Deep Dive BYOD, COPE & MDM



Similar documents
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

[BRING YOUR OWN DEVICE POLICY]

AirWatch Solution Overview

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Mobile Device Management

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Mobile Device Management for CFAES

Symantec Mobile Management Suite

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Choosing an MDM Platform

CHOOSING AN MDM PLATFORM

How To Manage A Mobile Device Management (Mdm) Solution

Management of Multi-OS Smart Devices Made Simple.

Mobile Devices Policy

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

Cisco Mobile Collaboration Management Service

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

BEST PRACTICES IN BYOD

How To Write A Mobile Device Policy

Managing and Securing the Mobile Device Invasion IBM Corporation

Hands on, field experiences with BYOD. BYOD Seminar

How To Protect Your Endpoints From Being Stolen By A Cell Phone Or Other Device

Use of tablet devices in NHS environments: Good Practice Guideline

The Guide to Implementing a BYOD Policy at Your Company An ebook by Your Friends at UTG

Mobile Device Strategy

BYOD: End-to-End Security

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Bring Your Own Device (BYOD) and Mobile Device Management

Guideline on Safe BYOD Management

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

IBM Endpoint Manager for Mobile Devices

Management of Multi-OS Smart Devices Made Simple.

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Corporate-level device management for BlackBerry, ios and Android

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Cyber Self Assessment

Data Protection Act Bring your own device (BYOD)

ForeScout MDM Enterprise

Simplifying Desktop Mgmt With Novell ZENworks

( and how to fix them )

The ForeScout Difference

Windows Phone 8.1 in the Enterprise

A number of factors contribute to the diminished regard for security:

Device Independence - BYOD -

BYOD (Bring Your Own Device)

State of South Carolina Policy Guidance and Training

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BRING YOUR OWN DEVICE

Smart Givaudan. From BYOD experience to new mobile opportunities

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

When enterprise mobility strategies are discussed, security is usually one of the first topics

Manage Mobile Devices

Moving to the Cloud: What Every CIO Should Know

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EndUser Protection. Peter Skondro. Sophos

F G F O A A N N U A L C O N F E R E N C E

How To Protect Your Mobile Devices From Security Threats

Transcription:

Deep Dive BYOD, COPE & MDM

Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD = Corporate Owned Device Use of private data and applications on corporate owned devices is not wanted or even prohibited. The use of mobile devices is allowed solely for business purposes and the devices remain in the full ownership of the company. SYNERGY BYOD BYOD: Bring Your Own Device Permission for employees to use personally owned devices to perform official and personal tasks on their private device. Mobile device strategy which provides the biggest freedom to the enduser, but incorporates the highest amount of risks at the same time. COPE COPE: Corporate-Owned, Personally-Enabled The usage of corporate devices for personal tasks (e.g. installing preferred apps etc.) is allowed to employees. Security software which is automatically and equally installed by the company on all COPE devices enables a smooth device management and minimizes security risks. 2

Deep Dive BYOD, COPE and COD Advantages and disadvantages of BYOD, COPE and COD from a company`s point of view. COD BYOD COPE Devices host corporate data, mainly in a homogeneous way. Data maintenance, data restriction and data protection can therefore be guaranteed easily by mobile device administrators. Device costs remain at the company. Employees may feel not comfortable with the provided device. This might shorten productivity. Company`s image might be considered as not up to date. Company has to buy fewer devices (>reduced CAPEX) with the worker paying for most, companies save app. $80 per month per user. Employees become more productive if they are using devices they like and feel comfortable with. Security: Network is exposed to security risks and data might easily be accessed by untrusted parties in case of loss of the device. Complexity of new device models makes it very difficult to maintain technological capabilities. Causes efforts in release-mgmt. due to high dependency to OS providers and heterogeneous landscape Infrastructure might be not sufficient when using multiple devices at the same time. Potential conflicts with worker`s council regarding compensation 3 Detecon Company reserves the right to wipe devices or disconnect devices of the corporate network if necessary (e.g. as in case of a security breach) in order to keep the company`s network and information secure. Companies can install management software, apply patches and enroll devices in MDM systems more easily under COPE than under BYOD. Number of supported devices is determined by the company. As a result device management becomes more transparent and easier to handle. Allows employees to use corporate devices for personal tasks (e.g. by installing preferred apps etc). that may cause security risks. Device costs remain at the company.

Deep Dive BYOD, COPE and COD The trend for the highest levels of BYOD in high growth markets continues, while some of the lowest rates are seen in mature, western markets. % respondents who BYOD 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 2012 2013 2014 Source Ovum: Employee Mobility Survey 2012 (N=4,038), 2013 (N=4,371) 2014 (N=5,187) 4 Global average rate of BYOD in 2014: 68.6% The rate of BYOD behavior is increasing across every geography, with Sweden the only country where it is down on 2012. Allocation of BYOD / COPE and COD usage has not yet been researched therefore the percentage of distribution cannot be represented.

Deep Dive BYOD, COPE and COD Overview of stumbling blocks while implementing a mobile device strategy. 1 Appropriate policies and systems should be implemented e.g. by defining a set of approved smartphones. These devices should be secured and managed appropriately, possibly with the addition of third-party software (see MDM slide). 2 Invests in IT infrastructure e.g. in fast network infrastructure with an appropriate bandwidth ensure the connection of several mobile devices / systems to connect wirelessly 3 4 5 A secure network is the base for BYOD/COPE strategies. Antivirus, spam software and the implementation of VPN allow secure access and transmission of data for staff that wish to use company servers remotely. Moreover the implementation of a Mobile Device Management is an essential need to maintain security within the company`s network. A clear user policy is essential to avoid litigation arising from compromised access of personal information especially by former employees. The policy should e.g. specify the internet sites that the employees have/do not have access to. Privacy and legal concerns should be stated clearly: Employees should be made aware that all the data (also private) that is stored on their devices, could be deleted if the device is stolen or if the employee leaves the organization. 5 Detecon

Deep Dive BYOD,. COPE and COD Mobile device management (MDM) allows companies to control and secure access to smartphones and tablets centrally - this is essential in case of BYOD / COPE strategy Benefits Mode of operation MDM ensures to secure, monitor, manage and support mobile devices, involving remote distribution of applications, data and configuration settings for all types of mobile devices centrally Manage apps Erase content of a mobile device Business security risks can be lowered by using MDM (e.g. by locking remotely mobile devices or completely erase sensitive company data from a stolen / lost mobile device MDM enables the management of apps: apps can be deployed, blocked or removed. This reduces the risk of dangerous mobile malware MDM allows the tracking of asset-related metrics e.g., device status, installed apps, utilization, etc., and expense management reports MDM realizes an unified, secured mobile network within a company Suppliers 6 Deploy updates Configure mobiles devices Report on assets and compliance Detecon

Deep Dive BYOD,. COPE and COD Advantages and recommendations of mobile device management software. 1 Reduce platforms: Helps to reduce deployment and operation costs. The MDM platform meets deployment complexities, security requirements and mobile growth within a single platform. Administrators have the ability to easily manage devices across the whole company. 2 Choose the right applications: Helps to focus on services that are really needed for the appropriate business services. Administrators can easily and individually configure policies that enable a dynamic application management or disable access if a device is compromised or noncompliant 3 Focus on release and lifecycle-management: Retiring outdated services based on a scheduled planning. By using MDM the company also benefits from service level guarantees, including uptime, backup and disaster recovery for business continuity without redundant installations 4 Ensures security on mobile devices by creating and managing granular level security policies for individuals, groups, devices, context, and location based on role or work style. 5 CONCLUSION: Cost savings, secured devices, remote service, software standardization (forced update policy), centralized administration.