Practical IT Research that Drives Measurable Results Manage the Invasion of Consumer Technology.

Slides:



Advertisements
Similar presentations
Security for Mobile Devices
Advertisements

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
PRODUCT FOCUS 5/27/14 – 6/6/14 INTRODUCTION Our Product Focus for the next two weeks is CompTIA. CompTIA is most well known for serving as the backbone.
Introducing an environment for change and innovation into your recruitment business.
Utilize AITech’s UC Technology to Differentiate your Voice Service Offering Greg Lohrenz - CEO Nashville FISPA LIVE.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
SELECTING TABLETS FOR ENTERPRISE USE TABLET COMPUTER SELECTION.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Customer Relationship Management (CRM)
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
IT RISK IT Managers Roundtable event – 06/24/15 Presentation by Simon Cousins.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Brought to you by ince, an integrated communications agency Powered by intralinks SECURE ENTERPRISE COLLABORATION IN THE CLOUD.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
User and Device Management
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
© 2015 albert-learning.com Role of Mobile Phone Apps Role of mobile Phone Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
ICT in the UAE Business Survey June Background3 Methodology4 Introduction and Main Results 6 Fixed Line Telephony 12 Mobile Telephony 16.
Practical IT Research that Drives Measurable Results Get Started Bringing Order to Help Desk Request Chaos.
Make the Decision to Upgrade to Microsoft Office 2010.
Info-Tech Research Group Practical IT Research that Drives Measurable Results Reduce Telecom Expenses.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Get Moving with Server Virtualization.
Info-Tech Research Group1 Integrate Consumer Applications into IT Secure IT’s core assets amidst the flood of personal unmanaged technology.
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Understand & Develop a Mobile Management Strategy Rein in the Mobile Fleet to Ensure Enterprise Security, Productivity, and Appropriate Use of Network.
Moving to BYOD Gary Audin 1.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
Info-Tech Research Group1 Use SharePoint for Enterprise Content Management Findability, taxonomies, and records management: It’s more expensive than you.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
GroupRocket.net. Years back checking s in the morning was the first ever thing most of the professionals would start their day with. And with the.
Unified Communications – Use and Advantages If you deal with business communications or head an organization where the right emphasis is put upon effective.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
Workshifting Transform your business – empower your people.
Practical IT Research that Drives Measurable Results Build Security Architecture & Roadmap Implementation 1Info-Tech Research Group.
Total Enterprise Mobility Comprehensive Management and Security
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Build an Enterprise IT Security Training Program
The time to address enterprise mobility is now
Select the Right Vendor for Desktop Virtualization
Quality Assurance System Field Service Automation
Data Minimization Framework
Create Data Strategies for the Small Enterprise
CHAPTER 3: STRATEGIC PLANNING.
Develop a Mobile Management Strategy
Improve Business Satisfaction by 10% Through Business Relationship Management Relationship management is the #1 driver of business satisfaction with IT.
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Quality Assurance System Field Service Automation
Presentation transcript:

Practical IT Research that Drives Measurable Results Manage the Invasion of Consumer Technology

Introduction IT is often wary of connecting personal mobile devices to the corporate network. While not without its risks, the benefits usually outweigh the minimal costs. Learn to efficiently and safely manage the influx of consumer technology. This solution set provides practical steps to take when considering or implementing an official stance on the use of consumer technology in the workplace. It will help readers understand that: Like it or not, consumer technology is invading the enterprise. Recent increases in the prevalence and variety of smart mobile devices make them an unavoidable issue to consider. Allowing personal devices in the workplace boosts productivity and end-user satisfaction. The majority of organizations are allowing them and having great success doing so. There are several different mobile platforms. Each has its own nuances. Understand them and simplify the management of a personal mobile fleet. It is not risk-free. Learn about the technologies that can help mitigate potential damage. Safely merging the consumer and the enterprise begins with compliance. Draft a policy and hold training sessions to help employees deal properly with incidents and keep them from happening in the first place. If you can’t beat them, join them. It is safer to facilitate connecting personal mobile devices to the corporate network than have end-users connect without IT’s oversight.

Executive Summary The last two years have seen a marked increase in end-user comfort with smart phones, resulting in a greater number of employees bringing in personal technology to aid with performing their job functions. 83% of organizations surveyed by Info-Tech allow personal mobile devices on their corporate networks, though most do so only after an employee has signed a policy highlighting the rights of IT and the end-user regarding data on the device. Regardless of whether users are bringing in tablets or smart phones, the majority of IT’s job on the management side remains the same. Focus on policy creation, management and enforcement. Determine what level of mobile security your organization requires – Minimum, Basic, Enhanced or Lockdown – and implement policies and technology checks and balances accordingly. Remote wipe and over-the-air encryption are the most common security functionalities put in place by organizations at all levels of the security spectrum to mitigate the threat of sensitive data leakage. Understand that all mobile platforms are not created equal; each has its strengths and weaknesses. BlackBerry is the most popular personal device on the corporate network due to embedded infrastructure and advanced out-of-the-box security functionality. Finally, securing end-user compliance with internal mobile policy is the largest contributor to successfully managing a fleet of personal mobile devices on the corporate network.

Strategize 3 Understand 1 Implement 4 Evaluate 2 Allow personal mobile technology in the enterprise to boost productivity and end-user satisfaction. Don’t dismiss personal mobile devices without consideration; there are benefits to be had by allowing end users to connect their personal mobile devices to the corporate network. Think nobody’s doing it? 83% of your peers are allowing personal mobile devices on the network. Determine what level of mobile security is best for your organization.

Do Not Allow Personal Devices Allow Personal Devices 17% 83% Support consumer technology & an increasingly tech-savvy workforce to improve productivity BlackBerry, Apple iOS, Android, and Windows Mobile make up the majority of allowed personal devices on corporate networks. N = 144 *Respondents were asked to select all that apply, resulting in a cumulative total greater than 100%. 83% of organizations allow end users to connect personal mobile devices to the corporate network. New technology is often met with disdain from the IT group. Understand that new technology is brought into the workplace by end-users as a facilitator of job functions. Organizations that allowed devices other than BlackBerry, iOS, Android and Windows Mobile were drastically less successful than those that did not. Allow personal devices on the network, but stick to the major players to avoid being trapped in a mobile device jungle.

Embrace tech-savvy end-users; they are assets to the firm The onus of new technology introduction in the workplace has shifted from IT to the end-user. 80% of survey respondents cited end-user demand as the primary driver for allowing personal mobile devices on the network. IT The flow of new devices to the end-user was governed by IT. Users were not tech-savvy enough to take advantage of personal technology in the workplace and limited themselves to what was provided to perform their job roles. Pre-2008 IT brings technology to the end-user Post-2008 IT End-users have become more demanding about technology. The flow of new technology into the workplace has shifted from a dedicated IT group to the user. Employees are now concerned with using the latest technology to perform their jobs more efficiently, and demand that IT keeps up. End-users bring technology to IT

Don’t get mired in definitions; manage any mobile device that connects to the corporate network Smart phones make up the majority of mobile devices connecting to the corporate network, but some users may push for tablets and readers. Don’t panic. The variance in devices does not matter if you have the right management strategy in place. Tablets and smart phones access the corporate network in very similar ways. Between iPhones and iPads, for example, there is no difference in the mobile management policies needed. Tablets Smart phones Employees use these devices to... Check corporate Text message Instant messaging Connect to the Internet through corporate WiFi networks Maintain and reference corporate calendars

Don’t try to quantify innovation & productivity benefits, but understand that they are real There is no accurate way to quantify the innovation and productivity benefits for employees, but understand that with improved business connectivity, you can expect the following changes: Because end-users will… Check and respond to their more often after-hours. Experience quicker… Turn-around time on time-sensitive s. Third-party apps can be your friend. Android, BlackBerry and iOS all have independent app stores, which contain mobile applications, some of which are aimed at improving productivity (though some are productivity killers). Look into apps aimed at corporate productivity and connectivity for quick wins with employees. Apps designed to transfer SMS text messages over data networks as opposed to cellular networks, for example, allow users to send unlimited text messages. Most personal devices can also connect to virtual desktops. Be more aware of their availability. Meeting setup times. Generally be more in touch with the organization. Flow of information between internal and external parties.

Case Study: YMCA’s experience with cost reduction Industry: Non-Profit Segment: Small Enterprise Source: Information Technology Executive Pain Point Administering and paying for corporate devices was significantly driving up costs. The organization needed to find a way to maintain connectivity with employees, but remove the cost burden of maintaining corporate liable mobile devices. Solution Allowed senior employees to keep corporate-issued phones, but mandated that data and voice contracts were personally held. Junior employees were stripped of mobile devices and encouraged to bring in personal devices to connect to the network. Saved $48,000 a year in mobile contracts alone. Even if they were already given corporate devices, employees can be convinced to attach personal mobile devices to the network. If the cost of managing a corporate mobile device fleet is becoming a burden on IT, consider switching to a personal device setup. Gift formerly corporate devices to soften the blow of transferring the cost to employees. Insight We had a reduction in costs from no longer covering the monthly bills. We were spending about $4,000 a month in contracts and now we spend nothing. “ “ -IT Executive, YMCA

Embrace the Apple effect: the iPhone 3G exploded by being a multi-function communications & recreational device The introduction of Apple’s iPhone 3G in 2008 spurred a smart phone craze among recreational end-users, raising their comfort with technology. The iPhone 3G’s carrier- subsidized pricing opened the doors to smart phone adoption for the common man. With a subsidized price of $200 in 2008, 48% of iPhone 3G adopters were from households earning between $ and $ annually. The iPhone 3G was viewed as the first practical convergence device; it eliminated the need for multiple devices. The price tag of the iPhone and an accompanying plan were not feasible for lower-income markets – as a phone. But the value gained from eliminating the need to purchase multiple devices spurred adoption of the iPhone as an affordable does-it- all gadget. Source: comScore Smart phones, and the iPhone in particular, are appealing to a new demographic and satisfying demand for a single device for communication and entertainment, even as consumers weather the economy by cutting back on gadgets. “ “ - ComScore

Define your security needs based on the sensitivity of your data, and act accordingly to optimize device management The level of policy enforcement and security your organization requires is contingent upon regulatory compliance requirements and data sensitivity. MinimumBasicEnhancedLockdown Companies that do not provide employees with any sensitive data (e.g. trade secrets, fiscal information, and press releases) do not need to invest in infrastructure to increase device security. Creating end-user mobile device policies and conducting training for such organizations is often unnecessary. Companies that are concerned with employees carrying sensitive data in their corporate accounts must create a mobile device policy to enforce the right to remote wipe user devices and mandate password protection. End-user training on policy and compliance are also required. Enhanced security measures must be taken by organizations that have highly sensitive data in employee in-boxes and calendars. These organizations must develop a mobile device policy, conduct training, and consider limiting adoption to only devices with over-the- air encryption, such as BlackBerry. Lockdown is necessary for those organizations that must adhere to regulatory compliance and house potentially damaging business data on end-user devices. In general, these organizations should only be considering BlackBerry. Those that accept other devices must implement third-party management tools, policies, conduct training, and limit device adoption. Organizations with more employees had less success in allowing personal devices on their networks. Large organizations should be particularly stringent in mitigating the risks of incorporating consumer technology, and look towards Enhanced and Lockdown levels of mobile security.

Info-Tech Helps Professionals To: Sign up for free trial membership to get practical Solutions for your IT challenges “Info-Tech helps me to be proactive instead of reactive - a cardinal rule in stable and leading edge IT environment.” - ARCS Commercial Mortgage Co., LP