managing and securing byod legal its next great challenge
TRANSCRIPT
![Page 1: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/1.jpg)
MANAGING AND SECURING BYOD
Legal IT’s Next Great Challenge
![Page 2: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/2.jpg)
AGENDA• The BYOD Trend – Evolution of Mobile Technology
• Best Practices for Managing Mobile Device Usage
• Overview of Mobile Device Management Technologies
• BYOD Management Strategies and Trends
![Page 3: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/3.jpg)
THE BYOD TREND – SOME HISTORY• Employee use of company owned computers
• Using laptops to access the Internet
• Drove usage policies and technology controls
• RIM BlackBerry delivers first mobile device
• Apple iPhone changes everything
![Page 4: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/4.jpg)
BYOD –BENEFITS AND CHALLENGES
Benefits
• Improved responsiveness
• Improved accessibility
• Greater flexibility
Challenges
• IT support of a wide range of mobile vendors and operating environments
• Secure access to firm data
• Mitigate risk of unsecure personal apps
![Page 5: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/5.jpg)
70 MILLIONSMARTPHONES LOST/STOLEN IN 2011
ONLY 7% RECOVEREDSource: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers
![Page 6: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/6.jpg)
17% OF BUSINESSES HAVE MOBILE DEVICE BREACHES
Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater
![Page 7: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/7.jpg)
BEST PRACTICES
Registering devices to ensure security:
• Virus protection, authentication, encryption
Provisioning of firm-authorized apps
IT use monitoring
User education
• Compliance with firm security policies
• Mobile Device registration with IT
• Password protection
• Use of unsanctioned apps
• Lost/stolen devices
![Page 8: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/8.jpg)
MOBILE DEVICE MANAGEMENT
![Page 9: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/9.jpg)
MOBILE DEVICE STRATEGY
SecurityApplication
Portfolio
Who Pays?Backing Up
Devices
Policies
![Page 10: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/10.jpg)
HOW DO YOU SUPPORT MOBILITY?• Who is responsible for equipment?
• IT staff availability and training
• Mobile device OS and security upgrades
• Mobile Device Management platform
• Is your firm website mobile friendly?
![Page 11: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/11.jpg)
MOBILE DEVICE MANAGEMENT• Not new!
• Optimize functionality
• Increase security
• Compliance
• Is MDM a requirement for BYOD?
![Page 12: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/12.jpg)
SMARTPHONES HAVE BECOME ANARCHY IN A POCKET THEY HAVE THE POWER OF A FULL DESKTOP SYSTEM OF JUST A DECADE AGO, AND THAT POWER IS INCREASING QUICKLY.Source: Tom Henderson, ITWORLD.com
![Page 13: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/13.jpg)
WHY NOW?• BYOD
• Malicious threats
• Control Application Portfolio
• Lost and Stolen Phones
• Access Control and Auditing
• Compliance
• Growing device inventory
• Native functions and features don’t cut it
• Changes to Microsoft Exchange licensing costs
![Page 14: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/14.jpg)
MDM IS SUBJECT TO THE WEAKNESS OF THE UNDERLYING PLATFORMGOOGLE ONLY PROVIDED 16 APIs, COMPARED TO MORE THAN 500 APIs FOR THE LATEST VERSION OF BLACKBERRY.Source: May 18, 2012 COMPUTERWORLD.com, Matt Hamblem
![Page 15: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/15.jpg)
SOLUTION OPTIONS• On-premise
• Service-based
• Hybrid
![Page 16: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/16.jpg)
COMMON FEATURES• Device provisioning and configuration
• Policy application
• Security
• Backup / restore
• Remote lock and wipe• Sandboxing
• Activity logging
• Reporting / dashboard
![Page 17: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/17.jpg)
ADVANCED FEATURES• Network access control
• Application deployment and management
• Firmware updates
• Diagnostics
• Network usage and support
• Mobile asset tracking and management
• Troubleshooting and diagnostic tools
• Remote control
• Remote administration
• GPS tracking and 'breadcrumb' mapping
![Page 18: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/18.jpg)
MOST COMMON PLATFORMSCommon in Legal:
• Airwatch
• MobileIron
• McAfee
• Fiberlink (MaaS360)
• Good
• BlackBerry• For BlackBerry Devices
![Page 19: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/19.jpg)
USEFUL FEATURE COMPARISONS• http://mobiwm.com/mdm-comparison/
• http://www.bluefishwireless.net/wp-content/uploads/2012/06/Bluefish-MGMT-MDM-Comparison-Chart.pdf
• Gartner: Magic Quadrant for Mobile Device Management Software 2012
![Page 20: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/20.jpg)
SELECTION CRITERIA• Enrollment
• Ease
• Self service
• Administration
• Ongoing Management
• Scalability
• Device Support
![Page 21: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/21.jpg)
LICENSING MODELS• Perpetual license
• Subscription
• Per devices
• Per user
• Minimum number of devices?
![Page 22: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/22.jpg)
MINDSHIFT’S EXPERIENCE
![Page 23: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/23.jpg)
FUTURE OF MDM• Commoditized
• Management tools with features built into devices• Open Mobile Alliance (OMA)
• OMA Device Management Protocol
• MDM absorbed into management platforms• Mobile Application Management (MAM)
• Mobile Information Management (MIM)
![Page 24: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/24.jpg)
&QA
![Page 25: MANAGING AND SECURING BYOD Legal ITs Next Great Challenge](https://reader036.vdocuments.us/reader036/viewer/2022062619/5518be3d550346881f8b54a7/html5/thumbnails/25.jpg)
THANK YOU
Charlie Magliato
BiscomLegal Program [email protected]
(978) 367-3592
www.Biscom.com/Legal
Pat Sklodowski
mindSHIFT Technologies, Inc.Managing Director, Legal Professional Services [email protected]
(856) 425-0029
www.mindSHIFT.com