CONSUMERIZATION OF IT BYOD and Cloud-based File Storage



Similar documents
Dell World Software User Forum 2013

AirWatch Solution Overview

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Dell Enterprise Mobility Management

Dell World Software User Forum 2013

End User Computing - Cloud Client Computing

The User is Evolving. July 12, 2011

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Desktop Virtualization. The back-end

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD)

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

IT Self Service and BYOD Markku A Suistola

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

What We Do: Simplify Enterprise Mobility

All your apps & data in the cloud, all in one place.

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

BYOD (Bring Your Own Device)

6 Things To Think About Before Implementing BYOD

Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies. Terry Lewis Solutions Architect

Embracing Complete BYOD Security with MDM and NAC

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Ancero Hosted Virtual Server (HVS) and Hosted Virtual Desktop (HVD) Service Guide

Symantec IT Management Suite 7.5 powered by Altiris

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Simplifying Desktop Mgmt With Novell ZENworks

Optimizing the Mobile Cloud Era Through Agility and Automation

Oracle Desktop Virtualization

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Citrix Desktop Virtualization Fast Track

Microsoft Windows Intune: Cloud-based solution

APRIL Must-Have Features for Endpoint Backup

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)

Welcome the world of Citrix - where Desktops, Apps and Data are following you, where ever you go

SA Series SSL VPN Virtual Appliances

Symantec Client Management Suite 7.5 powered by Altiris

VMware End User Computing Horizon Suite

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Citrix XenDesktop 5.6 Providing best TCO and TVO at once. Fabian Kienle Regional Sales Manager, Citrix Systems

How To Support Bring Your Own Device (Byod)

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Top Desktop Management Pain Points

How To Make Your Computer System More Secure And Secure

IBM United States Software Announcement , dated February 3, 2015

Debunking the Top 10 CloudHosted Virtual Desktop Myths

Mobile and BYOD Strategy

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Athena Mobile Device Management from Symantec

Enterprise Governance and Planning

Storgrid EFS Access all of your business information securely from any device

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Securing Enterprise Mobility for Greater Competitive Advantage

Kaseya IT Automation Framework

Enterprise Desktop Solutions: VMware View 4.5

Mobile device and application management. Speaker Name Date

Endpoint protection for physical and virtual desktops

CMB-207-1I Citrix Desktop Virtualization Fast Track

How to Turn the Promise of the Cloud into an Operational Reality

The increasing popularity of mobile devices is rapidly changing how and where we

Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization

Secure Your Mobile Device Access with Cisco BYOD Solutions

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Symantec Mobile Management 7.1

Top 10 Reasons why VDI is not a good solution for BYOD

activecho Driving Secure Enterprise File Sharing and Syncing

Howtomanage and protectend usersdata? Mati Raidma

605: Design and implement a desktop virtualization solution based on a mock scenario. Hands-on Lab Exercise Guide

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

Managing Enterprise Devices and Apps using System Center Configuration Manager

Symantec Mobile Management 7.1

IT Networking and Security

Endpoint protection for physical and virtual desktops

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

How To Make A Cloud Service Federation A Successful Business Model

Transcription:

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville Regional Airport Authority Vanessa Hickman, Vice President & CIO, Metropolitan Nashville Airport Authority John Newsome, Director IT, Greater Orlando Aviation Authority Brice Callison, Mobile Solutions Architect, Dell Services Best Practices & Business Processes

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage 2007.. www.aci-na.org 2

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage 2007.. First iphone released www.aci-na.org 3

Bring Your Own Anything (BYOA) Royce Holden, MBA-TM, CISSP Director of Information Technology Greater Asheville Regional Airport Authority rholden@flyavl.com @royceholden

The Business Problem How to obtain Always on, reliable access to airport systems and devices from Any Device? Perception of always connected staff Staff s reliance on mobile devices Ability to work from anywhere Consumerization of IT Blurred Lines (Organization Oriented) The CEO Can use whatever they want Types of Systems and Services Where should you start? State of North Carolina Bring Your Own Device Policy State of North Carolina Cloud Computing Strategy Personally Identifiable and confidential information Short Term: Protect data at device level Long Term: Protect data, no matter where it resides http://www.computing.co.uk/ctg/feature/2303720/bring-your-own-lawyer-the-legal-perils-of-byod

The Business Solution Policy in Place? Training in Place? Ideas on which Systems and Services are going to be in Place? IT Staff and SLA s in Place? Now, focus on Security and Productivity VDI Virtual Desktop Interface Enterprise Mobility Management End Point & Network Security Identity Management Malware & AV Support Single Sign On Split Tunneling Graphic: http://www.free-power-point-templates.com/articles/bring-your-own-device-trend-in-companies/

Cloud File Storage Experiences @ MNAA Presented by Vanessa Hickman VP & CIO ACI NA Business Information Technology Conference March 25, 2015 www.flynashville.com

The Business Problem...Automate Board Documents Allow remote access by board of directors Solution: Provide a tool to support 25 users: Board of Directors Senior Staff Easy to use with little to no training Publish to central location www.flynashville.com

Unintended Consequences solved with Dropbox for Business Dropbox use expanded to 75 users across organization * Initial purchase: 100 user licenses; annual subscription Security & governance of corporate assets * Single Sign-on * Remote wipe * Audit logs & sharing controls Integration with Windows Explorer or access via browser Access data on multiple platforms; both on-line and off-line Unlimited capacity for business account; also increased capacity of personal Dropbox Users can maintain personal Dropbox separately from business Dropbox account Support is responsive and readily accessible www.flynashville.com

Bring Your Own Device Orlando International Airport John Newsome - Director of Information Technology Greater Orlando Aviation Authority 10

BYOD Business Drivers 1. Business need for ever more smart mobile devices 2. Business decision to permit one combined business / personal device for personnel convenience (i.e., one versus two devices). 3. Business decision to permit personnel to select a device of their preference to improve efficiencies.and 4. Business decision to require personnel to own the device to shift support from internal IT to the carrier of preference. 5. Business need for data leak prevention and malware protection for the business partition.and ensure business email (and latter text messages) are retained in accord with public record regulations and laws. 11

BYOD Lessons Learned 1. MDMs were immature at the time (2012): a. Could not ensure performance across multiple vendor devices and frequent OS revisions b. Could no prevent documents from being moved from one partition to another (e.g., email attachments) c. Text messages could not be captured and retained except on the Android OS and even then were carrier dependent. 2. Maintenance of an Application library was a more controversial and daunting effort than first anticipated 3. Personnel continued to come to IT to solve problems instead of the vendors / carriers. IT support increased rather than decreased. 4. Personnel became concerned / suspicious about the potential for eavesdropping, location tracking, etc. 5. The amount of the stipend was even controversial due to different capabilities needed for different users 12

Consumerization of Corporate IT: BYOD and Cloud-base File Storage Brice Callison Mobile Product Technologist Dell

User Fit Assessment App Inventory Discovery Map Users to Apps App Performance Needs by User High Level App Compatibility HW Inventory CPU & Utilization RAM Installed and Used Network Connections IOPS Maps to Users and Locations Identify Performance Needs Network Test Latency Network Capacity User Data Identify Where Stored ROI Define Expected ROI Prioritized User Groups and Technology Fit 360 Integration Design Applications Prioritize Apps to Optimize Schedule Software Licensing Plan Method(s) for Providing Apps Identify Application Migration needs User Workflow Analysis Hardware Validate Server, Storage and Networking sizing Identify Endpoint Form Factors Network & QOS Latency, Bandwidth, Wireless and/or Remote Access Evaluate DNS and DHCP User Access and Single Sign On Peripherals USB Storage Card Readers and RSA Tokens User Data User Data Access Data Security on Endpoint Identify Shared Data for Multiple Users Printing Printing from Mobile Devices Determining Closest Printer Bandwidth Utilization of Printing Local Printers Active Directory AD Assessment Design AD Container for DVS GPO Control Identify Synchronization Issues Design Application Groups Communications Email and Exchange VOIP/Lync Video Screen Sharing DVS Image Apps User Personality Disaster Recovery Infrastructure Readiness Plan User Image(s) Define Content Map Users to Images Process Changes Help Desk Support Lifecycle Image Management App Management Performance Monitoring Implement Infrastructure Applications Compatibility Testing App Virtualization Implement App Layering Technology Design Custom Mobility Apps Build Custom Mobility Apps Application Migration Hardware Deploy Servers and Storage Network Implement Plan User State Engineer Data Migration Solution Engineer OS and App Settings Customization Active Directory Implement Plan DVS Software Hypervisor Connection Broker Load Sharing Web Access Mobile Access Functioning Client Virtualization Environment Deployment Planning Applications Track App Readiness Client Devices Replace or Refresh Peripherals and Special Requirements Deployment Schedule Migration and Deployment T-30 T-20 T-15 T-10 T-5 T-2 T0 T+5 Site Survey Printing Implement Plan User Comms T-Minus Site and User Readiness Plan Target PCs Communications Implement Plan Peripherals Implement Plan User Image(s) Build Image(s) Application Delivery Disaster Recovery App list Complete Schedule migration Final check Process Changes Develop Support Desk Changes and Train Develop and Implement Lifecycle Process Change Develop and implement Image Management Develop and Implement App Management Change Pilot Identify Pilot Users Define Pilot Success Criteria Define Pilot RollBack Deploy User Support Infrastructure Track Infrastructure Readiness DR Plan and Validation Scheduling Define T-Minus Plan Define Deployment Groups Define Settings and Apps for Each PC Change Management Communication User Training Support Desk Build Schedule Identify Tech & PM Resources Device Readiness Reports Site or User Group Schedule Schedule Rollout Replace Devices Where Needed Deploy Agents User Training Run Automated Migration Process User Switchover QA Test Post Migration Support

The same problem can be solved in different ways Configured device Image Container Application Container VDI receivers Browser

End users will only adopt tools they like Empower end users to use their evolving skills End users Productivity Privacy End users need productivity tools that work for them They want to use their personal devices Laptops/tablets Mobile devices They want privacy and data-wipe assurance IT 88% need remote access 66% use free file sharing tools

Agency owners will do anything to ensure productivity Agency owners Need productivity tools to deliver outcomes more quickly than IT can create them. Work around IT Agency owner IT Shadow IT Faster solutions Productivity tools BUT Security issues Integration complexity Extra cost $

Enterprise Mobility Management (EMM) Your devices, your users, your mobile strategy Complete, secure endpoint management Secure enterprise workspace on all devices Secure access to enterprise data Integrated console management User self-service Comprehensive mobile enablement Endpoint management Container management Smartphones Smartphones Tablets Tablets M2M Identity management Business apps and services you need Flexibility for future-proofing Laptops Desktops Laptops

Unified solution with common functions for all your devices EMM functions Systems, device, app and content management Secure access to corporate resources User self-service Endpoint management EMM Container management Real-time reporting and alerts

User experience same look and feel as an enterprise PC End users can: Run applications directly on their PC Login and start VPN and apps just like always Security controls to manage use of apps and data: Policies to protect Windows apps and data 20

Choose your own adventure Corporate-owned devices Personally-owned devices Corporate issued Corporate owned, personally enabled Choose your own (from enterprise-approved product list) Bring your own Most organizations have needs across these tiers

Future State Workspace Corporate network Corporate VPN and firewall VPN connector Secure access Public network Encrypted workspace separate from personal apps and data Corporate resources Corporate apps and data ABC Inc. Corporate Windows 7 Live PC DMZ Workspace management Application gateway Authentication, policy, player, and image updates 22 Active Directory Mgmt Platform Policies DLP controls Cut and paste Drag and drop BYOPC

Thank you

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Resources: www.brianmadden.com www.dell.com/emm http://blogs.intel.com/application-security/2013/12/16/api-managementanyway-you-want-it/?wapkw=enterprise+mobile+management http://www.intel.com/content/www/us/en/enterprise-mobility/learn-aboutenterprise-mobility-management.html?wapkw=enterprise+mobile+management www.aci-na.org 24