managing byod legal it’s next great challenge. agenda the byod trend – benefits and risks best...
TRANSCRIPT
![Page 1: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/1.jpg)
Managing BYODLegal IT’s Next Great Challenge
![Page 2: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/2.jpg)
Agenda
The BYOD Trend – benefits and risks Best practices for managing mobile device
usage Overview of mobile device management
technologies Case Study: Holland & Hart
![Page 3: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/3.jpg)
The BYOD Trend – Some History
Employee use of company owned computers Using laptops to access the internet Drove usage policies and technology controls
RIM Blackberry delivers first mobile device Apple iPhone changes everything
![Page 4: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/4.jpg)
BYOD Benefits and Challenges
Benefits Improved responsiveness Improved accessibility Greater flexibility
Challenges IT support of a wide range of mobile vendors and
operating environments Secure access to firm data Mitigate risk of unsecure personal apps
![Page 5: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/5.jpg)
5
Smartphones lost/stolen in 2011
Only 7% Recovered
70 millionSource: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers
![Page 6: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/6.jpg)
6
Have mobile device breaches
17% of businesses
Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater
![Page 7: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/7.jpg)
Best Practices
Registering devices to insure security: Virus protection, authentication, encryption
Provisioning of firm-authorized apps IT use monitoring User education
Compliance with firm security policies Mobile Device registration with IT Password protection Use of unsanctioned apps Lost/stolen devices
![Page 8: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/8.jpg)
Mobile Device Management
IT Control of mobile device usage Enforce authorized and secure access Requires investment, resources and Administration Central server
Manages all policies and employee access Provides secure connection to firm data/applications MDM mobile apps for user authentication and control
enforcement of third-party apps
![Page 9: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/9.jpg)
MDM Functions
Mobile app distribution Auto install firm supported apps and updates
Policy management User authentication policies Sanctioned and blacklisted apps
Inventory management Track employee usage Optimize service plans
![Page 10: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/10.jpg)
MDM Functions
Security management Block noncompliant devices form the network Password Protection Block specific apps Secure connections to firm data
Encryption Require device level encryption MDM secure container encryption
![Page 11: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/11.jpg)
MDM Functions
Data Loss Prevention Creates secure container on mobile device Custom MDM apps for secure e-mail, calendar and
browsers Enforce encryption and selective wipe Control file synchronization Control file access outside secure container
File save, print, copy/paste, email attachment Mobile apps outside the secure container
![Page 12: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/12.jpg)
MDM Case StudyScott Ainslie, Technical Operations Manager
Holland & Hart
12
![Page 13: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/13.jpg)
Real World MDM - History
Blackberries to iPhones – How we got here What do we do about it?
Protecting the mobile inbox
More than just email on phones - Tablets Time entry Documents Intranet/VPN
![Page 14: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/14.jpg)
Present Solution
Firm issued phone, personal tablet iPhone vs Android – Windows Phone?
Firm data requires firm management Mobile Device technology policy Encryption Lock times Certificates Support Official Apps (Time, DM, VPN)
![Page 15: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/15.jpg)
Current Projects
Network Access Control (NAC/NAP) Enterprise replacement for Dropbox Desktop Virtualization Beyond phones & tablets – laptops Mobilize the Intranet MS Office 2013 - 5 device subscription
![Page 16: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/16.jpg)
&QA16
![Page 17: Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649da75503460f94a92c21/html5/thumbnails/17.jpg)
17
Thank you for attending our webinar.
If you wish to view this presentation again, please contact us at: [email protected] OR 978-367-3592.
Secure Document Delivery Blog
blog.biscom.com
On the Webbiscomdeliveryserver.com
Twitter@biscominc
Phone(800) 477-2472
Whitepapers Case Studies and more