Do BYOD the Right Way

Published on March 2017 | Categories: Documents | Downloads: 32 | Comments: 0 | Views: 263
of 27
Download PDF   Embed   Report

Comments

Content

Do BYOD the Right Way
An InformationWeek Webcast Sponsored by

Webcast Logistics

Today’s Presenters

• Jonathan Feldman, Contributing Editor, InformationWeek • John Herrema, SVP Corporate Strategy, Good Technology

Achieving BYOD Balance
Bring-your-own-device, and the tensions between security and usability Jonathan Feldman

Ideal IT customer

IT, by nature, gets unhappy ones too.

CIOs Only Get A Few Happy Notes

BYOD Delights Customers

One Year Ago: IT Staff’s BYOD Reaction

But believe it or not, the world did NOT come to an end.

Where are you on the BYOD trail?
Choose all that apply to your company:
– IT worked with business units to assess risks & benefits prior to enacting policy – Defined BYOD policy prior to MDM rollout – Defined BYOD policy after MDM rollout – Rolled out MDM without new policies – Heck, no, we’re never doing BYOD

Success Starts & Ends With Trust & Accountability

Too Many Controls For Too Little Risk Harms Trust & Hampers Business

BYOD Can Work

… but only if it’s not IT vs the organization More info & discussion ★ @_jfeldman ★ [email protected] ★ 828-333-4663

Doing BYOD the Right Way

John Herrema SVP Corporate Strategy Good Technology, Inc. March 2012

“BYOD” – already happening, fast becoming standard practice
Source: Good Technology BYOD Survey, October 2011 Survey of Good’s “Top 400” Customers, n=108

Life Sciences Government(Local) Communications Software Entertainment/Media Retail/Wholesale Legal Government (Federal) Transportation/Logistics Manufacturing Professional Services Healthcare Finance/Insurance 0% Currently Support 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

1 1 2 3 3 4 5 6 7 9 13 14 40

Planning to Support, Next 6 Months

Planning to Support, 6-12 Months

Considering, But No Specific Timeframe Not Planning to Support

 72% already support formal BYOD programs  4% plan to do so in next 6 months, 15% considering  Only 9% have no plans to support

Critical BYOD Considerations
1.

DEFINE BUSINESS OBJECTIVES
 

Mobile Expansion Cost Reduction

2.

DEFINE “BYOD” PROGRAM ELEMENTS
     

Eligibility Enablement & Support Reimbursement (if any) Acceptable Use Privacy Policy Policy Violations

3.

IMPLEMENT SUPPORTING SOLUTIONS
  

Security, Data Loss Prevention, and Compliance Device Management Self-Service

Risks in today’s mobile environment
Device Risk:
 Consumer-focused, limited security  Inconsistent from one platform to next  Explicitly designed to share & replicate data

User-based Risk:
Devices, apps used without IT knowledge They don’t comply with IT security policies For better or worse, “there’s an app for that!” Users purposely replicate data on device and in cloud (Dropbox, Box.net, etc.)

Enterprise Risk:
 User passion for device choice and flexibility makes circumvention more likely  Exposes agency to data breaches  Prevents security policy consistency

“MDM” to the rescue? - not exactly …
Inconsistent policies, variable support for hardware encryption

Relies on limited, often inconsistent “native” security implementations

Most policies implemented at device, not app level

No separation between personal and business data and apps

No practical way to prevent native and ”prosumer” apps from leaking data

No ability to prevent data leakage

Good’s answer – “secure container”
Personal Data
Devices remain personal, untouched by enterprise
 No need to restrict

Enterprise Data
Enterprise data control
 Password and app policies  Data loss prevention  Selective remote wipe  Encryption OTA and at rest

personal services or apps
 No privacy issues  Justifies shared

“BYOD” expense

Freely access personal apps and data
 iCloud  Personal apps  Games  Music  Pictures  Videos

Access corporate apps
 Email & PIM  Intranets and collaboration

tools (e.g. Sharepoint)
 Web-enabled apps  Enterprise apps

Flexible management options
1 2 3

BYOD
“Container” Management

GovernmentIssued
“Container” Management + Device Wipe

GovernmentIssued
“Container” + “Whole Device” Management

About Good Technology – the leader in multiplatform enterprise mobility
   

Over 3,000 deployments of iOS/Android solution since launch in December 2009 7 of Fortune 10; 50 of the Fortune 100; 8 of top 10 financial; 5 of top 10 healthcare Only iOS/Android solution certified for use by DoD, DHS, DARPA, federal government Over 70% of largest customers already formally supporting BYOD
Financial Services

Government/ Public Sector

Healthcare/ Life Sciences

High-Tech

Pro Services/ Legal

Thank You! … Questions?

Q&A Session

Jonathan Feldman Contributing Editor InformationWeek

John Herrema SVP Corporate Strategy Good Technology

Resources
To View This or Other Events On-Demand Please Visit: http://www.netseminar.com

For more information please visit:

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close