5 considerations for a successful byod strategy

38
5 Considerations for a Successful BYOD Strategy Barbara Hudson, Global Product Marketing Manager, Mobile Data Protection

Upload: sophos

Post on 19-Jan-2015

488 views

Category:

Technology


0 download

DESCRIPTION

Bring your own device (BYOD) is becoming the rule rather than the exception which has created a new set of challenges for IT. A BYOD strategy can help you get a grasp on your mobile devices. But with the right security solution, it can also save you time, money, and the sanity of your help desk. Watch this webcast to understand how BYOD impacts your security and what to look for in a BYOD solution. Learn more about BYOD here: http://bit.ly/Ob1Giz

TRANSCRIPT

Page 1: 5 Considerations for a Successful BYOD Strategy

5 Considerations for aSuccessful BYOD Strategy

Barbara Hudson, Global Product Marketing Manager, Mobile Data Protection

Page 2: 5 Considerations for a Successful BYOD Strategy

Poll Question PlaceholderAre employees in your organization allowed to use personal devices for work?

•No and no plans•No but planning to allow•Yes, for email only•Yes, for email and other systems•Don’t know/other

Page 3: 5 Considerations for a Successful BYOD Strategy

What we’ll talk about• What is BYOD?• Mobile Revolution, the Post PC era?• BYOD: What to consider

1. Users

2. Devices

3. Apps

4. Infrastructure

5. Security

• Choosing a BYOD solution• Q&A

Page 4: 5 Considerations for a Successful BYOD Strategy

What is BYOD?

Consumerization of IT?

Personal smartphones, tablets, etc. being used at work

When employees pay for their own devices and plans

Bring Your Own Technology

Define what BYOD means – for you

There are probably no two organizations where

it means exactlythe same

Page 5: 5 Considerations for a Successful BYOD Strategy

The mobile revolution

Page 6: 5 Considerations for a Successful BYOD Strategy

The big shift

Source: Kleiner, Perkins, Caufield, Byers, Dec 2012

20001.3 million

devices

20121.2 billion devices

Page 7: 5 Considerations for a Successful BYOD Strategy

BUTPCs are evolving

- New interfaces

- New form factors

The Post-PC era? Not yet.

7

Data source: ZDNetPhoto source: Fujitsu

66%

29%

5%

Page 8: 5 Considerations for a Successful BYOD Strategy

The multi-device user

1.96 mobile devices used for

work in 2012iPass Mobile Workforce Report,

2012(Tablets, smartphones and mobile phones)

Page 9: 5 Considerations for a Successful BYOD Strategy

All work and no playSmartphones and tablets add

2 hours to the working day

Source: Pixmania Study, telegraph.co.uk 31.10.12, Photo: Getty Images

Page 10: 5 Considerations for a Successful BYOD Strategy

BYOD: 5 Considerations

Page 11: 5 Considerations for a Successful BYOD Strategy

BYOD: The new IT challengeNew challenges for IT departments

IT needs tools to control devices

Mixed ownership

Many different apps

Network access

User is the admin

Compliance & security

Device Diversity

Enterprise vs. Personal Apps

IT productivity

Page 12: 5 Considerations for a Successful BYOD Strategy

1. Users

Page 13: 5 Considerations for a Successful BYOD Strategy

Users have different needs

I am IT!My

smartphone is my lifeline

I need mobile access to my

sales data

iPads are great for

presenting

Page 14: 5 Considerations for a Successful BYOD Strategy

Know your users

100% 100% 20% 100%

50% 70% 10% 50%

30% 80% 10% 100%

5% 10% 15% 0%

100% 100% 100% 100%

2.5 2.7 1.3 2.5

SalesIT Office staff Remote workers

Smartphone

Tablet

Work remote

Manager

PC/Notebook

Devices/user

Page 15: 5 Considerations for a Successful BYOD Strategy

2. Devices

Page 16: 5 Considerations for a Successful BYOD Strategy

User devices

User-owned devices

- What happens in case of loss or theft?

- Can you wipe the device?

- What can you enforce?

- Can you block applications?

- How can you ensure data security?

Page 17: 5 Considerations for a Successful BYOD Strategy

Narrowing down

Look at experience in IT

Compare OS functionality

Decide which platforms

Define minimum OS version

Device model restrictions?

Device type restrictions?

Page 18: 5 Considerations for a Successful BYOD Strategy

The Acceptable Use PolicyScope

• Which devices does it cover?• Corporate and personal devices

Technical Requirements• Minimum OS• Encryption• Password• Anti-malware protection

User Requirements• What happens when…• Back up of personal data

Page 19: 5 Considerations for a Successful BYOD Strategy

3. Apps

Page 20: 5 Considerations for a Successful BYOD Strategy

• Potential risk from apps• Third-party app stores• Which workflows put sensitive data

on personal devices?• What regulations apply to your

region/industry?• How can apps benefit the mobile

user? • Promote collaboration with

supported tools

All about apps

Page 21: 5 Considerations for a Successful BYOD Strategy

• Distribute in-house apps

• Link to app store or upload

• Blacklist/Whitelist apps

• Deploy apps to devices

• Manage volume purchases

• iOS Managed Apps

• View installed apps

Mobile Application Management

Enterprise App Store

Page 22: 5 Considerations for a Successful BYOD Strategy

Secure collaboration, e.g. cloud

22

64% of people think cloud storage is risky but 45% still go right ahead and use it.

Sophos InfoSec Survey, 2012

Notebook

Cloud Storage

Mobile Device

The solution: End-to-end encryption

Page 23: 5 Considerations for a Successful BYOD Strategy

4. Infrastructure

Page 24: 5 Considerations for a Successful BYOD Strategy

Resources for BYODPersonnel• IT staff or dedicated resources• Decentralized management• Experience available

On premise solution, SaaS or Managed Service

Network infrastructure• WiFi set up• Connecting remote workers• Mobile access to internal systems

Stay productive

Page 25: 5 Considerations for a Successful BYOD Strategy

Application Control

Next Generation Firewall • Real-time reports• Completely block or

allow applications• Allocate bandwidth and

prioritize by shaping traffic to requirements

• Monitoring and reporting history

Priority for business

25

Page 26: 5 Considerations for a Successful BYOD Strategy

Hotspot guest accessProvide controlled and limited access• Managed, temporary

Internet access for guests and others

• Ticket management Password of the day Volume-based Time-based

26

Page 27: 5 Considerations for a Successful BYOD Strategy

5. Security

Page 28: 5 Considerations for a Successful BYOD Strategy

Widespread lack of awareness

89% = unaware

65% = unbothered

67% = unsecured

Page 29: 5 Considerations for a Successful BYOD Strategy

29

Explosion of Android malware

2010 2011 20120

10000

20000

30000

40000

50000

60000

70000

80000

No. of Android malware samples discovered each year

Page 30: 5 Considerations for a Successful BYOD Strategy

Security threats BYOD• An unsecured device means unsecured data

You can insure your devices – but what is your data worth?

• MDM helps enforce controls such as password, lock, etc. If you’re not sure, you’re not secure

• Protect Android devices with anti-malware protection Users can remove protection, so needs to be enforced

• Malicious websites can also target mobile users Apply web protection to keep web threats at bay

Page 31: 5 Considerations for a Successful BYOD Strategy

Keep malware at bay

Free Managed

Page 32: 5 Considerations for a Successful BYOD Strategy

5 Considerations for BYOD

1. Users

2. Devices

3. Apps

4. Infrastructure

5. Security

Page 33: 5 Considerations for a Successful BYOD Strategy

Choosing an MDM solution

Choose a flexible solution

Ensure it can grow with you

Look at security options

Look at licensing

Don’t bite off more than you can chew

Page 35: 5 Considerations for a Successful BYOD Strategy

And what about costs?

1 user

2 devices

2 licenses

1 user 2 devices 1 license

Better option

@ 50$ / license = 100$

Page 37: 5 Considerations for a Successful BYOD Strategy

Complete Security

Email Data Endpoint Mobile Web Network

Clean up

Automation

Visibility Local self-help

WiFi security

Keep people working

Technical support

Access control

Intrusion prevention

Anti-malware User education

Data Control

Stop attacks and breaches

Firewall

Email encryption

Virtualization

Endpoint Web Protection

Mobile Control

Secure branch offices

Encryption for cloud

Live Protection

Mobile app security

Protect everywhere

Web ApplicationFirewall

URL Filtering

Anti-spam Patch Manager

ApplicationControl

Encryption

Device Control

Reduce attack surface

Page 38: 5 Considerations for a Successful BYOD Strategy

38

US and Canada 1-866-866-2802

[email protected]

UK and Worldwide + 44 1235 55 9933

[email protected]

nakedsecurity.sophos.com

Staying ahead of the curveStaying ahead of the curve

facebook.com/securitybysophos

twitter.com/Sophos_News

Sophos on Google+

linkedin.com/company/sophos