Size: px
Start display at page:

Download ""

Transcription

1

2 The IT Manager s Nightmare... Good morning, the board decided last night that we need to have ipads in order to do our work properly. Can you please have these set up for us by next Friday so that we can read the board minutes, oh, and I decided I couldn t wait, so here is mine so that you can get me connected today

3 Disruptive Technologies 1980 s The Microcomputer 1980 s The Network 1990 s Personal s The Web 2000 s Smart Phones 2010 s Mobile Computing Devices

4 Mobile Computing Security Challenges What ever happened to the network perimeter? Is that one of our devices? Is that really one of our users? Where is our data? No, I said it s our data, not your data Yes, I know that it s a clever app Who s in charge of things anyway?

5 Security Taxonomy Mobile Device Policy Mobile Device Security Encryption Security Management Internal Security Identity Management Perimeter Security Storage Security Physical Security

6 Best Practices for Policy Engage the business Understand their mobile computing requirements Survey your workforce Establish a corporate strategy based on requirement vs risk

7 Best Practices for Policy Establish levels of service Tier 1 Corporate owned devices PIM and business applications Tier 2 Corporate or user owned devices Lightly managed and supported (eg mail/calendar) Tier 3 User owned devices Web based access only Unsupported

8 Best Practices for Policy Reserve to right to manage ALL devices with access to corporate resources Includes connections to internal wireless LANs and connections to PC s. Require installation of your security profile on all devices as a condition of access.

9 Best Practices for Policy Isolate corporate data from private data Sandboxing Policy compliance Application publication (no data at rest)

10 Best Practices for Policy Enforce strong security controls Passwords Auto lock Remote wipe Certificates Encryption Enforced device policy

11 Best Practices for Policy Consider disabling device functions that conflict with business activities Camera App stores Cloud storage services YouTube Explicit content

12 Best Practices for Policy Enforce acceptable use policy Cover current and future devices everywhere access means wiping a device when the employee leaves the organisation... And that may include their own personal device if it has been used to access corporate systems.

13 Best Practices for Policy Determine how users with be provisioned with applications The use of app stores is fine with only a few users but can become unwieldy with many users Start with basic applications ( , collaboration, productivity) Layer on advanced applications

14 Best Practices for Policy Proactively monitor voice and data usage Implement ongoing recording of usage

15 Best Practices for Policy Require users to backup their own data If it s their information, they are responsible for it. Assert the right to wipe the device if it is lost or stolen Assert the right to wipe the device when the employee leaves

16 Best Practices for Policy Require users to understand and agree with policy Security policies don t belong in a book Publish policies for all users to read Review the policies annually See Mrs K afterwards if you don t know how to do this bit

17 Best Practices for Policy Address the ramifications of non compliance to policy Usage infractions Unauthorised application installation Inappropriate material Not reporting lost devices Excessive personal use

18 OK, So You ve Got Your New Toys, Now What? Learn to walk before you can fly! Implement a mobile device management system Establish a base device policy Enforce that policy

19 Device Policy #1 Enable Password Protection Require a PIN code after power on Require a PIN code after auto lock Minimum of 4 digits Preferably longer if the device supports it

20 Device Policy #2 Lock the Device Always enable autolock on mobile devices Keep the lock period to as short as possible

21 Device Policy #3 Enable Wiping Wipe on more than five invalid PIN code entries Remote wipe in the event of loss or theft Easily implemented in Exchange, Keriomail and BES Setup a lost device hotline Wipe devices prior to disposal

22 Device Policy #4 Turn on Device Encryption IOS4.x, 5.x All user data is automatically encrypted Android Information on removable media is not encrypted by default. Windows Mobile 7 Encryption not supported It's important to note that Windows Phone 7 (WP7) primarily was developed as a consumer device and not an enterprise device. Windows 8 Expected to be supported when it is released

23 Device Policy #5 Encrypt Data in Transit Enable SSL encryption Use digital certificates

24 Device Policy #6 Update Frequently Keep the operating system and applications up to date Enable auto update if available

25 Device Policy #7 Control Network Connections Disable network services if not required Wifi Bluetooth Infrared Restrict WiFi Connections to authorised networks

26 Device Policy #8 Install AntiVirus Software Install AntiVirus software wherever practical Controlled and scrutinised application release minimises the threat

27 Strategy Decisions: BYOD Bring Your Own Device Your data, their device, your risk Firmly establish a data centric security strategy before even considering a BYOD strategy

28 Strategy Decisions: Application Publication Model Securely publish applications to mobile devices from your data centre Removes data at rest risk Device agnostic approach Requires good data centre bandwidth Enabler for BYOD strategy

29 Going Full Circle?

30 Going Full Circle?

31 Conclusion Mobile devices/tablets are a game changing technology Successful (and secure) deployment requires an effective policy and an effective strategy

32 Tony Krzyzewski Kaon Technologies Ltd

LabTech Mobile Device Management Overview

LabTech Mobile Device Management Overview You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Save costs, deliver flexible working and manage the risks Gary Shipsey Managing Director 25 September 2014 Agenda Bring Your Own Device (BYOD) and your charity and how to avoid the

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology Policy Checklist Name of Policy: Purpose of Policy: Directorate responsible for Policy Name & Title of Author: Does this meet criteria of a Policy? Trade Union consultation? Equality Screened by: Date

More information

BYOD and Mobile Device Dependency

BYOD and Mobile Device Dependency BYOD and Mobile Device Dependency Thursday, November 8, 2012 Brian Thomas, CISA, CISSP & Shohn Trojacek, CISSP Brian Thomas, CISA, CISSP Partner, IT Advisory Services at Weaver Provides security, IT audit

More information

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD

More information

How to Practice Safely in an era of Cybercrime and Privacy Fears

How to Practice Safely in an era of Cybercrime and Privacy Fears How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,

More information

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client. DropBox vs SugarSync - File storage in the cloud 1 Dropbox There are a number of solutions emerging into the market, which provide users the ability to store files in the cloud, which provide a number

More information

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense Consumerization of IT Fast & disruptive Enables business Increases productivity It s Mine! THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

What Is BYOD? Challenges and Opportunities

What Is BYOD? Challenges and Opportunities Wor k s pac es Mobi l i t ysol ut i ons Bl uewi r esol ut i ons www. bl uewi r e. c o. uk What Is BYOD? Challenges and Opportunities What is BYOD How Secure is Your BYOD Environment? Bring your own device

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

BYOD: What s Your Strategy?

BYOD: What s Your Strategy? : What s Your Strategy? Eric Panknin IT Manager epanknin@dmj.com What is BYOD? Building a Strategy Policy Considerations Mobile Security Solution Implementation and Training Maintain Discussion and Experiences?

More information

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444 Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...

More information

2 0 1 4 F G F O A A N N U A L C O N F E R E N C E

2 0 1 4 F G F O A A N N U A L C O N F E R E N C E I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 raj.patel@plantemoran.com This presentation will discuss current threats faced by public institutions,

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1

How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1 How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1 How Do I Set Up My Office 365 Account On An iphone, ipad or ipod Touch?... 3 How Do I Remove My Office 365 Account From A

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet 5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet Sr. Sales Engineer 1 What we ll talk about What is BYOD? Mobile Revolution, the Post PC era? BYOD: What to consider 1. Users 2. Devices

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Implications of BYOD & the Cloud for Enterprises

Implications of BYOD & the Cloud for Enterprises Implications of BYOD & the Cloud for Enterprises Clive Longbottom, Service Director, Quocirca Ltd BYOD Bring your own device It s not just smartphones, tablets, etc There is also: BYOS (software) Generally

More information

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

Riding technology waves

Riding technology waves BT Assure Riding technology waves Making the bring your own device (BYOD) trend work for you Making the bring your own device (BYOD) trend work for you Your data is everywhere. It s on devices you own

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Securing your business mobility with confidence

Securing your business mobility with confidence Vodafone Global Enterprise Securing your business mobility with confidence White Paper Vodafone Global Enterprise Key concepts: Traditional behind the firewall security measures are not practical or sufficient

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors

Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors Policy Nr 109 Published 30-Jun-15 Page 1 of 5 Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors School Guidelines

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Keeping Data Safe When Using Mobile Devices

Keeping Data Safe When Using Mobile Devices Keeping Data Safe When Using Mobile Devices Saying yes to people who want to use smartphones and tablets, safe in the knowledge you can keep them secure By Ollie Hart, Head of Public Sector, UK&I Data,

More information

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines May 2013 Choosing a Mobile Device Had to pass FAA Device Security Hardware

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

BYOD in the Enterprise

BYOD in the Enterprise BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security whitepapers@contextis.co.uk October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile

Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile M. Asif Riaz, CISM, CISSP, CEH Agenda Users are demanding access to applications and services from wherever they are, whenever they

More information

Mobile Banking and Bring Your Own Device

Mobile Banking and Bring Your Own Device 2013 CliftonLarsonAllen LLP Mobile Banking and Bring Your Own Device Cyber Security Strategies for Information Technology Risk Management cliftonlarsonallen.com Our perspective CliftonLarsonAllen Started

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

BYOD and Mobile Device Management

BYOD and Mobile Device Management April 25, 2013 BYOD and Mobile Device Management Scott Bream Office of the CIO scott.bream@ofm.wa.gov Topics to be covered What is Bring Your Own Device?(BYOD) What is Mobile Device Management?(MDM) Policy

More information

Get Tough with Mobile Device Management

Get Tough with Mobile Device Management Get Tough with Mobile Device Management Franke Martinez Director, Regulated Industries SOTI Shwetank Bharati Director, OEM SOTI Doug Havemann Solutions Architect Panasonic SOTI is the Worlds Most Trusted

More information

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

(A trading company s staff, Ken, is opening the office s door)

(A trading company s staff, Ken, is opening the office s door) Information Security Animations Cloud Service Case Study (Script) First Set Setting: At a Trading Company (A trading company s staff, Ken, is opening the office s door) Ken: Boss, what happened? Mr. Chung:

More information

Back to the Future: Securing your Unwired Enterprise

Back to the Future: Securing your Unwired Enterprise Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

Mobility Impact on the Enterprise

Mobility Impact on the Enterprise BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device

More information

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11 Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about

More information

Small Business IT Basic Security Guide:

Small Business IT Basic Security Guide: Small Business IT Basic Security Guide: 20 Common-Sense Steps to Protect Your Network, Your Data, and Your Business Created by John Coleman Managing Director + Principal, 1123IT Version 1.1 (Fall 2014)

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Android for the Enterprise Ge#ng from Here to There

Android for the Enterprise Ge#ng from Here to There Android for the Ge#ng from Here to There 1 Overview addresses enterprise needs: security and device management. 2 Overview pla6orm server so4ware 3 Overview 4 Use cases 5 Use cases Loss Remediation Minimize

More information

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014 The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate

More information

Apple Configurator Settings for Deploying ios Devices

Apple Configurator Settings for Deploying ios Devices Apple Configurator Settings for Deploying ios Devices Apple Configurator Settings for Deploying ios Devices 1. Preference Settings Preferences in Configurator can be used to manage what happens when supervised

More information

Students Mobile Messaging Registration & Configuration

Students Mobile Messaging Registration & Configuration Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established

More information

BENEFITS OF MOBILE DEVICE MANAGEMENT

BENEFITS OF MOBILE DEVICE MANAGEMENT BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management

More information

Mobile Device Management ios Policies

Mobile Device Management ios Policies Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Hosted Desktop Services (HDS)

Hosted Desktop Services (HDS) Introducing Hosted Desktop Services (HDS) What is HDS (Hosted Desktop Services)? It s just like your normal computer except it is hosted in the cloud, meaning you can access it on practically all devices

More information

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of

More information

Bring Your Own Device (BYOD) for Staff and Visitors

Bring Your Own Device (BYOD) for Staff and Visitors Bring Your Own Device (BYOD) for Staff and Visitors Version 1.01 01.16 Created April 2015 Reviewed by Education and staffing Committee 21.01.16 Review Cycle Triennial Next review September 2019 Source

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where

More information

Security for the Road Warrior

Security for the Road Warrior Security for the Road Warrior Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Version 1.1 We are all mobile We all travel from home to campus or from

More information

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT

More information

Management Options ios

Management Options ios Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?

More information

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring

More information

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG

More information

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Securing Critical Corporate Data in a Mobile World

Securing Critical Corporate Data in a Mobile World Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...

More information

Safe-Guarding Client Information Basic Data Security Training for Lawyers

Safe-Guarding Client Information Basic Data Security Training for Lawyers Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes

More information

Mobile Device Management Delivering control and security. Multinational Solutions

Mobile Device Management Delivering control and security. Multinational Solutions Mobile Device Management Delivering control and security Multinational Solutions Control and security across your global device estate Maintaining visibility and control of a large number of devices across

More information

White Paper. Data Security. journeyapps.com

White Paper. Data Security. journeyapps.com White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management

More information

Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security

Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security An Opportunity To Revolutionize Business Wireless Systems Significant cost savings, enhanced security, streamlined

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree Cyber Security: Potential Threats Impacting Organizations January 10, 2015 Scott Petree Agenda 2 Data Security Trends Root Causes of Cyber Attacks How Can We Fix This? Secure Infrastructure User Awareness

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information