BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

Similar documents
Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.2

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

mobilecho: 5-Step Deployment Plan for Mobile File Management

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

The User is Evolving. July 12, 2011

Symantec Mobile Management 7.1

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

Cisco Mobile Collaboration Management Service

Mobile Device Management for CFAES

Symantec Mobile Management Suite

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

The Maximum Security Marriage:

IBM Endpoint Manager for Mobile Devices

Division of Information Technology Lehman College CUNY

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Bell Mobile Device Management (MDM)

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

USING GENIE REMOTELY

Chris Boykin VP of Professional Services

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

MDM Mobile Device Management

Bring Your Own Device Policy

All your apps & data in the cloud, all in one place.

How To Write A Mobile Device Policy

Hands on, field experiences with BYOD. BYOD Seminar

Mobile Device Strategy

activecho Frequently Asked Questions

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Access All Your Files on All Your Devices

ForeScout MDM Enterprise

HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

The ForeScout Difference

Mobile Printing for Business Made Easy

Harry Fike Frostburg State University Office of Information Technology Technical Services

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

E-commerce: Competing the Advantages of a Mobile Enterprise

Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015

20696B: Administering System Center Configuration Manager and Intune

Simplifying Desktop Mgmt With Novell ZENworks

Kaspersky Security for Mobile

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

activecho Driving Secure Enterprise File Sharing and Syncing

Research Information Security Guideline

Chapter 4. Operating Systems and File Management

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Five Steps to Android Readiness

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Mobile Device Management

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Business Case for Voltage Secur Mobile Edition

Salmon Group, Inc. An 8(a) Certified, Veteran owned company

When enterprise mobility strategies are discussed, security is usually one of the first topics

Microsoft Office 365 From Vodafone 2015 Update

How To Protect Your Mobile Devices From Security Threats

Cloud Backup and Recovery for Endpoint Devices

Workplace-as-a-Service BYOD Management

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

How To Protect Your Data From Harm

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

EMPOWERING THE DYNAMIC WORKPLACE

Enabling Growth and Driving Business Transformation. cloud

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

IBM United States Software Announcement , dated February 3, 2015

Generating leads with Meraki's Systems Manager. Partner Training"

How To Support Bring Your Own Device (Byod)

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Transcription:

BYOD and Its Impact on IT Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

BYOD and IT D means Apple products Macs iphones ipads Android phones IT means Microsoft products Active Directory Exchange File Servers Sharepoint 2 Macs ipads iphones Android Phones

EDA Members and Focus Security, Control, & Compliance Policies Macs File Access, Client Lifecycle Management Synching & Sharing ipads Enterprise Laptop Backup iphones Virtual Desktop Help Desk & Knowledge Base Android Phones Making it easy to deploy, integrate & manage Macs, iphones & ipads in a Windows environment. www.enterprisedevicealliance.org

Most Organizations Allow Employees to Bring Their Own Mobile Device 3/4 of Organizations Condone BYOD 85% 78% 75% 66% 67% 10000+ 2-10,000 500-2,000 100-500 All Responding Organizations by Number of Employees 4 Does your organization allow any employees to bring their own device?

You need a policy The policies must balance business return with additional IT overhead. User Productivity IT Efficiency Security: Protect Data Access Control Configuration Apps, Licensing ROI 5

Security Is Number One Concern, Slows Tablet Adoption IT is apprehensive about theft & corporate data access 54% 59% 29% 31% 31% 18% 11% Other Compliance Issues Application security Client management issues. Help Desk calls will increase. Securing access to company info Devices get stolen/lost 6 If your organization has set some limitations on whether employees can use Tablets, please select all the concerns that led to these restrictions.

Consumer Apps Compromise Mobile Security 56% believe consumer solutions compromise security Employees are using consumer solutions, and it's acceptable. 44% We are providing a secure alternative. 15% Employees are using these solutions. It's not really acceptable, but we don't have an alternative. 30% Employees are using these solutions, and we are planning to provide an alternative in or before 2012. 11% 0% 10% 20% 30% 40% 50% 7 Which of the following reflects your organization s attitude about staff using consumer solutions (Gmail or Dropbox) on their Smartphones and Tablets?

BYOD Security Requirements Data Protection / Device Control / Policy Enforcement 8

BYOD Device Management Configuration Connectivity Applications Compliance Licensing Regulations PCI-DSS, GLB, HIPAA, FISMA Device Control Remote Wipe 9

Device Management Solutions 10

How has the addition of Mobile Devices impacted the IT Department? 65% More Demands, Same Staff Automation Required 52% 53% 53% 56% 44% 47% 48% 40% 38% 37% 31% 36% 33% 29% 21% Number of IT personnel IT software costs IT hardware costs Security threats Compliance issues Management tools End user applications Help desk calls 11 Cost Less Same More Don't Know

BYOD Administration Challenges More work, same staff & budget New expertise/understanding required Management utilities must address new Mobile OSes New security threats New classes of user error, device trouble-shooting and management options and constraints New policies to enforce DOD Device Owner Defiance 12

Multi-Platform Solutions Required Exploit expertise Exploit infrastructure Require cross platform solutions Pursue automation 13

Administration Solutions 14

BYOD Productivity Means Data access Application access 15 558,603 apps published*

Data Access Solutions 16

Application Access Solutions 17

Wrap Up - BYOD and IT For Macs, iphones and ipads, IT must deliver: Data Protection Encryption Backup Remote Wipe Recovery of Lost Devices Access Control Policy Enforcement EDA solutions can help institutions: 18

More information Company Contacts: Absolute Software sales@absolute.com +1.800.220.0733 Code 42 - CrashPlan Bob Casserly bob@code42.com +1.612.333.4242 ext: 426 Parallels eda@parallels.com +1.425.282.6400 Centrify info@centrify.com +1.408.542.7500 GroupLogic info@grouplogic.com +1.703.528.1555 Web Help Desk eda@webhelpdesk.com +1.510.27.2251 Enterprise Desktop Alliance info@enterprisedesktopalliance.com +1.408.542.7572 19

The Enterprise Device Alliance Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment 20