of 25
PowerPoint Presentation
Managing and Securing BYODLegal ITs Next Great ChallengeAgendaThe BYOD Trend Evolution of Mobile TechnologyBest Practices for Managing Mobile Device UsageOverview of Mobile Device Management TechnologiesBYOD Management Strategies and Trends
The BYOD Trend Some HistoryEmployee use of company owned computersUsing laptops to access the InternetDrove usage policies and technology controlsRIM BlackBerry delivers first mobile deviceApple iPhone changes everything
BYOD Benefits and ChallengesBenefitsImproved responsivenessImproved accessibilityGreater flexibilityChallengesIT support of a wide range of mobile vendors and operating environmentsSecure access to firm dataMitigate risk of unsecure personal apps
70 millionSmartphones lost/stolen in 2011
Only 7% Recovered
Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers
17% of businesses Have mobile device breaches
Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater
Best PracticesRegistering devices to ensure security:Virus protection, authentication, encryptionProvisioning of firm-authorized appsIT use monitoringUser education Compliance with firm security policiesMobile Device registration with ITPassword protectionUse of unsanctioned appsLost/stolen devices
Mobile Device ManagementMobile Device StrategyHow Do You Support Mobility?Who is responsible for equipment?IT staff availability and trainingMobile device OS and security upgradesMobile Device Management platformIs your firm website mobile friendly?
Mobile Device ManagementNot new! Optimize functionality Increase security ComplianceIs MDM a requirement for BYOD?
Smartphones have become anarchy in a pocket They have the power of a full desktop system of just a decade ago, and that power is increasing quickly.Source: Tom Henderson, ITWORLD.com
Why Now?BYODMalicious threatsControl Application PortfolioLost and Stolen PhonesAccess Control and AuditingCompliance Growing device inventoryNative functions and features dont cut itChanges to Microsoft Exchange licensing costs
MDM is subject to the weakness of the underlying platformGoogle only provided 16 APIs, compared to more than 500 APIs for the latest version of BlackBerry.
Source: May 18, 2012 COMPUTERWORLD.com, Matt HamblemSolution OptionsOn-premiseService-basedHybrid
Common FeaturesDevice provisioning and configurationPolicy applicationSecurityBackup / restoreRemote lock and wipeSandboxingActivity loggingReporting / dashboard
Advanced FeaturesNetwork access controlApplication deployment and managementFirmware updatesDiagnosticsNetwork usage and supportMobile asset tracking and managementTroubleshooting and diagnostic toolsRemote control Remote administrationGPS tracking and 'breadcrumb' mapping
Most Common PlatformsCommon in Legal:AirwatchMobileIronMcAfeeFiberlink (MaaS360)GoodBlackBerryFor BlackBerry Devices
Useful Feature Comparisonshttp://mobiwm.com/mdm-comparison/ http://www.bluefishwireless.net/wp-content/uploads/2012/06/Bluefish-MGMT-MDM-Comparison-Chart.pdf Gartner: Magic Quadrant for Mobile Device Management Software 2012
Selection CriteriaEnrollmentEaseSelf serviceAdministration Ongoing ManagementScalabilityDevice Support
Licensing ModelsPerpetual licenseSubscriptionPer devicesPer user Minimum number of devices?
mindSHIFTs ExperienceFuture of MDMCommoditized Management tools with features built into devicesOpen Mobile Alliance (OMA)OMA Device Management Protocol MDM absorbed into management platformsMobile Application Management (MAM)Mobile Information Management (MIM)
&QAThank YouCharlie MagliatoBiscomLegal Program [email protected] (978) 367-3592www.Biscom.com/Legal
Pat SklodowskimindSHIFT Technologies, Inc.Managing Director, Legal Professional Services [email protected] (856) 425-0029www.mindSHIFT.com