Client compu=ng is evolving ‐ giving IT
and end users the power to do more
2
Users Devices
Mainframe computing era
Personal computing era
Mobile era
Less than 2000 systems sold in 1960
Over 900,000 systems sold in 1980
1 billion processors connected by 2015
Users
n 1 1 1
Users
1 n
Devices Devices
The mobile device market is thriving
3
$100 million $1.7 billion Market for mobile devices in healthcare
2011 2014
$4.7 billion U.S. hospital spending on IT $6.8 billion
2 out of 5 physicians go online during patient consultations; mostly on handheld devices
63% of physicians are using personal devices for mobile health solutions not connected to their practice
86% of physicians are interested in accessing Electronic Medical Records from mobile devices
2% Mobile device usage compared to overall IT 25%
Source: TechTarget news
Enterprise Mobility Adop=on Curve
Communicate
Collaborate
Inform
Enable
Mobile Workflow
Mobile Intranet
Corporate File & Directory
Search
Sales & CRM Enablement
Field Service Enablement
Mobile Business Intelligence Enablement
Unified Communications
Mobile KPI Dashboards
B2C Apps
Personal Information
Management
Internet
Instant Messenger
Productivity Applications
• Many organizations follow a similar mobility adoption curve.
• The right strategy and roadmap must
be established to help you on your journey, and design and implement the right solution to support your
business needs.
• Empower the workforce in a flexible and secure way maximizing ROI.
• Reach out to your customers, enable
them to interact with you in convenient ways, expand business
value and maximise customer satisfaction
4
Handling the Smartphone & Tablet explosion presents
new enterprise management challenges
5
Corporate Owned BlackBerry Devices
Secure
Proliferation of Smartphone/Tablet Platforms in the Enterprise
o How do I provide secure access and protect corporate data?
o How do I deliver LOB mobile apps to improve productivity?
o How do I ensure my mobile apps work on such a wide variety of devices?
o How do I keep costs from getting out of control?
o How do I let my employees select the mobile devices they want while delivering the security and management IT requires?
Enterprise Systems / Data
Why allow employee‐owned devices into your
environment
• They are fun, and your execu=ves and employees want them
• Improved employee morale and produc=vity
• Improved compliance and security by recognizing that employees will use device of choice and planning for these devices in corporate environment.
• Ability to create customized mobile applica=ons to solve business problems
• Reduce device and plan costs
• Reduced employee costs for devices and plans based on corporate agreements with carriers
6
Considera=ons for employee‐owned devices in your
environment
• Control over devices to implement governance and policy requirements
• Timely dele=on of data in the event of loss or theP of device
• Ability to restrict content on the devices, including third party applica=ons
• Control over the device plaQorms, opera=ng systems, and other factors to manage vulnerabili=es associated with each consumer device plaQorm
• BeRer support from carriers than maybe available for individual employees u=lizing their own, consumer‐grade device
• Addi=onal security controls may be required to meet security, compliance, and regulatory requirements.
7
Special Concerns for Some Industries
• Consumer mobile devices present special challenges:
– New opera=ng environment is like the wild west
– Unhardened Opera=ng Systems are vulnerable to exploita=on, with few protec=ons compared to hardened or purpose‐built devices
– Devices may represent unmanaged entrance/exit points to secured, segregated ICS networks
– Clear defini=on of allowable devices and ac=vi=es is required
– Security flaws in devices may not be resolved in a =mely manner, if ever
8
9 Confidential
Establishing an Enterprise Mobility Strategy
Enterprise Mobility Strategy
Infrastructure
Management
Applica9ons
Security & Compliance
What is your risk level / appe=te?
11
Government Intelligence
DOD – TS/TS SCI
Federal Civilian and Global 500
Financial, Engineering, Pharmaceu9cal
PCI Data on the phone
PHI data is on the phone
PII data is on the phone
Email is on the phone
Data on the phone
Recover phone
Mobility security affects/is affected by…
12
End Users
Security
Governance Business Strategy
Architecture
Applications Infrastructure Risk Posture
Service Desk
Data Classification
WiFi VPN Policies
Compliance
DLP NAC
Encryption
A mobility strategy leads to a solu=on that is secure,
manageable, scalable, and open to all mobile OSs
13
Key Features:
• Provide Security – Secure Delivery of Enterprise Data
– Data Isolation on Device – Encryption – Policy Compliance
• Manage Complexity – Mobile Device Management
– Multi-OS Support – Multi-Application Support
• Improve Productivity – LOB Mobile Applications
– Custom Mobile Applications – Wireless Email & PIM
• Manage Costs – Mobile Expense Management – Carrier plan management
– Alerting – Usage Tracking
Customer
Secure
End User
Secure
MDM – Making the Smartphone Enterprise Ready
Multi-Platform Support – ActiveSync, BES, Good
Security & policy management – Enforcement & notification
Dynamic cost management – Roaming & plan management
Application management – Enterprise application store
Device monitoring – Health & usage
Analysis and reporting – Predictive & cost avoidance
Delivering multi-platform security, visibility, control and cost savings
“Managing how users Interact with devices”
“Managing devices, data and
applications”
“Managing costs of devices”
“MDM should be an agnostic OS, device and carrier independent
solution”
Device Management
Policy Management
Applica=on Management
E‐Mail Deployment
Functions • User provisioning
• Migrations • Device re-provision
Benefits
• Reduce helpdesk calls
• Reduce support
calls • Increase uptime
• Centralize tracking
ROI • Lower TCO
Functions • Hardware mgmt
• Software mgmt • Real-time updates
Benefits • Increased visibility
• Efficient diagnostics
• Upgrade planning & deployment
• Centralize tracking • History reporting
ROI • Cross platform
status reporting
Functions • Security mgmt
• Usage governance • Compliance
Benefits • Reduce security
risks
• Increased compliance
• Manage user behaviors
ROI
• Decrease admin and help desk costs
Functions • Control footprint
• App. deployment • Update/upgrade mgt
Benefits
• OTA installs • Close-loop
deployments
• Simple, consistent app management
• Improved BES mgmt
ROI
• Decrease in admin/help desk support
time
Performance Monitoring
Functions • Server monitoring
• Device monitoring • Load balancing
Benefits • Quicker resolution to
problems
• Reduce downtime and costs
• Analysis and trending
ROI
• Decrease help desk costs
• Enable proactive
monitoring
MDM Capabili=es
15
Strategies for BYOPC
18
• Establish catalog of supported opera=ng systems:
– Windows 7 & 8
– Mac OS X?
– Linux Variants?
• Catalog of supported AV solu=ons
• Use Inspect to Connect technology to interrogate employee‐owned PC to verify compliance
• U=lize virtualized applica=ons or virtual desktops to secure enterprise apps and data on untrusted devices.
• Virtual desktop clients can be configured to control wri=ng to local or removable media, prin=ng, cut & paste, etc.
Ques=ons to ask when considering BYOD
19
• Are there any specific concerns that would
preclude the use of employee‐owned devices?
– Informa=on may be subject to FOIA requests or
other regulatory or compliance requirements.
• Is there a catalog of devices that would be
allowed to access enterprise applica=ons?
– With each new plaQorm supported in the
environment, complexity is added. Costs may
increase as addi=onal versions of enterprise apps
are developed and maintained.
Ques=ons to ask when considering BYOD
20
• Is the organiza=on willing to accept a short‐term increase in risk to allow newer plaQorms access to data while the device’s management and security tools mature?
– For corporate‐owned devices, it may be an easy decision to delay upgrades; however, for personally‐owned devices, employees may be unwilling to forego the latest devices or updates.
• Have we considered all of the risks? – Inappropriate content on personally‐owned devices. ECPA considera=ons? Compensa=on considera=ons, especially for CA‐based employees?