28
Protecting Corporate Data in the BYOD Era Clint Adams | Director of Mobile Technology Solutions | [email protected]

Protecting Corporate Data in the BYOD Era

Embed Size (px)

DESCRIPTION

BYOD is Smart Business Companies of all sizes are now recognizing that mobile access to corporate information and resources is both inevitable and crucial to long-term competitive success. The workforce is carrying the office in their pockets, and there is no question that a Bring Your Own Device (BYOD) program is a smart business call. BYOD facilitates increased workforce efficiency, results in controlled costs for provisioning mobile devices, and introduces new ways for businesses to stay ahead of the proverbial curve. For IT, BYOD Means New Challenges For credit unions operating in a highly regulated and security sensitive environment, issues surrounding regulations, privacy and policy require new approaches to establish the level of trust needed for a successful BYOD program. FINRA, SEC Regulations S-P (Safeguards Rule), SOX and other mandates governing data handling now extend from the desktop to all endpoints from laptops to mobile devices, increasing security and compliance risks. Concerns over securing corporate data to managing a multitude of disparate devices present valid challenges, but these can be easily managed, secured and controlled. Fiberlink’s Director of Mobile Technology Solutions, Clint Adams, outlines best practices you can use to quickly protect corporate data and reduce risk, while adapting to the new BYOD model: • BYOD policy considerations • Device discovery • Enrollment best-practices • Over-the-air configuration • Self-service portals

Citation preview

Page 1: Protecting Corporate Data in the BYOD Era

Protecting Corporate Data in the BYOD Era

Clint Adams | Director of Mobile Technology Solutions | [email protected]

Page 2: Protecting Corporate Data in the BYOD Era

Agenda

1. BYOD Trends2. Security and Privacy3. BYOD policy considerations4. Device discovery5. Enrollment best-practices6. Over-the-air configuration7. Self-service portals

2

Page 3: Protecting Corporate Data in the BYOD Era

Poll Question #1

3

• Why are you attending this webinar?– So what is BYOD again?!?! We have nothing and need more information!– We have an informal program, but want additional information on setting

up a formal program– We have a BYOD program and want to benchmark with others’ best

practices

Page 4: Protecting Corporate Data in the BYOD Era

BYOD is Becoming the Norm

4

60% of employees use personal devices for work

iOS dominates in the enterprise, but Android

is gaining traction

By 2017, Half of employers will require BYOD

By 2015, 90% of organizations will support corporate applications on personal devices

*Gartner, “Bring Your Own Device: The Facts & the Future”, April 2013 - Juniper Research, 2012

Page 5: Protecting Corporate Data in the BYOD Era

When Will Organizations Switch?

5

• Corporate-liable programs will become the exception soon

• 45% of companies to stop providing devices to workers by 2020

• 15% of companies will never provide any BYOD option

• 40% of companies will offer both styles of programs

* Gartner, “Bring Your Own Device: The Facts & the Future”, April 2013

Page 6: Protecting Corporate Data in the BYOD Era

Poll Question #2

6

• What are the main challenges you face with BYOD? (select all that apply)– Securely connecting employee devices– Avoiding the use of more IT resources– Building enough wireless coverage and capacity– Ensuring mobile device security– Establishing a corporate policy on acceptable use– Enforcing access rights based on user, device, and application– Evaluating the business benefit, relative to risk– Other

Page 7: Protecting Corporate Data in the BYOD Era

Security Risks• Less robust security on personal devices than employer-provided devices

rules.

7

– One in three do not password protect their smartphone (MaaS360 Mobile Metrics™)

– Fewer than one in 20 smartphones and tablets have third-party security software installed (MaaS360 Mobile Metrics™)

– Less than 10% of companies are “fully aware” of the devices accessing their network (Enterasys survey, Feb 2012)

– Security protection on many mobile devices is not monitored using compliance rules.

Page 8: Protecting Corporate Data in the BYOD Era

Security Risks

• Employees believe BYOD is a right – not a privilege• Lost or stolen devices risk loss of company’s confidential information• State security obligations for protecting social security numbers, driver’s license

numbers, etc. (e.g. Massachusetts)• Non-employee access to the mobile device (friends and family)• Cloud – use of Dropbox, iCloud, Google Docs, Box.net or Evernote to store information

8

Page 9: Protecting Corporate Data in the BYOD Era

Security Risks Specific to Credit Unions

• Complying with local, state, and federal regulations

• Preventing data loss• Enforcing security policy on

mobile devices• Ensuring the use of passwords on

mobile devices

9

Page 10: Protecting Corporate Data in the BYOD Era

Employee Privacy Considerations

• Use of technology that wipes the device if it’s lost or stolen.

• Use of technology that tracks the phone’s location

• Use of technology that keeps an inventory of the apps installed on the device may also

• e-Discovery: If the device contains data that is part of the e-Discovery

10

Page 11: Protecting Corporate Data in the BYOD Era

Technical Considerations

• Device settings• Do you treat user groups

differently?• Tracking and remote wipe• Commingling of personal and

company data

11

Page 12: Protecting Corporate Data in the BYOD Era

Policy Best Practices

• Determine whether to adopt guidelines, a policy, an agreement, or some other means for BYOD program communication and compliance

• Determine whether BYOD should apply to all employees Regionalize policies to ensure compliance with local laws

• Ensure that policies make clear that employees have no reasonable expectation of privacy

12

Page 13: Protecting Corporate Data in the BYOD Era

Policy Best Practices

• Require employees to provide affirmative consent to the BYOD policy either with electronic or paper acceptance

• Determine whether employer will provide support for personal devices or if support will be handled by device vendor

• Require employees to immediately report stolen/lost mobile devices, so that devices can be remotely wiped

• Clearly state guidance on the use cloud-based storage system to store company confidential information

13

Page 14: Protecting Corporate Data in the BYOD Era

Measure Your Mobile Footprint

• Do you have ActiveSync enabled today?

• Do you know how many devices are connecting to ActiveSync?

14

45%

36%

1%3% 15% ActiveSync is open (mo-

bile devices are automat-ically enabled by end-user)ActiveSync is closed (admin manually en-ables mobile devices)Auto-quarantine is en-abled in Exchange 2010Use of a custom tool or PowerShell ScriptWe don't allow mobile devices to access Ex-change

Page 15: Protecting Corporate Data in the BYOD Era

Enterprise Mobility Management is Foundational for BYOD

• Supports BYOD with self-service enrollment

• Configure devices and protect employee privacy

• Enforce security policies and meet regulations

• Push content, apps and docs and provide workspace separation

Page 16: Protecting Corporate Data in the BYOD Era

Tactics - Simplify User Enrollment

• Keep the enrollment simple, fast & low touch– Email & SMS text– Simple URL or QR code– Over the air (OTA)– Notification when

complete– Corporate credentials vs.

passcode for authentication

16

or

Page 17: Protecting Corporate Data in the BYOD Era

Tactics - Configure Policies Over the Air

• Configure devices with enterpriseprofiles, credentials & settings– Email, contacts & calendar– Wi-Fi & VPN– App catalog with public &

enterprise apps– Corporate content & documents– Device restrictions– Data container settings– Data expense limits

17

Page 18: Protecting Corporate Data in the BYOD Era

Tactics - Help Users Help Themselves

• An end user self service portal will help cut down on the number of calls to your IT teams

• Enable user to take basic actions– Lock device– Reset passcode– Locate device– Wipe device

• View information– View hardware & network

information– View security & compliance state 18

Page 19: Protecting Corporate Data in the BYOD Era

Diverse Enterprise Customer BaseOthersManufacturing Consumer FinancialHealthcare Public

Page 20: Protecting Corporate Data in the BYOD Era

What Customers are Saying about MaaS360

20

“We chose MaaS360 because we can run it across our full mobility network, whether a laptop, phone or tablet. I can provision access to all of those devices at once, knowing that each has a different graphical paradigm. That's the way we think people will be moving.”

– Anthony Perkins, CIO, BNY Mellon

“MaaS360 is great for our company, it’s great for the business and it’s great for IT. We look good because we’re truly supporting the staff and the business through mobility. We’re able to be more proactive about empowering employees to buy the devices they need and a day later we can have those devices all set up for secure and productive use.”

-David Pitzer, Vice President & CIO,

Frederick Mutual Insurance Company

Page 21: Protecting Corporate Data in the BYOD Era

Solution• MaaS360 provides an easy-to-deploy and -use solution to manage and

control all devices and applications.• Chose MaaS360 over alternative solutions, including AirWatch, due to

cloud model for cost, ease-of-use and disaster recovery• Manage and track employee-owned devices, automatically push

mandatory apps and suggest recommended apps

MaaS360 Customer Capsule

Benefits• Simple, rapid deployment and enrollment of new devices in only a few

minutes• Easy-to-use, cloud-based platform saves approximately $50K in

hardware costs and 45-60 days in deployment time• Decreased IT costs and workload with new BYOD policy• Ability to empower users with the increased mobility they need to

better service customers• Streamlined mobility intelligence for compliance and audit purposes

About Frederick Mutual Insurance Company• Strong and reliable insurance company with over $25 million in

assets• Began issuing insurance policies in early 1844, and has been in

continuous operation since that time• Located in Frederick, MD• Industry: Financial Services

Challenges• Decision to replace company-owned BlackBerries and laptops with BYO

iPhones and iPads highlighted the need for device security and application management

• Wanted a cloud-based enterprise mobility solution

21

Page 22: Protecting Corporate Data in the BYOD Era

MaaS360 Delivers an Integrated Approach

22One Platform for All Your Mobile Assets

Secure Content Collaboration

Secure MobileContainers

ComprehensiveMobile Management

Seamless Enterprise Access

Page 23: Protecting Corporate Data in the BYOD Era

Why Customers Love MaaS360

Powerfulfeatures to address the full mobility lifecycle

23

Seamless integration with all of your existing infrastructure

Simpleand fast with an exceptional experience

Provenapproach to mobile management

Securecontainers to separate work from play

Page 24: Protecting Corporate Data in the BYOD Era

The MaaS360 Customer Experience

24

Fastest Time to Trust60% deployed MaaS360 in less than 4 hours

75% deployed MaaS360 in less than 8 hours

0% 100%

Reference customers consistently praise MaaS360 for ease of use at the end-user and administrator levels.

”“–

Included sales and customer support at no additional charge

Customer support available 24 x 7 by phone, chat or email

Community, forums, blogs, on-demand webinars

Page 25: Protecting Corporate Data in the BYOD Era

Recognized Industry Leadership

“Winner” of 2013 SIIA CODiE Award for Best Mobile Device Application for Enterprises

25

“Leader” in the 2014 Magic Quadrant for Enterprise Mobility Management Suites

“Best-in-class cloud” among ranked EMM vendors

Named an “Innovator” for Cloud-Hosted Mobile Device Management Solutions

Identified as a “Champion” in the Mobile Device Management Vendor Landscape Report

Page 26: Protecting Corporate Data in the BYOD Era

Get Started Now

26

maas360.com/ibm

InstantAccess a free, fully functional trial for 30 days

MobileManage and secure your devices, emails, apps and docs

EasySet up and configure your service in minutes

1 2 3

Page 27: Protecting Corporate Data in the BYOD Era

Poll Question #3

• Would you like more information?– Yes, please have MaaS360 reach out– No, not at this time

27

Page 28: Protecting Corporate Data in the BYOD Era

Questions?

Clint Adams | [email protected] |maas360.com

28