CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville Regional Airport Authority Vanessa Hickman, Vice President & CIO, Metropolitan Nashville Airport Authority John Newsome, Director IT, Greater Orlando Aviation Authority Brice Callison, Mobile Solutions Architect, Dell Services Best Practices & Business Processes
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage 2007.. www.aci-na.org 2
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage 2007.. First iphone released www.aci-na.org 3
Bring Your Own Anything (BYOA) Royce Holden, MBA-TM, CISSP Director of Information Technology Greater Asheville Regional Airport Authority rholden@flyavl.com @royceholden
The Business Problem How to obtain Always on, reliable access to airport systems and devices from Any Device? Perception of always connected staff Staff s reliance on mobile devices Ability to work from anywhere Consumerization of IT Blurred Lines (Organization Oriented) The CEO Can use whatever they want Types of Systems and Services Where should you start? State of North Carolina Bring Your Own Device Policy State of North Carolina Cloud Computing Strategy Personally Identifiable and confidential information Short Term: Protect data at device level Long Term: Protect data, no matter where it resides http://www.computing.co.uk/ctg/feature/2303720/bring-your-own-lawyer-the-legal-perils-of-byod
The Business Solution Policy in Place? Training in Place? Ideas on which Systems and Services are going to be in Place? IT Staff and SLA s in Place? Now, focus on Security and Productivity VDI Virtual Desktop Interface Enterprise Mobility Management End Point & Network Security Identity Management Malware & AV Support Single Sign On Split Tunneling Graphic: http://www.free-power-point-templates.com/articles/bring-your-own-device-trend-in-companies/
Cloud File Storage Experiences @ MNAA Presented by Vanessa Hickman VP & CIO ACI NA Business Information Technology Conference March 25, 2015 www.flynashville.com
The Business Problem...Automate Board Documents Allow remote access by board of directors Solution: Provide a tool to support 25 users: Board of Directors Senior Staff Easy to use with little to no training Publish to central location www.flynashville.com
Unintended Consequences solved with Dropbox for Business Dropbox use expanded to 75 users across organization * Initial purchase: 100 user licenses; annual subscription Security & governance of corporate assets * Single Sign-on * Remote wipe * Audit logs & sharing controls Integration with Windows Explorer or access via browser Access data on multiple platforms; both on-line and off-line Unlimited capacity for business account; also increased capacity of personal Dropbox Users can maintain personal Dropbox separately from business Dropbox account Support is responsive and readily accessible www.flynashville.com
Bring Your Own Device Orlando International Airport John Newsome - Director of Information Technology Greater Orlando Aviation Authority 10
BYOD Business Drivers 1. Business need for ever more smart mobile devices 2. Business decision to permit one combined business / personal device for personnel convenience (i.e., one versus two devices). 3. Business decision to permit personnel to select a device of their preference to improve efficiencies.and 4. Business decision to require personnel to own the device to shift support from internal IT to the carrier of preference. 5. Business need for data leak prevention and malware protection for the business partition.and ensure business email (and latter text messages) are retained in accord with public record regulations and laws. 11
BYOD Lessons Learned 1. MDMs were immature at the time (2012): a. Could not ensure performance across multiple vendor devices and frequent OS revisions b. Could no prevent documents from being moved from one partition to another (e.g., email attachments) c. Text messages could not be captured and retained except on the Android OS and even then were carrier dependent. 2. Maintenance of an Application library was a more controversial and daunting effort than first anticipated 3. Personnel continued to come to IT to solve problems instead of the vendors / carriers. IT support increased rather than decreased. 4. Personnel became concerned / suspicious about the potential for eavesdropping, location tracking, etc. 5. The amount of the stipend was even controversial due to different capabilities needed for different users 12
Consumerization of Corporate IT: BYOD and Cloud-base File Storage Brice Callison Mobile Product Technologist Dell
User Fit Assessment App Inventory Discovery Map Users to Apps App Performance Needs by User High Level App Compatibility HW Inventory CPU & Utilization RAM Installed and Used Network Connections IOPS Maps to Users and Locations Identify Performance Needs Network Test Latency Network Capacity User Data Identify Where Stored ROI Define Expected ROI Prioritized User Groups and Technology Fit 360 Integration Design Applications Prioritize Apps to Optimize Schedule Software Licensing Plan Method(s) for Providing Apps Identify Application Migration needs User Workflow Analysis Hardware Validate Server, Storage and Networking sizing Identify Endpoint Form Factors Network & QOS Latency, Bandwidth, Wireless and/or Remote Access Evaluate DNS and DHCP User Access and Single Sign On Peripherals USB Storage Card Readers and RSA Tokens User Data User Data Access Data Security on Endpoint Identify Shared Data for Multiple Users Printing Printing from Mobile Devices Determining Closest Printer Bandwidth Utilization of Printing Local Printers Active Directory AD Assessment Design AD Container for DVS GPO Control Identify Synchronization Issues Design Application Groups Communications Email and Exchange VOIP/Lync Video Screen Sharing DVS Image Apps User Personality Disaster Recovery Infrastructure Readiness Plan User Image(s) Define Content Map Users to Images Process Changes Help Desk Support Lifecycle Image Management App Management Performance Monitoring Implement Infrastructure Applications Compatibility Testing App Virtualization Implement App Layering Technology Design Custom Mobility Apps Build Custom Mobility Apps Application Migration Hardware Deploy Servers and Storage Network Implement Plan User State Engineer Data Migration Solution Engineer OS and App Settings Customization Active Directory Implement Plan DVS Software Hypervisor Connection Broker Load Sharing Web Access Mobile Access Functioning Client Virtualization Environment Deployment Planning Applications Track App Readiness Client Devices Replace or Refresh Peripherals and Special Requirements Deployment Schedule Migration and Deployment T-30 T-20 T-15 T-10 T-5 T-2 T0 T+5 Site Survey Printing Implement Plan User Comms T-Minus Site and User Readiness Plan Target PCs Communications Implement Plan Peripherals Implement Plan User Image(s) Build Image(s) Application Delivery Disaster Recovery App list Complete Schedule migration Final check Process Changes Develop Support Desk Changes and Train Develop and Implement Lifecycle Process Change Develop and implement Image Management Develop and Implement App Management Change Pilot Identify Pilot Users Define Pilot Success Criteria Define Pilot RollBack Deploy User Support Infrastructure Track Infrastructure Readiness DR Plan and Validation Scheduling Define T-Minus Plan Define Deployment Groups Define Settings and Apps for Each PC Change Management Communication User Training Support Desk Build Schedule Identify Tech & PM Resources Device Readiness Reports Site or User Group Schedule Schedule Rollout Replace Devices Where Needed Deploy Agents User Training Run Automated Migration Process User Switchover QA Test Post Migration Support
The same problem can be solved in different ways Configured device Image Container Application Container VDI receivers Browser
End users will only adopt tools they like Empower end users to use their evolving skills End users Productivity Privacy End users need productivity tools that work for them They want to use their personal devices Laptops/tablets Mobile devices They want privacy and data-wipe assurance IT 88% need remote access 66% use free file sharing tools
Agency owners will do anything to ensure productivity Agency owners Need productivity tools to deliver outcomes more quickly than IT can create them. Work around IT Agency owner IT Shadow IT Faster solutions Productivity tools BUT Security issues Integration complexity Extra cost $
Enterprise Mobility Management (EMM) Your devices, your users, your mobile strategy Complete, secure endpoint management Secure enterprise workspace on all devices Secure access to enterprise data Integrated console management User self-service Comprehensive mobile enablement Endpoint management Container management Smartphones Smartphones Tablets Tablets M2M Identity management Business apps and services you need Flexibility for future-proofing Laptops Desktops Laptops
Unified solution with common functions for all your devices EMM functions Systems, device, app and content management Secure access to corporate resources User self-service Endpoint management EMM Container management Real-time reporting and alerts
User experience same look and feel as an enterprise PC End users can: Run applications directly on their PC Login and start VPN and apps just like always Security controls to manage use of apps and data: Policies to protect Windows apps and data 20
Choose your own adventure Corporate-owned devices Personally-owned devices Corporate issued Corporate owned, personally enabled Choose your own (from enterprise-approved product list) Bring your own Most organizations have needs across these tiers
Future State Workspace Corporate network Corporate VPN and firewall VPN connector Secure access Public network Encrypted workspace separate from personal apps and data Corporate resources Corporate apps and data ABC Inc. Corporate Windows 7 Live PC DMZ Workspace management Application gateway Authentication, policy, player, and image updates 22 Active Directory Mgmt Platform Policies DLP controls Cut and paste Drag and drop BYOPC
Thank you
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Resources: www.brianmadden.com www.dell.com/emm http://blogs.intel.com/application-security/2013/12/16/api-managementanyway-you-want-it/?wapkw=enterprise+mobile+management http://www.intel.com/content/www/us/en/enterprise-mobility/learn-aboutenterprise-mobility-management.html?wapkw=enterprise+mobile+management www.aci-na.org 24