace mobile
14 Resistance I don t want to lock my phone what if I forget the code? It s my device, not Harvard s! Just treat them the same way we do laptops. Harvard Approved Vendors don t provide these services in the way we want MDM products are EXPENSIVE! We re a school, not a bank! The faculty will never go for it Lock codes are annoying! If I lock my ipad down, my kids can t use it! It s a viola&on of my privacy! I don t want Harvard to be able to track my loca8on!
15 How do they complicate things? CLOUD SERVICES
16 Mobile Device & Cloud - Security Issues Mobile Devices Bring Cloud Storage & Security Risks Mobile devices with their limited storage and compu.ng capabili.es are drivers for having services provided by Cloud Compu.ng (icloud, Dropbox, AWS ). Insecure cloud- based backup and highly confiden0al informa0on from mobile devices. icloud Use of Pages, Numbers on ipad automa0cally copies file to Apple s servers. Non- compliance with data protec0on regula0ons. Privacy and iden0fy thec case of Mat Honan, Senior writer at wired.com - whole his digital life was erased.
17 What DON T MDM products do? MDM products leverage the capabili0es of the na0ve device If the device doesn t handle encryp.on If the device doesn t allow pajern swipe- unlock or enable 6- digit numeric pins If the OS s error message is confusing
18 What does MDM NEED to do? Today s devices need a solu0on to monitor, control and protect the enterprise across devices, apps, data and the network.
19 What would we NEED a MDM to do? Can we do these things WITHOUT inhibi8ng the customer s use of the Device device? Usability Device protec&on and compliance Can we help our customers follow Harvard s policies for how sensi8ve informa8on is handled? Access to HU Services Same goals Are we ensuring that customers have access to the RIGHT set of services?
20 What would we NEED a MDM to do? Enable us to help our customers follow Harvard s and SEAS policies and standards Phased approach to implementa0on: PIN/ Password, encryp0on, locate, lock, and wipe
21 First Phase: Password policy, encryp&on, and locate/lock/wipe features Ensure your device is encrypted
22 AirWatch SAMPLE MDM PRODUCT
23 AirWatch End- to- End Security Solu&on Airwatch provides solu0ons to meet almost all of the above requirements. SEAS started AirWatch pilot project in February 2013 op0ons and ini0al results in end- to- end mobile security management.
24 AirWatch Installa&on/Enrollment Guides Installa0on and enrollment guides for ios and Android are available at SEAS ISO website: hgp://www.seas.harvard.edu/informa0on- security/mobile- device- management
5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This
A DIGITAL LIFE E-GUIDE Files in Flight: What You Should Know About Cloud Storage What Is the Cloud? Back then, all your files were stored on hardware. Party photos, spreadsheets, and school projects were
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy email@example.com The Mobile Service Line A commitment
Q&A: Demystifying Cloud Security An Empowered Report: Getting Past Cloud Security Fear Mongering by Chenxi Wang, Ph.D. with Stephanie Balaouras and Lindsey Coit EXECUTIVE SUMMARY At Forrester s Security
Expand your business community in the cloud You ve discovered the power of the cloud great potential for increasing efficiency, collaborating and saving money in the operation of your design-focused business.
Is Connectivity A Human Right? For almost ten years, Facebook has been on a mission to make the world more open and connected. For us, that means the entire world not just the richest, most developed countries.
ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk
UCi2i Video Managed Services Discover why video conferencing is the way to do business wherever you are www.uci2i.com 0844 546 7001 Who are UCi2i? Put simply, we enable you to communicate face to face,
The Impact of BYOD in Education Contents Introduction...1 Survey Methodology...1 Key Findings...2 BYOD in Education Today...3 BYOD Adoption Across Education...3 Types of Devices Allowed...4 How Personal
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
This video will look the different versions of Active Directory Federation Services. This includes which features are available in each one and which operating system you need in order to use these features.
FREQUENTLY ASKED QUESTIONS MOBILE MEETINGS Connecting on the Go with iphones and Android Phones MobileMeet is the cornerstone of on-the-go InterCall Reservationless- Plus meetings. Discover a full-circle
Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows
HomeBudget Anishu, Inc. Overview Data Import User Guide HomeBudget supports import of OFX/QFX 1,2 formatted financial transactions from bank and credit card accounts. There are two methods to import data:
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your
INDUSTRY OUTLOOK M AY 2 0 1 2 The Virtual Office: The Next-Generation Workplace INDUSTRY OUTLOOK 2012: THE VIRTUAL OFFICE Enabling mobile access to corporate applications drives workforce productivity,
Please quote as: Weiß, F. & Leimeister, J. M. (2014): Why can t I use my iphone at work?: managing consumerization of IT at a multi-national organization. In: Journal of Information Technology Teaching
The Hidden Truth Behind Shadow IT Six trends impacting your security posture An Executive Brief Sponsored by McAfee www.frost.com Stratecast Frost & Sullivan THE HIDDEN TRUTH BEHIND SHADOW IT Six trends
Making the Most Out of Facebook s Privacy Settings How to Configure Your Account s Privacy Settings Rik Ferguson, Vice President Security Research Making the Most Out of Facebooks Privacy Settings As a
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing