HDAA BYOD Workshops May 2013



Similar documents
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

When Computers really become Personal

Guideline on Safe BYOD Management

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

IT Self Service and BYOD Markku A Suistola

Mobile and BYOD Strategy

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

Working anytime anywhere

Chris Boykin VP of Professional Services

Mobility Challenges & Trends The Financial Services Point Of View

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

Mobile Device Management Underpins A Bring-Your-Own- Device (BYOD) Strategy

The Evolution of the Service Desk: White Paper

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

Global Mobile Device Management (MDM) Market

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

trends and audit considerations

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

Security and Compliance challenges in Mobile environment

10/10. Fortescue Metals Group VDI Case Study. The Dashboard. Overview. Key Findings. Recommendations

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

AirWatch Solution Overview

Kony Mobile Application Management (MAM)

Readiness Assessments: Vital to Secure Mobility

What Is Cisco Mobile Workspace Solution?

IT Resource Management vs. User Empowerment

Mobile Device Management

If you can't beat them - secure them

Smart Givaudan. From BYOD experience to new mobile opportunities

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

The flexible workplace: Unlocking value in the bring your own device era

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

How To Support Bring Your Own Device (Byod)

Securing Corporate on Personal Mobile Devices

Solving the BYOD and Enterprise Mobility Puzzle

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Enterprise Mobility How the mobile world drives business

Five Steps to Android Readiness

Productive and Secure Enterprise Mobility with Cisco and Citrix

Architecture of Enterprise Mobile Apps

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Solve BYOD with! Workspace as a Service!

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

VMware End User Computing Horizon Suite

2011 Forrester Research, Inc. Reproduction Prohibited

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

IT Enterprise Services

Mobile Devices Policy

EMPOWERING THE DYNAMIC WORKPLACE

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

BRING YOUR OWN DEVICE

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Smartphones and ipads: mobility blessing or technology support curse?

ForeScout MDM Enterprise

Mobile Madness or BYOD Security?

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

The ForeScout Difference

Hands on, field experiences with BYOD. BYOD Seminar

Kaseya White Paper. Managing the Complexity of Today s Hybrid IT Environments

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

How To Protect Your Mobile Devices From Security Threats

Transcription:

HDAA BYOD Workshops May 2013

Discussion Mobility Trends in Australia BYOD and Consumerisation of IT Implications Checklist 2

Macro Trends GEOGRAPHIES Asia Pacific fastest growing Smart Mobile Device market HARDWARE 3 devices per employee; expansion of form factors APPS Complex, native v HTML5, disposable POLICY & LEGALITY CULTURAL Not moving quickly enough to match technology The soft factors become significantly harder Tech Research Asia

Australian Mobility Device Trends 54% Smartphone penetration of Australian population (Source : emarketeer/harris Interactive, Feb 2013) Penetration of Australian population 18+ (Source : emarketeer/harris Interactive, Feb 2013) 64% 130% Mobile device penetration forecast of population in 2015. (Source: Gartner) Penetration of tablets by 2016 (Source : Telsyte) ~50%

Device, OS, Platform Fragmentation Q. Which Brand do you Consider to be most useful in your role? Apple/iOS Microsoft Android/Google Other Source: TRA Future of Work Report, May 2013, prelim data, n = 260 5

DISCUSSION TOPIC How does Mobility adversely impact service level management, incident handling, reporting, etc? Does BYOD also impacts applications and employee- usability? 6

Applications & Implications Strategy Apps Performance Costs Surprises Apps Maintenance Approach Disposable Apps Image source: elie.im, jezweb.com.au, 123rf.com

The Consumerization of IT Consumerization of IT is the growing tendency for new information technology to emerge first in the consumer market and then spread into business and government organizations. Wikipedia Devices OS Apps Ecosystem

Enterprise BYOD Assumptions Consumer tech is considered better Employees want to bring their own devices Consumerisation is the primary driver of a next generation workspace Employees want flexibility with anywhere, anytime access 9 Productivity and employee satisfaction are key outcomes

and yet 94% of organisationswill have formal BYOD policy in place by mid-2013 *1 IT support for company-owned smart phones and tablets in Australian organisationshas nearly doubled from the previous year. *2 Support for BYO devices has decreased compared to 2011. *2 52% of Australian IT and business decision-makers believe that employees who encounter trouble with their personal devices contact the IT department. *2 60% of employees say they are most likely to troubleshoot the problem themselves. 14% per cent say they will ask a friend. *2 Source : 1 Citrix 2011 BYOD Survey, 2-2012 Unisys Consumerisation of IT research Forrester

DISCUSSION TOPICS How are capacity and infrastructure planning for mobility conducted? Reactively or Proactively Does mobility make asset management and configuration more complex?` 11

Mobility & BYOD Implications Connectivity Defined Triple A(ny) where, time, how Usage Push Mail, Net Connectivity Real time, Synchronous Company Kit Provided Mine, mine, mine! Work Office desk Sometimes Workplace devices Task Defined Computing Multi OS, Device, Apps Security Corporate Complexity Within the boundaries Extended Architecture Company management On All Employee Devices & SW Some User Frustration

Support Across the Mobility Ecosystem ENDUSERS APPLICATIONS DEVICES CONNECTIVITY SECURITY MIDDLEWARE INFRASTRUCTURE 13 Source: IDC, 2012

Security : The Landscape MDM landscape is evolving from single OS to multi OS to MIM and MAM Containerisation provides an efficient approach to issues of personal data loss as a result of selective / total device wipe in a BYOD environment. Containerisation also prevents the deployment of unauthorised apps direct to phone eg. It is not possible to download directly from Google s play store Expect commoditisation around MDM solutions as vendors bundle into service provider plans Despite scare-mongering, security threat is real in potentia No. of Apps installed on smartphone : 41* By 2015 mobile apps outnumber PC apps 4: 1** Look to certification credentials 14 * http://www.biztechrave.com/2012/07/27/the-great-app-splosion-infographic.html ** http://news.yahoo.com/android-ios-drive-mobile-app-explosion-infographic-230007886.html

Security : The Internal Checklist Risk vs. Reward? What s your risk profile? Who pays for mobility plans and / or hardware? Who pays if devices are lost / stolen at work? Who provides support for devices / company data? What applications are permitted / outlawed? Will employees agree to encryption of company data; monitoring of device and remote wipe if lost/stolen/leaving? Will employees agree to device monitoring to detect suspicious risk activity such as jail breaking? Start to create functional profiling of users based on mobile work style requirements 15

Legalities & Policies Data security policy must : Determine WHO has access to WHAT and HOW Risk profiles and employee role profiles need to be determined Provide for management of devices and access BYOD policy needs to: Define cost responsibilities Provide for minimisation of data & IP loss Ensure data security Provision for the management of liability and risk Ensure compliance both legal and 3 rd party Image Source : www.zynga.com Tech Research Asia

Legalities & Policies Discovery considerations In many countries, documents are defined as electronic data Discovery typically applies to all relevant company documents even if held on personal devices Have ability to provision and manage for separate work and personal profiles and device usage BACK UP, BACK UP, BACK UP Liability considerations How is this apportioned between company and employee? Who is responsible for licensing? Device lost, stolen, infected? Tech Research Asia

Checklist #1 Does your mobility strategy focus on both Internal and External goals? Does your company IT architecture support a Triple A operational approach? Does your architecture support multi-os, multi-device environment? Does policy incorporate legal, HR, IT and line of business operations? Establish clear metrics, goals and objectives. Does your App strategy reflect native, HTML5, hybrid? Image Source : www.photovalet.com

Checklist #2 Define where/when personal devices can be used for work. Define minimum specs- OS/HW/Apps Define who pays for support of the personal device. Define what ISN T supported or paid for by company. Define security policies, levels of permissible data access, lost/stolen devices, employee departures Image source : visualfunhouse.com

Email : tim@techresearch.asia Web : www.techresearch.asia 20