BYOD: What s Your Strategy?



Similar documents
BYOD: Bring Your Own Device Advantage, Liability or Both?

Mobile Device Management. Andrius Šaveiko

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Bring Your Own Device. Individual Liable User Policy Considerations

Bring Your Own Device (BYOD) Mobile Device Management (MDM) Joshua Jacobs, Sawyers & Jacobs LLC jjacobs@sawyersjacobs.com. Presented by Joshua Jacobs

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Total Enterprise Mobility. Norbert Elek

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

Mobility Impact on the Enterprise

LabTech Mobile Device Management Overview

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Thanks for joining We ll start at 10am

[BRING YOUR OWN DEVICE POLICY]

Mobile Device Security Is there an app for that?

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

Session 125: A Health IT Executive s Guide To BYOD Management

How To Write A Mobile Device Policy

Mobile App Management:

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success

BYOD Policy for [AGENCY]

Ben Hall Technical Pre-Sales Manager

Fit for Future Back Office. Project Board Meeting 18 May 2012 Agenda Item 2.1. Mobile Device Strategy

The Guide to Implementing a BYOD Policy at Your Company An ebook by Your Friends at UTG

IT Enterprise Services

allchoice We are XMA. Empowering employee device choice within the workplace

Kony Mobile Application Management (MAM)

Third Thursday Crowell & Moring s Labor & Employment Update June 20, 2013

Cortado Corporate Server

Mobile Devices Policy

Bring Your Own Device and Expense Management

Management of Multi-OS Smart Devices Made Simple.

Embracing Complete BYOD Security with MDM and NAC

Mobile Device Management: Key Components, V1.0. September Document Sponsor

Kaspersky Security for Mobile

Secure Your Mobile Workplace

IBM MobileFirst Managed Mobility

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Sophos Mobile Control User guide for Apple ios. Product version: 4

IT Resource Management vs. User Empowerment

A 3-STEP PLAN FOR MOBILE SECURITY

Mobile Device Management Solution Hexnode MDM

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Mobile Device Management for CFAES

IT Resource Management & Mobile Data Protection vs. User Empowerment

Enterprise Mobility. Bring Your Own Device (BYOD) Policy Guidebook Questions to Ask and Best Practices to Consider

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia

Washwood Heath Academy Use by staff of private communication devices policy

Microsoft Enterprise Mobility Suite

Secure Mobile Solutions


Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

GETS AIRWATCH MDM HANDBOOK

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Workplace-as-a-Service BYOD Management

How To Make Bring Your Own Device A Plus, Not A Risk

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Chris Boykin VP of Professional Services

Compliance Management for Mobile Devices

ForeScout MDM Enterprise

The ForeScout Difference

Adapting to a Mobile World

Latest IT Trends For Secure Mobile Collaboration

Note: Support: Never use your TruMobi application for personal use.

Mobile Tablet Devices

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Bell Mobile Device Management (MDM)

trends and audit considerations

IT Self Service and BYOD Markku A Suistola

How To Secure Your Mobile Device

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

NCSU SSO. Case Study

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Mobile Device Management (MDM) Policies. Best Practices Guide.

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Mobile Security Fall 2013

Insert Partner logo here. Financial Mobility Balancing Security and Success

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

How To Protect Your Mobile Devices From Security Threats

Tuesday, June 5, 12. Mobile Device Usage

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

Enterprise Mobility Management

A matter of trust Fujitsu Managed Mobile

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

How To Support Bring Your Own Device (Byod)

CDH. Microsoft System Center Configuration Manager & Mobile Device Management


Gartner for IT Leaders Tool [Organization Name] Mobile Device Policy and Procedures for Personally Owned Devices: BYOD Program

Enterprise- Grade MDM

Bring Your Own Device (BYOD) and Mobile Device Management.

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

Bring Your Own Device - A Case Study

Mobile Device Management (MDM) Policies

1 Mobile Device Management

Transcription:

: What s Your Strategy? Eric Panknin IT Manager epanknin@dmj.com

What is BYOD? Building a Strategy Policy Considerations Mobile Security Solution Implementation and Training Maintain

Discussion and Experiences? BYOD

How do mobile devices affect/interact with your corporate network?

What are our concerns? Do we need to manage devices?

BYOD Benefits Productivity Flexible Environments Reduce Costs *

BYOD Challenges Security Compliance Support Device Management Data Ownership

A strategy to managing devices Develop a Policy Implement a Mobile Security Solution Deploy and Train Maintain

Policy Development Define Your Goals Eligibility Acceptable Devices Acceptable Use Security Disclaimers

Policy Development Policy items to consider: Are all employees eligible for mobile access to company data and applications? Will you support any individual device? Any applications or data access limitations Employee risks and responsibilities Conditions for reimbursement

Policy Development Policy items to consider: Device Requirements password, encryption What is your policy and process for handling a lost or stolen device? What is your policy and process for handling the decommissioning of a device? Will your company wipe the entire device, corporate data and apps only, or both? Will you allow user to initiate wipe action(s) themselves (e.g., through self service portal)?

Policy Development Policy items to consider: Policy should be clear on any restrictions on the usage of cameras, browsers, Bluetooth, or other applications and services. Policy should disclaim any liability for loss of personal applications or data, whether directly or indirectly resulting from the usage of company apps or data, and/or the wiping of such apps or data, or the whole device.

Policy Templates: http://www.welcometogood.com/byod/byod_policy_wp.pdf http://www.whitehouse.gov/digitalgov/bring your own device http://www.sans.org/reading room/whitepapers/pda/security policyhandheld devices corporate environments 32823 http://www.hrmorning.com/byod heres a sample policy to handle a trickynew trend/

Mobile Security Solution Software solution to manage mobile devices Different methods MDM Secure Container Virtualization Gateway

Mobile Security Solution Many management features Device Application Network Data Auto Provision IT Department New responsibility Need to be involved in selection

Mobile Security Solution MDM Vendors Air Watch Maas360 Citrix Good Technology LetMobile Mobile Iron Symantec

Implementation & Training Users agree to MDM Policy Test with a small group first Individual training with users

Maintain Technology is in motion Review policy annually

SUMMARY BYOD and mobile device access have become a standard and the devices must be secured. BYOD strategy includes developing a company policy and adopting a security solution to manage them. BYOD will take continual maintenance as the technology is always changing.

Thank You Eric Panknin, IT Manager epanknin@dmj.com 336.275.9886