6 Things To Think About Before Implementing BYOD



Similar documents
Managing and Securing the Mobile Device Invasion IBM Corporation

Private Geräte im Unternehmen - ein großes Potential mit Risiken

IBM Endpoint Manager for Mobile Devices

IBM Mobile Security DELIVERING CONFIDENCE. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor

Mobile - and its effect on the enterprise

Security and Compliance challenges in Mobile environment

Jonas Vercruysse Technical Pre-sales February Endpoint Management IBM Corporation

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator

Mobile and BYOD Strategy

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices

Tivoli Automation for Proactive Integrated Service Management

Symantec Mobile Management 7.2

Symantec Mobile Management for Configuration Manager 7.2

IBM MobileFirst Enabling Continuous Business Operations with Mobile (BYOD) Applications

IBM MobileFirst Launch David Lee Heyman

Guideline on Safe BYOD Management

Symantec Mobile Management 7.2

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Best Practices for Monitoring a Vmware Environment. Gary Powell Senior Consultant IBM SWG Tivoli

Insert Partner logo here. Financial Mobility Balancing Security and Success

Creating a Cloud Backup Service. Deon George

Embracing Complete BYOD Security with MDM and NAC

ForeScout MDM Enterprise

The ForeScout Difference

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Athena Mobile Device Management from Symantec

IBM United States Software Announcement , dated February 3, 2015

Symantec Mobile Management Suite

Securing the mobile enterprise with IBM Security solutions

AirWatch Solution Overview

Application Monitoring Maturity: The Road to End-to-End Monitoring

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Getting a better grip on mobile devices

Going Mobile: Challenges, limits and impact of new smart devices Keith Poyser: Sales Leader Europe. IBM Mobility & End Point

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

RFI Template for Enterprise MDM Solutions

Cisco Mobile Collaboration Management Service

If you can't beat them - secure them

Symantec Mobile Management 7.1

Simplify security management in the cloud

BYOD Policy Implementation Guide. February 2016 March 2016

Kaspersky Security for Mobile

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Tom Schauer TrustCC cell

"Secure insight, anytime, anywhere."

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY

How to Deliver Measurable Business Value with the Enterprise CMDB

IT Enterprise Services

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

IBM s Mobile Enterprise Strategy IBM Corporation

11 Best Practices for Mobile Device Management (MDM)

When enterprise mobility strategies are discussed, security is usually one of the first topics

Total Enterprise Mobility

Securing Healthcare Data on Mobile Devices

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

M a as3 6 0 fo r M o bile D evice s

How To Write A Mobile Device Policy

Healthcare Buyers Guide: Mobile Device Management

Mobile Device Management for CFAES

IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Optimizing your IT infrastructure IBM Corporation

Mobile Security BYOD and Consumer Apps

Symantec Mobile Management 7.1

IBM System i Integrated Collaboration

The flexible workplace: Unlocking value in the bring your own device era

Cloud Backup and Recovery for Endpoint Devices

BYOD: End-to-End Security

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Technology Shifts. Mainframe Windows Desktop Internet

The Holistic Guide to BYOD in Your Business Jazib Frahim

SA Series SSL VPN Virtual Appliances

Effective Storage Management for Cloud Computing

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Ensuring the security of your mobile business intelligence

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

How To Secure Your Mobile Devices

IBM MobileFirst Managed Mobility

Title. Click to edit Master text styles Second level Third level

Mobile Device Management and Security Glossary

How To Manage A Mobile Device Management (Mdm) Solution

What We Do: Simplify Enterprise Mobility

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

EMPOWERING THE DYNAMIC WORKPLACE

IT Resource Management & Mobile Data Protection vs. User Empowerment

How To Support Bring Your Own Device (Byod)

Feature List for Kaspersky Security for Mobile

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

IBM Endpoint Manager Product Introduction and Overview

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Mobile Security: The good, the bad, the way forward

Simplifying Desktop Mgmt With Novell ZENworks

Transcription:

6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation

Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices have multiple personas Mobile devices are diverse. Mobile devices are used in more locations Mobile devices prioritize the user Personal phones and tablets shared with family Enterprise tablet shared with coworkers Social norms of mobile apps vs. file systems Work tool Entertainment device Personal organization Security profile per persona? OS immaturity for enterprise mgmt BYOD dictates multiple OSs Vendor / carrier control dictates multiple OS versions A single location could offer public, private, and cell connections Anywhere, anytime Increasing reliance on enterprise WiFi Conflicts with user experience not tolerated OS architecture puts the user in control Difficult to enforce policy, app lists

BYOD Questions to Ask Do you have the right policies in place? How are you going to manage and secure personal devices? Are employees aware of policies, security risks, enterprise capabilities? Do you have an enterprise app store? What services will you support beyond e-mail / calendar? Is your service desk ready? How will this impact your wireless networks? Client Functional Domain Back-end Server Services Social Interaction ERP and CRM ecommerce Marketing Merchandising Supply Chain Back Office

A Holistic Approach To Managing & Security The Mobile Environment 1 Develop and Communicate Formal Mobile Strategy, Policies 3 Protect devices from malware, PUBLIC WIFI data theft MOBILE APPS 5 Test, deliver and manage security-rich apps WEB SITES 2 INTERNET Manage users and access to enterprise apps and data iently acquire, deploy, Actively manage corporate device TELECOM PROVIDER secure, manage, and purchases, service contracts, SECURITY GATEWAY de-provision devices usage 8 4 Deliver an Adaptive Security Posture 6 7 PRIVATE WIFI Manage and optimize enterprise wireless networks

IBM: Addressing Strategic Client Initiatives Extend & Transform Extend existing business capabilities to mobile devices Transform the business by creating new opportunities Build & Connect Build mobile apps Connect to, and run backend systems in support of mobile Manage & Secure Manage mobile devices and apps Secure my mobile business

Thinking About Mobile Differently Platforms Apps Vodafone Networks Devices OS s Business strategy and planning Process & transaction integrity Smarter Commerce Social Business BI & Analytics Etc. Full lifecycle solutions Open cross-platform development End-to-end security and management Integration with backend systems, enterprise data and cloud Open Governed Integral IBM Mobile Enterprise

IBM Office of the CIO Extending Corporate Access IBM's BYOD program really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business. Jeanette Horan, IBM CIO Customer Needs Support BYOD for a variety of mobile platforms securely for a highly mobile population Scale to hundreds of thousands of devices Key Features & Outcomes 120,000 mobile devices, 80,000 personally owned, supported in months Integrated Lotus Traveler, IBM Connections, IBM Sametime, and IBM Endpoint Manager

Device Management, Security IBM Endpoint Manager for Mobile Devices: A highly-scalable, unified solution that delivers device management and security across device types and operating systems for superior visibility and control Systems management Desktop / laptop / server endpoint Managed = Secure Common agent Unified console Common infrastructure Single server IBM Endpoint Manager Mobile endpoint Security management Purpose-specific endpoint Client Challenge Managing and securing enterprise and BYOD mobile devices without additional resources Key Capabilities A unified systems and security management solution for all enterprise devices Near-instant deployment of new features and reports to customer s environments Platform to extend integrations with Service Desk, CMDB, SIEM, and other informationgathering systems to mobile devices Advanced mobile device management capabilities for ios, Android, Symbian, and Windows Mobile, Windows Phone Security threat detection and automated remediation

IBM Endpoint Manager for Mobile Devices Enable password policies Enable device encryption Force encrypted backup Disable icloud sync Access to corporate email, apps, VPN, WiFi contingent on policy compliance! Selectively wipe corporate data if employee leaves company Fully wipe if lost or stolen Personal Mail / Calendar Personal Apps Corporate Profile Enterprise Mail / Calendar Enterprise Access (VPN/WiFi) Enterprise Apps (App store or Custom) Encryption Enabled VPN / WiFi Corporate Network Access icloud icloud Sync itunes Sync

Benefits of a Unified Approach Organizations would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types Gartner, PCCLM Magic Quadrant, January 2011 Although at some level mobile is unique, the devices are just another form of endpoints in your infrastructure. This means whichever technologies you procure should have a road map for integration into your broader endpoint protection strategy. Forrester, Market Overview: Mobile Security, Q4, 2011 Reduces Hardware & Administration Costs Single pane for mobile devices, laptops, desktops, and servers Single Endpoint Manager Server scales to 250,000+ devices Unified infrastructure / administration model reduces FTE requirements Fast Time-to-Value Enterprise-grade APIs enable integration with service desks, CMDBs, etc (Integrated Service Management) Cloud-based content delivery model allows for rapid updates with no software upgrade or installation required

Approaches to Mobile Device Management Advanced management on ios through Apple s MDM APIs Advanced management on Android through a BigFix agent Email-based management through Exchange (ActiveSync) and Lotus Traveler (IBMSync) ios Android Windows Phone Windows Mobile Symbian

Create and Manage Profiles

13 Single Device Views for User Support

App Management Recommend, Whitelist, Blacklist, Remove

Jailbreak / Root Detection Warn Users, Notify Administrators, Take Action

Endpoint Manager in Action: Utility Provider Adding Mobile Devices Without Adding Infrastructure Serving 4.5 million customers in the southwestern region of the United States, this electric company of 25,000 employees is a leader in clean energy while exceeding reliability standards and keeping consumer costs below average. They are experiencing a migration from traditional endpoints to mobile devices. Customer Needs Support 20,000+ mobile devices Corporate and employee-owned, many platforms and OS versions High availability for certain devices used in the field Adherence to Internal security policies, external regulations Key Features & Outcomes Scalability to 250,000 endpoints provides room to grow Added mobile devices to existing IEM deployment in days Ability to integrate with Maximo, Remedy Responsiveness and agility of product and product team

Worklight Mobile app development Netcool / OMNIbus network management Lotus Traveler mobile e-mail, calendar Identity & Access Manager Federated identity mgmt The Complete Ecosystem signal quality perf data deploy, update Remediation actions policy Endpoint Manager mobile device mgmt Remediation actions compliance status Security events Q Radar Security intelligence hw, sw inventory Remediation actions open ticket TAMIT, CCMDB, Maximo asset mgmt Control Desk service desk

Thank You www.ibm.com/mobile-enterprise 2012 IBM Corporation

Trademarks and disclaimers Copyright IBM Australia Limited 2012 ABN 79 000 024 733 Copyright IBM Corporation 2012 All Rights Reserved. TRADEMARKS: IBM, the IBM logos, ibm.com, Smarter Planet and the planet icon are trademarks of IBM Corp registered in many jurisdictions worldwide. Other company, product and services marks may be trademarks or services marks of others. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Information concerning non-ibm products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-ibm list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-ibm products. Questions on the capability of non-ibm products should be addressed to the supplier of those products. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here. Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography. Photographs shown may be engineering prototypes. Changes may be incorporated in production models. 19