BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.

Slides:



Advertisements
Similar presentations
Speaker Name, Title Windows 8 Pro: For Small Business.
Advertisements

David Shepherd Pre Sales Director (EMEA)
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
1 © Aberdeen Group 2013 – Not For Distribution ™ Meeting the Rising Challenge of Modern Networks.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Building the case for Windows 8.1 Flexible Workstyle deployment Windows 8.1 Business Value Workshop Microsoft Consulting Services can help you build the.
Imation Mobile Security Research Presentation August 2013 What is happening with our data?
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Introduction to Windows 8. Window 8 Introduction Newest member of the Windows family Newest member of the Windows family Microsoft reimagined Windows.
Impact of Mobile Technology Tim Nesler CIO and Associate VP for Information Technology Services Santa Fe College League for Innovation 2011 CIO Summit.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
1-1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall MANAGING INFORMATION TECHNOLOGY 7 th EDITION CHAPTER 1 MANAGING IT IN A DIGITAL.
Third Annual Shopping on the Job: ISACA’s Online Holiday Shopping and Workplace Internet Safety Survey Commissioned by ISACA ( November 2010.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
S ECURE M OBILE W ORKSPACES – N EXT G ENERATION D ESKTOPS E MPOWERING A GILE G OVERNMENT J EFF P ORTER - D IRECTOR P LATFORM TECHNOLOGY D IVISION D EPARTMENT.
Communications and collaboration portals – what’s in it for employees? Elvar Thorkelsson Information Worker Business Group Lead
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Empowering Your Users-Security & Mobility Bil Martin 1.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
The State of Computer & Data Security in Corporations Independent Survey.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Build Your Business by making the Right Connections.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
User and Device Management
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Moving to BYOD Gary Audin 1.
Vodafone Business Cloud
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
Unified Communications Survey Summary Results
How to Define a Successful Mobility Strategy
Transforming business
Styr på filopbevaring og fildeling
Challenges facing Enterprise Mobility
Impact of IT Consumerisation on Enterprise Security
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Introduction to BYOD EIT, Author Gay Robertson, 2017.
MICROSOFT AZURE ISV PROFILE: ONEBE
System Center Marketing
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

BRING YOUR OWN DEVICE

BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices More organizations allowing “non-standard” IT devices on their networks Significant amount of business content stored/shared on employee owned devices InformationWeek Mobile Security Survey >86% of respondents permit use of personally owned devices now or are moving that way >84% identify lost or stolen devices as a key mobile security concern

Who use a personal electronic device for work-related functions say their company has not implemented a BYOD policy 31 % Who use a personal device for work let someone else use it 66 % 46 % 81 % Use a personal electronic device for work-related functions Connect to a company via a free or public wi-fi connection BYOD BY THE NUMBERS PEOPLE WILL USE THEIR PERSONAL MOBILE DEVICES ON THE JOB, REGARDLESS OF WHETHER THEIR ORGANIZATION HAS A FORMAL ‘BYOD’ POLICY

BYOD BY THE NUMBERS Desktop 56 % Laptop Smart Phone TabletNone BYOD DOESN’T ALWAYS HAVE TO MEAN SMART PHONES AND TABLETS. DESKTOP PCS WERE THE PERSONAL DEVICES MOST COMMONLY USED FOR WORK SOURCE: ESET, Harris Interactive and the SANS Institute as published in Government Computer News 51 % 38 % 15 % 19 %

BYOD BY THE NUMBERS DesktopLaptop Smart Phone Tablet 47 % 41 % 24 % 10 % BYOD BY THE NUMBERS Desktop PCs were the personal devices most commonly used to store and/or access company information. Survey reports that company data was being encrypted on only about a third of BYOD devices. DEVICES THAT STORE AND/OR ACCESS COMPANY INFORMATION SOURCE: ESET, Harris Interactive and the SANS Institute as published in Government Computer News

BYOD BY THE NUMBERS 65 % Said they don’t have the necessary tools in place to manage non-company issued mobile devices on the network. 44 % Said they’ve seen an increase in help desk requests. 40 % Said they’ve experienced an increase in network traffic. 27 % Said they are not at all confident. IT PROFESSIONALS RESPOND SOURCE: ESET, Harris Interactive and the SANS Institute as published in Government Computer News

SURVEY: TOP IT SECURITY INVESTMENTS FOR 2013 Editors if Information Security Media Group surveyed experts on what they expect organizations to invest in the coming year — Top of list is Mobile Security — Other technologies include authentication, encryption and monitoring wares Trend of moving away from organizationally owned to personally owned devices — “Realistically managing workers’ expectations while establishing appropriate safeguards and controls to reduce risks is the challenge facing almost every organization” Adoption and use of mobility for both corporate and personal use will make the importance of access management to the enterprise all the more important — How will the CIO and CISO identify and authenticate devices, users, services and data sources for all transactions? — What will the corporate policy for ‘wipe’ of lost devices? “If 2012 is the year of mobility – as remote computing drives organizations to figure out how to let employees gain access to critical systems from anywhere – 2013 is likely to be a repeat.” Eric Chabrow, Top IT Security Investments for 2013

CAUSE & EFFECT BEHAVIOR Despite corporate policies, employees are using their own devices for work related activities Growth of telework – workers see as their right; businesses want to offer as benefit 62% of businesses permit remote work RESULT Businesses are losing billions of dollars annually as a result of stolen laptops 2011 European Study estimate combined cost to organizations at $1.8 billion 2010 US Study estimate combined cost to organizations at $1.2 billion Teleworker effectiveness tied to user experience SOURCE: Ponemon Institute, GigaOM WORKSPACES ARE NO LONGER JUST THE COMPUTER DOWN THE HALL

BYOD CONSIDERATIONS Assume the worst o Spare the cost of hiring a penetration tester and deploy defenses by assuming the worst Assume that employees will use their personal devices on the corporate network, even if they are told not to o Use products to block the ones you are not willing to have around and encrypt and audit the movement of devices carrying critical data Assume employees value convenience more than security o Employees will find a way around cumbersome or inconvenient security policies Assume storage devices will be lost and IT not informed > Use encrypted drives or do not use at all Assume that an organization’s first and last defense against a security breach is its own employees o Train employees on good security practices FIVE ASSUMPTIONS IT DEPARTMENTS SHOULD KEEP IN MIND WHEN IT COMES TO BYOD

FULL WINDOWS DESKTOP ON SECURE USB Direct boot of Windows 7 or 8 ensures widespread adoption and user satisfaction delivering a normal desktop experience Workers can take all their data, applications and systems with them, securely and reliably A direct boot of Microsoft Windows ensures widespread adoption and user satisfaction, delivering a normal desktop experience without the performance drag of desktop virtualization WITH IMATION MOBILE SECURITY YOU CAN ENABLE BYOD AND LET EMPLOYEES WORK ON THEIR OWN LAPTOPS AND DESKTOPS WITH PEACE OF MIND. Solutions for Microsoft Windows 7 and 8

WHY IMATION MOBILE SECURITY Highest security levels available today Rugged solutions deployed in the world’s most demanding organizations Unmatched deployment flexibility –On premise –Cloud-based

IMATION MOBILE SECURITY …TO SECURING THE MOBILE WORKFORCE. Yes