: What s Your Strategy? Eric Panknin IT Manager epanknin@dmj.com
What is BYOD? Building a Strategy Policy Considerations Mobile Security Solution Implementation and Training Maintain
Discussion and Experiences? BYOD
How do mobile devices affect/interact with your corporate network?
What are our concerns? Do we need to manage devices?
BYOD Benefits Productivity Flexible Environments Reduce Costs *
BYOD Challenges Security Compliance Support Device Management Data Ownership
A strategy to managing devices Develop a Policy Implement a Mobile Security Solution Deploy and Train Maintain
Policy Development Define Your Goals Eligibility Acceptable Devices Acceptable Use Security Disclaimers
Policy Development Policy items to consider: Are all employees eligible for mobile access to company data and applications? Will you support any individual device? Any applications or data access limitations Employee risks and responsibilities Conditions for reimbursement
Policy Development Policy items to consider: Device Requirements password, encryption What is your policy and process for handling a lost or stolen device? What is your policy and process for handling the decommissioning of a device? Will your company wipe the entire device, corporate data and apps only, or both? Will you allow user to initiate wipe action(s) themselves (e.g., through self service portal)?
Policy Development Policy items to consider: Policy should be clear on any restrictions on the usage of cameras, browsers, Bluetooth, or other applications and services. Policy should disclaim any liability for loss of personal applications or data, whether directly or indirectly resulting from the usage of company apps or data, and/or the wiping of such apps or data, or the whole device.
Policy Templates: http://www.welcometogood.com/byod/byod_policy_wp.pdf http://www.whitehouse.gov/digitalgov/bring your own device http://www.sans.org/reading room/whitepapers/pda/security policyhandheld devices corporate environments 32823 http://www.hrmorning.com/byod heres a sample policy to handle a trickynew trend/
Mobile Security Solution Software solution to manage mobile devices Different methods MDM Secure Container Virtualization Gateway
Mobile Security Solution Many management features Device Application Network Data Auto Provision IT Department New responsibility Need to be involved in selection
Mobile Security Solution MDM Vendors Air Watch Maas360 Citrix Good Technology LetMobile Mobile Iron Symantec
Implementation & Training Users agree to MDM Policy Test with a small group first Individual training with users
Maintain Technology is in motion Review policy annually
SUMMARY BYOD and mobile device access have become a standard and the devices must be secured. BYOD strategy includes developing a company policy and adopting a security solution to manage them. BYOD will take continual maintenance as the technology is always changing.
Thank You Eric Panknin, IT Manager epanknin@dmj.com 336.275.9886