byod—the case for higher productivitybyod—the case for higher productivity extending today’s...

4
IDENTITY & ACCESS MANAGEMENT SOLUTION BRIEF An Opportunity for Increased Productivity and Collaboration Long gone are the days when people worked exclusively in front of their laptop or PC. Increasingly, employees get work done or collaborate on the road or at home, often during flexible hours. Business moves faster, more efficiently and with more satisfaction when professionals can communicate with their customers and partners quickly. The modern workforce can potentially continue working outside the office at any time of day. But to make that happen without cumbersome roadblocks, the workforce needs access to applications and resources from wherever they are, and the process needs to be natural, simple and secure. Consumerization of Mobile Devices An essential element of this trend toward higher productivity and business flexibility is the consumerization of mobile devices, which in most cases involves a transition to Bring Your Own Device (BYOD) policies. How businesses react to this trend will determine how effectively they capitalize on this unique opportunity. Increased productivity won’t happen automatically. It’s all too easy for the security concerns of the business to squash new creative ways to change, meaning improving the way users interact, collaborate and conduct business. Employees, contractors and partners need access to relevant information anytime from any device for both SaaS and Intranet services. Will IT organizations innovate on their existing infrastructure, or will they segregate and constrain mobiles users? BYOD—The Case for Higher Productivity Extending today’s access and collaboration infrastructure to your mobile users BUSINESS CHALLENGE Control risk to the business while letting users keep their personal devices personal. SOLUTION BENEFITS Convenient access for BYOD users Secure access for the business Minimal investment— leverage existing access infrastructure and policies Increased user satisfaction and productivity BYODIt’s Their Device, Not Yours Source: http://www.maas360.com/maasters/blog/security-information/byod-beware-infographic/?A=PR 82% consider the ability to be tracked an invasion of their privacy 76% would not give their employer access to view what applications are on their personal device 75% would not allow their employer to install an app that gives the company the ability to locate them in exchange for access to corporate resources 82% are concerned to extremely concerned about their employer tracking websites they browse on personal devices during non- work time 86% are concerned to extremely concerned about the unauthorized deletion of their personal pictures, music, and email profiles

Upload: others

Post on 20-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BYOD—The Case for Higher ProductivityBYOD—The Case for Higher Productivity Extending today’s access and collaboration infrastructure to your mobile users BUSINESS CHALLENGE Control

I D E N T I T Y & A C C E S S M A N A G E M E N T S O L U T I O N B R I E F

An Opportunity for Increased Productivity and Collaboration

Long gone are the days when people worked exclusively in front of their laptop or PC. Increasingly, employees get work done or collaborate on the road or at home, often during flexible hours. Business moves faster, more efficiently and with more satisfaction when professionals can communicate with their customers and partners quickly. The modern workforce can potentially continue working outside the office at any time of day. But to make that happen without cumbersome roadblocks, the workforce needs access to applications and resources from wherever they are, and the process needs to be natural, simple and secure.

Consumerization of Mobile Devices

An essential element of this trend toward higher productivity and business flexibility is the consumerization of mobile devices, which in most cases involves a transition to Bring Your Own Device (BYOD) policies. How businesses react to this trend will determine how effectively they capitalize on this unique opportunity. Increased productivity won’t happen automatically. It’s all too easy for the security concerns of the business to squash new creative ways to change, meaning improving the way users interact, collaborate and conduct business.

Employees, contractors and partners need access to relevant information anytime from any device for both SaaS and Intranet services. Will IT organizations innovate on their existing infrastructure, or will they segregate and constrain mobiles users?

BYOD—The Case for Higher ProductivityExtending today’s access and collaboration infrastructure to your mobile users

BUSINESS CHALLENGEControl risk to the business while letting users keep their personal devices personal.

SOLUTION BENEFITS• Convenientaccessfor

BYOD users

• Secureaccessforthebusiness

• Minimalinvestment—leverage existing access infrastructureandpolicies

• Increasedusersatisfactionand productivity

BYOD—It’s Their Device, Not Yours

Source: http://www.maas360.com/maasters/blog/security-information/byod-beware-infographic/?A=PR

82% consider the ability to be tracked aninvasionoftheirprivacy

76% wouldnotgivetheiremployeraccess to view what applications are on their personal device

75% wouldnotallowtheiremployerto install an app that gives the companytheabilitytolocatetheminexchangeforaccesstocorporate resources

82% areconcernedtoextremelyconcernedabouttheiremployertracking websites they browse on personal devices during non-worktime

86% areconcernedtoextremelyconcerned about the unauthorizeddeletionoftheirpersonalpictures,music,andemailprofiles

Page 2: BYOD—The Case for Higher ProductivityBYOD—The Case for Higher Productivity Extending today’s access and collaboration infrastructure to your mobile users BUSINESS CHALLENGE Control

And now that SaaS applications have become more important to organizations, IT departments also need to ensure they’re enabling both BYOD and SaaS access together.

Adding to the challenge is the need for corporations and other organizations to stay aggressive in managing their risk and keeping their private information secure while enabling the business.

Leveraging Past Identity and Access Investments

Today, it’s easy to forget how sophisticated we have become in the way we deliver information, applications and services throughout our organizations. By layering identity and access management onto corporate Intranets, organizations provide a portal to allow employees the freedom to do what they need. That can include searching for information dispersed

throughout the organization, participating in interchanges of knowledge and collaborating with other organizations.

Not only do Intranets often represent a significant infrastructure investment in accumulating, consolidating, storing and integrating all the various types of business information and services, they also offer access that is both convenient and secure. It’s no surprise that organizations that have invested in identity and access management have received, and continue to receive, enormous value from it. Intranets that contain robust identity and access management technologies can onboard users quickly, as well as provide a unified experience and manage user authentication. And for organizations offering single sign-on, applications are no longer islands. Rather, they are part of a single, efficient and unified experience in which a user authenticates once and has access to everything. The question is whether organizations can achieve the same benefits for their BYOD users.

Access Maturity

While increased user productivity and user satisfaction often rank high on the list of business priorities, equally crucial is managing risk. Organizations have evolved their internal processes and infrastructures to protect intellectual property, financial data or customer information. Organizations working in the healthcare or financial services industries must also deal with regulations, and as these regulations get stricter, IT will continue to rely on traditional Intranets to comply with these rigorous access requirements. Organizations can’t afford to throw away their investment in secure access.

BYOD in the Intranet

BENEFITS:

• Cost is shifted to their users (estimated 50% of companies are requiring employees to cover cost)

• Users are happier and more productive

• More business time—employees are more willing to respond to business emails during their personal time

• Enterprise IT becomes more flexible and can adopt new work paradigms

• Fuelled creativity—BYOD used in new ways to conduct

business

CONCERNS:

• Security issues related to having corporate data on personal devices

• In reality IT isn’t completely off the hook in troubleshooting access from these devices

• Access through VPN tends to be slow and complicated, and may be problematic or even unsupported

• Enterprises need to educate their employees about security and corporate good practice in relation to accessing company data

Page 3: BYOD—The Case for Higher ProductivityBYOD—The Case for Higher Productivity Extending today’s access and collaboration infrastructure to your mobile users BUSINESS CHALLENGE Control

Build on What You Have

The trick to a successful BYOD implementation that isn’t overly expensive or complicated is for IT to extend current Intranet access investments out to every user. When IT attempts to manage access at the device level, it can’t leverage its past investments. Instead, it has to reinvest in new application protection or access control. By concentrating on the identity of users, organizations can leverage existing Intranet capabilities, security and expertise instead of building duplicate functionality.

This also means that IT organizations need to quit thinking of their Intranet as a physical network to protect with firewalls and more as a set of services to bring users to, regardless of the location of those services or the location of users or the type of devices they are using.

Accessing the Cloud

Increasingly, organizations are consuming their important and often core business services as SaaS-based offerings. Modern organizations use these applications to deliver services not only to employees, but often to partners and customers that are beyond IT’s direct control. Because these services are hosted in the cloud, and access is most often provided by a separate identity, many IT organizations take the approach that if they don’t control it, they shouldn’t have to manage it. For managing corporate risk, this hands-off view is problematic, especially when BYOD users are the ones accessing such services. IT organizations have both a responsibility and an opportunity to protect access to all of their sensitive business information regardless of location.

The NetIQ Holistic Approach to BYOD

Some IT organizations take a case-by-case approach to solving their cloud and BYOD access needs. These organizations end up with a set of disconnected tools from a variety of vendors. Not only is there no single point of support for problem resolution, but it can be difficult to integrate and administer these disparate products to keep access secure and convenient. The NetIQ approach is different. We look at identity, access and security with a holistic view, providing integrated solutions across the spectrum.

40% of organizations aren’t confident of their ability to secure Intranet

access from mobile devices.

Source: http://www.sans.org/reading-room/analysts-program/SANS-survey-mobility

Only 20% of organizations believe that managing mobile devices is the right approach to protecting their information.

Page 4: BYOD—The Case for Higher ProductivityBYOD—The Case for Higher Productivity Extending today’s access and collaboration infrastructure to your mobile users BUSINESS CHALLENGE Control

NetIQ, the NetIQ logo, and Sentinel are trademarks or registered trademarks of NetIQ Corporation in the USA. All other company and product names may be trademarks of their respective companies.

© 2015 NetIQ Corporation and its affiliates. All Rights Reserved. 580-000002-002 DS 11/15

Worldwide Headquarters

515 Post Oak Blvd., Suite 1200 Houston, Texas 77027 USA Worldwide: +1 713.548.1700 U.S. / Canada Toll Free: 888.323.6768 [email protected] www.netiq.com http://community.netiq.com

For a complete list of our offices in North America, Europe, the Middle East, Africa, Asia-Pacific and Latin America, please visit www.netiq.com/contacts.

Follow us:

Convenient Mobile Access

As organizations continue to find new ways to use mobile devices (tablets and smartphones) to increase efficiency and enable new business processes, their users experience the obvious reality that mobile devices don’t work the same as PC workstations. They usually don’t have an attached keyboard and the small screen delivers a limited user experience. What’s quick and effortless on a desktop can be cumbersome and time consuming on a mobile device. NetIQ makes accessing internal and SaaS applications quick, convenient and secure on mobile devices.

Control Risk

Even though your BYOD users clamor for ease of access, you can’t let your guard down when it comes to protecting private information. Rest assured that Rest assured that the NetIQ identity, access and security solutions will keep access secure, not only from outsiders but from within as well. And unlike other solutions, NetIQ enables your IT team to leverage their existing infrastructure investments to move forward with Cloud and mobile rather than starting over.

To learn how to leverage your current investment to enable secure BYOD access for your employees and partners, visit www.netiq.com/solutions/identity-access-management

Identity-Powered Access Across the BoardAccess

Certification

Single Sign-on

Dashboards,Risks & Trends

Access Request

User Authentication

Security & Activity Intelligence

Access Administration

AuthorizationEnforcement

Forensic Analytics & Reporting

Delegated Administration

Privileged Access Management

Log Management Reporting

ACCESS FULFILLMENT

ACCESS AUTHORIZATION

ACCESS MONITORING

Security Remains the Top Business Barrier to BYOD.

Of respondents who thought the following were extremely important:

57% said data protection

55% said securing access to various corporate resources

51% said controlling and knowing who has access to sensitive information