Do BYOD the Right Way
An InformationWeek Webcast Sponsored by
Webcast Logistics
Today’s Presenters
• Jonathan Feldman, Contributing Editor, InformationWeek • John Herrema, SVP Corporate Strategy, Good Technology
Achieving BYOD Balance
Bring-your-own-device, and the tensions between security and usability Jonathan Feldman
Ideal IT customer
IT, by nature, gets unhappy ones too.
CIOs Only Get A Few Happy Notes
BYOD Delights Customers
One Year Ago: IT Staff’s BYOD Reaction
But believe it or not, the world did NOT come to an end.
Where are you on the BYOD trail?
Choose all that apply to your company:
– IT worked with business units to assess risks & benefits prior to enacting policy – Defined BYOD policy prior to MDM rollout – Defined BYOD policy after MDM rollout – Rolled out MDM without new policies – Heck, no, we’re never doing BYOD
Success Starts & Ends With Trust & Accountability
Too Many Controls For Too Little Risk Harms Trust & Hampers Business
BYOD Can Work
… but only if it’s not IT vs the organization More info & discussion ★ @_jfeldman ★
[email protected] ★ 828-333-4663
Doing BYOD the Right Way
John Herrema SVP Corporate Strategy Good Technology, Inc. March 2012
“BYOD” – already happening, fast becoming standard practice
Source: Good Technology BYOD Survey, October 2011 Survey of Good’s “Top 400” Customers, n=108
Life Sciences Government(Local) Communications Software Entertainment/Media Retail/Wholesale Legal Government (Federal) Transportation/Logistics Manufacturing Professional Services Healthcare Finance/Insurance 0% Currently Support 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
1 1 2 3 3 4 5 6 7 9 13 14 40
Planning to Support, Next 6 Months
Planning to Support, 6-12 Months
Considering, But No Specific Timeframe Not Planning to Support
72% already support formal BYOD programs 4% plan to do so in next 6 months, 15% considering Only 9% have no plans to support
Critical BYOD Considerations
1.
DEFINE BUSINESS OBJECTIVES
Mobile Expansion Cost Reduction
2.
DEFINE “BYOD” PROGRAM ELEMENTS
Eligibility Enablement & Support Reimbursement (if any) Acceptable Use Privacy Policy Policy Violations
3.
IMPLEMENT SUPPORTING SOLUTIONS
Security, Data Loss Prevention, and Compliance Device Management Self-Service
Risks in today’s mobile environment
Device Risk:
Consumer-focused, limited security Inconsistent from one platform to next Explicitly designed to share & replicate data
User-based Risk:
Devices, apps used without IT knowledge They don’t comply with IT security policies For better or worse, “there’s an app for that!” Users purposely replicate data on device and in cloud (Dropbox, Box.net, etc.)
Enterprise Risk:
User passion for device choice and flexibility makes circumvention more likely Exposes agency to data breaches Prevents security policy consistency
“MDM” to the rescue? - not exactly …
Inconsistent policies, variable support for hardware encryption
Relies on limited, often inconsistent “native” security implementations
Most policies implemented at device, not app level
No separation between personal and business data and apps
No practical way to prevent native and ”prosumer” apps from leaking data
No ability to prevent data leakage
Good’s answer – “secure container”
Personal Data
Devices remain personal, untouched by enterprise
No need to restrict
Enterprise Data
Enterprise data control
Password and app policies Data loss prevention Selective remote wipe Encryption OTA and at rest
personal services or apps
No privacy issues Justifies shared
“BYOD” expense
Freely access personal apps and data
iCloud Personal apps Games Music Pictures Videos
Access corporate apps
Email & PIM Intranets and collaboration
tools (e.g. Sharepoint)
Web-enabled apps Enterprise apps
Flexible management options
1 2 3
BYOD
“Container” Management
GovernmentIssued
“Container” Management + Device Wipe
GovernmentIssued
“Container” + “Whole Device” Management
About Good Technology – the leader in multiplatform enterprise mobility
Over 3,000 deployments of iOS/Android solution since launch in December 2009 7 of Fortune 10; 50 of the Fortune 100; 8 of top 10 financial; 5 of top 10 healthcare Only iOS/Android solution certified for use by DoD, DHS, DARPA, federal government Over 70% of largest customers already formally supporting BYOD
Financial Services
Government/ Public Sector
Healthcare/ Life Sciences
High-Tech
Pro Services/ Legal
Thank You! … Questions?
Q&A Session
Jonathan Feldman Contributing Editor InformationWeek
John Herrema SVP Corporate Strategy Good Technology
Resources
To View This or Other Events On-Demand Please Visit: http://www.netseminar.com
For more information please visit: