HDAA BYOD Workshops May 2013
|
|
|
- Erik Fisher
- 10 years ago
- Views:
Transcription
1 HDAA BYOD Workshops May 2013
2 Discussion Mobility Trends in Australia BYOD and Consumerisation of IT Implications Checklist 2
3 Macro Trends GEOGRAPHIES Asia Pacific fastest growing Smart Mobile Device market HARDWARE 3 devices per employee; expansion of form factors APPS Complex, native v HTML5, disposable POLICY & LEGALITY CULTURAL Not moving quickly enough to match technology The soft factors become significantly harder Tech Research Asia
4 Australian Mobility Device Trends 54% Smartphone penetration of Australian population (Source : emarketeer/harris Interactive, Feb 2013) Penetration of Australian population 18+ (Source : emarketeer/harris Interactive, Feb 2013) 64% 130% Mobile device penetration forecast of population in (Source: Gartner) Penetration of tablets by 2016 (Source : Telsyte) ~50%
5 Device, OS, Platform Fragmentation Q. Which Brand do you Consider to be most useful in your role? Apple/iOS Microsoft Android/Google Other Source: TRA Future of Work Report, May 2013, prelim data, n = 260 5
6 DISCUSSION TOPIC How does Mobility adversely impact service level management, incident handling, reporting, etc? Does BYOD also impacts applications and employee- usability? 6
7 Applications & Implications Strategy Apps Performance Costs Surprises Apps Maintenance Approach Disposable Apps Image source: elie.im, jezweb.com.au, 123rf.com
8 The Consumerization of IT Consumerization of IT is the growing tendency for new information technology to emerge first in the consumer market and then spread into business and government organizations. Wikipedia Devices OS Apps Ecosystem
9 Enterprise BYOD Assumptions Consumer tech is considered better Employees want to bring their own devices Consumerisation is the primary driver of a next generation workspace Employees want flexibility with anywhere, anytime access 9 Productivity and employee satisfaction are key outcomes
10 and yet 94% of organisationswill have formal BYOD policy in place by mid-2013 *1 IT support for company-owned smart phones and tablets in Australian organisationshas nearly doubled from the previous year. *2 Support for BYO devices has decreased compared to *2 52% of Australian IT and business decision-makers believe that employees who encounter trouble with their personal devices contact the IT department. *2 60% of employees say they are most likely to troubleshoot the problem themselves. 14% per cent say they will ask a friend. *2 Source : 1 Citrix 2011 BYOD Survey, Unisys Consumerisation of IT research Forrester
11 DISCUSSION TOPICS How are capacity and infrastructure planning for mobility conducted? Reactively or Proactively Does mobility make asset management and configuration more complex?` 11
12 Mobility & BYOD Implications Connectivity Defined Triple A(ny) where, time, how Usage Push Mail, Net Connectivity Real time, Synchronous Company Kit Provided Mine, mine, mine! Work Office desk Sometimes Workplace devices Task Defined Computing Multi OS, Device, Apps Security Corporate Complexity Within the boundaries Extended Architecture Company management On All Employee Devices & SW Some User Frustration
13 Support Across the Mobility Ecosystem ENDUSERS APPLICATIONS DEVICES CONNECTIVITY SECURITY MIDDLEWARE INFRASTRUCTURE 13 Source: IDC, 2012
14 Security : The Landscape MDM landscape is evolving from single OS to multi OS to MIM and MAM Containerisation provides an efficient approach to issues of personal data loss as a result of selective / total device wipe in a BYOD environment. Containerisation also prevents the deployment of unauthorised apps direct to phone eg. It is not possible to download directly from Google s play store Expect commoditisation around MDM solutions as vendors bundle into service provider plans Despite scare-mongering, security threat is real in potentia No. of Apps installed on smartphone : 41* By 2015 mobile apps outnumber PC apps 4: 1** Look to certification credentials 14 * **
15 Security : The Internal Checklist Risk vs. Reward? What s your risk profile? Who pays for mobility plans and / or hardware? Who pays if devices are lost / stolen at work? Who provides support for devices / company data? What applications are permitted / outlawed? Will employees agree to encryption of company data; monitoring of device and remote wipe if lost/stolen/leaving? Will employees agree to device monitoring to detect suspicious risk activity such as jail breaking? Start to create functional profiling of users based on mobile work style requirements 15
16 Legalities & Policies Data security policy must : Determine WHO has access to WHAT and HOW Risk profiles and employee role profiles need to be determined Provide for management of devices and access BYOD policy needs to: Define cost responsibilities Provide for minimisation of data & IP loss Ensure data security Provision for the management of liability and risk Ensure compliance both legal and 3 rd party Image Source : Tech Research Asia
17 Legalities & Policies Discovery considerations In many countries, documents are defined as electronic data Discovery typically applies to all relevant company documents even if held on personal devices Have ability to provision and manage for separate work and personal profiles and device usage BACK UP, BACK UP, BACK UP Liability considerations How is this apportioned between company and employee? Who is responsible for licensing? Device lost, stolen, infected? Tech Research Asia
18 Checklist #1 Does your mobility strategy focus on both Internal and External goals? Does your company IT architecture support a Triple A operational approach? Does your architecture support multi-os, multi-device environment? Does policy incorporate legal, HR, IT and line of business operations? Establish clear metrics, goals and objectives. Does your App strategy reflect native, HTML5, hybrid? Image Source :
19 Checklist #2 Define where/when personal devices can be used for work. Define minimum specs- OS/HW/Apps Define who pays for support of the personal device. Define what ISN T supported or paid for by company. Define security policies, levels of permissible data access, lost/stolen devices, employee departures Image source : visualfunhouse.com
20 [email protected] Web : 20
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
When Computers really become Personal
When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
Mobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices
ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices The Landscape of IT Services Provision is Changing! Customers and users are demanding a higher level of customer service
Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.
Managing Mobile: BYOD, MDM, MAM, and more acronyms John H Sawyer Senior Security Analyst InGuardians, Inc. Who Am I? InGuardians Senior Security Analyst Penetration Testing Web, Network, Smart Grid, Mobile,
Working anytime anywhere
1 28/11/2014 Working anytime anywhere Future Workplace 3 28/11/2014 Future Workplace 4 28/11/2014 Future Workplace 5 28/11/2014 Future Workplace 6 28/11/2014 Future Workplace 7 28/11/2014 Future Workplace
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Mobility Challenges & Trends The Financial Services Point Of View
Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions
W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored
Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy
A Custom Technology Adoption Profile Commissioned By Sybase/SAP Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy July 2012 Forrester Surveys Show Surging Demand For Consumerization
The Evolution of the Service Desk: White Paper
The Evolution of the Service Desk: White Paper September 2012 Neil Penny Product Marketing Manager Sunrise Software The Evolution of the Service Desk Synopsis Gartner analysts are predicting that by the
DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions
DRIVING ENTERPRISE MOBILITY Enterprise Mobility Solutions from Computacenter CONTENTS 03 04 05 06 09 10 The Growth of Mobility Seizing Opportunities Overcoming Adversity Computacenter Mobility Solutions
Global Mobile Device Management (MDM) Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3238411/ Global Mobile Device Management (MDM) Market 2015-2019 Description: About MDM MDM (mobile device management) is a tool
MAM + MDM = BMS. (Bada$$ Mobile Strategy)
MAM + MDM = BMS (Bada$$ Mobile Strategy) Table of Contents 3 Introduction 4 What is Mobile Device Management? 5 What is Mobile Application Management? 6 Why Should You Use Both MDM and MAM? 7 MAM Lifecycle
trends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM
ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which
Security and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]
10/10. Fortescue Metals Group VDI Case Study. The Dashboard. Overview. Key Findings. Recommendations
1 Fortescue Metals Group VDI Case Study By Trevor Clarke, Lead Analyst Asia Pacific Overview This Tech Research Asia end user case study analyses the adoption of a Citrix virtual desktop infrastructure
Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing
Enterprise Mobility Security Solution Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing WHAT IS ENTERPRISE MOBILITY MANAGEMENT Enterprise Mobility Management
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
Mobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities
Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials
The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014
The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate
The flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Solving the BYOD and Enterprise Mobility Puzzle
WHITE PAPER Solving the BYOD and Enterprise Mobility Puzzle Sponsored by: AT&T Stacy K. Crook August 2015 THE GROWING COMPLEXITY OF MANAGING ENTERPRISE MOBILITY Trends such as consumerization and mobility
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
Enterprise Mobility How the mobile world drives business
Enterprise Mobility How the mobile world drives business Enterprise Mobility How the mobile world drives business white paper 1 Executive summary More and more employees carry their own smartphone into
Five Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
Productive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
Architecture of Enterprise Mobile Apps
Architecture of Enterprise Mobile Apps November 22, 2011 Sergey Zabaluev http://mobile.ctco.eu Setting the context Business trends need for speed and agility Highly competitive, global marketplace Increasing
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape
Office anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape Consumers adopting mobile RISKS Users Devices Apps Data Users
VMware End User Computing Horizon Suite
VMware End User Computing Horizon Suite Luc Gallet [email protected] 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work
2011 Forrester Research, Inc. Reproduction Prohibited
1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile
SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps
September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change
Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Addressing the BYOD Challenge with Okta Mobility Management Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Executive Summary The Impact of BYOD BYOD can be a very polarizing
IT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
EMPOWERING THE DYNAMIC WORKPLACE
EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
BRING YOUR OWN DEVICE
WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Smartphones and ipads: mobility blessing or technology support curse?
Smartphones and ipads: mobility blessing or technology support curse? harris.com Smartphones and ipads: mobility blessing or technology support curse? An ipad and a smartphone walk into a building and
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Mobile Madness or BYOD Security?
Mobile Madness or BYOD Security? How to take control of your mobile devices By Barbara Hudson, Senior Product Marketing Manager The Bring Your Own Device paradigm has rapidly moved from novelty to near
WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013
WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Kaseya White Paper. Managing the Complexity of Today s Hybrid IT Environments
Kaseya White Paper Managing the Complexity of Today s Hybrid IT Environments There are many factors driving the increasing complexity of IT today. The rapid adoption of cloud computing, big data and mobile
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
