www.soti.net
The BYOD of Tomorrow:BYOD 2.0
SOTI Inc. Presents
Security Challenges in Enterprise Mobility Management
What is BYOD 1.0?
• BYOD 1.0 was the first wave of mobile device management that controlled the entire device
• BYOD 1.0 was inadequate as a tactical solution, forcing mutual sacrifices to be made by employers and employees
• BYOD 1.0 as a policy framework was not fully baked, was too device-centric, and didn’t focus on the complete mobility lifecycle
Source: Gartner
What is BYOD 2.0?BYOD 2.0 is the rapid evolution of BYOD 1.0• BYOD 2.0 is the evolution towards managing the apps
necessary for enterprise to secure corporate privacy while maintaining personal privacy
• Forbes coined BYOD 2.0 as “The move away from either business or employee-owned centricity, and toward the intersection of the two”
• BYOD 2.0 is the most radical change to the economics and the culture of client computing in business
Source: Gartner
Source: Gartner
The BYOD ShiftToday vs Tomorrow
• BYOD will dominate enterprise in 2020
• 45% of enterprise will need to support BYOD
• 40% of enterprises will provide both corporate-liable and BYOD
Popularity of BYODRiding the BYOD Wave
• By 2015, the number of employees using mobile applications in the workplace will double
• By 2016, organizations will spend over $300/employee/year on mobile applications, security, management and support
• By 2017, half of employers will require employees to supply their own device for work purposes
Source: Gartner
Generation Y Employees:• 75% actively use personal mobile devices in the
workplace
• 35% couldn't go a day without checking their social media networks
• 47% wouldn't manage 24 hours without sending a text
• 66% believe IT has no right to monitor or restrict behavior, even on company-issued devices on corporate networks
• 52% of IT professionals say that they believe employees follow IT policies BUT 71% of Gen Y workforce actively disobey company rules
Pushing IT Limits
Drivers of BYOD
• Interoperability of connected “devices”
• Multiple device usage will prompt the increase in pairing devices and services for home and work
• The Internet of Things will heighten the need for BYOD security
• New form factors will continue to emerge, and these devices will be brought to work
Why Secure BYOD?
“My work will not supply me with apps. I’m just going to download them myself.”
“I just got the new iPad. I will connect to the office network.”
“I can’t find a secure network at my local coffee shop…I will use the open Wi-Fi.”
BYOD is changing the culture of the business environment
Top-5 Trends in BYOD & Mobile Security• The number one benefit of BYOD is greater employee
satisfaction and productivity
• A majority of companies are concerned about loss of and unauthorized access to data
• Encryption is the most used risk control measure for mobile devices
• The biggest impact of mobile security threats is the need for additional IT resources to manage them
• The most popular mobile business applications are email, calendar and contact management
Source: Lumension
Mobile Security ConsiderationsMore IT security challenges and less control
• 40% of devices are consumer owned
• 80% of professionals will use 2 or more devices by next year
• Less than 1/3 of companies enforce any security policies, controls, or encryption on these personal devices
• Corporate systems and data are more accessible than ever
Source: Gartner
Summary Policy Considerations
BYOD Policy
PlatformSupport
OS SupportMobile registration
Pre-Enrollment Checks
Policy complianceRooted / Jail-broken devices
End user Agreement
Monitoring, remote support, data storage
Device Ownership
Employee vs. corporation owned devices
Authentication
Passcode parametersPKI and SSO
Encryption
Data at rest or in motionHandling breaches
WiFi /VPN Access
WiFi rulesCorp network, apps & data
Mobile Apps
Granular accessApp complianceBL / WL of apps
Mobile Data
Data loss preventionAutomatic actions
Telecom Expenses
Voice/data roaming policies
Device Loss /Employee Departure
Decommission devicesBackup Data
77 % of organizations are most concerned about protecting business and employee data
Source: Lumension
The Great DivideEmployees say…
70%of employees access the corporate
network with personal devices
88%of employees view their
personal devices as secure
IT thinks…
37%of IT managers think employees are accessing the corporate network from personal device
77%of IT managers see risk of infection from
BYOD mobile devices as very high
Source: Security InfoWatch
The Challenges of BYOD
• Security
• Risk of Data Leakage
• Risking Viruses and Malware
• Additional skills required for help support
• Managing multi-platform devices
Recommendations for BYOD StrategyImpactsBYOD drivers innovation by increasing the number of mobile application users in the workforce
BYOD drives employee satisfaction
BYOD can be used as a cost reduction and avoidance mechanism
BYOD increases risk and changes expectations
Top Recommendations• Look for opportunities throughout the entire workforce where mobility could
drive substantial innovation• Pursue platform-agnostic application platforms
• Assess where your organization sits vs others in your industry
• Decide on how many forms of BYOD you will support• Determine when, how and how much you will subsidize business use of personal devices
• Establish clear policies for BYOD• Invest in key technologies to separate enterprise and personal applications and data• Establish user self-support and third-party support options• Specify what platforms will be supported
Source: Gartner
BYOD risksYou can’t protect what you can’t control
• Security risks
• Safeguarding corporate data
• Malware, viruses, and hacking
• Secure remote access
• Compliance and privacy
• Lost or stolen devices
• Parting employee data recovery
Enable your mobility strategyEstablish Clear BYOD Policies
• Clear Security Policies
• Protect Limit VPN access
• Protect Corporate Data
• Application control strategies make BYOD policies more secure
• Clearly communicate the separation of work from fun
Optimize your mobility strategyBest practices and policy enforcement are essential
• Are you subject to controls such as HIPAA or PCI DSS?
• If a device is lost, can you wipe the data?
• Do employees know what rights they give up when using a mobile device?
Secure your mobility strategyManage BYOD with EMM
• Enroll devices• Application Catalog• Self-Serve Portal• Content Library• Configure Wi-Fi/VPN• Wipe Corporate Data• Email Policies• Detect Jail-broken/rooted devices
Best Practices• Registering devices to ensure security
• Virus protection, authentication, encryption
• Provisioning of enterprise-authorized apps
• IT should be able to remotely monitor
• User education • Compliance with firm security policies• Mobile Device registration with IT• Password protection• Use of unsanctioned apps• Lost/stolen devices
SOTI is the World’s Most Trusted EMM Vendor12,000+ customers, millions of devices managed worldwide
Since 1995, SOTI Inc. has been developing industry - leading technology that solves the unique challenges involved in managing, securing, supporting and tracking mobile devices.
Global Reach:
- 80,000+ customers across 170+ countries- 12,000+ customers using SOTI MobiControl EMM software - Millions of devices worldwide
Mobility Management Lifecycle
SOTI provides the tools and solutions to make BYOD environments safe and productive ecosystems for today’s IT administrators
SOTI is the proven leader in innovative technology solutions for enterprise mobility
SOTI’s MobiControl is an award-winning EMM solution for mobile and desktop computing devices
Questions?
Questions?
•www.moncourtierinformatique.com•www.lmltechnologie.com• 514-898-7379, #120