bring your own device: the great debate
TRANSCRIPT
Bring Your Own Device:The Great Debate
Brandon Swain
Client computing is evolving - giving IT and end users the power to do more
2
Users Devices
Mainframe computing
era
Personalcomputing
era
Mobileera
Less than 2000 systems sold in
1960
Over 900,000 systems sold in
1980
1 billion processors connected by 2015
Users
n 1 1 1
Users
1 n
DevicesDevices
3
The mobile device market is thriving
$100 million $1.7 billionMarket for mobile devices in healthcare
2011 2014
$4.7 billion U.S. hospital spending on IT $6.8 billion
2 out of 5 physicians go online during patient consultations; mostly on handheld devices
63% of physicians are using personal devices for mobile health solutions not connected to their practice86% of physicians are interested in accessing Electronic Medical Records from mobile devices
2% Mobile device usage compared to overall IT 25%
Source: TechTarget news
Enterprise Mobility Adoption Curve
Communicate
Collabora
te
InformEnable
Mobile WorkflowMobile
Workflow
Mobile IntranetMobile
Intranet
Corporate File &
Directory Search
Corporate File &
Directory Search
Sales & CRMEnablement
Sales & CRMEnablement
Field ServiceEnablement
Field ServiceEnablement
Mobile Business
IntelligenceEnablement
Mobile Business
IntelligenceEnablement
Unified Communicatio
ns
Unified Communicatio
ns
Mobile KPI DashboardsMobile KPI
Dashboards B2C AppsB2C Apps
Personal Information
Management
Personal Information
Management
EmailEmail
InternetInternet
Instant Messenger
Instant Messenger
Productivity ApplicationsProductivity Applications
• Many organizations follow a similar mobility adoption curve.
• The right strategy and roadmap must be established to help you on your journey, and design and implement the right solution to support your business needs.
• Empower the workforce in a flexible and secure way maximizing ROI.
• Reach out to your customers, enable them to interact with you in convenient ways, expand business value and maximise customer satisfaction
4
Handling the Smartphone & Tablet explosion presents new enterprise management challenges
5
Corporate OwnedBlackBerry Devices
Secure
Proliferation of Smartphone/Tablet Platforms in the Enterprise
o How do I provide secure access and protect corporate data?
o How do I deliver LOB mobile apps to improve productivity?
o How do I ensure my mobile apps work on such a wide variety of devices?
o How do I keep costs from getting out of control?
o How do I let my employees select the mobile devices they want while delivering the security and management IT requires?
Enterprise Systems / Data
6
Why allow employee-owned devices into your environment
• They are fun, and your executives and employees want them
• Improved employee morale and productivity
• Improved compliance and security by recognizing that employees will use device of choice and planning for these devices in corporate environment.
• Ability to create customized mobile applications to solve business problems
• Reduce device and plan costs• Reduced employee costs for devices
and plans based on corporate agreements with carriers
7
Considerations for employee-owned devices in your environment • Control over devices to implement
governance and policy requirements • Timely deletion of data in the event of
loss or theft of device • Ability to restrict content on the
devices, including third party applications
• Control over the device platforms, operating systems, and other factors to manage vulnerabilities associated with each consumer device platform
• Better support from carriers than maybe available for individual employees utilizing their own, consumer-grade device
• Additional security controls may be required to meet security, compliance, and regulatory requirements.
8
Special Concerns for Some Industries
• Consumer mobile devices present special challenges:– New operating environment is like the wild west– Unhardened Operating Systems are vulnerable to
exploitation, with few protections compared to hardened or purpose-built devices
– Devices may represent unmanaged entrance/exit points to secured, segregated ICS networks
– Clear definition of allowable devices and activities is required
– Security flaws in devices may not be resolved in a timely manner, if ever
9 Confidential
Establishing an Enterprise Mobility Strategy
Enterprise
Mobility
Strategy
Strong governance required
10
11
What is your risk level / appetite?
Government IntelligenceDOD – TS/TS SCI
Federal Civilian and Global 500 Financial, Engineering, Pharmaceutical PCI Data on the phone
PHI data is on the phonePII data is on the phone
Email is on the phoneData on the phoneRecover phone
12
Mobility security affects/is affected by…
End Users
Security
Governance Business Strategy
Architecture
Applications Infrastructure Risk Posture
Service Desk
Data Classification
WiFi VPN Policies
Compliance
DLP NAC
Encryption
A mobility strategy leads to a solution that is secure, manageable, scalable, and open to all mobile OSs
13
Key Features:•Provide Security
– Secure Delivery of Enterprise Data– Data Isolation on Device– Encryption– Policy Compliance
•Manage Complexity– Mobile Device Management– Multi-OS Support– Multi-Application Support
• Improve Productivity– LOB Mobile Applications– Custom Mobile Applications– Wireless Email & PIM
•Manage Costs– Mobile Expense Management– Carrier plan management– Alerting– Usage Tracking
Customer
Secure
End User
Secure
MDM – Making the Smartphone Enterprise Ready
Multi-Platform Support– ActiveSync, BES, Good
Security & policy management– Enforcement & notification
Dynamic cost management– Roaming & plan management
Application management– Enterprise application store
Device monitoring– Health & usage
Analysis and reporting– Predictive & cost avoidance
Delivering multi-platform security, visibility, control and cost savings
“Managing how users Interact with devices”
“Managing devices, data and applications”
“Managing costs of devices”
“MDM should be an agnostic OS, device and carrier independent solution”
DeviceManagement
Policy Management
ApplicationManagement
E-MailDeployment
Functions• User provisioning• Migrations• Device re-
provision
Benefits• Reduce helpdesk
calls• Reduce support
calls• Increase uptime• Centralize
tracking
ROI• Lower TCO
Functions• Hardware mgmt• Software mgmt• Real-time
updates
Benefits• Increased
visibility• Efficient
diagnostics• Upgrade planning
& deployment• Centralize
tracking• History reporting
ROI• Cross platform
status reporting
Functions• Security mgmt• Usage
governance• Compliance
Benefits• Reduce security
risks• Increased
compliance• Manage user
behaviors
ROI• Decrease admin
and help desk costs
Functions• Control footprint• App. deployment• Update/upgrade
mgt
Benefits• OTA installs• Close-loop
deployments• Simple, consistent
app management• Improved BES
mgmt
ROI• Decrease in
admin/help desk support time
Performance Monitoring
Functions• Server monitoring• Device monitoring• Load balancing
Benefits• Quicker resolution
to problems• Reduce downtime
and costs• Analysis and
trending
ROI• Decrease help
desk costs• Enable proactive
monitoring
MDM Capabilities
15
16
Types of Mobile Applications
Native
Web
Hybrid
17
Value of a Mobile Enterprise Application Platform
18
Strategies for BYOPC
• Establish catalog of supported operating systems:– Windows 7 & 8– Mac OS X?– Linux Variants?
• Catalog of supported AV solutions• Use Inspect to Connect technology to interrogate
employee-owned PC to verify compliance• Utilize virtualized applications or virtual desktops to
secure enterprise apps and data on untrusted devices. • Virtual desktop clients can be configured to control
writing to local or removable media, printing, cut & paste, etc.
19
Questions to ask when considering BYOD
• Are there any specific concerns that would preclude the use of employee-owned devices?– Information may be subject to FOIA requests or
other regulatory or compliance requirements.• Is there a catalog of devices that would be
allowed to access enterprise applications?– With each new platform supported in the
environment, complexity is added. Costs may increase as additional versions of enterprise apps are developed and maintained.
20
Questions to ask when considering BYOD
• Is the organization willing to accept a short-term increase in risk to allow newer platforms access to data while the device’s management and security tools mature?– For corporate-owned devices, it may be an easy decision
to delay upgrades; however, for personally-owned devices, employees may be unwilling to forego the latest devices or updates.
• Have we considered all of the risks?– Inappropriate content on personally-owned devices.
ECPA considerations? Compensation considerations, especially for CA-based employees?
Questions / Comments
Confidential21
Thank [email protected]
Confidential22