Moving to BYOD Gary Audin 1.

Slides:



Advertisements
Similar presentations
Mobile Payment Security The Good, the Bad and the Ugly
Advertisements

Mobile Asset Disposition in a BYOD World Craig Boswell HOBI International, Inc.
New Technologies for Tuberculosis Control: Programme Perspective Draft Definitions Retooling Task Force Meeting Geneva, Switzerland January 2008.
Introducing the Mason Infotech BYOD Commercial Smart Solution Presented by Mark Powelll-Mason Infotech Ltd January 2013.
Empowering People-centric IT Speaker name 00/00/0000.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
1 © Aberdeen Group 2013 – Not For Distribution ™ Meeting the Rising Challenge of Modern Networks.
2012 Annual Conference & Tradeshow Celebrating 26 years of service to the Collegiate Travel Marketplace GETTING VALUE IN A MANAGED ACADEMIC TRAVEL PROGRAM.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
University of Florida Incident Tracking and Reporting Kathy Bergsma
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Software Asset Management
NetMotion Wireless Get Connected. Stay Connected..
ENTERPRISE MOBILITY. IT CONSUMERIZATION Social Media Cloud Services Mobile Devices.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Network security policy: best practices
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
BYOD Charter Purpose and Scope
Q5 Systems Limited “Pay me now or pay me later!” Reducing field data capture, reporting, trend analysis and corrective action by up to 70%
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Security Policies Jim Stracka The Problem Today.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Security considerations for mobile devices in GoRTT
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Cyber Security & Fraud – The impact on small businesses.
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
Data management with mobile devices © 2014 wheresjenny.com Data management with mobile devices.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Washington State Work Zone Rule  Work Zone Rule Implementation  New Work Zone Policy Cathy Nicholas, FHWA - WA Division Office Frank Newboles, WSDOT.
Empowering people-centric IT Anthony Bartolo Technical Evangelist Microsoft Canada 05/14/2014.
Information Security tools for records managers Frank Rankin.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Scott Musgrove Senior Business Systems Analyst Water Corporation of Western Australia Developing for an Evolving Mobility Landscape: How Do You Hit a Moving.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
1 Corruption Prevention Strategies. 2 Specific Objectives: 1. Corruption Loopholes 2. Corruption Prevention Strategies 3. Conclusions.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
Data Management With Mobile Devices ©2015 albert-learning.com Data management with mobile devices.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Total Enterprise Mobility Comprehensive Management and Security
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Hybrid Cloud Web Filtering Platform
Information Security Program
Mobile Data Solutions Inc
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Microsoft Virtual Academy
Presentation transcript:

Moving to BYOD Gary Audin 1

BYOD is Inevitable IDC survey “2011 Consumerization of IT Study: Closing the Consumerization Gap” 69% thought tablets, iPads and other like devices will be part of the business tools used. Unfortunately, 57% thought that IT will have an increased workload when these devices come into use. 52% of executives expect that their devices need to be supported. 43% thought that a BYOD policy would increase morale. 37% thought a BYOD policy would improve productivity. 2

BYOD Challenges (1) Challenge # 1 – The enterprise is not the device owner and nor is it the wireless service provider subscriber. Challenge # 2 – IT is responding to the rapid BYOD growth, usually not initiating it. Challenge # 3 – The user may have more than one device in use. Average 2 to 3. Challenge # 4 – There may be information overlap, multiple applications in use and the need to ensure application accessibility. Challenge # 5 – Data protection is required, but is complicated by the BYOD user communicating with non-enterprise social networks. 3

BYOD Challenges (2) Challenge # 6 – The user expects multimedia to be supported. Challenge # 7 – Ensuring that the existing infrastructure can support BYOD access and traffic. Challenge # 8 – Developing, implementing, and enforcing new access and usage policies, covering both the device and the user’s role in the enterprise. Challenge # 9 – Training the help desk and trying to avoid help desk overload. 4

State of Mobility Survey The surveyed organizations were asked which mobile apps are currently used in 2012 compared to 2011: 1. use increased from 75% to 86%. 2. Web browsing increased from 70% to 80%. 3. Contacts increased from 69% to 80%. 4. Calendar applications increased from 66% to 75%. 5. Sales force automation decreased from 63% to 51%. 5 Source: Symantec’s 2012 State of Mobility Survey; Global Findings. Symantec’s 2012 State of Mobility Survey; Global Findings

6 Source: Trend Micro, June 2011.

Getting It Right (1) Establish a Mobility Committee Determine the Current Mobility Environment Revise the Existing Cell Phone Policy to Include Tablets Accommodate Users While Protecting the Enterprise Network and Data Ensure Compliance Regulations Are Followed 7

Getting It Right (2) Require Employees to Sign a User Policy Statement Centralize the Management of Services Strengthen the Existing Security Policies Develop Corporate Standards for Devices and Platforms Create User Groups and Policy Standards 8

Getting It Right (3) Determine Payment Options (Who Pays What) Minimize the Impact on IT and Help Desk Staff Develop a Communications and Training Plan Evaluate Mobile Device Management (MDM) Solutions Measure the Results 9

Developing a BYOD Policy A clear, approved definition of enterprise- owned vs. employee-owned is necessary. Better staff communications are needed to describe the change to a BYOD policy. The length of time it takes to get the policy in place can be longer than expected. There is an effort needed to work with carriers to keep the same phone number and features for employee-owned devices. 10

Impact on the Enterprise Study the impact of employee owned devices on its staff in order to provide a high level of service and support for users and devices. Standardize on mobile platforms and, more important, use existing Mobile Device Management Solutions (MDM) to manage the possible multi-platforms. Identify and evaluate all risks associated with employees’ use of personal devices to include network, data, security, privacy, business, compliance, and legal. 11

Four Key Recommendations * Plan apps that have mainstream use that can be broadly applied. * Consider the enterprise infrastructure and strategically assess its ability to support the apps. * Don't forget that mobile devices should be treated as real endpoints like desktop PCs and laptops. Be ready to manage them appropriately. Since mobile users will not necessarily be available in person, make sure you produce good policies and procedures and then enforce them. * Focus on the data and apps and secure them as well as or even better than the apps and data at the office desktop. 12

Resources “Adjusting to a BYOD World”, 29/adjusting-to-a-byod-world/ 29/adjusting-to-a-byod-world/ “Fifteen Steps to Conquering BYOD”, 05/fifteen-steps-to-conquering-byod.html 05/fifteen-steps-to-conquering-byod.html “BYOD: Avoiding Anarchy”, 04/byod-avoiding-anarchy.html 04/byod-avoiding-anarchy.html 13