Vision on Mobile Security and BYOD BYOD Seminar Brussel, 25 september 2012
Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl +31 610 999 199 1
Personal note The mobile (smart phones and tablets) devices are still not frequently used or are unmanaged. Many companies don't trust external devices and most of IT managers don't want to implement BYOD (the proper awareness is missing). Most of companies don't have clear vision about usage, benefits and controls over mobile devices. They don't know where it can save money. Most of them also think they can adopt either company managed devices or BYOD - implement both based on data characteristics or type of usage has not been really evaluated. The only massive implementation was remarked in global companies 2
Mobility and Persistent Connectivity have Crossed the Tipping Point Continued investment and hardware/software innovation will result in increasingly powerful mobile devices and operating systems, fueling yet more consumer demand. Technology Adoption Drivers Number of Days to Reach 1 Million Units Sold ~360 ~300 ~180 ~75 ~30 ~1 Lower Prices + 400 Faster Hardware + Days 300 200 Inflection Point: In 2011, the number of smart phones shipped globally exceeded the number of PCs Enhanced Usability + 100 3 Wireless Connectivity 0 ipod BlackBerry Netbooks iphone 3 ipad iphone 4s 2002 2002 2007 2007 2010 2011
Mobile Device Trends Employees are distributed & require mobility support Demand to support personal devices (Bring Your Own Device (BYOD)/ Consumerization) Push to create mobile apps & adopt socially connected applications Usage of apps without knowing what risks are introduced Insecure apps Improved productivity and reduced costs All Nippon Airways - 6000 ipads, 400 million yen (3.89 million euros) annual savings Senate of the Dutch Parliament replaces printed parliamentary documents with ipad Mobile device management and security are significant challenges. 4
Anticipated Mobile Security & Privacy Trends Mobile Operating Systems Mobile Apps BYO Mobile Devices Standard security features: device encryption, passcode locks, etc. Android will include more enterprise security features and be easier to manage Android will dominate worldwide market share 1 Windows Phone market share will surpass ios by 2015 1 Increase in mobile malware targeting ios and Android Additional anti-malware products available Incidents of corporate data leakage due to mobile malware By 2014 90% of organizations will support BYO 2 Different tiers of BYO for different groups of users BYO = smartphones, tablets, e-readers, laptops, & other devices Security & privacy issues: Near Field Communication (NFC) for mobile payments, e.g. Sixpack Radio Frequency Identification (RFID) Cameras - videoconferencing, image projection, barcode scanning Voice recognition, augmented reality, location based services Mobile devices will be increasingly used to process both sensitive business and personal data. 5 1 Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012 2 Gartner Top Predictions for 2011: IT s Growing Transparency and Consumerization
Enterprise Applications Extended to Mobile Devices New opportunities for sales enablement, customer & partner interaction, employee productivity, business process acceleration, & instant access to key analytics. Email Approvals Dashboards Top Management Contacts Workflow Middle Management Calendars Reports Scheduling & Dispatch Time & Expense Operations Transactions 6
BYOD roadmap 1. Your Road Map Must Address Diverse Hardware, Software, And Security Capabilities 2. Build your mobile road map Based ON Business Requirements 3. Prepare For Evolving Security And Privacy Challenges 4. Keep Your App Developers In Check With Strong Standards 7
Jumpstarting Your Enterprise Mobility Strategy Business Strategy Mobile Applications Enterprise Architecture Infrastructure Wireless Networks Security Device Management BYO Governance Establish a mobility leadership team. Identify and prioritize mobile applications for each business unit. Create a ~24 month mobility roadmap. This becomes a tangible destination for the IT team. Develop a design framework to guide application design decisions. Define use cases, target devices, functional requirements, wireframes and proof of concepts for top ~10 applications. Identify data and application services needed by mobile devices. Develop standard service interfaces that scale and are secure. Develop a cloud-friendly architecture (e.g. thin client or sync) that allows seamless roaming between smartphone, tablet and laptop over the course of the day. Decide on a push or pull model for mobile applications. Implement an application store or alternate distribution method. Understand the role of mobile middleware and evaluate architecture options. Understand the wireless expectations of your mobile applications. Ensure you have strong authentication and reliable, secure, high-speed wireless connectivity everywhere mobile users are. Perform security reviews throughout the mobile app development process. Evaluate security risks for each mobile application and each layer of the mobility stack and mitigate as needed. Develop mobile device procurement, security and management standards. Define mobile device management & data protection requirements & solution. Develop an agile process for new devices. Implement network access control to prevent unauthorized devices from accessing the network. Develop a policy around BYO devices. Define minimum security requirements and management controls. Implement systems and processes that provide adequate control. Communicate to users. Develop a mobile application rollout framework that addresses the complete systems delivery life cycle: requirements, design, testing, user training, user documentation, help desk readiness, etc. An enterprise mobility strategy establishes a framework to guide business, technology, architecture, process and resource decisions made while rolling out mobile apps and devices. It provides a roadmap for success. 8
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and deep local expertise to help clients succeed wherever they operate. Deloitte's approximately 170,000 professionals are committed to becoming the standard of excellence. This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the Deloitte Network ) is, by means of this publication, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this publication.
10