supporting byod without reservation: are we there yet?
TRANSCRIPT
- Samsung Tablet Photo -
Supporting BYOD Without Reservation: Are We There Yet?Survey of IT pros explores security fears that may limit BYOD benefits
S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 1
Introduction 2
Security: The greatest BYOD concern 4
Securing BYOD: Effective steps IT pros can take 6
Comprehensive mobility management solution: 7 KnoxTM from Samsung
About Samsung 8
About the survey 8
Table of contents
S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 2
Introduction
In just a few short years, Bring Your Own Device (BYOD) has evolved from a less-than-welcome
trend for many businesses to a company-sanctioned everyday reality.1 The majority (85%) of
IT pros responding to a recent survey by Spiceworks indicate their organizations support BYOD
devices. This broad acceptance should come as no surprise, given the benefits that have emerged
from BYOD – everything from higher employee productivity and lower IT costs2 to improved
business continuity.3
BYOD Device Support
Laptops
Total Use BYOD Supported
Smartphones
Tablets
Wearables 10%5%
None of the above 0%15%
Not surprisingly, the top three employee-owned devices supported by survey respondents are
smartphones, tablets and laptops.
100%50%
97%57%
95%76%
88%61%
S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 3
BYOD Access to Corporate Assets
Email/
calendar/
contacts
0%
20%
40%
60%
80%
100%
99%
Company file-
sharing accounts
45%
Secure netw
ork
reourc
es
41%
Company m
obile
apps/software
35%
Other
2%
This white paper looks at the concerns that lead organizations to limit BYOD access to corporate
assets and at what might alleviate those concerns. It proposes an approach to addressing
specific challenges that could pave the way for organizations to support BYOD more broadly –
and thereby derive greater benefits from it.
I N T R O D U C T I O N
The majority (85%) of IT pros responding to a recent survey by Spiceworks indicate their organizations support BYOD devices.
!
What may be surprising, however, is that even though organizations in the survey widely accept
BYOD, 86% limit access to a handful of everyday office applications – and only 14% allow full
access to corporate assets. For this reason, the benefits they enjoy may also be limited.
S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 4
Security: The greatest BYOD concern
Concerns about
security/contro
l0%
20%
40%
60%
80%
100%
65%
Concerns about s
eparatin
g
personal/corp
orate
data
41%
Lack of need
Other
41%
Lack of dem
and
Don’t know
36%
Insuffi
cient monito
ring/
managem
ent tools
Lack of tim
e/resourc
es to
monito
r/m
anage access
30% 26%
Industry
standard
s/
complia
nce regulatio
ns
14% 3% 1%
When Spiceworks asked survey participants who restricted BYOD access why they did so, the
top answer by a substantial margin was concern about security, followed by concern about
keeping personal and corporate data separate. This is consistent with other reports about BYOD
concerns over the last several years. “CIOs hesitate to allow full BYOD access because they’re
balancing convenience and flexibility for employees with security and logistical concerns of
their employers,” says one industry observer.4 More recently, Computerworld reported on
some tricky IT issues that can arise when employees’ personal data starts presenting security
issues, such as malware that comes in from non-work websites that employees have visited via
personal device.5
Reasons for Restricted Access (asked of those not allowing full BYOD access)
S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 5
S E C U R I T Y : T H E G R E A T E S T B Y O D C O N C E R N
Separating personal and corporate data
Limited end-user knowledge
64%70%
Time/resources required to manage devices 53%
100%
Enforcing authentication 49%Cost of security solutions 45%
Increased network complexity 38%Lack of comprehensive security solutions 35%
End-user resistance 34%Limited knowledge to configure/
manage multiple device types34%
50%
When asked about the greatest challenge associated with securing access for BYOD, 70% of
survey respondents – including both those supporting and not supporting BYOD – cited limited
end-user knowledge about risk and security practices.
“CIOs hesitate to allow full BYOD access because they’re balancing convenience and flexibility for employees with security and logistical concerns of their employers.”
—Computerworld
Top Challenges with Securing Access for BYOD(asked of those supporting and not supporting BYOD)
S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 6
What can be done to make BYOD secure enough that organizations will feel free to allow
employees BYOD access to file sharing, network resources, and other critical applications and
capabilities? Expert recommendations include clearly establishing policies for how devices can
be used and educating employees to be sure they know about, understand and follow those
policies.6 Mobile device management (MDM) is also recommended, as it provides IT with the
tools to monitor employee devices and ensure they’re being used according to policy.7
But is this enough? These steps are important, but none of them – not even MDM – can provide a
full measure of mobile security. While more comprehensive mobile security technology solutions
are emerging to address the gap, what does IT need to see in these solutions? When asked what
factors they considered most important in a BYOD security solution, survey respondents most
frequently mentioned data protection and anti-virus/malware software.
Data protection 75%Anti-virus/malware software 70%
100%
Data loss prevention 54%Central management capabilities 54%
MDM 44%Remote management 43%
Secure container 43%Application control
Identity access management (IAM)
36%35%
50%
Securing BYOD: Effective steps IT pros can take
Important Factors in a BYOD Security Solution
S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 7
Comprehensive mobility management solution: Knox from Samsung
Samsung KnoxTM is a complete enterprise mobile solution that addresses all the top security
concerns IT pros report in the Spiceworks survey. Designed to enhance security of the open-
source Android platform, it provides hardware-level, OS-level and application-level security to
safeguard corporate data accessed on personal devices. With Knox, employees can use a single
device for both personal and business use without compromising business data security. Knox
features include:
• Comprehensive protection against malware attacks and hacking
• Multi-layered protection with biometric authentication for authorized device access
• A complete set of cloud-based MDM, IAM and security services that work across device platforms and enable single sign-on or mobile apps
• Remote device/application control through an IT admin or U.S.er portal
• Enhanced application sandbox to secure enterprise apps and prevent data leakage
• Best-in-class device management with more than 390 IT policies
• Compatible with existing enterprise infrastructure
With a multi-layered security model and industry-leading device management capabilities,
Knox meets the needs of even the most demanding business environments.
Learn more about Samsung Knox.
With a multi-layered security model and industry-leading device management capabilities, Knox meets the needs of even the most demanding business environments.
!
As a global leader in enterprise mobility and information technology, Samsung Business provides
a diverse portfolio of enterprise technologies including smartphones, wearables, tablets, digital
displays, hospitality TVs, printers and medical diagnostic equipment. We are committed to putting
the business customer at the core of everything we do by delivering comprehensive products,
solutions and services across diverse industries including retail, healthcare, hospitality, education
and government. For more information, please visit samsung.com/business or follow Samsung
Business via Twitter @SamsungBizUSA.
About Samsung Business
Samsung commissioned Spiceworks to conduct an online survey in November 2014 to profile
current BYOD practices and pain points. A total of 173 interviews were collected from IT pros
in the U.S. Forty-nine percent of the respondents came from organizations with fewer than 100
employees. Another 37% came from organizations with 100 to 499 employees, and 14% came
from organizations with 500 or more employees.
About the survey
Sources1 “Celebrating Five Years of BYOD With a Look Back,” Wired Innovation Insights, December 2014. http://insights.wired.com/profiles/blogs/celebrating-five-years-of-byod-with-a-look-back#axzz3LovxsSgj
2 “BYOD All About Benefits and Risks,” Wired Innovation Insights, September 2013. http://insights.wired.com/profiles/blogs/bring-your-own-device-benefits-and-risks#axz-z3LovxsSgj
3 “The Impact of BYOD on Business Continuity,” Tech Cocktail, November 2014. http://venturebeat.com/2013/03/05/small-businesses-not-huge-companies-will-lead-the-way-for-tablet-growth/
4 “Why will IT STILL not support BYOD?” IT World, May 2012. http://www.itworld.com/article/2726388/mobile/why-will-it-still-not-support-byod-.html
5 “Tech support’s NSFW problem,” Computerworld, October 2014. http://www.computerworld.com/article/2839235/tech-support-s-nsfw-problem.html
6 “Dos and Don’ts of BYOD,” PC, October 2014. http://www.pcmag.com/article2/0,2817,2470068,00.asp
7 “Keeping BYOD in Check: How to Enforce BYOD Policy,” CIO, September 2014. http://www.enterprisecioforum.com/en/blogs/ricknotsodelgadogmailcom/keeping-byod-check-how-enforce-byod-poli