Bring Your Own Device (BYOD) has been a fact of life since the first mobile phones came to market, but now that personal devices have the compute power of a laptop, there are challenges and opportunities for both service providers and enterprise IT. Your Device is Our Opportunity Three Reasons to Feel Better About BYOD An Innovation Scouting Report by: Nancee E. Ruzicka Sponsored by:
Your Device is Our Opportunity Introduction Nearly anyone with a mobile device has, at some point, used it for work. It s convenient and accessible. Rather than carrying multiple handsets and managing multiple numbers and identities, most employees find that sometimes using a personal phone, tablet, or laptop is just easier. Now that voice minutes, long distance, and text are unlimited in many plans there is nothing stopping workers from using their own smart phone rather than carrying a second work device or switching during business hours. On the surface, Bring Your Own Device (BYOD) should be advantageous to business. However, the savings that result from not having to purchase devices or subscribe to service plans can be overshadowed by the risk to corporate networks and proprietary data. A work order accessed using a smart phone includes a customer name, address, account number, and other personal data. Worse, the login to the work order system might be saved on a tablet and easily accessible by anyone. Beyond that are regulatory requirements for proving that access to personal data is monitored and protected. The networks that large and small businesses rely on are secure subsets of the public network. Virtual Private Networks (VPNs) and carrier Ethernet services are proven methods for connectivity that are so reliable most businesses take connectivity for granted. Communication service providers spend billions every year on security, prevention, and investigation of breaches. When defining a BYOD strategy, the network should be of less concern to businesses than securing enterprise applications and protecting corporate data regardless of source, user, or device. In this Innovation Scouting report, ICT intuition profiles three innovative vendor solutions that enable service providers to offer, and businesses to implement, BYOD strategies that protect and manage IT and information assets regardless of the device being used by an employee or partner. ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 1
All About the Business For BYOD to become an accepted part of enterprise ICT operations, businesses and service providers alike must come to grips with how best to enable, monitor, and manage devices, applications, and users without having to apply and enforce restrictive or complex procedures. A selfish approach to BYOD ensures that business infrastructure, applications, and data are secured, monitored, and managed. Employees can use any device they choose, but enterprise access will be carefully controlled and each corporate user s workspace exists outside the device. Both enterprise and service provider ICT strategies must address the business issues associated with BYOD not to stop it, but to embrace it and make it beneficial to the business. Whether developing a BYOD strategy as an enterprise or service provider, there are advantages: Employees want BYOD Employee demand is at the heart of BYOD and one of many benefits for the business, beyond device purchase and maintenance, is that the user understands the device and how to operate it. They have all the accessories and extras and if there s a problem with the device, the employee will likely contact their mobile operator rather than the corporate IT help desk. What they expect from the business is secure, remote access to corporate systems and data, and a fair settlement of usage charges and fees. BYOD improves productivity Employees will use devices and applications that are more familiar and they will use them more often. Mobility is becoming important to business and employees prefer not to juggle devices. Embracing BYOD means that businesses will further benefit from engaging with employees using devices and applications that are familiar (e.g. Facebook, LinkedIn, DropBox). ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 2
BYOD does save money Enterprises must look beyond the cost of devices and service plans because they will often choose to subsidize employees that use their own devices. While there is expense associated with managing a BYOD environment, automated solutions can dramatically reduce costs in the areas of help desk, configuration, contract management, inventory, and maintenance. Service providers are in an excellent position to offer secure connected cloud solutions as a service to business customers and many are implementing solutions for multitenant managed services offerings capable of scaling to support hundreds or even thousands of individual enterprises. To make corporate applications securely available to employees regardless of device, there are innovative solutions that make implementing a selfish BYOD strategy both possible and practical. Strategic Solutions Delivering a comprehensive, less intrusive solution that protects the enterprise while still empowering the individual requires enterprises to ensure that employee access to critical applications and use of sensitive data is consistent, secure, and accounted for. Implementing a selfish BYOD strategy is practical and possible with off-the-shelf solutions that enable businesses to: Configure and manage an employee cloud workspace independent of device Secure applications and manage remote access Monitor and account for usage of personal versus business mobile services, data plans, and spending Solutions implemented to support BYOD are required to be fully automated and entirely self-sufficient, otherwise costs increase and profitability suffers. Security is always a concern and systems alone will not prevent compromise. BYOD policies and procedures must be established and enforced across the organization. Service providers that want to take advantage of BYOD opportunities require multi-tenant solutions that are capable of supporting multiple customers in multiple industries. ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 3
CloudFactory ASG Software Solutions ASG Software Solutions is a company that has been delivering enterprise IT and business software solutions for more than 25 years. Most recently, ASG launched a solution for delivery of cloud services that works for individual business customers, managed services providers, or network operators that wish to offer cloud services. ASG CloudFactory provides cloud building blocks and architecture blueprints to build, provision, and operate multi-tenant end-to-end cloud platforms. The intersection of cloud environments and BYOD occurs at the individual workspace. ASG CloudFactory delivers a next generation workspace that provisions, aggregates and provides end-point agnostic delivery of applications, data, and IT management services. With access to each workspace carefully controlled and enabling access to only approved applications, the ASG CloudFactory workspace exists independent of user device to manage access to internal applications and cloud services in a single secure workspace, as shown in Figure 1. The ASG CloudFactory platform delivers fully-automated infrastructure lifecycle management and provisioning workflows to reduce management overhead, including: Bank-level security access: integrated two-factor authentication and device/location awareness Modular workspace design to improve productivity and user satisfaction No vendor lock-in: support of any application delivery technology Controlled access to all cloud services internal and external - through single sign-on for improved usability ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 4
Figure 1: ASG Cloud Factory The CloudFactory platform is open and interoperable with multiple external IT and network management tools, OSS/BSS, and security platforms. Delivery models include fully licensed, hosted, white label, or custom implementations. Application Wrapping Mocana Founded in 2004, Mocana builds solutions for phones, apps, and tablets, as well as consumer electronics, industrial automation, medical devices, military electronics, automotive, aviation, and smart grid devices and applications around the globe. Mocana Mobile App Protection (MAP) is a general purpose app security automation platform that enables enterprises to create self-defending mobile applications in a unified manner independent of devices and operating systems. Managing individual user devices has been somewhat effective in controlling access to corporate resources but it has not addressed the core information security challenge of ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 5
protecting corporate data regardless of device, even if that device has been compromised. As shown in Figure 2, MAP wraps individual applications with customizable security features that can prevent compromises such as unauthorized access or data loss. Figure 2: Mocana MAP MAP addresses the security requirements of extended enterprises in one of the industry s most flexible and least intrusive ways by: Eliminating barriers to massive and rapid scaling of mobile application deployments Applying enterprise grade application security in a timely manner to meet business objectives Preserving the end user experience on mobile applications Creating Self-Defending applications in seconds, without the need for source code or SDK integration Securing applications rather than requiring time-consuming and costly enrollment and management of personal devices ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 6
Integrating with existing IT management systems, enterprise app stores, and cloud catalogs Enterprise applications can be wrapped post-development, so there is no code to write and adding security to any application is easily accomplished using a point and click administrator console. Mocana MAP aims to mitigate complexity for mobile users and managers, authenticate high-value transactions on untrusted devices, and eliminate the expense of developing unique code for every security scenario. Real-Time Billing Orga Systems Orga Systems, based in Germany, offers a portfolio of real-time convergent charging and billing products for telecommunication companies, utility providers, and automotive manufacturers. The Orga Systems transaction management engine has been developed especially for processing large volumes of data in real time, powering numerous large-scale deployments serving over 400 million users. In a BYOD environment, both enterprises and CSPs are required to collect and classify usage. Orga Systems convergent charging, billing, and financial management solutions provide CSPs and enterprises more flexibility and insight into usage to enable convergent billing across services, management of prepaid services, and real-time monitoring of usage. Whether corporate or CSP, Orga Systems solutions enable: Real-time budget control Mapping of multiple organizational structures and hierarchies Credit/usage limits Cost center billing Dual invoicing for business and private use Per service payment options and shared balances Orga Systems enables collection and classification of transactions in real time, delivering insight into usage and clearly determining which charges are the ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 7
responsibility of the business and which should be attributed to the individual. Using Orga Systems Dual Invoicing, payment responsibility can be differentiated according to corporate/business and private usage as shown in Figure 3. Payment responsibility can either be triggered manually or based on the user configuration. Figure 3: Orga Systems Dual Invoicing Due to its flexible configuration, Orga Systems solutions support many types of differentiated charging, hierarchical accounts, and modeling of corporate structures that include BYOD users. Dual invoicing enables corporations to track usage and, even if they choose not to bill users, understand how connected services and applications are being used. As more workers use personal devices for business purposes, enterprises and operators that embrace rather than ignore BYOD will ultimately benefit. It is no longer sufficient or economical to manage network, device, application, and user operations individually. Implementing a selfish BYOD strategy that protects the business regardless of device relieves IT of the burden of updating monitoring and management systems as new devices, versions of OS, or applications become available. ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 8
Take It Away As BYOD becomes a permanent fixture in businesses worldwide, it is unrealistic to expect IT to manage every instance of every device that is now or will be available in the future. The better option is to secure and manage corporate assets, applications, and data so that the business is protected. Understand what devices are accessing your infrastructure and data but ensure that it is protected regardless. The three solutions profiled in this Innovation Scouting report represent creative approaches to managing BYOD by better managing IT and the business. There are other tools that are useful for taming BYOD and ensuring that personal devices are well integrated and do not disrupt normal business processes. Mobile Device Management (MDM) was not profiled here and while MDM is a valuable approach for configuring and controlling devices, the overhead and maintenance required to manage every type and version of device and mobile operating system is becoming substantial and costly. In this dynamic BYOD environment, businesses might be better served to first be selfish and protect the business before trying to corral the devices. Nancee Ruzicka ICT intuition, LLC +1 720.981.5755 office +1 920.216.6379 mobile nruzicka@ictintuition.com ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 9
About Orga Systems For 20+ years, Orga Systems portfolio of real time products and consulting services has been designed for living in a connected world. Scalable architecture, outstanding performance, lowest rating latency and consequent customer-centricity ensure reliable access to any kind of cross vertical NG services for 400+M subscribers in Africa, Americas, Asia and Europe. Worldwide 40+ telecommunications providers, energy suppliers, car manufacturers, automotive and logistics companies rely on Orga Systems and achieve reduced OPEX, real time-to-market, short-termed ROI as well as beneficial access to new value chains and profitable M2M revenue streams. Take the shortcut to monetize the digital life in real time: www.orga-systems.com About ICT intuition ICT intuition is a boutique research and consulting firm specializing in defining and delivering strategies for the deployment and management of connected users and businesses. The convergence of Information and Communication Technologies is global and research will not deliver insight without the analysis and understanding that comes with a wealth of industry experience. ICT intuition is committed to delivering the highest quality market intuition, thought leadership, innovation scouting, and strategy consulting to communication service providers, utilities, government, and the vendors that serve them. ICT-i IS 01, Sept 2013 ICT intuition, 2013 Page 10