MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

25
MANAGING AND SECURING BYOD Legal IT’s Next Great Challenge

Transcript of MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

Page 1: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

MANAGING AND SECURING BYOD

Legal IT’s Next Great Challenge

Page 2: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

AGENDA• The BYOD Trend – Evolution of Mobile Technology

• Best Practices for Managing Mobile Device Usage

• Overview of Mobile Device Management Technologies

• BYOD Management Strategies and Trends

Page 3: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

THE BYOD TREND – SOME HISTORY• Employee use of company owned computers

• Using laptops to access the Internet

• Drove usage policies and technology controls

• RIM BlackBerry delivers first mobile device

• Apple iPhone changes everything

Page 4: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

BYOD –BENEFITS AND CHALLENGES

Benefits

• Improved responsiveness

• Improved accessibility

• Greater flexibility

Challenges

• IT support of a wide range of mobile vendors and operating environments

• Secure access to firm data

• Mitigate risk of unsecure personal apps

Page 5: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

70 MILLIONSMARTPHONES LOST/STOLEN IN 2011

ONLY 7% RECOVEREDSource: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

Page 6: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

17% OF BUSINESSES HAVE MOBILE DEVICE BREACHES

Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

Page 7: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

BEST PRACTICES

Registering devices to ensure security:

• Virus protection, authentication, encryption

Provisioning of firm-authorized apps

IT use monitoring

User education

• Compliance with firm security policies

• Mobile Device registration with IT

• Password protection

• Use of unsanctioned apps

• Lost/stolen devices

Page 8: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

MOBILE DEVICE MANAGEMENT

Page 9: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

MOBILE DEVICE STRATEGY

SecurityApplication

Portfolio

Who Pays?Backing Up

Devices

Policies

Page 10: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

HOW DO YOU SUPPORT MOBILITY?• Who is responsible for equipment?

• IT staff availability and training

• Mobile device OS and security upgrades

• Mobile Device Management platform

• Is your firm website mobile friendly?

Page 11: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

MOBILE DEVICE MANAGEMENT• Not new!

• Optimize functionality

• Increase security

• Compliance

• Is MDM a requirement for BYOD?

Page 12: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

SMARTPHONES HAVE BECOME ANARCHY IN A POCKET THEY HAVE THE POWER OF A FULL DESKTOP SYSTEM OF JUST A DECADE AGO, AND THAT POWER IS INCREASING QUICKLY.Source: Tom Henderson, ITWORLD.com

Page 13: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

WHY NOW?• BYOD

• Malicious threats

• Control Application Portfolio

• Lost and Stolen Phones

• Access Control and Auditing

• Compliance

• Growing device inventory

• Native functions and features don’t cut it

• Changes to Microsoft Exchange licensing costs

Page 14: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

MDM IS SUBJECT TO THE WEAKNESS OF THE UNDERLYING PLATFORMGOOGLE ONLY PROVIDED 16 APIs, COMPARED TO MORE THAN 500 APIs FOR THE LATEST VERSION OF BLACKBERRY.Source: May 18, 2012 COMPUTERWORLD.com, Matt Hamblem

Page 15: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

SOLUTION OPTIONS• On-premise

• Service-based

• Hybrid

Page 16: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

COMMON FEATURES• Device provisioning and configuration

• Policy application

• Security

• Backup / restore

• Remote lock and wipe• Sandboxing

• Activity logging

• Reporting / dashboard

Page 17: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

ADVANCED FEATURES• Network access control

• Application deployment and management

• Firmware updates

• Diagnostics

• Network usage and support

• Mobile asset tracking and management

• Troubleshooting and diagnostic tools

• Remote control

• Remote administration

• GPS tracking and 'breadcrumb' mapping

Page 18: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

MOST COMMON PLATFORMSCommon in Legal:

• Airwatch

• MobileIron

• McAfee

• Fiberlink (MaaS360)

• Good

• BlackBerry• For BlackBerry Devices

Page 19: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

USEFUL FEATURE COMPARISONS• http://mobiwm.com/mdm-comparison/

• http://www.bluefishwireless.net/wp-content/uploads/2012/06/Bluefish-MGMT-MDM-Comparison-Chart.pdf

• Gartner: Magic Quadrant for Mobile Device Management Software 2012

Page 20: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

SELECTION CRITERIA• Enrollment

• Ease

• Self service

• Administration

• Ongoing Management

• Scalability

• Device Support

Page 21: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

LICENSING MODELS• Perpetual license

• Subscription

• Per devices

• Per user

• Minimum number of devices?

Page 22: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

MINDSHIFT’S EXPERIENCE

Page 23: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

FUTURE OF MDM• Commoditized

• Management tools with features built into devices• Open Mobile Alliance (OMA)

• OMA Device Management Protocol

• MDM absorbed into management platforms• Mobile Application Management (MAM)

• Mobile Information Management (MIM)

Page 24: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

&QA

Page 25: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

THANK YOU

Charlie Magliato

BiscomLegal Program [email protected]

(978) 367-3592

www.Biscom.com/Legal

Pat Sklodowski

mindSHIFT Technologies, Inc.Managing Director, Legal Professional Services [email protected]

(856) 425-0029

www.mindSHIFT.com