Managing BYOD Legal IT’s Next Great Challenge
Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview of mobile device management technologies Case Study: Holland & Hart
The BYOD Trend – Some History Employee use of company owned computers Using laptops to access the internet Drove usage policies and technology controls RIM Blackberry delivers first mobile device Apple iPhone changes everything
BYOD Benefits and Challenges Benefits Improved responsiveness Improved accessibility Greater flexibility Challenges IT support of a wide range of mobile vendors and operating environments Secure access to firm data Mitigate risk of unsecure personal apps
Smartphones lost/stolen in 2011 Only 7% Recovered 70 million 5 Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers
Have mobile device breaches 17% of businesses 6 Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater
Best Practices Registering devices to insure security: Virus protection, authentication, encryption Provisioning of firm-authorized apps IT use monitoring User education Compliance with firm security policies Mobile Device registration with IT Password protection Use of unsanctioned apps Lost/stolen devices
Mobile Device Management IT Control of mobile device usage Enforce authorized and secure access Requires investment, resources and Administration Central server Manages all policies and employee access Provides secure connection to firm data/applications MDM mobile apps for user authentication and control enforcement of third-party apps
MDM Functions Mobile app distribution Auto install firm supported apps and updates Policy management User authentication policies Sanctioned and blacklisted apps Inventory management Track employee usage Optimize service plans
MDM Functions Security management Block noncompliant devices form the network Password Protection Block specific apps Secure connections to firm data Encryption Require device level encryption MDM secure container encryption
MDM Functions Data Loss Prevention Creates secure container on mobile device Custom MDM apps for secure , calendar and browsers Enforce encryption and selective wipe Control file synchronization Control file access outside secure container File save, print, copy/paste, attachment Mobile apps outside the secure container
MDM Case Study Scott Ainslie, Technical Operations Manager Holland & Hart 12
Real World MDM - History Blackberries to iPhones – How we got here What do we do about it? Protecting the mobile inbox More than just on phones - Tablets Time entry Documents Intranet/VPN
Present Solution Firm issued phone, personal tablet iPhone vs Android – Windows Phone? Firm data requires firm management Mobile Device technology policy Encryption Lock times Certificates Support Official Apps (Time, DM, VPN)
Current Projects Network Access Control (NAC/NAP) Enterprise replacement for Dropbox Desktop Virtualization Beyond phones & tablets – laptops Mobilize the Intranet MS Office device subscription
&& QQ AA 16
Thank you for attending our webinar. If you wish to view this presentation again, please contact us at: OR Secure Document Delivery Blog blog.biscom.com On the Web biscomdeliveryserver.com Phone (800) Whitepapers Case Studies and more 17