Enterprise Mobility Development Model Client Presentation

Download Report

Transcript Enterprise Mobility Development Model Client Presentation

Enterprise Mobility Development Model
Service Overview
28 April 2020
Agenda
The challenge of enterprise mobility
Our Enterprise Mobility
value proposition
Enterprise Mobility Development Model
Secure Mobility Solution
Dimension Data Security Approach
© Copyright Dimension Data
28 April 2020
2
External Business Driver Require Change
Pervasive
Consumer
Computing
Market place
Agility
Risk and
Compliance
Business Driver
IT Complexity
and Cost
Sales/Service
Channel
Convergence and
Integration
Future Insurance
employee :Remote ,
Collaborative with
their own devices
Source: CEB TowerGroup Research
© Copyright Dimension Data
28 April 2020
3
Six Solutions Transform Insurance
Network security integrated
with regulatory compliance
Field mobility tools:
lowering loss costs,
improving customer
experience
Contact Center integrating
voice, web, e-mail, IM
Source: Cisco System
© Copyright Dimension Data
Agent communication
tools: increasing growth,
retention, flexibility
Rich media to broaden
and deepen agent
Knowledge & skills:
increasing share of
customer wallet
Voice, data, video on a single converged
network: eliminating redundant costs,
increasing flexibility and responsiveness
28 April 2020
4
The Challenge: Getting control
why good
governance makes good sense
BYOD (bring your own devices)
privacy regulations
6 out of 10 employees ages 18-35
use a personal device for work
65 countries
have their
own data
protection laws
24
billion
data proliferation
connected
devices
by 2020
the average corporate
1
security breaches
worker
sends and receives 112 emails per day
worker receives
3 terabytes of
information per year
PASS
cybercrime costs
US $1 trillion per year
!
75
million
malware samples in 2012
downtime
social media risk
2 out of 3 companies
are at risk from
social media
9.6 million petabytes
$380
business-related information
processed by the world’s
computer servers per year
billion
incidents
Source: COBIT5 (www.isaca.org/cobit5info-sec)
© Copyright Dimension Data
average cost for downtime
$5,000 a minute
cost of disasters
in 2011
28 April 2020
5
Mobility decisions require trade-offs
Less
More
Network Dependency
Less
More
Security Risk
Less
More
Develop/Support Cost
Worse
Better
User Experience
Less
More
Tradeoffs
Support/Management Cost
Enterprises need to enable
their mobile workers.
The process of creating
mobile solutions often
requires that enterprises
make challenging
decisions between various
conflicting trade-offs.
Maintaining the balance
between user experience
and security of corporate
data is an example of one
such challenge.
Source: Gartner Enterprise Mobility and it’s Impact on IT (2012)
© Copyright Dimension Data
28 April 2020
6
The Opportunity: Enable a “mobility first” culture
Real-time
communications
Contextual
Collaboration
Personal
Productivity
• Productivity no longer dependent on location
• Drive business agility through familiar technology that already exists in the Enterprise
• Information and resources are available on demand. This leads to users having access to
valuable context with every interaction
• Acceleration of business processes, decisions and service delivery
• Smart mobile devices provide a platform for Enterprise productivity tools from anywhere
• Organisations can customise a suite of tools for users depending on role and enable them to
increase personal productivity
Business imperatives
Cost reduction
© Copyright Dimension Data
Employee productivity
Customer intimacy
Competitive Differentiation
Innovation
28 April 2020
7
Our Enterprise Mobility Value Proposition
Our approach to the mobility opportunity
What Enterprise Mobility means to us…
What is Enterprise Mobility?
The concept of connected intelligence – always
on, always connected, seamless availability of
resources and information from anywhere on
any device
Who needs it?
Organisations that operate in competitive
global markets. Individuals who value agility in
a high performance culture, as well as work/life
balance
How is it relevant?
Enterprise mobility will drive business agility,
efficiency, green objectives and productivity
through telecoms and converged technologies
and applications
“Enterprise mobility has passed the tipping point”
said Andrew Borg, senior research analyst at Aberdeen Group.
“In this global marketplace, the need to keep enterprise workers in touch
no matter where or when, is now a given”
© Copyright Dimension Data
28 April 2020
9
Mobility is a priority for IT departments
How likely is it that the following initiative will be one of your IT
organisation’s top technology priorities over the next 12 months?
• Most firms have
prioritised mobility
technology expansion
(Expand use of mobility technologies for employees and customers)
High priority
46%
Low priority
31%
Critical priority
16%
Not on our agenda
Don't know
6%
0%
• Mobility is front and
centre for 62% of CIOs
and IT leaders across
the globe
› 16% see it as a
critical priority and
46% see it as a high
priority
• This indicates that
mobility is a top priority
both within the firm and
in taking the products
or services to
customers
Source: Forrsights Budgets And Priorities Tracker Survey, Q2 2010
© Copyright Dimension Data
28 April 2020
10
Increasing productivity and improving customer satisfaction
are key mobility benefits for companies
“What benefits, if any, has your firm experienced as a result of
deploying mobile applications?”
Increased worker productivity
75%
Increased employee
responsiveness and decisionmaking speed
65%
Resolve internal IT issues faster
48%
Resolve customer issues faster
48%
Improved customer satisfaction
Why do companies
deploy mobility services
and applications?
Top mobility benefits of
interest include
increasing employee
productivity and
responsiveness leading
to improved customer
satisfaction.
42%
Source: Enterprise And SMB Networks And Telecommunications Survey, North America And
Europe, Q1 2010
© Copyright Dimension Data
28 April 2020
11
Who in the organisation cares?
CEO –CEO
Enabling
mobility
first culture
– Mobility
Culture
CFO – Managing the cost of mobility
• Productivity, collaboration and innovation gains
• Costs are affected – capex and opex
• Agility, innovation and flexibility
• Offset costs with benefits of productivity
• Attract and retain top talent and clients
• Roadmap for investment
• Competitive differentiation
• Demonstrable ROI
CIO – Managing consumerised mobility
User – access and experience
•
Consumerisation of IT – pull demand on IT function
• Work-life balance
•
Balance innovation with infrastructure
• Productivity, flexibility
•
Provide quality access to end users
• Use my own device / bring my own device/s
•
Security and infrastructure concerns
• Work is something I do, not a place I go
© Copyright Dimension Data
28 April 2020
12
Enterprise Mobility Development Model
Discover, Construct, and Recommend
A major shift in the enterprise:
from next-gen desktop to user-based computing
The move to user
based computing
Users
PC
CIO challenge:
Where to start?
Applications
Data
The device revolution is happening at an unprecedented rate
© Copyright Dimension Data
28 April 2020
14
Enterprise mobility: we have built a framework to assist
a wider context…brings order
Desktops /
laptops
The move to user
based computing
Users
Applications
Tablets
User
PC
Applications
Data
Data
Enterprise
requirement
A unified lens
Security for every
mobile requirement,
device and
application
Single lens to understand
all the interdependencies
Mobility services,
change management,
operations and
adoption
Devices
Value added
mobility solutions as well as
organisation specific
applications
© Copyright Dimension Data
Phones
Project & service
elements
Applications
Device policy
Connectivity
Security
Virtualisation
Compliance
Operations
Data centre
Enterprise business
projects
Use of mobile
devices for Biz
BYOD
Micro apps
Client service
models
28 April 2020
15
Our Enterprise Mobility Framework
An Enterprise Mobility project requires each Dimension Data Line of Business
© Copyright Dimension Data
28 April 2020
16
Consulting | Enterprise Mobility Development Model
(EMDM)
Strategic development
Optimised
To Be
Enterprise Mobility
Development Model Cycle
Integrated
Co-ordinated
As Is
Basic
Operational development
• The EMDM is a consultative engagement
that helps clients understand where they
are with their enterprise mobility
capability, what their future need is – and
how to get there.
• Strong linkage to the Dimension Data
strengths to allow us to execute
© Copyright Dimension Data
28 April 2020
17
High level EMDM Assessment delivery process
Discover
• Existing architecture: Collect client information
and requirements as well as logical/physical
architecture diagrams
• Workshop: Conduct facilitated workshop to
discuss high level mobility strategy and
understand current ability to support mobility
elements and future need to enable components
of mobility as per the Enterprise Mobility
Framework.
© Copyright Dimension Data
28 April 2020
18
High level EMDM Assessment delivery process
Discover
Construct
• Review: Detailed review of the existing
architecture and other diagrams collected in
discover phase
• Analyse: The data collected in the workshop to
understand how the environment needs to
change to support an enterprise mobility strategy.
© Copyright Dimension Data
28 April 2020
19
High level EMDM Assessment delivery process
Discover
Construct
Recommend
• Report: A document including all the analysis,
findings & recommendations from the
assessment is created. It highlights what the
future state mobility architecture should be
(roadmap).
• Presentation: A presentation on the assessment
analysis, findings and recommendations is
delivered to allow for deeper discussion.
© Copyright Dimension Data
28 April 2020
20
Recommendations and Roadmap
• EMDM Findings Report
Optimised
Strategic development
How does the model work?
To Be
Six operational and 6 strategic criteria are utilised to give a
comprehensive assessment (12 areIntegrated
listed here)
There is an interactive process which allows for discussion and
learning regarding each measurement criteria
An ‘as is’ and ‘to be’Co-ordinated
consensus score is decided upon on for
each operational and strategic competency and is then an
overall mapping of as-is towards a to-be state is completed.
As Is
(upper left part of the slide)
Basic
− Analysis of the “As Is” state
is captured based on
workshop
− The “To Be” state as agreed
in the workshop is also
captured
− The roadmap to get from the
“As Is” to the “To Be” state is
provided in the form of
recommendations
− Taking action on one or more
of the recommendations will
improve maturity position
Operational development
© Copyright Dimension Data
28 April 2020
21
EMDM Workshop – Focus Areas
Optimised
Integrated
Co-ordinated
Basic
Enterprise Mobility Strategy and Policy
Users
User
Experience
Applications
Operational
Excellence
Social
Expense Mgmt
Unified Comms
IT Services
Productivity
Lifecycle Mgmt
App Delivery
Process
Enablement
Performance
Devices
Device
Management
Device Support
Network
Security
Infrastructure
GRC
Architecture
Technology
Performance
Management
People
Scored Questions: Develop score for as-is and to-be states
Un-Scored Comments: Provide commentary and clarity on maturity and gaps
© Copyright Dimension Data
28 April 2020
22
EMDM Workshop – Participants
Senior Management
CIO
CFO
Application Owner
• Needed to have the business alignment
discussion
>
>
>
>
>
>
Strategy
Financial
Sourcing
Compliance
Metrics
Culture
Senior Technical Staff
VP/ Director IT
Sr. Architect
© Copyright Dimension Data
• Needed for high level technical discussion
>
>
>
>
>
Network
Applications
Security
Operations
Infrastructure
28 April 2020
23
Benefits of the Enterprise Mobility Development Model
• Route to improved adoption and better collaboration
• Understanding of how to drive increased productivity
• Visibility of potential for deeper cost savings
• Creating a single vision for Enterprise Mobility
• Delivers recommendations on how to improve mobility
maturity
• Useful tool:
− As a starting point for the strategic planning process
− To align business and functional stakeholders
− As a checkpoint and progress check
− As a comparison to best practice
− When exploring where to go and what to do
− For sharing insights across the management team
− When guiding teamwork for development initiatives
© Copyright Dimension Data
28 April 2020
24
Practical Example – Maturity Level Roadmap
Basic
Drivers
 Requirements for remote access to email and calendar
 Remote management of mobile devices
 Visibility of mobile devices connecting to the network
 Automated provisioning of mobile devices
 Access control of devices connecting to ActiveSybc
 Mobile Device application management
 Cost control on mobile devices
 Password less access to email
 Securely share information from external networks
Capabilities
 Secure ActiveSync Access for email and calendar
 Secure file storage, transfer and collaboration
 Mobile device application control and reporting
 Controls now in place to deploy managed mobile
devices
 Certificates are in place for password less access

Mobile security and access policy has been defined
and this has been communicated to users so they are
aware of how mobile devices should be used
© Copyright Dimension Data
Integrated
Drivers
 Requirements to deploy in-house applications with network access
 Mobile VPN access
 Mobile access to SharePoint
 Mobile access to internal services
 Requirements for endpoint control for devises accessing the network
infrastructure
 Requirement to audit devices connecting to the network
 Requirement to protect from vulnerabilities and threats prior to patching
Capabilities
 Seamless secure remote access to network resources
 Control and deployment of in-house mobile applications
 IPS has been enhanced to ensure services exposed to remote access
are protected from exploitation
 SSDLC is in place ensuring software deployment is carried out
securely
 DLP in place allowing visibility and control of data flowing to and from
mobile devices
 SIEM is implemented to give visibility and correlation of events and
information
 Policy has been reviewed to ensure any gaps have been identified and
additional policies have been created taking into account the mobile
device strategy
28 April 2020
25
Practical Example – Output Solution and Roadmap
© Copyright Dimension Data
28 April 2020
26
Secure Enterprise Mobility
Work as an activity … not a location
The Security Challenges of Enterprise Mobility
© Copyright Dimension Data
28 April 2020
28
DD approach to Secure Mobility
© Copyright Dimension Data
28 April 2020
29
Example – Question Guideline for BYOD Policy
Before you begin
© Copyright Dimension Data
•
What is your mobility strategy
•
Who is eligible to use a personal device
•
What level of data employees can access
•
Which devices are approved for use
28 April 2020
30
Example – Question Guideline for BYOD Policy
Key Stakeholder
•
Onboarding boarding
process
•
Awareness Training
•
Leave or terminated
BYOD
•
type of devices and OS
•
How handle jail-broken or
rooted devices
•
How initial device enroll
•
How ensure compliance with
© Copyright Dimension Data
BYOD
•
Use Acceptance Sign off
•
Who pay devices
•
Who pay
voice/data plan
•
Who pay for
support
•
Launch BYOD
Program
Finance
Policy
Corporate
Communication
IT
T
How about laws and
regulation ?
Legal
Human
Resources
•
•
•
How secure personal devices
•
How handle lost devices
•
How should make apps
available to users
•
Application control
28 April 2020
31
Dimension Data
Security Approach
© Copyright Dimension Data
28 April 2020
32
dimension data’s security philosophy:
visibility. awareness. protection.
!
“you can’t secure what you don’t know, and you don’t know
what you can’t see”
© Copyright Dimension Data
28 April 2020
‹#›
Security | Fully Lifecycle
• Maintenance/Support (aggregation)
• Managed Security Infrastructure
Services (MSIS)
• GRC Assessment
• Cloud Security
Assessment
• S-TLMA
• Penetration Testing & VA
• DLP Assessment
• Firewall Assurance
•
•
•
•
•
•
• Implementation
• Integration
© Copyright Dimension Data
Security Architecture
Security Roadmap
Workshops
Evaluations
Proof of Concept
Policies and Procedures
• Design
• Network segmentation
• Build
28 April 2020
34
Security Consulting Portfolio
Dimension Data Security Consulting Service Portfolio
Growing
Initiate
Items
Pure
Consulting
ISO 2K
Solution
Consulting
GRCA
(Risk)
VAPT
(System)
Compliance
Consulting
Wireless
Pentest
PCI
Local
Regulation
Application
Pentest
TLMA
(Network)
Secure
Virtualization
Assessment
Firewall
Assessment
DLP
Assessment
NAC
Assessment
Remediat Road
-ion
Map
Mature
Source Code
Review
© Copyright Dimension Data
Business Continuity Management Consulting
Security Architecture with 3 Year Road Map
Remediation & Solution Recommendation
28 April 2020
35
Security Architecture
Strategy & Architecture Workshops Cloud
Architecture Consulting
Quickstart Pilot Implementation
Design, Planning & Implementation
N-tier
Architecture
Incident
McAfee,
Management
Configuration
Forensics
and Asset
Cisco,
RSA, Algosec
Investigation
Management
Event
Monitoring &
Management
APPLICATION SECURITY
Application Platforms
Collaboration
Internet
SA.com,
F5-SEC,
Data
Facing Web
Warehouse
Imperva
server
Data
Instant
Email
Cisco,
McAfee,
RSA
Encryption
Messaging
Strategy
Assess Management
Identity
CA
Management
SSO
Role &
Responsibility
SERVER AND ENDPOINT SECURITY
Service
Oriented
Architecture
Server & Endpoint
Antivirus &
Patch
RSA,
HIPS McAfee,
Management
Vulnerability
DLP Micro
Trend
Management
Authentication
Wireless
Cisco,
DLP
RSA
Virtualised
Security
SaaS
© Copyright Dimension Data
PERIMETER AND INFRA SECURITY
Network
Cisco,
Security
Virtualised
Network
Web
Network
F/W andPoint,
Admission
Check
McAfee,,Gateway
Blue Coat,
RSA,
Antivirus
IPS
Control
Solutions
Policy
eGRC Toool (RSA, Checkpoint)
Change
Management
Architecture
Principle &
Model
Governance
SECURITY OPERATION
Cloud Security Risk Assessment Compliance
Consulting (ISO27001,PCI)
Security
Architecture
Wireless Fortinet
DLP
Juniper,
Risk
Management
Legal &
Regulatory
Compliance
28 April 2020
36
Security solution set
Policy and standards
Maturity level 1
Maturity level 2
Maturity level 3
Maturity level 4
Endpoint encryption
Network DLP
Host DLP
Rights management
Remediation and compliance
Anti-malware
Host IPS
Vulnerability
management
Intrusion prevention
Remediation management
Policy compliance and
auditing
Authentication and access control
Two factor authentication
Identity based networking
Single sign on
Physical access
management
Event management
Log consolidation
Network behavioural
analyst
Security information and
event management
GRC framework
DR/BCP
Device control
Collaboration
Content security
Mobility
Secure file transfer
Security management
Security assessments
Data loss prevention
Defensive network security
Network segmentation
Remote access
Intrusion prevention
Firewalls
Content security
Centralised management
© Copyright Dimension Data
Application security
Powered by Mobile. Powered by the Cloud
28 April 2020
37
Next steps …
Consider the state of development of your
enterprise mobility
• What might the gaps be?
• Do you know what your priorities are?
Engage and enlist all the relevant stakeholders
and arrange the EMDM workshop with your
Dimension Data representative
• Where should you focus?
Contact your Dimension Data representative to find
out more about setting up an EMDM workshop for
your operations
• When is the best time to do one?
• Who should be involved?
• What can you expect before, during and after the EMDM?
© Copyright Dimension Data
28 April 2020
38
Thank You!
Sompoj Patsuwan
Senior Professional Service Consultant
CCIE , PMP , ITIL , TOGAF
<[email protected]>
28 April 2020