BYOD (Bring Your Own Device)

Similar documents
Management of Multi-OS Smart Devices Made Simple.

Cisco Mobile Collaboration Management Service

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

6/5/2013 BYOD. About Sikich. Mobility Statistics. Mobility Makes BYOD Possible. Introduction. BYOD: Getting the Most Out of Your Technology

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Bell Mobile Device Management (MDM)

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

Mobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda

How To Manage A Mobile Device Management (Mdm) Solution

Device Independence - BYOD -

Management of Multi-OS Smart Devices Made Simple.

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile device and application management. Speaker Name Date

Tuesday, June 5, 12. Mobile Device Usage

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Enterprise Mobility Management

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Dell World Software User Forum 2013

Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3

Athena Mobile Device Management from Symantec

device management solutions

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

BRING YOUR OWN DEVICE

Symantec Mobile Management 7.2

Hands on, field experiences with BYOD. BYOD Seminar

Secure Your Mobile Device Access with Cisco BYOD Solutions

How To Support Bring Your Own Device (Byod)

Secure Mobile Solutions

How To Make Your Computer System More Secure And Secure

Mobile Device Management

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

The Maximum Security Marriage:

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW

Insert Partner logo here. Financial Mobility Balancing Security and Success

Mobile Device Security Is there an app for that?

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

BYOD: End-to-End Security

AirWatch Solution Overview

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

How To Write A Mobile Device Policy

Mobile Security: The good, the bad, the way forward

The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

Chris Boykin VP of Professional Services

The Holistic Guide to BYOD in Your Business Jazib Frahim

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

Get Tough with Mobile Device Management

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Mobility Solutions for Plant Personnel

Sophos Mobile Control

IT Resource Management & Mobile Data Protection vs. User Empowerment

Enterprise Mobility Management

Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform

Healthcare Buyers Guide: Mobile Device Management

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Fit for Future Back Office. Project Board Meeting 18 May 2012 Agenda Item 2.1. Mobile Device Strategy

Ben Hall Technical Pre-Sales Manager

Guideline on Safe BYOD Management

BYOD: Bring Your Own Device Advantage, Liability or Both?

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

Enterprise Mobile Device Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec Mobile Management 7.2

Symantec Mobile Management for Configuration Manager 7.2

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

MAKING BUSINESS MOBILITY BETTER Best practices for business mobility management

Mobile & Security? Brice Mees Security Services Operations Manager

IT Enterprise Services

A framework for auditing mobile devices

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Kaspersky Security for Mobile

How To Make A Desktop Operating System (Daas) Available To Aaas (Aas) Service Provider

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

IT Enterprise Services

THE BLUENOSE SECURITY FRAMEWORK

Deep Dive BYOD, COPE & MDM

Radix Mobile Device Management (MDM) March 2015

Enterprise Mobility Management for Financial Sector

Easy, interoperable, high-definition video collaboration in the cloud

Securing Enterprise Mobility for Greater Competitive Advantage

Three Best Practices to Help Enterprises Overcome BYOD Challenges

IT Resource Management vs. User Empowerment

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Mobile Device. Management-

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Enterprise Mobility Services

SysAid MDM User Guide for Android

What We Do: Simplify Enterprise Mobility

Mobile and BYOD Strategy

A CIO s Guide To Mobility Management

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

Generating leads with Meraki's Systems Manager. Partner Training"

Mobile Security Market Trends and Best Practices. 24 May 2013

Transcription:

BYOD (Bring Your Own Device)

Agenda Set the scene BYOD raising many questions Structured & Integrated answers Belgacom Entreprise Mobility Belgacom Mobile Device Management Sensitivity : "Unrestricted", "Internal Use Only" or "Confidential" 12/20/2012 Slide 2

In this Hyper-connected World, How Connected are You? 75% of Americans with mobile phones use their phones in the bathroom! Source: 11markagency January 2012 In Commercial Confidence 20/12/2012 Slide 3 Source: 11markagency January 2012

Impact of Social Networks! In Commercial Confidence 20/12/2012 Slide 4

This is not only Happening Abroad! 21% of Belgians consider remote access and the ability to work remotely a Right, not a privilege (Cisco Northern Europe Workforce Survey, Mar 2012) 47% of Belgians think that a week without a Mobile Phone is worse than a week without sex! (Comeva, Oct 2011, The Digital Life of Belgians) In Commercial Confidence 20/12/2012 Slide 5

Bring Your Own Device Bring Your Own Device (BYOD) Describes the recent trend of employees bringing personally-owned mobile devices to their place of work, and using those devices to access privileged company resources such as email, file servers, and databases (from anywhere (red).). Wikipedia Definition Connecting Extending Bring Your Own Apps (BYOA) Any IP-based device (M2M) Bring Your Own Technology (BYOT) In Commercial Confidence 20/12/2012 Slide 6

BYOD Raising many questions How do I onboard my users and their devices? What type of device should I accept or reject? Why should I accept BYOD in my company? Is my wireless network ready for new devices? What policies to apply on the devices? What type of support should I provide? How do Simplify monitoring & administration? BYOD? Which applications should be enabled on these devices? How to access the Corporate applications? What are the risks? Is my infrastructure secure enough? In Commercial Confidence 12/20/2012 Slide 7

Give structure to your questions Policies & Compliance Users & Devices Applications Networks Security BYOD policy Security policy Mobile policy Usage policy Policy per user Policy per device Business / private use Who is accessing what Which devices Which OS How many devices/users Which applications (private / professional) Accessible to whom Where does the data reside Type Capacity Availability Access Type of traffic QoS Access management Malware Loss/Theft of devices Data Loss Decommission How to mange? How to monitor? How to support? How to start? In Commercial Confidence 12/20/2012 Slide 8

A BYOD Project starts with Homework Audit the Existing Situation What are the Business Needs? Does Everyone in the organisation have the same need? What kind of information needs to be accessed? What kind of Application? What are the existing Policies? (Mobile, Security, BYOD, ) What are the existing used hardware, Oss, software,? Identify your organisation s Risk Profile Identify Who should be involved in the Project Extend the policies to support BYOD Decide what you will support and who will pay what Work on a Project plan to modify or adapt the infrastructure and organisation to support BYOD Communicate and Educate In Commercial Confidence 20/12/2012 Slide 9

Belgacom Entreprise Mobility Corporate Mobility Strategy Mobile Managed Servicing Mobile Devices Mobile Device Management Mobile Subscriptions Corporate Mobility Strategy (soft consultancy) Device choice Regulatory & compliance Application access Support Users funding Less >< More Limit >< Embrace Email/Calendar/PIM >< Business Apps Full >< User Executive >< All User >< Company

Mobile Device Lifecycle Mobile Managed Services Expense Management End of Life / Replacement Services Buy Logistics and fulfilment Alarms and Reports Inventory Mobile Device Management Application Deployment Device Configuration Security & Policy Enforcement

Belgacom Mobile Device Management Mobile device management enables a customer to secure, monitor, manage and supports mobile device remotely (over mobile data connection or wifi). Alarms and Reports End of Life / Replacement Services Expense Management Application Deployment Security & Policy Enforcement Buy Logistics and fulfilment Inventory Device Configuration Inventory Management integrated, real-time view of all mobile devices deployed, Remote Device Configuration Enables the configuration and update of device & applications over the air, Policy Management Implementation of Profiles & Policies, remotes set up of password,... Application deployment Enterprise app store White / Black list of application Security Remote device lock and wipe, GPS location, certificate,... Reporting Provides an extensive library of management reports and logs, multiple access and reporting levels, 12/20/2012 Slide 12 12

Belgacom MDM proposition MDM Consultancy Soft & Technical MDM Training MDM ICT Services MDM Licenses MDM Service Desk MDM Managed Service track, monitor & manage your mobile fleet (smartphones, tablets, ruggedized devices, mobile scanners & printers,..) 12/20/2012 Slide 13

Belgacom MDM solutions & Partners On-Premise EU SaaS Self-Service Managed

More Info? http://ict.belgacom.be/fr/propositions/mobilit y/mobilemanagement/mobiledevicemanageme ntandprotection.asp

In Commercial Confidence 12/20/2012 Slide 16