The Irresistible Force of BYOD -- How to Get it Running Securely

Post on 09-May-2015

2.065 views 0 download

description

From increasing productivity to reducing operational costs, it's time for companies to look at how they be more effective with BYOD. Join Marco Nielsen, VP of Services at Enterprise Mobile, as he shares how to optimize your BYOD strategy and execution, how to make the most of your existing management solutions and how to address security challenges that have arisen from a much more diverse mobile device and application landscape.

Transcript of The Irresistible Force of BYOD -- How to Get it Running Securely

The Irresistible Force of BYOD –

How to Get it Running Securely

Presenter: Marco NielsenVice President, Servicesmnielsen@enterprisemobile.com

Our Agenda Today

Introduction

BYOD Strategy

BYOD Execution

BYOD Support

Summary

Q&A

Contact Us

Marco Nielsen, VP of Services, Enterprise Mobile 

Meet Today’s Presenter

Marco is an internationally recognized expert in mobile device management and mobile devices, with nearly 20 years’ experience spanning systems architecture, operating systems, hardware and communications. Marco brings a broad perspective on how to design and deliver a successful enterprise mobility initiative.

What is “BYOD”?

Bring your own device (BYOD) is the policy of permitting employees to bring personally owned

mobile devices (laptops, tablets, and smartphones) to their workplace, and use those devices to access

privileged company information and applications.

BYOD“Bring Your Own Device”

According to Forrester, there will be 1 billion smartphone

customers by 2016, with 257 million smartphones and 126

million tablets in the US alone.*

*Source: Forrester – Mobile is the New Face of Engagement

BYOD Strategy: Gathering User Segments

Need for Mobility

Need

for

Su

pp

ort

Low High

Low

H

igh

Admin/ClericalCall

Center/SupportFinance

IT SupportIT Educator/TrainerTechnical Support

ExecutivesSales RepsHealthcare

Workers

EngineersIT Staff

Technical Sales Staff

User Requirements

Human Resourc

es

Sales

C-Level Execs

BYOD Strategy: Gathering Requirements

BYOD Strategy: Policy Creation

Device and Data Plans

Compliance

Security

Applications

Agreements

Privacy

Services

BYOD Strategy: Policy Creation – Device/Data

Questions to consider:◦ What mobile devices will

be supported: only certain devices or whatever the employee wants?

◦ How will the procurement process work?

◦ Will the organization pay for the data plan at all? Stipend or will employee submit expense?

Policy Creation - Device & Data Plans

BYOD Strategy: Policy Creation - Compliance

What regulations govern the data your organization needs to protect? ◦ Example: HIPAA

requires native encryption on any device that holds data.

◦ International or state laws

Policy Creation - Compliance

BYOD Strategy: Policy Creation - Security

What security measures are needed?◦ passcode protection◦ jailbroken/rooted devices◦ encryption◦ device restrictions◦ iCloud back-up◦ consumer content

solutions What is the employee

perception of security?

Policy Creation - Security:

BYOD Strategy: Policy Creation – Apps

What apps are forbidden at your organization?

What are the approved and supported Content Management solutions?◦ Dropbox, SkyDrive etc.

How to handle malware?

Policy Creation – Apps

BYOD Strategy: Policy Creation – HR/Legal

Does your organization have an Usage Agreement for employee access to corporate information?

Consider including:◦ Opt-in/out clauses ◦ What the company will monitor and

perform on mobile devices◦ Specifically outlines what happens if

an employee does something bad ◦ When and how a company will

perform a remote wipe of company information

Policy Creation – HR/Legal

BYOD Strategy: Policy Creation - Services

What kinds of resources will the employees have access to?◦ Corporate email, certain

wireless networks, VPNs ◦ You could, based upon

your user segmentation, provide access only to certain networks or apps.

Policy Creation - Services

BYOD Strategy: Policy Creation - Privacy

Your #1 priority is to protect your network and sensitive company information, but you also need to think about the privacy of your employees. ◦ What data is collected from

employees’ devices?◦ What personal data is never

collected?◦ Will the inadvertent remote

wipe of personal data make for an unhappy employee?

Policy Creation - Privacy

BYOD Strategy: Policy Creation - Processes

Employee Qualification: ◦ Who qualifies? ◦ Review the labor laws for exempt and non-exempt

employees. ◦ Hourly employees may claim overtime based on

reading email on a personal device. Restrictions: ◦ What are the restrictions on enterprise security, data

usage and privacy in the organization? Employee Termination:

◦ Data and phone number transition at termination.◦ Is there a clear process and who does what?

Policy Creation - Processes

Are you confident in the security of BYOD management in your organization?

YES No?

BYOD Execution: Management Solutions

MDM

MAM

BYOD Execution: MAM Best Practices

App installation and configuration

App wrapping and containerization

Relevant acceptable app use policies

BYOD Execution: Security Best Practices

Control wireless networks

Control app access

Keep your OS & firmware current

Back up your data

Password protection

Don’t store personal financial data on devices

Beware of free apps

Try antivirus/scanning software

Use MDM and MAM software

Remote device wipe

BYOD Support: Best Practices

SUPPORT Spell it out

Consider loaner devices

Provide additional support for execs

Educate and enable employees

Utilize outside support

82%of surveyed companies in 2013 allow some or all workers to use employee-owned devices.

BYOD IS POPULAR – AND GROWING!

Summary

BYOD

While every care has been taken to ensure that the information in this document is correct, Enterprise Mobile cannot accept (and hereby disclaims) any responsibility for loss or damage caused by errors or omissions. All

rights reserved. No part of this document may be reproduced without the prior permission of Enterprise Mobile. ©2013 Enterprise Mobile.

Image Sources: MorgueFile: Slide 16: dhester, Slide 17: mconnors, Slide 18: Melodi2,

Slide 20: doctor_bob, Slide 21: dhester, Slide 22: Alvimann

www.enterprisemobile.com

Thank

you!