Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com
BYOD is Accelerating 350 million employee-owned devices in the enterprise by 2014 (Juniper Research 2012)
Mobile and BYOD in the Corporate Network Opportunities Drive incremental growth by providing the right information to the right users at the right time at the point of impact Improve efficiency and employee productivity by enabling an untethered workforce and an ubiquitous work environment Improve employee morale with convenience mobile applications and untethered computing experiences coupled with choice computing Challenges Increased opportunity for breaches of public trust that may damage the brand and reputation Increased exposure to potential theft of intellectual property assets and other forms of sensitive data Increased opportunity for service disruption affecting business continuity Possibility of sabotage and alteration of sensitive enterprise information
BYOD is an Organizational Issue BYOD initiatives span beyond the IT organization Communication is essential Who, What, Why WIIFM!
Enterprise Mobility Management is Foundational for BYOD Supports BYOD with self-service enrollment Configure devices and protect employee privacy Enforce security policies and meet regulations Push content, apps and docs and provide workspace separation
Key BYOD Management Goals Protect corporate data Protect user privacy and personal data Support a diverse set of platforms/device types Help users adhere to HR, audit, legal, compliance and security guidance Support a diverse set of policies, roles, personas and access rights Improve productivity and accessibility Support employee work-style choice
Meeting BYOD Goals and Protecting Work and Personal Data
Enroll and Configure Devices OTA Identify corporate vs. personal (BYOD) devices at enrollment Configure work email, calendar, contacts, Wi-Fi and VPN profiles Set passcode and encryption settings Restrict business emails and attachments from being emailed via personal email accounts
Set BYOD Privacy Settings Disable collection of PII on a single device, all devices, or a device group Software Inventory Information Location Information IP Address and Wi-Fi SSID
Automate Policy Enforcement Continuously monitoring for your non-compliant events Automate your enforcement actions accordingly Enforce MDM management Minimum OS version Remote wipe support SIM change Encryption support Application management Jailbreak/root detection Roaming state change
Extending Mobile Apps Separate business apps from personal apps with an on-device Enterprise App Catalog Centralize app distribution and management Set app security policies including required (whitelist) and disallowed (blacklist) Authenticate and authorize access to apps
Securely Share Docs Create a separate on-device Doc Catalog App for users Centralize distribution and management of corporate docs Control edit, copy/paste, share or open files in unauthorized applications Integrate with MDM policies and compliance state
Use Dual-Persona for Email and Apps Separation of personal and work data is suited to the BYOD era Simple and Secure Cost Effective Extends Apps & Docs Freedom and Privacy
Don t Forget to Selectively Wipe Selectively wipe of corporate data at once Emails, contacts, calendar WiFi and VPN profiles Attachments Apps and docs Leave personal email, data, and photos untouched
Why Cloud MDM? Agility of the cloud for the fast pace of change in mobility Fast deployment Effortless scalability Automatic upgrades Unmatched affordability
Questions? Thank you! Clint Adams cadams@fiberlink.com P: 215-664-1996 M: 215-499-1043