Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities



Similar documents
Chris Boykin VP of Professional Services

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

When enterprise mobility strategies are discussed, security is usually one of the first topics

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

BYOD(evice) without BYOI(nsecurity)

Tom Schauer TrustCC cell

Mobile Device Management for CFAES

Ben Hall Technical Pre-Sales Manager

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

MDM Mobile Device Management

Choosing an MDM Platform

Security and Compliance challenges in Mobile environment

Mobile Device Security Is there an app for that?

SANS Mobility/BYOD Security Survey

The Future of Mobile Device Management

M a as3 6 0 fo r M o bile D evice s

CHOOSING AN MDM PLATFORM

Access Your Cisco Smart Storage Remotely Via WebDAV

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Building a Mobile Information Management Strategy

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Five Steps to Android Readiness

Cisco Mobile Collaboration Management Service

Secure Mobile Solutions

Corporate-level device management for BlackBerry, ios and Android

Symantec Mobile Management Suite

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

What We Do: Simplify Enterprise Mobility

SANS Mobility/BYOD Security Survey

Guidance End User Devices Security Guidance: Apple ios 7

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Device Independence - BYOD -

ADDING STRONGER AUTHENTICATION for VPN Access Control

IT Self Service and BYOD Markku A Suistola

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Exchange ActiveSync (EAS)

Case Study Cloud Computing

Good Technology Mid-Market Mobility Trends Survey. August 2014

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Securing Office 365 with MobileIron

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

IT Resource Management & Mobile Data Protection vs. User Empowerment

The Maximum Security Marriage:

Athena Mobile Device Management from Symantec

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Secure Your Mobile Device Access with Cisco BYOD Solutions

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Architecture of Enterprise Mobile Apps

GlobalProtect Configuration for IPsec Client on Apple ios Devices

The ForeScout Difference

Guideline on Safe BYOD Management

The 9 Pillars of Enterprise Mobility

Webfusion Hosted Exchange 2010

Empowering Students with Mobility and BYOD Technology

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Total Enterprise Mobility

The flexible workplace: Unlocking value in the bring your own device era

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

How To Make A Cloud Based Computer System Work For You

Generating leads with Meraki's Systems Manager. Partner Training"

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Symantec Mobile Management 7.1

Samsung Mobile Security

Transcription:

Smart Devices @ Givaudan From BYOD experience to new mobile opportunities

2 Givaudan

What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials generation Access personal applications @work Access corporate applications @home Anywhere Anytime from Any Device Who decides user or corporate IT? Devices Applications Security 3

Drivers For Change Smartphones landscape in the US Multi-devices trend + smart devices proliferation Demands of company provided/supported tablets Upcoming mobile applications 4

Now what? A short terms solution to our problems sort of 5

BYOD Challenges How to provide platform independent services? How to avoid interfering with personal apps and data? How to secure corporate data? Can we secure the full device? Can we wipe the device? Do we support personal devices?.. 6

Mobile Devices Situation 18 months ago 950 Blackberry smartphones Services: Email, calendar, contacts Chat Intranet Company provided Full end-user support Standard corporate service: BlackBerry 2011 - First experiment of BYOD service 380 users (volunteers) Email, calendar, contacts on iphone and ipad only Bring Your Own device (employee liable) User self support (+ forum) 7

Approach MDM platform implementation To support various devices Addition of Android to the BYOD service Follow quick market evolution Be ready for mobile app deployment Build foundation for an evolutive mobile services platform Find the right trade-off between security and user-experience In parallel, enhance mobile service with new features (Chat, VPN ) Provide courtesy wireless to corporate users for internet access only (reduce personal costs while in the office) MDM selection MobileIron Identified differentiators with competitors: Integration with device operating system (no sandbox approach) App deployment capabilities (Internal app store) Integrator in Switzerland (Nomasys) 8

Security Data device encryption embedded in the profile (ios) ActiveSync outgoing flow only Access to email/calendar/contacts windows credentials into device client Attachments no limitations Lock-code mandatory embedded into device profile loaded Internal approval process to access the service VPN required to access internal resources Only http and https Device identified through a certificate from PKI infrastructure Courtesy network filters through MAC@ for access Same web traffic filtering rules as corporate Wipe is authorised 9

High-Level Timeline BYOD ios only BYOD service based on MDM (ios +Android) Company provided multi-device catalogue MDM solution selection PoC Pilot Phase Service go- Live Satisfaction survey Corporate service preparation Corporate service deployment Multi-device corporate service Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 2011 2012 2013 today 10

Our BYOD Service Today Based on MobileIron solution 1600 active devices Voluntary enrolment ios & Android only Email, Calendar, Contacts + Chat VPN for ios (via MobileIron PKI device certificate) Security rules Mandatory screen-lock pin code Jailbroken/rooted devices not allowed Remote wipe in case of loss User self support (+ forum, getting started videos) Users must comply read and accept 11

Our BYOD Service Today Infrastructure and Security In-house managed redundant MDM platform infrastructure Employees BYOD internet access, but no access to internal resources End-User security rules same as corporate for web access Content and virus filtering Juniper VPN for ios (device certificate access control) Transparent launch No user authentication Corporate security rules VPN provides http/https limited access to resources 12

Satisfaction Survey August 2012 Participation: around 250 users (40% of the user population at that time) General satisfaction rate: All devices iphone/ipad users Android users 93% 96% 78% 13

What s next 2013: Multi-device corporate catalogue (but keep it simple) Including corporate tablets (ios only) Mobile apps in-house development Deployment via MobileIron app store Apps@Work Open network to more resources Allow devices into corporate network? Keep controlled access through VPN? 14

Open Questions Blackberry future Windows phone 8 success Any other mobile OS out there? Android as a secure business platform? BYOD with financial compensation to replace corporate smartphones? How to deal with the forthcoming general unavailability of feature phones Outsourced MDM solution? Increased attacks on mobile devices -> higher corporate and data leak risks? 15

16 Q&A