© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology.

Slides:



Advertisements
Similar presentations
Chapter 5 Transfer of Training
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Zhongxing Telecom Pakistan (Pvt.) Ltd
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Membership & Roster Maintenance Officers Training Workshop September 2012 Kevin Shanahan 1.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Carrie, living with Crohns disease Mobile Devices & The Information Professional – Where Do I fit In? PHTD Spring Meeting, Baltimore March 18 th -20 th.
Modern Systems Analyst and as a Project Manager
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Vendor Statements of Work: Your Role as an IT Professional Theresa Rowe | June 2011.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Configuration management
CHAPTER 10 CREDIT You’re in Charge
Effectively applying ISO9001:2000 clauses 6 and 7.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Taiwan ITQ.
Employee & Manager Self Service Overview
Powered by:. Who We Are 3 Enterprise Technology Services VoiceOne DataOne is the leading independent provider of managed technology services to enterprises.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Office 365 for Enterprises ITExpo February 2, 2012.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
Sample Service Screenshots Enterprise Cloud Service 11.3.
How to commence the IT Modernization Process?
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Functional Areas & Positions
MANAGEMENT RICHARD L. DAFT.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
PSSA Preparation.
Copyright © 2002 by The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing the BYOD Management Gap: the evolution of enterprise mobility.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Total Enterprise Mobility Comprehensive Management and Security
The time to address enterprise mobility is now
Transforming business
Mobile Device Management
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
MICROSOFT AZURE ISV PROFILE: ONEBE
Microsoft Virtual Academy
Presentation transcript:

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology July 2012

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 2 Ovum IT Super Themes 2012 Big Data & Analytics Cloud Computing Connected Society Consumerization of IT Global Sourcing IT Modernization IT-enabled Business Innovation Mobility Security, Identity & Privacy Sustainability

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 3 Ovum’s consumerization practice: every employee is a consumer Consumer as Connected Customer Consumer as Employee Consumer as System Component Consumer as Protagonist The employee brings consumer technology into the workplace as a preferred tool: “Bring Your Own Device” (BYOD) is a key trend

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 4 Consumerization of IT: Managing the Employee Experience  Bring Your Own Computer/Device strategies in enterprise IT  Enterprise Mobility Management vendor strategy  Mobile application strategies for the connected employee  Governance and policy: managing employee data privacy legislation Consumerization of IT The adoption of new IT devices and applications in the consumer market is accelerating – fuelling improvements in personal productivity. Enterprise workplaces move more slowly, creating a divide between user expectations and corporate IT realities. We focus on the impact of the proliferation of new devices, apps and data sources on user behaviors and IT management practices in the enterprise.

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 5 What’s behind consumerization? Apple and Google’s consumer market focus creates the “BYOD Gap” Rate of adoption Early adopters Normal point of enterprise entry Actual point of enterprise entry BYOD Gap Mobile device adoption curve Employee demographics

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 6  Building and defining a business case & strategy  Data security  Introducing new platforms to IT Service Desk workflow without loading into excess cost  Managing the implementation challenge  Dealing with cultural and geographic legal variance  Putting together a consumerized corporate mobility strategy  Case studies Agenda

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 7 Defining the business case for BYOD: balancing tangible and intangible benefits, risks and costs Tangible benefits Intangible benefits Costs and risks Improved employee engagement and satisfaction Improved employee productivity – yet to be demonstrated with hard evidence New, specialized line of business capabilities Hardware costs – if paying employees a stipend Airtime costs – either on corporate or personal tariffs Less reliance on the service desk, more self-help Potential cost of a third party enterprise mobility management solution Increased risk of data loss? Managing an unstoppable market trend? Potential Opex and Capex increase on the IT service desk Risk of violating data privacy regulation Shifting the burden of shortened replacement cycles on to the employee

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 8 The business case for BYOD: it is unavoidable The benefits of BYOD have not yet been proven…  Improved productivity and engagement still needs to be demonstrated with hard evidence … The threats and challenges it poses cannot be ignored  The risk of data loss is real and must be addressed, whether BYOD is officially sanctioned or not  Providing solutions to the security challenges generates further issues around cost management and data privacy

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 9  Building and defining a business case & strategy  Data security  Introducing new platforms to IT Service Desk workflow without loading into excess cost  Managing the implementation challenge  Dealing with cultural and geographic legal variance  Putting together a consumerized corporate mobility strategy  Case studies Agenda

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc BES What consumerization means for IT: moving towards a multi-platform environment ?

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 11 Consumerization means that:  More (unsecured) networks are transferring corporate data  More (unsecured) endpoints are accessing corporate data  More (unsecured) applications are using corporate data Consumerization multiplies the threats to data security Data security is always at risk at three main points: the network, the endpoint, and the application

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 12  Building and defining a business case & strategy  Data security  Introducing new platforms to IT Service Desk workflow without loading into excess cost  Managing the implementation challenge  Dealing with cultural and geographic legal variance  Putting together a consumerized corporate mobility strategy  Case studies Agenda

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 13 Potential lack of expertise and resource: investment required  Training required to fully understand intricacies of different platforms  System administrators accustomed to working with a single platform  Extra man hours (and therefore cost) required on the helpdesk / service desk to deal with troubleshooting on multiple platforms IT service desks are not necessarily equipped to deal with this multi-platform environment

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 14 Contracts may need to be renegotiated  Need to work with provider to establish what capabilities they have, what can and can’t be supported  Outsourcing providers may need to train up staff – and charge more as a result  If support for multiple OSs was not built into the original contract, the likelihood is that they will need to be renegotiated  Enterprise mobility vendors provide workflow tools to manage thousands of devices at once – would require roll out and training, but designed to be “single pane of glass” easy IT service desks: how does BYOD impact existing IT service desk outsourcing arrangements?

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 15  Building and defining a business case & strategy  Data security  Introducing new platforms to IT Service Desk workflow without loading into excess cost  Managing the implementation challenge  Dealing with cultural and geographic legal variance  Putting together a consumerized corporate mobility strategy  Case studies Agenda

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 16 BYOD is about empowering employees – but they also need to be aware of responsibilities BYOD frees employees to do their job wherever they are…  The perfect storm of mobile, social and cloud – employees are able to be connected 24/7, being productive when they’re away from the office … But its implementation needs to be closely managed  Employees need to understand the security risks and implications, and who’s responsible for what – data, applications, cost, technical support  Their consent is required to implement complete security solutions

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 17 The “complete” enterprise mobility solution should offer: Device management Mobile enterprise application management and provisioning Expense management

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 18 Some common MDM capabilities across major mobile OSs:  Over-the-air discovery, quarantine, enrolment and configuration of devices accessing the corporate network  Password policy enforcement, data encryption  Remote lock and wipe  Real time reporting and alerts, activity logging, GPS tracking  Content- and context-aware mobile data loss prevention software  Application management and distribution, document control e.g. blocking copy / paste / local storage Addressing security concerns: common MDM capabilities across major mobile OSs

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 19 Mobile enterprise application platforms – addressing the same issues as MDM but with a different approach Managing the application, not the device:  Secure app wrapping technology – applying MDM capabilities to a single app  Removes the need to intrude on personal activities Corporate app stores  An easy way to push apps to the relevant users in the relevant format  Including custom apps – designed specifically for line-of-business users to maximize business value

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 20 On-device multi-persona management: a third way Providing separate work and personal “identities” on the same device  Solutions such as Enterproid Divide allow for one persona to be managed and secured by the enterprise, and the other to remain free for personal use  App-wrapping and persona management are a way around privacy concerns – but are they as secure? Only allow for monitoring select applications, no idea what corporate data might be going through the unsecured consumer apps  These capabilities are only available on Android at the moment – and BlackBerry to a certain extent with BlackBerry Balance

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 21 BYOD might make some savings on hardware…  Companies can save on device renewal cycles  But often devices (e.g. BlackBerry’s) come free with a corporate airtime contract anyway  Will the company still need to maintain a “backup” fleet of devices?  Will the company be providing a stipend for employees to buy their own device?

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 22 … But it will add costs elsewhere  Paying for personal tariffs can be up to 5x more expensive than a corporate tariff  Extra costs on the service desk, or;  Extra cost of a third party enterprise mobility solution, or;  Both!

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 23 Telecoms expense management solutions and corporate-provided SIMs help to manage costs Keeping track of telecoms spending  Companies are not always aware of how much they are spending  Controls can be put in place to monitor spending while roaming, for example: when a certain limit is reached, the user can be prompted as to whether they want to keep on talking / using data One option: corporate provisioned SIM, personally owned device  The best of both worlds? The user gets the device of their choice; the enterprise gets to control the airtime contract and can keep the number if the employee leaves…  But will employees go for that?

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 24 Vendors from a range of backgrounds are converging on the enterprise mobility services space Enterprise mobility / MDM specialists ITSM / enterprise application vendors Telecoms expense management vendors Device OEMs IT security vendors Enterprise mobility management capabilities Brand / reputation strength

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 25  Building and defining a business case & strategy  Data security  Introducing new platforms to IT Service Desk workflow without loading into excess cost  Managing the implementation challenge  Dealing with cultural and geographic legal variance  Putting together a consumerized corporate mobility strategy  Case studies Agenda

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 26 The legal implications of BYOD – complying with data privacy legislation Organizations face a legal conundrum  Data being accessed on a personal device needs to be secured. If it is lost, the organization is responsible – not the individual  However… the solutions that provide data security on a mobile device involve a certain amount of monitoring and processing of personal activities – which can be seen as a violation of data privacy rights

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 27 The legal implications of BYOD – complying with data privacy legislation Employee consent is required  No matter which region you are operating in, the only way around is to get employee consent. They must know the implications of the solution and freely agree to it. Regional and vertical regulation  Data privacy regulation has basic similarities from country to country, but multinational organizations must consider it in every country in which they operate  Organizations must also be aware of data regulations specific to their industry, both internationally and regionally

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 28  Building and defining a business case & strategy  Data security  Introducing new platforms to IT Service Desk workflow without loading into excess cost  Managing the implementation challenge  Dealing with cultural and geographic legal variance  Putting together a consumerized corporate mobility strategy  Case studies Agenda

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 29 What should a consumerized corporate mobility policy address? Security: Understand the steps required to secure corporate data Employee privacy: Make employees aware of the security implications and gain their consent to implement an MDM solution Eligibility: Know exactly which employees the policy applies to Acceptable use and dealing with policy violations: Make sure employees understand the consequences of violating the policy Technical support: Have a clear idea of who’s responsibility this is Reimbursement and total cost of ownership: Understand the impact of the policy on bottom-line costs and take steps to control them

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 30  Building and defining a business case & strategy  Data security  Introducing new platforms to IT Service Desk workflow without loading into excess cost  Managing the implementation challenge  Dealing with cultural and geographic legal variance  Putting together a consumerized corporate mobility strategy  Case studies Agenda

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 31 Consumerization case study Strategy  UK-based multinational bank not running a full BYOD policy, but replacing BlackBerrys by rolling out iPhones to its mobile employees instead. Moving beyond only using on the go: “wanted to move from an platform that does apps to an app platform that does ”.  10,000 iPhones distributed by end 2011, and each of those users has the option to bring in a personally owned iPad as well (2,000 actually running on the corporate network).  12 internal apps available to relevant employees, covering functions beyond such as trading, customer management, customer service, and exchange rates.

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 32 Security mechanisms  Everything provided in a secure environment: access to corporate data on corporate network only, no local storage – no sensitive data can be left on the device.  Single-tunnel VPN – when a user is connected to the corporate network, all other access is blocked.  All managed in-house by Standard Chartered’s own IT department Consumerization case study

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 33 BYOD case study Strategy  Relationships with multiple mobile carriers in every country in which it operates means that Cisco is in a great position to implement an internal BYOD policy. The networking giant no longer pays for any mobile devices, telling employees to bring their own into work. Cisco leverages its relationships with carriers to provide very good Cisco- employee-only mobile tariffs.  iPhone now the most popular device in the company, 41% share. BlackBerry slipping back (24%), Android growing (10%).  Results: Mobile spend flat year on year (May 2010 – May 2011), even with 32% increase in number of mobile users. Users also self-support more effectively on personally owned devices, and mobile IT support requests dropped 20% year on year.

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 34 Security mechanisms  Aims to support as many platforms and devices as possible and is continually increasing its number of "trusted devices“. Trusted devices must meet certain architectural principles around security, authentication, authorization and storage, and execution elements around policy enforcement and asset management. Mobility policy  Cisco employees have to agree to a corporate mobility policy and understand that their phone may be wiped if confidential corporate data is “deemed likely to be compromised”. Violating the policy can lead to disciplinary procedures including termination of employment. BYOD case study

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 35 BYOD case study Strategy  In the first year of its global BYOD implementation, managed services provider Unisys deployed iPads and iPhones to customer-facing employees, and set up the IT infrastructure to allow mobile devices to securely connect to the Unisys intranet and other critical applications for day-to-day business functions. Unisys also built the systems needed to support personal Blackberrys and Windows Mobile.  The auto provisioning process (built in-house) to set up iPads and iPhones (3GS) reduced help desk calls by ~1000 and saved ~ $50,000 in licensing cost over a year.  Unisys claims to have increased workforce productivity by connecting employees on the move with critical internal corporate assets.

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 36 Security mechanisms  Strict authentication and encryption processes are in place, and cloud based applications mitigate the risk of mobile data theft.  What applications employees can use depends on their device’s security rating – some are more secure than others. No Android devices are yet being allowed into the Unisys environment. Mobility policy  Employees must sign up to an acceptable use policy, which informs them in which circumstances their device may be wiped, and that their device may be subpoenaed for litigation purposes (especially in the US). The data security terms are globally applied; the policy for reimbursement differs by region. BYOD case study

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 37 Localized consumerization case study BlackBerry s switched off at night in Germany  In December 2011, Volkswagen agreed to deactivate the function on its BlackBerry fleet at night for employees in Germany. The move is a result of pressure from the company’s work council to counter expectations that employees with a BlackBerry should be reachable at all times. The works council reasons that such an addiction to the “CrackBerry” corporate device heightens the risk of burnout and stress, leading to increased numbers of sick days taken.

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 38 Localized consumerization case study Consider local cultural factors when implementing any policy  Be aware that allowing a BYOD policy or provisioning employees with consumer-focused devices does not automatically mean that they will be reachable at all times.  In Germany, organizations implementing any enterprise mobility policy must do so in cooperation and agreement with local work councils. If any such policies do not conform to the employee’s contract of employment (e.g. on required working hours), expect opposition from the works council.

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 39 Localized BYOD case study Council opens up to personal devices  Leeds City Council is allowing staff to choose their own phone, including iPhones and Android devices. The council began work on the implementation in early 2012, selecting MobileIron’s MDM solution to enable the scheme.  Employee’s wanting to enrol in the BYOD scheme can only install the MobileIron software after signing a text message disclaimer agreeing to keep their phone updated with the latest OS, apply security updates, and not to attempt to circumvent any of the security measures. Having downloaded the MobileIron client app, work , documents, and data are encrypted when accessed on the employee’s personal device.

© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 40 Localized BYOD case study Ensure that employees understand and sign up to a policy before implementing any intrusive security measures  Make sure that employees are fully aware of what activities and data on their personal devices will be monitored, and how. Ask employees to sign up to a mobility policy before allowing them access to corporate data on their personal device, outlining their responsibilities in regards to protecting corporate data.  Implement adequate security steps, including a strong PIN policy and AES-128 encryption as a minimum, to prevent the loss or leakage of data through usage on personally owned devices. This may well involve buying into a third party solution if such capability / expertise is not available in-house.