Upload
enterprise-mobile
View
2.070
Download
0
Embed Size (px)
DESCRIPTION
From increasing productivity to reducing operational costs, it's time for companies to look at how they be more effective with BYOD. Join Marco Nielsen, VP of Services at Enterprise Mobile, as he shares how to optimize your BYOD strategy and execution, how to make the most of your existing management solutions and how to address security challenges that have arisen from a much more diverse mobile device and application landscape.
Citation preview
The Irresistible Force of BYOD –
How to Get it Running Securely
Presenter: Marco NielsenVice President, [email protected]
Our Agenda Today
Introduction
BYOD Strategy
BYOD Execution
BYOD Support
Summary
Q&A
Contact Us
Marco Nielsen, VP of Services, Enterprise Mobile
Meet Today’s Presenter
Marco is an internationally recognized expert in mobile device management and mobile devices, with nearly 20 years’ experience spanning systems architecture, operating systems, hardware and communications. Marco brings a broad perspective on how to design and deliver a successful enterprise mobility initiative.
What is “BYOD”?
Bring your own device (BYOD) is the policy of permitting employees to bring personally owned
mobile devices (laptops, tablets, and smartphones) to their workplace, and use those devices to access
privileged company information and applications.
BYOD“Bring Your Own Device”
According to Forrester, there will be 1 billion smartphone
customers by 2016, with 257 million smartphones and 126
million tablets in the US alone.*
*Source: Forrester – Mobile is the New Face of Engagement
BYOD Strategy: Gathering User Segments
Need for Mobility
Need
for
Su
pp
ort
Low High
Low
H
igh
Admin/ClericalCall
Center/SupportFinance
IT SupportIT Educator/TrainerTechnical Support
ExecutivesSales RepsHealthcare
Workers
EngineersIT Staff
Technical Sales Staff
User Requirements
Human Resourc
es
Sales
C-Level Execs
BYOD Strategy: Gathering Requirements
BYOD Strategy: Policy Creation
Device and Data Plans
Compliance
Security
Applications
Agreements
Privacy
Services
BYOD Strategy: Policy Creation – Device/Data
Questions to consider:◦ What mobile devices will
be supported: only certain devices or whatever the employee wants?
◦ How will the procurement process work?
◦ Will the organization pay for the data plan at all? Stipend or will employee submit expense?
Policy Creation - Device & Data Plans
BYOD Strategy: Policy Creation - Compliance
What regulations govern the data your organization needs to protect? ◦ Example: HIPAA
requires native encryption on any device that holds data.
◦ International or state laws
Policy Creation - Compliance
BYOD Strategy: Policy Creation - Security
What security measures are needed?◦ passcode protection◦ jailbroken/rooted devices◦ encryption◦ device restrictions◦ iCloud back-up◦ consumer content
solutions What is the employee
perception of security?
Policy Creation - Security:
BYOD Strategy: Policy Creation – Apps
What apps are forbidden at your organization?
What are the approved and supported Content Management solutions?◦ Dropbox, SkyDrive etc.
How to handle malware?
Policy Creation – Apps
BYOD Strategy: Policy Creation – HR/Legal
Does your organization have an Usage Agreement for employee access to corporate information?
Consider including:◦ Opt-in/out clauses ◦ What the company will monitor and
perform on mobile devices◦ Specifically outlines what happens if
an employee does something bad ◦ When and how a company will
perform a remote wipe of company information
Policy Creation – HR/Legal
BYOD Strategy: Policy Creation - Services
What kinds of resources will the employees have access to?◦ Corporate email, certain
wireless networks, VPNs ◦ You could, based upon
your user segmentation, provide access only to certain networks or apps.
Policy Creation - Services
BYOD Strategy: Policy Creation - Privacy
Your #1 priority is to protect your network and sensitive company information, but you also need to think about the privacy of your employees. ◦ What data is collected from
employees’ devices?◦ What personal data is never
collected?◦ Will the inadvertent remote
wipe of personal data make for an unhappy employee?
Policy Creation - Privacy
BYOD Strategy: Policy Creation - Processes
Employee Qualification: ◦ Who qualifies? ◦ Review the labor laws for exempt and non-exempt
employees. ◦ Hourly employees may claim overtime based on
reading email on a personal device. Restrictions: ◦ What are the restrictions on enterprise security, data
usage and privacy in the organization? Employee Termination:
◦ Data and phone number transition at termination.◦ Is there a clear process and who does what?
Policy Creation - Processes
Are you confident in the security of BYOD management in your organization?
YES No?
BYOD Execution: Management Solutions
MDM
MAM
BYOD Execution: MAM Best Practices
App installation and configuration
App wrapping and containerization
Relevant acceptable app use policies
BYOD Execution: Security Best Practices
Control wireless networks
Control app access
Keep your OS & firmware current
Back up your data
Password protection
Don’t store personal financial data on devices
Beware of free apps
Try antivirus/scanning software
Use MDM and MAM software
Remote device wipe
BYOD Support: Best Practices
SUPPORT Spell it out
Consider loaner devices
Provide additional support for execs
Educate and enable employees
Utilize outside support
82%of surveyed companies in 2013 allow some or all workers to use employee-owned devices.
BYOD IS POPULAR – AND GROWING!
Summary
BYOD
Contact us
https://twitter.com/entmobile
http://www.linkedin.com/company/enterprise-mobile
https://www.facebook.com/entmobile
http://www.enterprisemobile.com
Marco Nielsen [email protected]
While every care has been taken to ensure that the information in this document is correct, Enterprise Mobile cannot accept (and hereby disclaims) any responsibility for loss or damage caused by errors or omissions. All
rights reserved. No part of this document may be reproduced without the prior permission of Enterprise Mobile. ©2013 Enterprise Mobile.
Image Sources: MorgueFile: Slide 16: dhester, Slide 17: mconnors, Slide 18: Melodi2,
Slide 20: doctor_bob, Slide 21: dhester, Slide 22: Alvimann
www.enterprisemobile.com
Thank
you!