How To Manage A Mobile Device Management At Harvard



Similar documents
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

UAB Cyber Security Ini1a1ve

Mobile Security & BYOD Policy

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

AirWatch for Android Devices

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Connec(ng to the NC Educa(on Cloud

How To Protect Virtualized Data From Security Threats

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov

Apple Configurator MDM Site - Review

Tom Schauer TrustCC cell

Mobile Devices Using Without Losing

GETS AIRWATCH MDM HANDBOOK

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM

Encrypted Opening and Replying to a Secure Message

Cloud Compu)ng in Educa)on and Research

When enterprise mobility strategies are discussed, security is usually one of the first topics

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

A guide to enterprise mobile device management.

Smart Ideas for Smartphone Security

Cloud Compu)ng: Overview & challenges. Aminata A. Garba

Overview of SOTI.

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Mobile Iron User Guide

Systems Manager Cloud Based Mobile Device Management

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Mobile Device Management for CFAES

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Android EMM Enrollment

Mobile App Containers: Product Or Feature?

Kaspersky Security for Mobile

Mobile Device Security Is there an app for that?

The Seven Habits of State-of-the-Art Mobile App Security

District 211 Technology. ipad Setup Instructions

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Deploying iphone and ipad Apple Configurator

How To Secure Shareware Kiteworks By Accellion

MDM User Guide June 2012

Online Enrollment Op>ons - Sales Training Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Selling Hosted MS Exchange 2010 & SharePoint

Mobile Device Management ios Policies

BYOD: End-to-End Security

Research Information Security Guideline

Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents

Harry Fike Frostburg State University Office of Information Technology Technical Services

Top. Enterprise Reasons to Select kiteworks by Accellion

An Introduc+on to CloudPrime

11 Best Practices for Mobile Device Management (MDM)

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

GCM for Android Setup Guide

Bring Your Own Device Policy

Building a Mobile Information Management Strategy

ITS Strategic Plan Enabling an Unbounded University

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Symantec Mobile Management 7.1

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

BadUSB On accessories that turn evil

Manual for Android 1.5

Healthcare Buyers Guide: Mobile Device Management

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Salmon Group, Inc. An 8(a) Certified, Veteran owned company

Enterprise Mobility Services

Symantec Mobile Management for Configuration Manager 7.2

Transcription:

Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS

Objec&ves Our hope is that this conversa0on will get people thinking about mobile device management: Why is this important? And why is it 0me sensi0ve? How do we get there from here? What do we need to be doing? Why would you want to use MDM socware at SEAS? Why we need end- to- end mobile security management Solu0ons to monitor, control and protect across devices, apps, data and the network. Enrollment Demo and Q&A 2

Why do we need to think about this? Why can t we delay? TRENDS, RISKS & CHALLENGES

Trends: Personal Mobile Device Use 4

Risks and Challenges: An Evolving Landscape

Trends: Mobile Devices in the Workplace 6

Risks & Challenges: How do we protect Data & Iden88es? Harvard is a high- value target for many such threats 7

Risks & Challenges: How do we protect Data & Iden88es? Are Paid Apps Safer Than Free Apps? ios vs. Android Apps? 8

Risks and Challenges: What are other schools doing? Some schools are using a MDM vendor, others are leveraging resources they already own. AirWatch clients include Georgetown, Indiana University & UCLA Stanford has developed their own solu0on. Yale also offers an MDM solu0on to their customers. Harvard is BEHIND the curve

What do we need to be doing? Why should you use MDM socware? GETTING THERE FROM HERE

WHY use MDM? If you don t have a mobile strategy, you don t have a future strategy. Eric Schmidt (Google)

WHY use MDM? Allow you to use your mobile device for work purposes while making sure your data is protected. We all lose if your security is compromised. What do mobile devices bring to the table? How does the use of mobile devices ENABLE the pedagogy at Harvard? These are no longer just status symbols...they are useful devices. These are the func0ons that you want to embrace, enable, and foster How could the use of mobile devices INHIBIT the pedagogy or even HARM the school?

Security is the main reason companies hesitate to embrace mobile

Resistance I don t want to lock my phone what if I forget the code? It s my device, not Harvard s! Just treat them the same way we do laptops. Harvard Approved Vendors don t provide these services in the way we want MDM products are EXPENSIVE! We re a school, not a bank! The faculty will never go for it Lock codes are annoying! If I lock my ipad down, my kids can t use it! It s a viola&on of my privacy! I don t want Harvard to be able to track my loca8on!

How do they complicate things? CLOUD SERVICES

Mobile Device & Cloud - Security Issues Mobile Devices Bring Cloud Storage & Security Risks Mobile devices with their limited storage and compu.ng capabili.es are drivers for having services provided by Cloud Compu.ng (icloud, Dropbox, AWS ). Insecure cloud- based backup and highly confiden0al informa0on from mobile devices. icloud Use of Pages, Numbers on ipad automa0cally copies file to Apple s servers. Non- compliance with data protec0on regula0ons. Privacy and iden0fy thec case of Mat Honan, Senior writer at wired.com - whole his digital life was erased.

What DON T MDM products do? MDM products leverage the capabili0es of the na0ve device If the device doesn t handle encryp.on If the device doesn t allow pajern swipe- unlock or enable 6- digit numeric pins If the OS s error message is confusing

What does MDM NEED to do? Today s devices need a solu0on to monitor, control and protect the enterprise across devices, apps, data and the network.

What would we NEED a MDM to do? Can we do these things WITHOUT inhibi8ng the customer s use of the Device device? Usability Device protec&on and compliance Can we help our customers follow Harvard s policies for how sensi8ve informa8on is handled? Access to HU Services Same goals Are we ensuring that customers have access to the RIGHT set of services?

What would we NEED a MDM to do? Enable us to help our customers follow Harvard s and SEAS policies and standards Phased approach to implementa0on: PIN/ Password, encryp0on, locate, lock, and wipe

First Phase: Password policy, encryp&on, and locate/lock/wipe features Ensure your device is encrypted

AirWatch SAMPLE MDM PRODUCT

AirWatch End- to- End Security Solu&on Airwatch provides solu0ons to meet almost all of the above requirements. SEAS started AirWatch pilot project in February 2013 op0ons and ini0al results in end- to- end mobile security management.

AirWatch Installa&on/Enrollment Guides Installa0on and enrollment guides for ios and Android are available at SEAS ISO website: hgp://www.seas.harvard.edu/informa0on- security/mobile- device- management

DEMO AND Q & A SESSION