Vision on Mobile Security and BYOD BYOD Seminar



Similar documents
Hands on, field experiences with BYOD. BYOD Seminar

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

How To Support Bring Your Own Device (Byod)

Cisco Mobile Collaboration Management Service

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

How To Protect Your Mobile Devices From Security Threats

Android vs BlackBerry vs ios vs Symbian vs Windows Phone in South Africa

Athena Mobile Device Management from Symantec

Systems Manager Cloud Based Mobile Device Management

The Myths & Truths of Enterprise Mobile Printing: 9 ways PrintMe Mobile sets the truth and your IT department free.

1. Understanding Big Data

Storgrid EFS Access all of your business information securely from any device

CA Enterprise Mobility Management MSO

AirWatch Solution Overview

Guideline on Safe BYOD Management

EMEA TMC client conference Using global tax management systems to improve visibility and enhance control. The Crystal, London 9-10 June 2015

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

IT Resource Management vs. User Empowerment

Mobile Madness or BYOD Security?

Enterprise Mobility: The New Imperative. Scott Dillon, Industry Principal Mobility 20 June 2011

Mobile Device Management and Security Glossary

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Mobile Device Management

Systems Manager Cloud-Based Enterprise Mobility Management

Security and Compliance challenges in Mobile environment

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Chris Boykin VP of Professional Services

IT Resource Management & Mobile Data Protection vs. User Empowerment

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Total Enterprise Mobility

2011 Forrester Research, Inc. Reproduction Prohibited

A Marketing & Sales Dashboard Implementation Lessons Learned & Results

The Expanding Role Of Mobility In The Workplace

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Preparing your network for the mobile onslaught

Cloud and Mobile Computing A Higher Education Perspective. Brian Stewart AVU ODL-PD Program Nairobi 16 th 2013

Enabling Supply Chain Visibility Through Mobile Computing

If you can't beat them - secure them

Bring Your Own Device Mobile Security

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

A Rimini Street White Paper. Mobility Solutions for ERP

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

Symantec Mobile Management 7.2

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Mobilizing the Enterprise: Trends, Strategies and Techniques

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Symantec Mobile Management for Configuration Manager 7.2

BYOD Strategies: Chapter I

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

Enterprise Mobility as a Service

Mobility in Claims Management

03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement

Mobile Device Security and Audit

Hosted Desktop for Business

Secure Your Mobile Device Access with Cisco BYOD Solutions

Mobile Device Security Is there an app for that?

Smart Ideas for Smartphone Security

Enterprise Mobility Management

Architecture of Enterprise Mobile Apps

Module 1: Facilitated e-learning

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT

Transcription:

Vision on Mobile Security and BYOD BYOD Seminar Brussel, 25 september 2012

Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl +31 610 999 199 1

Personal note The mobile (smart phones and tablets) devices are still not frequently used or are unmanaged. Many companies don't trust external devices and most of IT managers don't want to implement BYOD (the proper awareness is missing). Most of companies don't have clear vision about usage, benefits and controls over mobile devices. They don't know where it can save money. Most of them also think they can adopt either company managed devices or BYOD - implement both based on data characteristics or type of usage has not been really evaluated. The only massive implementation was remarked in global companies 2

Mobility and Persistent Connectivity have Crossed the Tipping Point Continued investment and hardware/software innovation will result in increasingly powerful mobile devices and operating systems, fueling yet more consumer demand. Technology Adoption Drivers Number of Days to Reach 1 Million Units Sold ~360 ~300 ~180 ~75 ~30 ~1 Lower Prices + 400 Faster Hardware + Days 300 200 Inflection Point: In 2011, the number of smart phones shipped globally exceeded the number of PCs Enhanced Usability + 100 3 Wireless Connectivity 0 ipod BlackBerry Netbooks iphone 3 ipad iphone 4s 2002 2002 2007 2007 2010 2011

Mobile Device Trends Employees are distributed & require mobility support Demand to support personal devices (Bring Your Own Device (BYOD)/ Consumerization) Push to create mobile apps & adopt socially connected applications Usage of apps without knowing what risks are introduced Insecure apps Improved productivity and reduced costs All Nippon Airways - 6000 ipads, 400 million yen (3.89 million euros) annual savings Senate of the Dutch Parliament replaces printed parliamentary documents with ipad Mobile device management and security are significant challenges. 4

Anticipated Mobile Security & Privacy Trends Mobile Operating Systems Mobile Apps BYO Mobile Devices Standard security features: device encryption, passcode locks, etc. Android will include more enterprise security features and be easier to manage Android will dominate worldwide market share 1 Windows Phone market share will surpass ios by 2015 1 Increase in mobile malware targeting ios and Android Additional anti-malware products available Incidents of corporate data leakage due to mobile malware By 2014 90% of organizations will support BYO 2 Different tiers of BYO for different groups of users BYO = smartphones, tablets, e-readers, laptops, & other devices Security & privacy issues: Near Field Communication (NFC) for mobile payments, e.g. Sixpack Radio Frequency Identification (RFID) Cameras - videoconferencing, image projection, barcode scanning Voice recognition, augmented reality, location based services Mobile devices will be increasingly used to process both sensitive business and personal data. 5 1 Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012 2 Gartner Top Predictions for 2011: IT s Growing Transparency and Consumerization

Enterprise Applications Extended to Mobile Devices New opportunities for sales enablement, customer & partner interaction, employee productivity, business process acceleration, & instant access to key analytics. Email Approvals Dashboards Top Management Contacts Workflow Middle Management Calendars Reports Scheduling & Dispatch Time & Expense Operations Transactions 6

BYOD roadmap 1. Your Road Map Must Address Diverse Hardware, Software, And Security Capabilities 2. Build your mobile road map Based ON Business Requirements 3. Prepare For Evolving Security And Privacy Challenges 4. Keep Your App Developers In Check With Strong Standards 7

Jumpstarting Your Enterprise Mobility Strategy Business Strategy Mobile Applications Enterprise Architecture Infrastructure Wireless Networks Security Device Management BYO Governance Establish a mobility leadership team. Identify and prioritize mobile applications for each business unit. Create a ~24 month mobility roadmap. This becomes a tangible destination for the IT team. Develop a design framework to guide application design decisions. Define use cases, target devices, functional requirements, wireframes and proof of concepts for top ~10 applications. Identify data and application services needed by mobile devices. Develop standard service interfaces that scale and are secure. Develop a cloud-friendly architecture (e.g. thin client or sync) that allows seamless roaming between smartphone, tablet and laptop over the course of the day. Decide on a push or pull model for mobile applications. Implement an application store or alternate distribution method. Understand the role of mobile middleware and evaluate architecture options. Understand the wireless expectations of your mobile applications. Ensure you have strong authentication and reliable, secure, high-speed wireless connectivity everywhere mobile users are. Perform security reviews throughout the mobile app development process. Evaluate security risks for each mobile application and each layer of the mobility stack and mitigate as needed. Develop mobile device procurement, security and management standards. Define mobile device management & data protection requirements & solution. Develop an agile process for new devices. Implement network access control to prevent unauthorized devices from accessing the network. Develop a policy around BYO devices. Define minimum security requirements and management controls. Implement systems and processes that provide adequate control. Communicate to users. Develop a mobile application rollout framework that addresses the complete systems delivery life cycle: requirements, design, testing, user training, user documentation, help desk readiness, etc. An enterprise mobility strategy establishes a framework to guide business, technology, architecture, process and resource decisions made while rolling out mobile apps and devices. It provides a roadmap for success. 8

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and deep local expertise to help clients succeed wherever they operate. Deloitte's approximately 170,000 professionals are committed to becoming the standard of excellence. This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the Deloitte Network ) is, by means of this publication, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this publication.

10