+ All Categories
Home > Documents > BYOD Presentation

BYOD Presentation

Date post: 02-Mar-2016
Category:
Upload: ram021
View: 41 times
Download: 0 times
Share this document with a friend

of 25

Transcript

PowerPoint Presentation

Managing and Securing BYODLegal ITs Next Great ChallengeAgendaThe BYOD Trend Evolution of Mobile TechnologyBest Practices for Managing Mobile Device UsageOverview of Mobile Device Management TechnologiesBYOD Management Strategies and Trends

The BYOD Trend Some HistoryEmployee use of company owned computersUsing laptops to access the InternetDrove usage policies and technology controlsRIM BlackBerry delivers first mobile deviceApple iPhone changes everything

BYOD Benefits and ChallengesBenefitsImproved responsivenessImproved accessibilityGreater flexibilityChallengesIT support of a wide range of mobile vendors and operating environmentsSecure access to firm dataMitigate risk of unsecure personal apps

70 millionSmartphones lost/stolen in 2011

Only 7% Recovered

Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

17% of businesses Have mobile device breaches

Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

Best PracticesRegistering devices to ensure security:Virus protection, authentication, encryptionProvisioning of firm-authorized appsIT use monitoringUser education Compliance with firm security policiesMobile Device registration with ITPassword protectionUse of unsanctioned appsLost/stolen devices

Mobile Device ManagementMobile Device StrategyHow Do You Support Mobility?Who is responsible for equipment?IT staff availability and trainingMobile device OS and security upgradesMobile Device Management platformIs your firm website mobile friendly?

Mobile Device ManagementNot new! Optimize functionality Increase security ComplianceIs MDM a requirement for BYOD?

Smartphones have become anarchy in a pocket They have the power of a full desktop system of just a decade ago, and that power is increasing quickly.Source: Tom Henderson, ITWORLD.com

Why Now?BYODMalicious threatsControl Application PortfolioLost and Stolen PhonesAccess Control and AuditingCompliance Growing device inventoryNative functions and features dont cut itChanges to Microsoft Exchange licensing costs

MDM is subject to the weakness of the underlying platformGoogle only provided 16 APIs, compared to more than 500 APIs for the latest version of BlackBerry.

Source: May 18, 2012 COMPUTERWORLD.com, Matt HamblemSolution OptionsOn-premiseService-basedHybrid

Common FeaturesDevice provisioning and configurationPolicy applicationSecurityBackup / restoreRemote lock and wipeSandboxingActivity loggingReporting / dashboard

Advanced FeaturesNetwork access controlApplication deployment and managementFirmware updatesDiagnosticsNetwork usage and supportMobile asset tracking and managementTroubleshooting and diagnostic toolsRemote control Remote administrationGPS tracking and 'breadcrumb' mapping

Most Common PlatformsCommon in Legal:AirwatchMobileIronMcAfeeFiberlink (MaaS360)GoodBlackBerryFor BlackBerry Devices

Useful Feature Comparisonshttp://mobiwm.com/mdm-comparison/ http://www.bluefishwireless.net/wp-content/uploads/2012/06/Bluefish-MGMT-MDM-Comparison-Chart.pdf Gartner: Magic Quadrant for Mobile Device Management Software 2012

Selection CriteriaEnrollmentEaseSelf serviceAdministration Ongoing ManagementScalabilityDevice Support

Licensing ModelsPerpetual licenseSubscriptionPer devicesPer user Minimum number of devices?

mindSHIFTs ExperienceFuture of MDMCommoditized Management tools with features built into devicesOpen Mobile Alliance (OMA)OMA Device Management Protocol MDM absorbed into management platformsMobile Application Management (MAM)Mobile Information Management (MIM)

&QAThank YouCharlie MagliatoBiscomLegal Program [email protected] (978) 367-3592www.Biscom.com/Legal

Pat SklodowskimindSHIFT Technologies, Inc.Managing Director, Legal Professional Services [email protected] (856) 425-0029www.mindSHIFT.com


Recommended