Managing Personal Devices in the Enterprise



From this document you will learn the answers to the following questions:

Is developing a strategy for managing and securing employees personal owned mobile devices no longer avoidable?

Who is now able to use personal devices to access corporate email?

Similar documents
Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise PRODUCT BROCHURE.

Symantec Mobile Management 7.2

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.2

Five Strategies Small and Medium Enterprises Can Use to Successfully Implement High Value Business Mobility

Mobility Advantage: Becoming an Unwired Enterprise

What We Do: Simplify Enterprise Mobility

Symantec Mobile Management Suite

Sybase Unwired Platform 2.0

Enabling Strategic Deployments With. A Mobility Platform

The Maximum Security Marriage:

Choosing an MDM Platform

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

SECURING TODAY S MOBILE WORKFORCE

You will need your District Google Mail username (e.g. and password to complete the activation process.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

CHOOSING AN MDM PLATFORM

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Sybase Unwired Platform 2.1.x

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

ManageEngine ServiceDesk Plus - MSP Training Agenda

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

How To Manage A Mobile Device Management (Mdm) Solution

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Bell Mobile Device Management (MDM)

Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation

Mobile Device Management and Security Glossary

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

IBM Endpoint Manager for Mobile Devices

5 Things You Need to Know About ipad in the Enterprise

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Kony Mobile Application Management (MAM)

An Oracle White Paper December Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication

Sophos Mobile Control User guide for Android

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Workplace-as-a-Service BYOD Management

Chris Boykin VP of Professional Services

Harnessing the power of Google Apps

Kaspersky Security for Mobile

The User is Evolving. July 12, 2011

SQL Anywhere New Features Summary

Cisco Mobile Collaboration Management Service

Mobile Device Management for CFAES

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device

Feature List for Kaspersky Security for Mobile

MOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

McAfee Enterprise Mobility Management

EMBRACING SECURE BYOD

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

How To Secure Your Mobile Devices

STRONGER AUTHENTICATION for CA SiteMinder

Samsung Mobile Security

Sophos Mobile Control User guide for Android. Product version: 4

ZENPRISE ADDS SMARTPHONE REMOTE CONTROL CAPABILITIES TO ITS MOBILE MANAGEMENT SUITE

Android support for Microsoft Exchange in pure Google devices

BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015

Technical Note. ForeScout MDM Data Security

Copyright 2013, 3CX Ltd.

Securing Enterprise Mobility for Greater Competitive Advantage

Ensuring the security of your mobile business intelligence

Simplify SSL Certificate Management Across the Enterprise

Why Digital Certificates Are Essential for Managing Mobile Devices

BEST PRACTICES IN BYOD

Secure, Centralized, Simple

IBM MobileFirst Managed Mobility

Harness the Power of Analytics Across Lines of Business with Speed and Ease

CA Technologies Empowers Employees with Better Access to Applications via OneAccess Mobile App

Five Answers to Top BYOD Challenges

Sophos Mobile Control user help. Product version: 6.1

Mobility Manager 9.5. Users Guide

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

WHITE PAPER SPON. Achieving Rapid Payback With Mobile Device Management. Published November An Osterman Research White Paper.

Exchange 2010 ActiveSync: Connection

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Device Independence - BYOD -

Integrating F5 Application Delivery Solutions with VMware View 4.5

The Oracle Mobile Security Suite: Secure Adoption of BYOD

Sophos Mobile Control Technical guide

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Employee Active Directory Self-Service Quick Setup Guide

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Mobile Device Management

Mobile Application Management

"Secure insight, anytime, anywhere."

Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst

The Convergence of IT Operations

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011

Trust Digital Best Practices

IT Self Service and BYOD Markku A Suistola

The New Workplace: Supporting Bring your own

IT Enterprise Services

Why NetDimensions Learning

Transcription:

WHITE PAPER AN IT MANAGER S GUIDE TO Managing Personal Devices in the Enterprise

AN IT MANAGER S GUIDE TO MANAGING PERSONAL DEVICES IN THE ENTERPRISE Allowing personal smartphones does not have to be mob rule. Consider establishing these seven steps to creating a more secure and manageable mobile enterprise. Developing a strategy for managing and securing employees personally owned mobile devices is no longer avoidable. iphone and Google Android devices are joining BlackBerry, Symbian and Windows Mobile smartphones in the workplace, and their numbers are only going to increase in the coming months. Regardless of whether corporate policy allows mobile devices to access the corporate network, workers are still bringing them into the office. According to a recent Forrester Research report, almost half of U.S. and European businesses surveyed are embracing the notion of allowing personally owned devices access to a secure corporate network. One-quarter of businesses surveyed do provide full support to at least some personal devices, and another 21 percent provide at least limited support. What these companies are realizing is that if they allow employees with personally owned devices to access corporate email and other resources, these employees will be more productive. In addition, in today s economic times, enabling personal devices helps companies offload some of the cost because users are paying for these devices themselves. Corporate IT departments naturally are cautious about opening up the network and allowing full access to any device. IT needs control over how and under what circumstances mobile devices can access corporate systems. Finding just the right balance maintaining the integrity and security of the network while allowing easy access to the applications users need to be more productive will give organizations a competitive advantage in the coming years.

SETTING THE GROUND RULES IT can secure the network for mobile devices without endangering corporate assets. These seven best practices will help protect your environment and provide employees the flexibility to use their personal devices without compromising critical enterprise resources. 1. Discover mobile devices on the network. A good starting point for IT managers is to definitively identify who is accessing or trying to access the network. Frequently this can be accomplished by auditing existing systems such as your Exchange Server, Microsoft ISA logs and desktop/laptops for the presence of local synchronization software. If you don t think any mobile devices are on your network, consider this example. A large national retailer implemented Exchange server gating software from Sybase at its corporate headquarters, and within just a few days its IT department determined that the company had more than 1,000 unauthorized Windows Mobile, Palm, iphone, and Symbian devices on the corporate network. 2. Determine the back-office systems employees want to access. Every user shouldn t automatically get access to everything on the network not by a long shot. Take the time to survey your departments and employees to determine what they hope to gain from mobility. The trends towards personal devices are being driven by information workers, those employees who are often in the office or travel occasionally, and see mobile devices as productivity tools. Do these users simply need access to enterprise email and intranet sites, or do they want access specific applications? For example, you can provide sales reps with access to their sales applications, executives with access to sales dashboards and purchasing approval systems, while information workers only have access to enterprise email. 3. Formalize user types and set policies. Based on what you learned in step 2, evaluate users, create groups of users and determine governance policies for each group. These policies will define the like to have access and need to have access for each group of users. IT can set up management and security protocols that conform to those policies. Varying device management tasks and levels of security can also be applied to each group. 4. Get ready to take action. A good place to start implementing more security is to add a filter to control access to your backend systems. A filter is a piece of software that collects data and analyzes it so you can evaluate personal mobile devices coming into the network. One option is to monitor who is attempting access and to block access unless a management client is installed on the device. Sybase provides an Exchange ISAPI filter that can identify and deny access to back office email unless each device meets a predefined set of criteria.

5. Add password and encryption policies plus remote wipe capabilities at a minimum. The bare minimum to consider for securing personally-owned devices is password enforcement and on-device data encryption. Other critical areas include the ability to remotely wipe lost devices, as well as inventory management that identifies which devices are connected to the network at any given time. 6. Consider separating personal data from business data. One security strategy that many companies are adopting is a sandbox approach. This approach involves storing enterprise data, including email and applications, in a distinct area of the device, and encrypting and password protecting only that data. All other files, including personal music, videos, photos and so on, are available to the user without logging in to the device. 7. Enable users to be self-sufficient. Because most IT departments are spread very thin, the best strategy for making all of these adjustments to corporate policies is to keep things as simple as possible. Rather than adding another screen to the bank of displays that IT managers already need to look at for network status and the like, it makes sense to give users a measure of self-sufficiency to comply with company policy. For example, instead of flipping a switch and barring personal devices entirely, why not direct users to where they can download a management client application that will bring their device into compliance. This self-help policy frees IT staff from spending precious time tending to personal devices, and it helps keep the network secure. Sybase customer Baloise Insurance was faced with the challenge of personal devices coming to work. The company decided to install a self-service portal to enable users to locally set up and maintain corporate data on a variety of mobile devices including iphones and Windows Mobile devices. After implementing Sybase software, the company has cut the number of help desk calls in half, reduced engineering time and support and improved overall satisfaction and productivity of end users.

SYBASE MAKES THE MOBILE DELIVERY For all of the best practices discussed, IT managers can confidently turn to Sybase and its range of enterprise mobility products. Sybase offers the industry s most powerful, flexible and secure solution for managing mobility across the entire enterprise. The wide range of mobile operating systems and the constant introduction of new devices make managing and securing mobile devices a major challenge. Sybase simplifies this complexity by providing infrastructure that allows enterprises to take full advantage of the vast benefits of mobility today and into the future. Sybase ensures the management and security of mobile devices over any network for any deployment size. For the growing number of organizations that are deploying Apple s iphone as part of a mobile strategy, Sybase provides these capabilities: Device management via over-the-air provisioning, including establishing network and security settings to minimize IT resource requirements in managing the mobile device population; Security through lockable configuration and security policies that are consistent with IT standards; Pre-built and custom-built applications that isolate enterprise data to comply with enterprise security requirements, while leaving the user s personal data untouched and easily accessible TIME TO EMBRACE MOBILE DEVICES For IT professionals facing the onslaught of personal devices in the workplace, smartphones don t have to be viewed as a violation of corporate security policies. As the Forrester report cited earlier states, because the vast majority of employees are using personal devices at home, harnessing that trend and turning it to the advantage of your company makes sound business sense and will go a long way to keeping employees happy and productive. ABOUT SYBASE With more than 20,000 global mobility customers, thousands of leading mobility partners and 20 years of enterprise mobility expertise, Sybase is committed to offering device-agnostic solutions that support a broad range of operating systems. Whether your workers are using personally-owned consumer devices or task-specific ruggedized devices on the frontlines, Sybase empowers you to manage mobility with complete confidence. By providing a mobile platform that offers capabilities for device management, security, applications, messaging and development, Sybase provides a solid foundation to mobilize your business and provides the tools for a long-term strategy that helps to protect your valuable IT budget. Sybase, Inc. Worldwide Headquarters One Sybase Drive Dublin, CA 94568-7902 U.S.A 1 800 8 sybase www.sybase.com Copyright 2010 Sybase, Inc. All rights reserved. Unpublished rights reserved under U.S. copyright laws. This material is the confidential and trade secret information of Sybase, Inc. Sybase, and the Sybase logo are trademarks of Sybase, Inc. or its subsidiaries. indicates registration in the United States of America. SAP and the SAP logo are the trademarks or registered trademarks of SAP AG in Germany and in several other countries. 09/10 L03267