Implications of BYOD & the Cloud for Enterprises



Similar documents

Cloud Backup and Recovery for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Mobile Access Software Blade

Riding technology waves

Introduction. Mobile devices have become an integral part of the everyday work environment. www. Ulistic.com

THE BYOD SURVIVAL GUIDE 5TIPS FOR PRACTICING SAFE MOBILE FILE ACCESS AND COLLABORATION

CLOUD AND AUTOMATION FOR SMBS: Simple strategies for success

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

Mobile Content Collaboration and its Benefits Across Your Enterprise. A Good Technology Whitepaper

What Is BYOD? Challenges and Opportunities

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Choosing a global cloud infrastructure provider

How To Support Bring Your Own Device (Byod)

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

Device Independence - BYOD -

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

Hands on, field experiences with BYOD. BYOD Seminar

Mobile World. Chris Winter SafeNet Inc.

SOOKASA WHITEPAPER CASB SECURITY OVERVIEW.

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

Online File Sharing for Business

BYOD report. Comms-care commissioned survey highlighting the change in Bring Your Own Device (BYOD) issues over the past twelve months

Bring Your Own Devices (BYOD) Information Governance Guidance

10 Hidden IT Risks That Threaten Your Financial Services Firm

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

Inside Track Research Note. In association with. The Escalating Mobile Security Challenge BYOD was just the beginning

BYOD (Bring Your Own Device)

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Access Tropical Cloud Desktop from Any Device

Consumerization Survey Report The Consumerization of IT

ALL THAT GLITTERS IS NOT GOLD

Cheap, Free Cloud Storage Works for Your Device, Your Stuff, You

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

ForeScout MDM Enterprise

SANS Survey on Mobility/BYOD Security Policies and Practices

The ForeScout Difference

BYOD - A challenge for IT Leaders

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

A Guide to MAM and Planning for BYOD Security in the Enterprise

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Welcome to the era of the anywhere worker

Rx for mthreats in Today s Healthcare Institutions. Daniel W. Berger, President and CEO, Redspin, Inc. P: E: dberger@redspin.

Mobile Security: The good, the bad, the way forward

Greenlight. Managed Network. Managed Services. IT Support. Printer Support. Business VoIP. Cloud Solutions. Office Relocations.

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

Eprise Mobility - A Model For Success!

MOBILE SECURITY: DON T FENCE ME IN

EOH Cloud Backup - End User. EOH Cloud Services - EOH Cloud Backup - End User

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

7 Things You Need to Know about Virtual Mobile Infrastructure

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

Neat Cloud Service + Mobile App

Data Protection Act Bring your own device (BYOD)

Work From Anywhere With Unified Communications. gsolutionz.com

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

The BYOD Survival. for Practicing Safe Mobile Collaboration

BYOD (Bring your own device)

The Changing Dynamics of Mobility in the Workplace

How to Practice Safely in an era of Cybercrime and Privacy Fears

Security Architecture Whitepaper

IT Self Service and BYOD Markku A Suistola

With the adoption of the technology of Cloud Computing (Cloud. Computing), virtual desktop solutions represent one of the most

Practical Legal Aspects of BYOD

The Challenges Posed by BYOD.

Workshop: Data protection in the digital office. ICO Foundation SME Workshop Technology

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Interacting with End Users re: Security

How to Avoid Data Leakage from Mobile Enterprise Apps:

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

MDM and beyond: Rethinking mobile security in a BYOD world

Five ways to improve business continuity. Mitel Mobility

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

Policy Outsourcing and Cloud Based File Sharing

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Time better spent. Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business

Is your business secure in a hosted world?

Cortado Corporate Server

How A Connection Broker Simplifies Hosted Desktop Environments

Adapting to a Mobile World

Monitoring & Measuring: Wi-Fi as a Service

Making Leaders Successful Every Day

Top 5 Reasons to Choose User-Friendly Strong Authentication

W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Five Strategies Small and Medium Enterprises Can Use to Successfully Implement High Value Business Mobility

VIRTUALIZATION: THE PUBLIC KNOWLEDGE GAP

Acronis BRING YOUR OWN DEVICE

Bring Your Own Device Policy

Insert Partner logo here. Financial Mobility Balancing Security and Success

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Transcription:

Implications of BYOD & the Cloud for Enterprises Clive Longbottom, Service Director, Quocirca Ltd

BYOD Bring your own device It s not just smartphones, tablets, etc There is also: BYOS (software) Generally through BYOA (App) BYOC (Cloud) Most everything is held elsewhere BYOCh (Chaos) Information everywhere in unknown states being used by unknown apps Just what can you do?

The big issues of BYOD Where s the data? How are costs managed? Theft, loss or other departure of device Lack of best practice in usage Lack of team work capabilities Lack of organisation access to all information Too many lone wolves

Strategising BYOD What are your aims? Secure corporate intellectual property Enable the organisation to compete in its markets Enable departments to complete their processes Enable the workforce to carry out their tasks Pretty much everything else is nice to have Rule #1 Information must be controlled

Option 1 Lockdown Force everyone to use authorised devices only Provide a list of corporate apps Drive everything through remote desktops (VDI) Enforce rules through monitoring, blocking and HR sanctions

Option 1 It s never worked and never will do Devices can be expensed If you stop users from expensing the items, they are cheap enough to self-fund Unsubstantiated received wisdom is that the new workforce will just go elsewhere The virtual desktop is not the ultimate answer Ever tried saying No when the CEO comes in and says Make this brand new Applia iplaymia TransTab work, will you?

Option 2 Free for all If you can t stop them, let them get on with it Remove device support maybe give them a cash fund for using their own kit Remove the help desk if you chose that tool/app, then you support it Information storage, backup and recovery is the user s problem Just make it an S.E.P.

Option 2 Not recommended Who will the organisation blame when the file sharing site goes out of business, and all the intellectual property suddenly disappears? What do you do when the business says that they would have made the right decision if only they had had access to all the information? How do you deal with leavers? Oh it s your problem, right enough

Option 3 Let s be sensible Create a pretty embracing base platform definition And keep it up to date Aim to allow users to have flexibility Put yourself in their shoes but with the business hat on Monitor device connectivity and activity What are users using? How? WHY? Embrace where users are doing things intelligently Gently re-position where users are not being clever Centralise where it makes sense

Embrace and advise Is that app doing something useful? Great can we use this across the whole organisation? Is that app helping the organisation? If no, do we have an equivalent that does? Is that app dangerous to the organisation? If so, why and what can be done about it? Build up a library of useful apps that are useful to the organisation and add and change as necessary.

Centralise It s not all about VDI Although that is a starting point It is about ensuring that all corporate data is secured Look at how applications can be streamed How the power of the device can be utilised How apps can be accessed and downloaded Corporate portal needs to be as good as a consumer app store

Protect Secure how devices are used for corporate activities Encryption VPNs On the move and at rest Gives a central point of connection Data leak prevention Sandbox functionality Prevention of cut and paste Prevention of use of certain apps for certain types of data

Management and control Asset management Identify anything that touches the network Use multi-factor authentication to make sure it is who they say they are Bomb rogue devices But only the corporate parts The device if BYOD does not belong to you

Conclusion BYOD is here it is not going away You have to embrace it Many users will be doing things in a clever way Identify, praise and use Many will be doing something clever but not in the best way Identify, praise and find a better equivalent You can only control what you know is happening Everything corporate has to touch a known point Don t be scared of BYOD and the Cloud But don t be laissez faire about it, either