BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS



Similar documents
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

AirWatch Solution Overview

MDM Mobile Device Management

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

BYOD Strategies: Chapter I

How To Write A Mobile Device Policy

Cisco Mobile Collaboration Management Service

What We Do: Simplify Enterprise Mobility

IT Enterprise Services

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Sophos Mobile Control

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Technical Note. ForeScout MDM Data Security

MAM - Mobile Application Management

IT Resource Management & Mobile Data Protection vs. User Empowerment

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Total Enterprise Mobility

Embracing Complete BYOD Security with MDM and NAC

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

trends and audit considerations

Optimizing the Mobile Cloud Era Through Agility and Automation

IT Resource Management vs. User Empowerment

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

EMPOWERING THE DYNAMIC WORKPLACE

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Securing Enterprise Mobility for Greater Competitive Advantage

6 Steps to Migrate from BlackBerry to a Secure, Multi-OS Environment

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Deep Dive BYOD, COPE & MDM

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

ForeScout MDM Enterprise

The ForeScout Difference

IBM Endpoint Manager for Mobile Devices

Total Enterprise Mobility. Norbert Elek

IT Self Service and BYOD Markku A Suistola

Managing Mobility in the BYOD Era:

Hands on, field experiences with BYOD. BYOD Seminar

Introduction to BYOD. Overview. In This Guide

Unified Windows Device Management in the Enterprise

Bring your own device freedom

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

How To Make Bring Your Own Device A Plus, Not A Risk

The User is Evolving. July 12, 2011

Private Geräte im Unternehmen - ein großes Potential mit Risiken

How To Manage A Mobile Device Management (Mdm) Solution

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

PULSE SECURE FOR GOOGLE ANDROID

How to Successfully Roll Out an Android BYOD Program

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

How Nokia deployed AirWatch MDM for Nokia Lumia

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Endpoint protection for physical and virtual desktops

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

Mobile Devices Policy

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Endpoint protection for physical and virtual desktops

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Five Strategies Small and Medium Enterprises Can Use to Successfully Implement High Value Business Mobility

Athena Mobile Device Management from Symantec

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Transcription:

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate

Current & Future Mobile Landscape Number of mobile phones will exceed world population by 2014 By the end of 2014, the number of global mobile users accessing the Internet is expected to surpass the number of desktop Internet users Today, 90% of U.S. workers are BYODers. 92% of BYODers access their own smartphones for work every week 62% at least every day and 30 % at least once per week Total smartphone shipments worldwide are expected to reach 1.03 billion by 2015

Key Trends in the Evolution of Mobility Past Present Future Security infrastructure Compromised detection Device lock and wipe Passcode policy App distribution Email management IT influence App SDK App Wrapping Content management BYOD IT infrastructure integration Granular privacy policies Legal influence Systems consolidation Business system integration Device, laptop, peripherals Content filtering Web gateways Law and regulation influence 25+ years of one-sizefits-all approach to workplace technology 82% using personal smartphones/tablets for business purposes 56% businesses are looking at mobility to improve productivity

Business Challenges IT Departments are faced with several challenges that come with managing a variety of employee-owned devices and operating systems Network access Network security Data Loss Prevention (DLP) Lost and stolen devices Supporting new and unknown equipment

What is BYOD? According to top analysts, Bring-Your-Own-Device (BYOD) is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data.

Bring Your Own Device (BYOD) Programs Business Objectives Device Choice Liability Privacy Security Management Employee Satisfaction Mobility Innovation Minimize IT Costs Employee Preference Platform Limitations Baseline Requirements Enterprise Data (Email, Apps, Content) Web/App Usage Onsite vs. Offsite Usage End User License Agreements Industry Regulations Personal Data (Email, Apps, Content) Device/Location Monitoring Policies and Compliance Access to Enterprise Services Request / Approval / Enrollment Procurement / Reimbursement Plan for Future Devices

BYOD Program Benefits Employee Enablement Support all operating systems and latest device models Enable employees to choose the most productive device Security and Risk Configure security policies based on device ownership Secure access to enterprise resources, apps and content Privacy and Transparency Configure info collected based on device ownership Isolate and protect both corporate and personal data Cost Control Reduce procurement and provisioning costs Focus resources on strategic mobile initiatives

What Does a BYOD Program Mean for IT Support? The IT department can rid themselves of the costs of mobile devices due to the preference of employees to use their personal devices at work. IT can outsource the cost of some of the company s cost of these devices, employee services, etc. Companies can use the money set aside for purchasing thousands of dollars worth of devices and data plans to provide support for those devices with maintenance. IT can take more time to focus on issues surrounding financial benefits and operational benefits.

Keeping Data Secure on Your Mobile Device Device ownership Terms of Use agreements Device and user authentication Data encryption Compromised device detection Remote data wipe

BYOD Lifecycle Self-service Corporate Resources Self-service Enrollment Policy Definition BYOD and Enterprise Mobility Self-service Enterprise Management Self-service Retirement

EMM is Key Enabler for BYOD Programs Device Choice Liability Privacy Security Management Support multiple platforms and device types Centralize asset tracking and management Enforce acceptance of End User License Agreement (s) Isolate personal and corporate data on device Set privacy settings to prevent viewing of personal data Secure access to enterprise services, apps, and content Disable access / remove data for non-compliant devices Simplify self-service enrollment for end users Manage approval work flows for enrollment requests Automate user authentication and device provisioning Configure settings and policies based on ownership Self-service support capabilities without IT involvement Integration into existing corporate user portals

Technology Platform