How to Successfully Roll Out an Android BYOD Program



Similar documents
MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

MobileIron and Samsung Value Proposition

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

Chris Boykin VP of Professional Services

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

How To Protect Your Mobile Device From Attack

Symantec Mobile Management Suite

Bell Mobile Device Management (MDM)

6 Steps to Migrate from BlackBerry to a Secure, Multi-OS Environment

Guideline on Safe BYOD Management

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Mobile First Era with MobileIron. MobileIron Japan

Symantec Mobile Management for Configuration Manager 7.2

Making the Enterprise Mobile First

Total Enterprise Mobility

The Future of Mobile Device Management

ForeScout MDM Enterprise

How To Manage A Mobile Device Management (Mdm) Solution

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

The ForeScout Difference

AirWatch Solution Overview

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Mobile Security: Threats and Countermeasures

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

MAM - Mobile Application Management

Athena Mobile Device Management from Symantec

Healthcare Buyers Guide: Mobile Device Management

Symantec Mobile Management 7.2

Embracing Complete BYOD Security with MDM and NAC

6 Things To Think About Before Implementing BYOD

What We Do: Simplify Enterprise Mobility

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Security and Compliance challenges in Mobile environment

IT Resource Management & Mobile Data Protection vs. User Empowerment

Sophos Mobile Control

MDM Mobile Device Management

Mobile App Containers: Product Or Feature?

Good for Enterprise Good Dynamics

IT Resource Management vs. User Empowerment

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Symantec Mobile Management 7.1

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Building a Mobile Information Management Strategy

Mobile Madness or BYOD Security?

Symantec Mobile Management 7.1

Five Steps to Android Readiness

Codeproof Mobile Security & SaaS MDM Platform

Enterprise Mobility Management for Financial Sector

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Mobile Security Standard

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Mobile Devices in Healthcare: Managing Risk. June 2012

Secure Your Mobile Workplace

Cisco Mobile Collaboration Management Service

Choosing an MDM Platform

Securing Office 365 with MobileIron

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Feature List for Kaspersky Security for Mobile

Jits Langedijk Sr. Consultant

Mobile First Government

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

IBM Endpoint Manager for Mobile Devices

Practical Attacks against Mobile Device Management Solutions

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Mobile App Management:

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Transcription:

How to Successfully Roll Out an Android BYOD Program Nathan Steuer, Director of Mobility Solutions Ann Marie Cullen, Advisory Services Manager

Global Computing Platform Market Share! 1Billion! Android device activations! 80%! Smartphone market share!

Android Will Gain Ground in BYOD Get Ready! 60 50 40 30 20 ios Android Blackberry Windows 10 0 40 24 27 6 50 34 6 6 Corporate-owned BYOD Source: Information Week Mobile Security Survey 2013!

PaRaBaL, Inc. Mobility for the Enterprise! Started in 2009 to teach ios/ Android exploitation and data exfiltration! Full Mobility Lifecycle Products and Services Company! GSA Contract Holder and SBA Certified HUBZone Company! Mobile Environment Assessments! MDM Implementation and Resale! Professional Training Services!! BYOD Preparedness Checks! Mobile Application Testing!

2007 2009 5000+ 250+ 96% Company founded Purpose-built for multi- OS Mobile IT Coined Mobile First V1 innovations Enterprise app store BYOD privacy Selective wipe Access control Real-time cost mgmt Customers globally Of Fortune 500 / Global 2000 Customer support satisfaction 2013 Magic Quadrant for Mobile Device Management Software Gartner, Inc: Magic Quadrant for Mobile Device Management Software by Phillip Redman, John Girard, Terrence Cosgrove, and Monica Basso (May 23, 2013) This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from MobileIron.

Security and management platform for mobile enterprise apps, documents, and devices Innovation and Customer Success 5000+ Customers globally 95%+ Customer support satisfaction Recognized Best mobile enterprise service Deployed 8 of top 10 global automotive 7 of top 10 global pharma 5 of top 10 global banks Strong mobile ecosystem First Enterprise app store BYOD privacy Selective wipe Jailbreak detection Email attachment DLP

Device Fragmentation! Android is the most fragmented it has ever been

OS Version Fragmentation Comparison! ios 4 or less! 2%! Kit Kat 1% Froyo 2% ios 5! 6%! ios 7! 69%! ios 6! 23%! Jelly Bean 54% Gingerbread 24% Ice Cream Sandwich 19% Honeycomb 0% ios! Android! Source: Chitika Insights, blended % for iphone and ipad! Source: http://developer.android.com/about/dashboards/ index.html!

More Android Challenges! Malware Easy Rooting 0.7 0.3 0.3 19 79 Android ios Symbian Blackberry Source: FBI and DHS, Threats to Mobile Devices Using Android, 7/23/13!

Challenges Unique to Android! Removable storage presents data loss risk! No granular permissions control

Get to Know Your Employees! What devices do your employees want to use? What devices are most popular? What OS versions are used? What applications best suite business needs? What are employees actually using the devices for?

Get to Know Yourself! Who am I and what are my needs? Understanding your organization and data How will employees use devices Data loss and encryption requirements Risk tolerance on the accessible data Financial model $ Risk Tolerance DLP/ Encryption Requirements Data Accessibility Needs Look in the Mirror

Policy Development! Living Document Lifecycle Management Employee Groups/Roles Technology Agnostic Regulatory compliance HIPPA, SOX/GLB HIPPA Employee privacy and workers rights

EMM Addresses BYOD Challenges! BYOD Basics! Password enforcement! Encryption enforcement! Compliance enforcement! Remote selective wipe! Certificate authentication! App whitelist or blacklist!

AppConnect for BYOD Success! Secure container for enterprise apps and data! Password protected separately from the device! Enterprise data is isolated from personal data! AES encryption! Application Ecosystem! PIM Secure Email+, Divide PIM, Touchdown! 3rd party partner applications! In-house applications! Simple, consistent user experience! Enterprise apps signified with green lock icon! Single Sign On!

AppConnect for BYOD Success! Consistent user experience across devices running 2.3 +! No need to rely on device-level encryption! All container data is encrypted regardless of storage location! Secure barrier protects business apps from malware infection! Container becomes unusable on rooted devices!

Rollout Best Practices! Phase Rollout! Test, Pilot, Phased Production! By device manufacturer or type and department! Incorporate feedback before Production Rollout! Educate Users! Address privacy concerns! Set expectations around fragmentation impact! Provide resources!

Rollout Best Practices! Prepare Help Desk! Provide devices to test! OS/device specialization if possible! Define support line! Provide access to basic functions: register, retire, locate, send message, wipe! Define escalation procedures! Image: Stuart Miles from FreeDigitalPhotos.net Continue to refine program! New OS/Device functionality! New EMM functionality! New Legal/Privacy/Compliance precedents! Processes, procedures, resources! Review Incorporate Prepare Build Rollout

Minimum Recommendations! Lost/ Stolen Device Cloudbased Storage Data Loss 0verprivileged Malware apps SD card Password (device, container) Encryptio n (device, container) Block rooted devices Remote lock Remote Wipe

Additional Recommendations! Lost/ Stolen Device Cloudbased Storage Data Loss 0verprivileged Malware apps SD card Anti- Malware App Reputation Protected Container

Questions?! Nathan Steuer 240.258.2106 nsteuer@parabal.com Ann Marie Cullen 650.919.8571 amcullen@mobileiron.com For More Info, visit: www.parabal.com/mobileiron and www.mobileiron.com