How to Successfully Roll Out an Android BYOD Program Nathan Steuer, Director of Mobility Solutions Ann Marie Cullen, Advisory Services Manager
Global Computing Platform Market Share! 1Billion! Android device activations! 80%! Smartphone market share!
Android Will Gain Ground in BYOD Get Ready! 60 50 40 30 20 ios Android Blackberry Windows 10 0 40 24 27 6 50 34 6 6 Corporate-owned BYOD Source: Information Week Mobile Security Survey 2013!
PaRaBaL, Inc. Mobility for the Enterprise! Started in 2009 to teach ios/ Android exploitation and data exfiltration! Full Mobility Lifecycle Products and Services Company! GSA Contract Holder and SBA Certified HUBZone Company! Mobile Environment Assessments! MDM Implementation and Resale! Professional Training Services!! BYOD Preparedness Checks! Mobile Application Testing!
2007 2009 5000+ 250+ 96% Company founded Purpose-built for multi- OS Mobile IT Coined Mobile First V1 innovations Enterprise app store BYOD privacy Selective wipe Access control Real-time cost mgmt Customers globally Of Fortune 500 / Global 2000 Customer support satisfaction 2013 Magic Quadrant for Mobile Device Management Software Gartner, Inc: Magic Quadrant for Mobile Device Management Software by Phillip Redman, John Girard, Terrence Cosgrove, and Monica Basso (May 23, 2013) This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from MobileIron.
Security and management platform for mobile enterprise apps, documents, and devices Innovation and Customer Success 5000+ Customers globally 95%+ Customer support satisfaction Recognized Best mobile enterprise service Deployed 8 of top 10 global automotive 7 of top 10 global pharma 5 of top 10 global banks Strong mobile ecosystem First Enterprise app store BYOD privacy Selective wipe Jailbreak detection Email attachment DLP
Device Fragmentation! Android is the most fragmented it has ever been
OS Version Fragmentation Comparison! ios 4 or less! 2%! Kit Kat 1% Froyo 2% ios 5! 6%! ios 7! 69%! ios 6! 23%! Jelly Bean 54% Gingerbread 24% Ice Cream Sandwich 19% Honeycomb 0% ios! Android! Source: Chitika Insights, blended % for iphone and ipad! Source: http://developer.android.com/about/dashboards/ index.html!
More Android Challenges! Malware Easy Rooting 0.7 0.3 0.3 19 79 Android ios Symbian Blackberry Source: FBI and DHS, Threats to Mobile Devices Using Android, 7/23/13!
Challenges Unique to Android! Removable storage presents data loss risk! No granular permissions control
Get to Know Your Employees! What devices do your employees want to use? What devices are most popular? What OS versions are used? What applications best suite business needs? What are employees actually using the devices for?
Get to Know Yourself! Who am I and what are my needs? Understanding your organization and data How will employees use devices Data loss and encryption requirements Risk tolerance on the accessible data Financial model $ Risk Tolerance DLP/ Encryption Requirements Data Accessibility Needs Look in the Mirror
Policy Development! Living Document Lifecycle Management Employee Groups/Roles Technology Agnostic Regulatory compliance HIPPA, SOX/GLB HIPPA Employee privacy and workers rights
EMM Addresses BYOD Challenges! BYOD Basics! Password enforcement! Encryption enforcement! Compliance enforcement! Remote selective wipe! Certificate authentication! App whitelist or blacklist!
AppConnect for BYOD Success! Secure container for enterprise apps and data! Password protected separately from the device! Enterprise data is isolated from personal data! AES encryption! Application Ecosystem! PIM Secure Email+, Divide PIM, Touchdown! 3rd party partner applications! In-house applications! Simple, consistent user experience! Enterprise apps signified with green lock icon! Single Sign On!
AppConnect for BYOD Success! Consistent user experience across devices running 2.3 +! No need to rely on device-level encryption! All container data is encrypted regardless of storage location! Secure barrier protects business apps from malware infection! Container becomes unusable on rooted devices!
Rollout Best Practices! Phase Rollout! Test, Pilot, Phased Production! By device manufacturer or type and department! Incorporate feedback before Production Rollout! Educate Users! Address privacy concerns! Set expectations around fragmentation impact! Provide resources!
Rollout Best Practices! Prepare Help Desk! Provide devices to test! OS/device specialization if possible! Define support line! Provide access to basic functions: register, retire, locate, send message, wipe! Define escalation procedures! Image: Stuart Miles from FreeDigitalPhotos.net Continue to refine program! New OS/Device functionality! New EMM functionality! New Legal/Privacy/Compliance precedents! Processes, procedures, resources! Review Incorporate Prepare Build Rollout
Minimum Recommendations! Lost/ Stolen Device Cloudbased Storage Data Loss 0verprivileged Malware apps SD card Password (device, container) Encryptio n (device, container) Block rooted devices Remote lock Remote Wipe
Additional Recommendations! Lost/ Stolen Device Cloudbased Storage Data Loss 0verprivileged Malware apps SD card Anti- Malware App Reputation Protected Container
Questions?! Nathan Steuer 240.258.2106 nsteuer@parabal.com Ann Marie Cullen 650.919.8571 amcullen@mobileiron.com For More Info, visit: www.parabal.com/mobileiron and www.mobileiron.com