BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.

Slides:



Advertisements
Similar presentations
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Advertisements

1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Security for Mobile Devices
City of Boroondara Mobile Device Management
PCS – BYOD Are you ready for devices in your classroom? August 2013.
BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Imation Mobile Security Research Presentation August 2013 What is happening with our data?
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
1 Outlook on the future Andres Vicente Chief Commercial Officer Enterprise Business Unit Vodafone Romania Bucharest, September 24 th 2012.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
THE RIGHT TECHNOLOGY IN INVESTOR RELATIONS: WHAT TO DO ONLINE? THOMSON REUTERS Alex Ménage Head of Business Development Corporate Services Rapidly Developing.
Mobile Device Security Group Magic: Michael Gong Jake Kreider Chris Lugo Kwame Osafoh MSIT 458 – Information Security October 30, 2010.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Ettalong Public School Parent Information Session
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Conference – 7-8 August, 2013 Presented by David Melnick | pg 1 Employee Privacy and Organizational Security: August 8th, 2013 Addressing.
Apps & the Enterprise Will Ro, Global Director, HTCpro.
Should We Believe the Hype? Stephen Fast Lead, Cyber Innovation Strategy Cyber Innovation Division Applied Research Laboratory The Pennsylvania State University.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
The Road to Transaction
ENTREPRENEUR COACHING BY Dr. R.JAGANNATHAN. TOPICS FOR DISCUSSION AND INTERACTION BUSINESS LINE IDENTIFICATION IDENTIFYING THE CHALLENGES IN THE MARKET.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Richard Tworek VP, Enterprise Communication Servers 2006 Technology Focus Enhancing the Human Experience with Enterprise Real-Time and Secure Converged.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
10/8/20151 Mobile Apps and QAD Stephen McHugh Broom Street Software 03-17,2013.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
 Remember that you may also need significant upload bandwidth as students start to create and deliver large media files.
Innovation Leadership Dr Françoise Legoues. 2 What is innovation? “Innovation occurs at the intersection of invention and insight. It’s about the application.
Michael Fine 1. What is a Digital Firm?  Subjective?  Expectations vs. Success  The digital firm provides services to a client company, main company,
Describe the potential of IT to improve internal and external communications By Jim Green.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
The Evolution of Technology In the Workplace There’s An App For That:
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
Info-Tech Research Group1 Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover.
- Company Confidential - Corporate Overview March 2015.
The BEST Citrix/Microsoft RDS alternative
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
BYOD Security Risks Presentation by Ravi Namboori Visit
The BEST Citrix/Microsoft RDS alternative
Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,
Challenges facing Enterprise Mobility
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Impact of IT Consumerisation on Enterprise Security
BYOD (Bring Your Own Device) Market Analysis
Introduction to BYOD EIT, Author Gay Robertson, 2017.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Global Identity and Access Management Market Worth Over $20 bn by 2025:
Presentation transcript:

BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons

Without BYOD

With BYOD

 A device utilized for communicative and informational purposes in the workplace and personal life.  Some prominent examples include:  Smartphone  iPad  Laptop  Tablet What is BYOD?

 Technological mobility has fostered a significant impact in most business environments.  Ability to remotely create and consume information essential for business operations, and BYOD enables this process.  Understand and more importantly have access to tools and resources of a world-wide network imperative to a company. Why BYOD?

 Employees’ experiences are important.  Freedom to choose their own device. In the Work Environment BYOD! “The way we work is changing fast. People adapt differently.”

 2007: there was an increased rate at which companies began accepting and implementing BYOD. Market Trend

 Creates a liberal-minded environment for potential employees.  Each associate’s technological needs differ at InsureAll, BYOD allow workers to tailor their devices to their individual needs.  Corporate systems and data become more accessible than ever. A Few Benefits

 Mobile devices are becoming more affordable.  Not having to provide devices to employees means one less cost for InsureAll.  BYOD is a promising system to increase productivity. Benefits (cont.)

 Mobile devices offer little protection. Risky Viruses & Malware

 Risking data loss  Risky viruses and malware  Uninvited guests/Hackers/Intrusions You Can’t Protect What You Don’t Know Source: Understanding and managing risks associated with BYOD

 Policy enforcement  Challenges to productivity Further Challenges

BYOD Strategies

Policy = Simplicity Focusing on policy is the first step  Determine which devices are allowed to access the network  Determine which devices you will support

Separate Work From Fun Work life and personal life should be kept separate. To get network access, employees must agree to acceptable use policies. IT should monitor activity. Make sure employees understand the rules and the risks.

BYOD is Here to Stay Will grow in size and scope Presents new challenges and opportunities A BYOD strategy is critical for data security A major trend that is changing IT.

  change-everything-about-security.html change-everything-about-security.html  privacy-and-legal-implications-of-byod-bring-your-own-device/ privacy-and-legal-implications-of-byod-bring-your-own-device/  a_bring a_bring  byod-real-solutions-for-the-real-life-issues-facing- enterprises/#ixzz2fLwzkSKk byod-real-solutions-for-the-real-life-issues-facing- enterprises/#ixzz2fLwzkSKk    ww.w.zdnet.com  References