bring your own device: the great debate - north … your own device: the great debate ... mobile kpi...

22
Bring Your Own Device: The Great Debate Brandon Swain

Upload: truongtuong

Post on 06-May-2018

218 views

Category:

Documents


3 download

TRANSCRIPT

Bring Your Own Device: The Great Debate 

Brandon Swain 

Client compu=ng is evolving ‐ giving IT  

and end users the power to do more 

 

2

Users Devices

Mainframe computing era

Personal computing era

Mobile era

Less than 2000 systems sold in 1960

Over 900,000 systems sold in 1980

1 billion processors connected by 2015

Users

n 1 1 1

Users

1 n

Devices Devices

The mobile device market is thriving 

 

3

$100 million $1.7 billion Market for mobile devices in healthcare

2011 2014

$4.7 billion U.S. hospital spending on IT $6.8 billion

2 out of 5 physicians go online during patient consultations; mostly on handheld devices

63% of physicians are using personal devices for mobile health solutions not connected to their practice

86% of physicians are interested in accessing Electronic Medical Records from mobile devices

2% Mobile device usage compared to overall IT 25%

Source: TechTarget news 

Enterprise Mobility Adop=on Curve

Communicate

Collaborate

Inform

Enable

Mobile Workflow

Mobile Intranet

Corporate File & Directory

Search

Sales & CRM Enablement

Field Service Enablement

Mobile Business Intelligence Enablement

Unified Communications

Mobile KPI Dashboards

B2C Apps

Personal Information

Management

Email

Internet

Instant Messenger

Productivity Applications

•  Many organizations follow a similar mobility adoption curve.

•  The right strategy and roadmap must

be established to help you on your journey, and design and implement the right solution to support your

business needs.

•  Empower the workforce in a flexible and secure way maximizing ROI.

•  Reach out to your customers, enable

them to interact with you in convenient ways, expand business

value and maximise customer satisfaction

  

4

Handling the Smartphone & Tablet explosion presents 

new enterprise management challenges 

5

Corporate Owned BlackBerry Devices

Secure

Proliferation of Smartphone/Tablet Platforms in the Enterprise

o  How do I provide secure access and protect corporate data?

o  How do I deliver LOB mobile apps to improve productivity?

o  How do I ensure my mobile apps work on such a wide variety of devices?

o  How do I keep costs from getting out of control?

o  How do I let my employees select the mobile devices they want while delivering the security and management IT requires?

Enterprise Systems / Data

Why allow employee‐owned devices into your 

environment 

•  They are fun, and your execu=ves and employees want them 

•  Improved employee morale and produc=vity 

•  Improved compliance and security by recognizing that employees will use device of choice and planning for these devices in corporate environment. 

•  Ability to create customized mobile applica=ons to solve business problems 

•  Reduce device and plan costs 

•  Reduced employee costs for devices and plans based on corporate agreements with carriers  

6

Considera=ons for employee‐owned devices in your 

environment  

•  Control over devices to implement governance and policy requirements  

•  Timely dele=on of data in the event of loss or theP of device  

•  Ability to restrict content on the devices, including third party applica=ons  

•  Control over the device plaQorms, opera=ng systems, and other factors to manage vulnerabili=es associated with each consumer device plaQorm  

•  BeRer support from carriers than maybe available for individual employees u=lizing their own, consumer‐grade device  

•  Addi=onal security controls may be required to meet security, compliance, and regulatory requirements. 

7

Special Concerns for Some Industries 

•  Consumer mobile devices present special challenges: 

–  New opera=ng environment is like the wild west 

–  Unhardened Opera=ng Systems are vulnerable to exploita=on, with few protec=ons compared to hardened or purpose‐built devices 

–  Devices may represent unmanaged entrance/exit points to secured, segregated ICS networks 

–  Clear defini=on of allowable devices and ac=vi=es is required 

–  Security flaws in devices may not be resolved in a =mely manner, if ever 

8

9 Confidential

Establishing an Enterprise Mobility Strategy 

 

Enterprise Mobility Strategy 

Infrastructure 

Management 

Applica9ons 

Security & Compliance 

Strong governance required 

10

  

What is your risk level / appe=te? 

11

Government Intelligence 

DOD – TS/TS SCI 

Federal Civilian and Global 500  

Financial, Engineering, Pharmaceu9cal  

PCI Data on the phone 

PHI data is on the phone 

PII data is on the phone 

 

Email is on the phone 

Data on the phone 

Recover phone 

 

 

Mobility security affects/is affected by… 

12

End Users

Security

Governance Business Strategy

Architecture

Applications Infrastructure Risk Posture

Service Desk

Data Classification

WiFi VPN Policies

Compliance

DLP NAC

Encryption

A mobility strategy leads to a solu=on that is secure, 

manageable, scalable, and open to all mobile OSs 

13

Key Features:

• Provide Security –  Secure Delivery of Enterprise Data

–  Data Isolation on Device –  Encryption –  Policy Compliance

• Manage Complexity –  Mobile Device Management

–  Multi-OS Support –  Multi-Application Support

• Improve Productivity –  LOB Mobile Applications

–  Custom Mobile Applications –  Wireless Email & PIM

• Manage Costs –  Mobile Expense Management –  Carrier plan management

–  Alerting –  Usage Tracking

Customer

Secure

End User

Secure

MDM – Making the Smartphone Enterprise Ready 

 Multi-Platform Support –  ActiveSync, BES, Good

 Security & policy management –  Enforcement & notification

 Dynamic cost management –  Roaming & plan management

 Application management –  Enterprise application store

 Device monitoring –  Health & usage

 Analysis and reporting –  Predictive & cost avoidance

Delivering multi-platform security, visibility, control and cost savings

“Managing how users Interact with devices”

“Managing devices, data and

applications”

“Managing costs of devices”

“MDM should be an agnostic OS, device and carrier independent

solution”

Device Management 

Policy  Management 

Applica=on Management 

E‐Mail Deployment 

Functions •  User provisioning

•  Migrations •  Device re-provision

Benefits

•  Reduce helpdesk calls

•  Reduce support

calls •  Increase uptime

•  Centralize tracking

ROI •  Lower TCO

Functions •  Hardware mgmt

•  Software mgmt •  Real-time updates

Benefits •  Increased visibility

•  Efficient diagnostics

•  Upgrade planning & deployment

•  Centralize tracking •  History reporting

ROI •  Cross platform

status reporting

Functions •  Security mgmt

•  Usage governance •  Compliance

Benefits •  Reduce security

risks

•  Increased compliance

•  Manage user behaviors

ROI

•  Decrease admin and help desk costs

Functions •  Control footprint

•  App. deployment •  Update/upgrade mgt

Benefits

•  OTA installs •  Close-loop

deployments

•  Simple, consistent app management

•  Improved BES mgmt

ROI

•  Decrease in admin/help desk support

time

Performance  Monitoring 

Functions •  Server monitoring

•  Device monitoring •  Load balancing

Benefits •  Quicker resolution to

problems

•  Reduce downtime and costs

•  Analysis and trending

ROI

•  Decrease help desk costs

•  Enable proactive

monitoring

MDM Capabili=es 

  

15

Types of Mobile Applica=ons 

16

Na=ve 

Web 

Hybrid 

Value of a Mobile Enterprise Applica=on PlaQorm 

17

Strategies for BYOPC 

18

•  Establish catalog of supported opera=ng systems: 

– Windows 7 & 8 

– Mac OS X? 

–  Linux Variants? 

•  Catalog of supported AV solu=ons 

•  Use Inspect to Connect technology to interrogate employee‐owned PC to verify compliance 

•  U=lize virtualized applica=ons or virtual desktops to secure enterprise apps and data on untrusted devices.   

•  Virtual desktop clients can be configured to control wri=ng to local or removable media, prin=ng, cut & paste, etc. 

Ques=ons to ask when considering BYOD 

19

•  Are there any specific concerns that would 

preclude the use of employee‐owned devices? 

–  Informa=on may be subject to FOIA requests or 

other regulatory or compliance requirements. 

•  Is there a catalog of devices that would be 

allowed to access enterprise applica=ons? 

– With each new plaQorm supported in the 

environment, complexity is added.  Costs may 

increase as addi=onal versions of enterprise apps 

are developed and maintained. 

Ques=ons to ask when considering BYOD 

20

•  Is the organiza=on willing to accept a short‐term increase in risk to allow newer plaQorms access to data while the device’s management and security tools mature? 

–  For corporate‐owned devices, it may be an easy decision to delay upgrades; however, for personally‐owned devices, employees may be unwilling to forego the latest devices or updates. 

•  Have we considered all of the risks? –  Inappropriate content on personally‐owned devices.  ECPA considera=ons?  Compensa=on considera=ons, especially for CA‐based employees? 

Questions / Comments

Confidential 21

Thank You. [email protected]

Confidential 22