Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities



Similar documents
Chris Boykin VP of Professional Services

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

When enterprise mobility strategies are discussed, security is usually one of the first topics

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

BYOD(evice) without BYOI(nsecurity)

Tom Schauer TrustCC cell

Mobile Device Management

SECURING TODAY S MOBILE WORKFORCE

Mobile Device Management for CFAES

Ben Hall Technical Pre-Sales Manager

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

MDM Mobile Device Management

Peace of mind across all your mobile devices

Choosing an MDM Platform

Security and Compliance challenges in Mobile environment

Mobile Device Security Is there an app for that?

SANS Mobility/BYOD Security Survey

BYOD & Virtualization: Managing Mobile

The Future of Mobile Device Management

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

M a as3 6 0 fo r M o bile D evice s

CHOOSING AN MDM PLATFORM

Access Your Cisco Smart Storage Remotely Via WebDAV

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Mobile Security: The good, the bad, the way forward

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Building a Mobile Information Management Strategy

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

Five Steps to Android Readiness

Tuesday, June 5, 12. Mobile Device Usage

Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices

Cisco Mobile Collaboration Management Service

Mobile Encrypted Messaging: A Perfect Complement to MDM

Secure Mobile Solutions

Enterprise on the Go. How enterprises can leverage mobile apps

Corporate-level device management for BlackBerry, ios and Android

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Symantec Mobile Management Suite

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

What We Do: Simplify Enterprise Mobility

SANS Mobility/BYOD Security Survey

Guidance End User Devices Security Guidance: Apple ios 7

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Device Independence - BYOD -

ADDING STRONGER AUTHENTICATION for VPN Access Control

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer

BEST PRACTICES IN BYOD

IT Self Service and BYOD Markku A Suistola

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Exchange ActiveSync (EAS)

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo.

Case Study Cloud Computing

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

Good Technology Mid-Market Mobility Trends Survey. August 2014

Enterprise Security with mobilecho

The Holistic Guide to BYOD in Your Business Jazib Frahim

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Securing Office 365 with MobileIron

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

ipad in Business The Top Considerations

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones)

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

IT Resource Management & Mobile Data Protection vs. User Empowerment

The Maximum Security Marriage:

Athena Mobile Device Management from Symantec

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Secure Your Mobile Device Access with Cisco BYOD Solutions

The New Workplace: Supporting Bring your own

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Mobility Security and. Nigel Hawthorn EMEA Marketing Director

Architecture of Enterprise Mobile Apps

Mac in the Enterprise

GlobalProtect Configuration for IPsec Client on Apple ios Devices

The ForeScout Difference

Guideline on Safe BYOD Management

The 9 Pillars of Enterprise Mobility

Webfusion Hosted Exchange 2010

Empowering Students with Mobility and BYOD Technology

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Total Enterprise Mobility

Blank Slide. For additional content

The flexible workplace: Unlocking value in the bring your own device era

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

How To Make A Cloud Based Computer System Work For You

Generating leads with Meraki's Systems Manager. Partner Training"

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Symantec Mobile Management 7.1

Samsung Mobile Security

Transcription:

Smart Devices @ Givaudan From BYOD experience to new mobile opportunities

2 Givaudan

What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials generation Access personal applications @work Access corporate applications @home Anywhere Anytime from Any Device Who decides user or corporate IT? Devices Applications Security 3

Drivers For Change Smartphones landscape in the US Multi-devices trend + smart devices proliferation Demands of company provided/supported tablets Upcoming mobile applications 4

Now what? A short terms solution to our problems sort of 5

BYOD Challenges How to provide platform independent services? How to avoid interfering with personal apps and data? How to secure corporate data? Can we secure the full device? Can we wipe the device? Do we support personal devices?.. 6

Mobile Devices Situation 18 months ago 950 Blackberry smartphones Services: Email, calendar, contacts Chat Intranet Company provided Full end-user support Standard corporate service: BlackBerry 2011 - First experiment of BYOD service 380 users (volunteers) Email, calendar, contacts on iphone and ipad only Bring Your Own device (employee liable) User self support (+ forum) 7

Approach MDM platform implementation To support various devices Addition of Android to the BYOD service Follow quick market evolution Be ready for mobile app deployment Build foundation for an evolutive mobile services platform Find the right trade-off between security and user-experience In parallel, enhance mobile service with new features (Chat, VPN ) Provide courtesy wireless to corporate users for internet access only (reduce personal costs while in the office) MDM selection MobileIron Identified differentiators with competitors: Integration with device operating system (no sandbox approach) App deployment capabilities (Internal app store) Integrator in Switzerland (Nomasys) 8

Security Data device encryption embedded in the profile (ios) ActiveSync outgoing flow only Access to email/calendar/contacts windows credentials into device client Attachments no limitations Lock-code mandatory embedded into device profile loaded Internal approval process to access the service VPN required to access internal resources Only http and https Device identified through a certificate from PKI infrastructure Courtesy network filters through MAC@ for access Same web traffic filtering rules as corporate Wipe is authorised 9

High-Level Timeline BYOD ios only BYOD service based on MDM (ios +Android) Company provided multi-device catalogue MDM solution selection PoC Pilot Phase Service go- Live Satisfaction survey Corporate service preparation Corporate service deployment Multi-device corporate service Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 2011 2012 2013 today 10

Our BYOD Service Today Based on MobileIron solution 1600 active devices Voluntary enrolment ios & Android only Email, Calendar, Contacts + Chat VPN for ios (via MobileIron PKI device certificate) Security rules Mandatory screen-lock pin code Jailbroken/rooted devices not allowed Remote wipe in case of loss User self support (+ forum, getting started videos) Users must comply read and accept 11

Our BYOD Service Today Infrastructure and Security In-house managed redundant MDM platform infrastructure Employees BYOD internet access, but no access to internal resources End-User security rules same as corporate for web access Content and virus filtering Juniper VPN for ios (device certificate access control) Transparent launch No user authentication Corporate security rules VPN provides http/https limited access to resources 12

Satisfaction Survey August 2012 Participation: around 250 users (40% of the user population at that time) General satisfaction rate: All devices iphone/ipad users Android users 93% 96% 78% 13

What s next 2013: Multi-device corporate catalogue (but keep it simple) Including corporate tablets (ios only) Mobile apps in-house development Deployment via MobileIron app store Apps@Work Open network to more resources Allow devices into corporate network? Keep controlled access through VPN? 14

Open Questions Blackberry future Windows phone 8 success Any other mobile OS out there? Android as a secure business platform? BYOD with financial compensation to replace corporate smartphones? How to deal with the forthcoming general unavailability of feature phones Outsourced MDM solution? Increased attacks on mobile devices -> higher corporate and data leak risks? 15

16 Q&A