Managing BYOD
Download
Report
Transcript Managing BYOD
Managing BYOD
Legal IT’s Next Great Challenge
Agenda
The BYOD Trend – benefits and risks
Best practices for managing mobile device
usage
Overview of mobile device management
technologies
Case Study: Holland & Hart
The BYOD Trend – Some History
Employee use of company owned computers
Using laptops to access the internet
Drove usage policies and technology controls
RIM Blackberry delivers first mobile device
Apple iPhone changes everything
BYOD
Benefits and Challenges
Benefits
Improved responsiveness
Improved accessibility
Greater flexibility
Challenges
IT support of a wide range of mobile vendors and
operating environments
Secure access to firm data
Mitigate risk of unsecure personal apps
70 million
Smartphones lost/stolen in 2011
Only 7% Recovered
Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers
5
17% of businesses
Have mobile device breaches
Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater
6
Best Practices
Registering devices to insure security:
Virus protection, authentication, encryption
Provisioning of firm-authorized apps
IT use monitoring
User education
Compliance with firm security policies
Mobile Device registration with IT
Password protection
Use of unsanctioned apps
Lost/stolen devices
Mobile Device Management
IT Control of mobile device usage
Enforce authorized and secure access
Requires investment, resources and Administration
Central server
Manages all policies and employee access
Provides secure connection to firm data/applications
MDM mobile apps for user authentication and control
enforcement of third-party apps
MDM Functions
Mobile app distribution
Auto install firm supported apps and updates
Policy management
User authentication policies
Sanctioned and blacklisted apps
Inventory management
Track employee usage
Optimize service plans
MDM Functions
Security management
Block noncompliant devices form the network
Password Protection
Block specific apps
Secure connections to firm data
Encryption
Require device level encryption
MDM secure container encryption
MDM Functions
Data Loss Prevention
Creates secure container on mobile device
Custom MDM apps for secure e-mail, calendar and
browsers
Enforce encryption and selective wipe
Control file synchronization
Control file access outside secure container
File save, print, copy/paste, email attachment
Mobile apps outside the secure container
MDM Case Study
Scott Ainslie, Technical Operations Manager
Holland & Hart
12
Real World MDM - History
Blackberries to iPhones – How we got here
What do we do about it?
Protecting the mobile inbox
More than just email on phones - Tablets
Time entry
Documents
Intranet/VPN
Present Solution
Firm issued phone, personal tablet
iPhone vs Android – Windows Phone?
Firm data requires firm management
Mobile Device technology policy
Encryption
Lock times
Certificates
Support
Official Apps (Time, DM, VPN)
Current Projects
Network Access Control (NAC/NAP)
Enterprise replacement for Dropbox
Desktop Virtualization
Beyond phones & tablets – laptops
Mobilize the Intranet
MS Office 2013 - 5 device subscription
Q&
A
16
Thank you for attending our webinar.
If you wish to view this presentation again, please contact
us at: [email protected] OR 978-367-3592.
Secure Document
Delivery Blog
On the Web
biscomdeliveryserver.com
Twitter
@biscominc
Phone
(800) 477-2472
blog.biscom.com
Whitepapers
Case Studies
and more
17