the irresistible force of byod -- how to get it running securely

33
The Irresistible Force of BYOD – How to Get it Running Securely Presenter: Marco Nielsen Vice President, Services [email protected] om

Upload: enterprise-mobile

Post on 09-May-2015

2.064 views

Category:

Technology


0 download

DESCRIPTION

From increasing productivity to reducing operational costs, it's time for companies to look at how they be more effective with BYOD. Join Marco Nielsen, VP of Services at Enterprise Mobile, as he shares how to optimize your BYOD strategy and execution, how to make the most of your existing management solutions and how to address security challenges that have arisen from a much more diverse mobile device and application landscape.

TRANSCRIPT

Page 1: The Irresistible Force of BYOD -- How to Get it Running Securely

The Irresistible Force of BYOD –

How to Get it Running Securely

Presenter: Marco NielsenVice President, [email protected]

Page 2: The Irresistible Force of BYOD -- How to Get it Running Securely

Our Agenda Today

Introduction

BYOD Strategy

BYOD Execution

BYOD Support

Summary

Q&A

Contact Us

Page 3: The Irresistible Force of BYOD -- How to Get it Running Securely

Marco Nielsen, VP of Services, Enterprise Mobile 

Meet Today’s Presenter

Marco is an internationally recognized expert in mobile device management and mobile devices, with nearly 20 years’ experience spanning systems architecture, operating systems, hardware and communications. Marco brings a broad perspective on how to design and deliver a successful enterprise mobility initiative.

Page 4: The Irresistible Force of BYOD -- How to Get it Running Securely

What is “BYOD”?

Bring your own device (BYOD) is the policy of permitting employees to bring personally owned

mobile devices (laptops, tablets, and smartphones) to their workplace, and use those devices to access

privileged company information and applications.

BYOD“Bring Your Own Device”

Page 5: The Irresistible Force of BYOD -- How to Get it Running Securely

According to Forrester, there will be 1 billion smartphone

customers by 2016, with 257 million smartphones and 126

million tablets in the US alone.*

*Source: Forrester – Mobile is the New Face of Engagement

Page 6: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Gathering User Segments

Need for Mobility

Need

for

Su

pp

ort

Low High

Low

H

igh

Admin/ClericalCall

Center/SupportFinance

IT SupportIT Educator/TrainerTechnical Support

ExecutivesSales RepsHealthcare

Workers

EngineersIT Staff

Technical Sales Staff

Page 7: The Irresistible Force of BYOD -- How to Get it Running Securely

User Requirements

Human Resourc

es

Sales

C-Level Execs

BYOD Strategy: Gathering Requirements

Page 8: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation

Device and Data Plans

Compliance

Security

Applications

Agreements

Privacy

Services

Page 9: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation – Device/Data

Page 10: The Irresistible Force of BYOD -- How to Get it Running Securely

Questions to consider:◦ What mobile devices will

be supported: only certain devices or whatever the employee wants?

◦ How will the procurement process work?

◦ Will the organization pay for the data plan at all? Stipend or will employee submit expense?

Policy Creation - Device & Data Plans

Page 11: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation - Compliance

Page 12: The Irresistible Force of BYOD -- How to Get it Running Securely

What regulations govern the data your organization needs to protect? ◦ Example: HIPAA

requires native encryption on any device that holds data.

◦ International or state laws

Policy Creation - Compliance

Page 13: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation - Security

Page 14: The Irresistible Force of BYOD -- How to Get it Running Securely

What security measures are needed?◦ passcode protection◦ jailbroken/rooted devices◦ encryption◦ device restrictions◦ iCloud back-up◦ consumer content

solutions What is the employee

perception of security?

Policy Creation - Security:

Page 15: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation – Apps

Page 16: The Irresistible Force of BYOD -- How to Get it Running Securely

What apps are forbidden at your organization?

What are the approved and supported Content Management solutions?◦ Dropbox, SkyDrive etc.

How to handle malware?

Policy Creation – Apps

Page 17: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation – HR/Legal

Page 18: The Irresistible Force of BYOD -- How to Get it Running Securely

Does your organization have an Usage Agreement for employee access to corporate information?

Consider including:◦ Opt-in/out clauses ◦ What the company will monitor and

perform on mobile devices◦ Specifically outlines what happens if

an employee does something bad ◦ When and how a company will

perform a remote wipe of company information

Policy Creation – HR/Legal

Page 19: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation - Services

Page 20: The Irresistible Force of BYOD -- How to Get it Running Securely

What kinds of resources will the employees have access to?◦ Corporate email, certain

wireless networks, VPNs ◦ You could, based upon

your user segmentation, provide access only to certain networks or apps.

Policy Creation - Services

Page 21: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation - Privacy

Page 22: The Irresistible Force of BYOD -- How to Get it Running Securely

Your #1 priority is to protect your network and sensitive company information, but you also need to think about the privacy of your employees. ◦ What data is collected from

employees’ devices?◦ What personal data is never

collected?◦ Will the inadvertent remote

wipe of personal data make for an unhappy employee?

Policy Creation - Privacy

Page 23: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Strategy: Policy Creation - Processes

Page 24: The Irresistible Force of BYOD -- How to Get it Running Securely

Employee Qualification: ◦ Who qualifies? ◦ Review the labor laws for exempt and non-exempt

employees. ◦ Hourly employees may claim overtime based on

reading email on a personal device. Restrictions: ◦ What are the restrictions on enterprise security, data

usage and privacy in the organization? Employee Termination:

◦ Data and phone number transition at termination.◦ Is there a clear process and who does what?

Policy Creation - Processes

Page 25: The Irresistible Force of BYOD -- How to Get it Running Securely

Are you confident in the security of BYOD management in your organization?

YES No?

Page 26: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Execution: Management Solutions

MDM

MAM

Page 27: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Execution: MAM Best Practices

App installation and configuration

App wrapping and containerization

Relevant acceptable app use policies

Page 28: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Execution: Security Best Practices

Control wireless networks

Control app access

Keep your OS & firmware current

Back up your data

Password protection

Don’t store personal financial data on devices

Beware of free apps

Try antivirus/scanning software

Use MDM and MAM software

Remote device wipe

Page 29: The Irresistible Force of BYOD -- How to Get it Running Securely

BYOD Support: Best Practices

SUPPORT Spell it out

Consider loaner devices

Provide additional support for execs

Educate and enable employees

Utilize outside support

Page 30: The Irresistible Force of BYOD -- How to Get it Running Securely

82%of surveyed companies in 2013 allow some or all workers to use employee-owned devices.

BYOD IS POPULAR – AND GROWING!

Page 31: The Irresistible Force of BYOD -- How to Get it Running Securely

Summary

BYOD

Page 33: The Irresistible Force of BYOD -- How to Get it Running Securely

While every care has been taken to ensure that the information in this document is correct, Enterprise Mobile cannot accept (and hereby disclaims) any responsibility for loss or damage caused by errors or omissions. All

rights reserved. No part of this document may be reproduced without the prior permission of Enterprise Mobile. ©2013 Enterprise Mobile.

Image Sources: MorgueFile: Slide 16: dhester, Slide 17: mconnors, Slide 18: Melodi2,

Slide 20: doctor_bob, Slide 21: dhester, Slide 22: Alvimann

www.enterprisemobile.com

Thank

you!