BYOD (Bring Your Own Device)
|
|
|
- Karin Knight
- 10 years ago
- Views:
Transcription
1 BYOD (Bring Your Own Device)
2 Agenda Set the scene BYOD raising many questions Structured & Integrated answers Belgacom Entreprise Mobility Belgacom Mobile Device Management Sensitivity : "Unrestricted", "Internal Use Only" or "Confidential" 12/20/2012 Slide 2
3 In this Hyper-connected World, How Connected are You? 75% of Americans with mobile phones use their phones in the bathroom! Source: 11markagency January 2012 In Commercial Confidence 20/12/2012 Slide 3 Source: 11markagency January 2012
4 Impact of Social Networks! In Commercial Confidence 20/12/2012 Slide 4
5 This is not only Happening Abroad! 21% of Belgians consider remote access and the ability to work remotely a Right, not a privilege (Cisco Northern Europe Workforce Survey, Mar 2012) 47% of Belgians think that a week without a Mobile Phone is worse than a week without sex! (Comeva, Oct 2011, The Digital Life of Belgians) In Commercial Confidence 20/12/2012 Slide 5
6 Bring Your Own Device Bring Your Own Device (BYOD) Describes the recent trend of employees bringing personally-owned mobile devices to their place of work, and using those devices to access privileged company resources such as , file servers, and databases (from anywhere (red).). Wikipedia Definition Connecting Extending Bring Your Own Apps (BYOA) Any IP-based device (M2M) Bring Your Own Technology (BYOT) In Commercial Confidence 20/12/2012 Slide 6
7 BYOD Raising many questions How do I onboard my users and their devices? What type of device should I accept or reject? Why should I accept BYOD in my company? Is my wireless network ready for new devices? What policies to apply on the devices? What type of support should I provide? How do Simplify monitoring & administration? BYOD? Which applications should be enabled on these devices? How to access the Corporate applications? What are the risks? Is my infrastructure secure enough? In Commercial Confidence 12/20/2012 Slide 7
8 Give structure to your questions Policies & Compliance Users & Devices Applications Networks Security BYOD policy Security policy Mobile policy Usage policy Policy per user Policy per device Business / private use Who is accessing what Which devices Which OS How many devices/users Which applications (private / professional) Accessible to whom Where does the data reside Type Capacity Availability Access Type of traffic QoS Access management Malware Loss/Theft of devices Data Loss Decommission How to mange? How to monitor? How to support? How to start? In Commercial Confidence 12/20/2012 Slide 8
9 A BYOD Project starts with Homework Audit the Existing Situation What are the Business Needs? Does Everyone in the organisation have the same need? What kind of information needs to be accessed? What kind of Application? What are the existing Policies? (Mobile, Security, BYOD, ) What are the existing used hardware, Oss, software,? Identify your organisation s Risk Profile Identify Who should be involved in the Project Extend the policies to support BYOD Decide what you will support and who will pay what Work on a Project plan to modify or adapt the infrastructure and organisation to support BYOD Communicate and Educate In Commercial Confidence 20/12/2012 Slide 9
10 Belgacom Entreprise Mobility Corporate Mobility Strategy Mobile Managed Servicing Mobile Devices Mobile Device Management Mobile Subscriptions Corporate Mobility Strategy (soft consultancy) Device choice Regulatory & compliance Application access Support Users funding Less >< More Limit >< Embrace /Calendar/PIM >< Business Apps Full >< User Executive >< All User >< Company
11 Mobile Device Lifecycle Mobile Managed Services Expense Management End of Life / Replacement Services Buy Logistics and fulfilment Alarms and Reports Inventory Mobile Device Management Application Deployment Device Configuration Security & Policy Enforcement
12 Belgacom Mobile Device Management Mobile device management enables a customer to secure, monitor, manage and supports mobile device remotely (over mobile data connection or wifi). Alarms and Reports End of Life / Replacement Services Expense Management Application Deployment Security & Policy Enforcement Buy Logistics and fulfilment Inventory Device Configuration Inventory Management integrated, real-time view of all mobile devices deployed, Remote Device Configuration Enables the configuration and update of device & applications over the air, Policy Management Implementation of Profiles & Policies, remotes set up of password,... Application deployment Enterprise app store White / Black list of application Security Remote device lock and wipe, GPS location, certificate,... Reporting Provides an extensive library of management reports and logs, multiple access and reporting levels, 12/20/2012 Slide 12 12
13 Belgacom MDM proposition MDM Consultancy Soft & Technical MDM Training MDM ICT Services MDM Licenses MDM Service Desk MDM Managed Service track, monitor & manage your mobile fleet (smartphones, tablets, ruggedized devices, mobile scanners & printers,..) 12/20/2012 Slide 13
14 Belgacom MDM solutions & Partners On-Premise EU SaaS Self-Service Managed
15 More Info? y/mobilemanagement/mobiledevicemanageme ntandprotection.asp
16 In Commercial Confidence 12/20/2012 Slide 16
Management of Multi-OS Smart Devices Made Simple.
Singtel Business Product Factsheet Managed Mobility Device Defense Manager Services Management of MultiOS Smart Devices Made Simple. A smart solution that enables companies to secure, control and manage
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security
EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
Bell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Device Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
Management of Multi-OS Smart Devices Made Simple.
Singtel Business Product Factsheet Managed Mobile Device Defense Manager Services Management of Multi-OS Smart Devices Made Simple. A smart solution that enables companies to secure, control and manage
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Mobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3
Simplifying Mobility Management WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management New solutions for the wireless world If you don t already have a mobility management strategy in
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
device management solutions
device management solutions devicemanagement Do you have a high number of geographically dispersed remote or field workers who use mobile devices? Do you need to monitor and track the devices and upload
AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
BRING YOUR OWN DEVICE
WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Secure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move [email protected] 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
How To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
Mobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. [email protected]. Co-Author Bitkom Leitfaden BYOD
BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland [email protected] CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf
The Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
Mobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Get Tough with Mobile Device Management
Get Tough with Mobile Device Management Franke Martinez Director, Regulated Industries SOTI Shwetank Bharati Director, OEM SOTI Doug Havemann Solutions Architect Panasonic SOTI is the Worlds Most Trusted
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
Mobility Solutions for Plant Personnel
Mobility Solutions for Plant Personnel ARC Forum Orlando, February 2014 Greg Gorbach Vice President ARC Advisory Group [email protected] Introduction Mobile Devices play a key role in industrial operations
Sophos Mobile Control
Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
Enterprise Mobility Management
SOTI MobiControl Enterprise Mobility Management MANAGE SUPPORT SECURE MONITOR TRACK SOTI Inc. is the world s most trusted provider of MDM solutions with over 12,000 enterprise deployments, managing millions
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy [email protected] The Mobile Service Line A commitment
Healthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation
Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation The Central Florida Chapter of The Florida Government Finance Officers Association 2/7/2014 K. Adam Glover,
Ben Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Enterprise Mobile Device Management
SOTI MobiControl Enterprise Mobile Device Management Manage Support Secure Monitor Track SOTI Inc., a leader in Enterprise Mobile Device Management for over 10 years, has sold millions of licenses to more
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s
#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
IT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
A framework for auditing mobile devices
A framework for auditing mobile devices Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. 2010 Baker Tilly Virchow Krause, LLP
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.
1 FUTURE FOCUS What s Coming in Enterprise Mobility Management Whitepaper 2 Future Focus: What s Coming in Enterprise Mobility Management (EMM) There s far more power in modern smartphones and tablets
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape
Office anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape Consumers adopting mobile RISKS Users Devices Apps Data Users
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Deep Dive BYOD, COPE & MDM
Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD
Radix Mobile Device Management (MDM) March 2015
Radix Mobile Device Management (MDM) March 2015 Worldwide, organizations operating in every field of activity are integrating hardware and software technology into their systems. Scenarios range from enterprises
Enterprise Mobility Management for Financial Sector
Enterprise Mobility Management for Financial Sector Conferința Ziarul Financiar: Scurgeri de informații, furt de date confidențiale, hackeri. Pot fi o realitate? Principalele riscuri de securitate și strategii
Easy, interoperable, high-definition video collaboration in the cloud
BSF AV Consulting Services 27 Burger Road, Midrand, South Africa [email protected] +27 71 423 4444 BSF AV Consulting Services are the leading Consultancy and Managed Services firm in Africa. Currently
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing
Enterprise Mobility Security Solution Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing WHAT IS ENTERPRISE MOBILITY MANAGEMENT Enterprise Mobility Management
Enterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
SysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Mobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
A CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist
Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report
CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT
CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT GETTING CONTROL OF MOBILITY IN THE MARKET In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business
Generating leads with Meraki's Systems Manager. Partner Training"
Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution
