Managing BYOD Legal IT’s Next Great Challenge. Agenda The BYOD Trend – benefits and risks Best...

Post on 23-Dec-2015

217 views 0 download

Tags:

transcript

Managing BYODLegal IT’s Next Great Challenge

Agenda

The BYOD Trend – benefits and risks Best practices for managing mobile device

usage Overview of mobile device management

technologies Case Study: Holland & Hart

The BYOD Trend – Some History

Employee use of company owned computers Using laptops to access the internet Drove usage policies and technology controls

RIM Blackberry delivers first mobile device Apple iPhone changes everything

BYOD Benefits and Challenges

Benefits Improved responsiveness Improved accessibility Greater flexibility

Challenges IT support of a wide range of mobile vendors and

operating environments Secure access to firm data Mitigate risk of unsecure personal apps

5

Smartphones lost/stolen in 2011

Only 7% Recovered

70 millionSource: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

6

Have mobile device breaches

17% of businesses

Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

Best Practices

Registering devices to insure security: Virus protection, authentication, encryption

Provisioning of firm-authorized apps IT use monitoring User education

Compliance with firm security policies Mobile Device registration with IT Password protection Use of unsanctioned apps Lost/stolen devices

Mobile Device Management

IT Control of mobile device usage Enforce authorized and secure access Requires investment, resources and Administration Central server

Manages all policies and employee access Provides secure connection to firm data/applications MDM mobile apps for user authentication and control

enforcement of third-party apps

MDM Functions

Mobile app distribution Auto install firm supported apps and updates

Policy management User authentication policies Sanctioned and blacklisted apps

Inventory management Track employee usage Optimize service plans

MDM Functions

Security management Block noncompliant devices form the network Password Protection Block specific apps Secure connections to firm data

Encryption Require device level encryption MDM secure container encryption

MDM Functions

Data Loss Prevention Creates secure container on mobile device Custom MDM apps for secure e-mail, calendar and

browsers Enforce encryption and selective wipe Control file synchronization Control file access outside secure container

File save, print, copy/paste, email attachment Mobile apps outside the secure container

MDM Case StudyScott Ainslie, Technical Operations Manager

Holland & Hart

12

Real World MDM - History

Blackberries to iPhones – How we got here What do we do about it?

Protecting the mobile inbox

More than just email on phones - Tablets Time entry Documents Intranet/VPN

Present Solution

Firm issued phone, personal tablet iPhone vs Android – Windows Phone?

Firm data requires firm management Mobile Device technology policy Encryption Lock times Certificates Support Official Apps (Time, DM, VPN)

Current Projects

Network Access Control (NAC/NAP) Enterprise replacement for Dropbox Desktop Virtualization Beyond phones & tablets – laptops Mobilize the Intranet MS Office 2013 - 5 device subscription

&QA16

17

Thank you for attending our webinar.

If you wish to view this presentation again, please contact us at: sales@biscom.com OR 978-367-3592.

Secure Document Delivery Blog

blog.biscom.com

On the Webbiscomdeliveryserver.com

Twitter@biscominc

Phone(800) 477-2472

Whitepapers Case Studies and more