A SIMPLE APPROACH TO BYOD
This presentation is the property of its rightful owner.
Sponsored Links
1 / 22

March 20, 2014 PowerPoint PPT Presentation


  • 110 Views
  • Uploaded on
  • Presentation posted in: General

A SIMPLE APPROACH TO BYOD. March 20, 2014. 1. THE STATE OF BYOD. USERS WANT EASE OF USE. WHAT THEY DON’T WANT IS: Company monitoring of their personal activities or restriction of the apps they rely on Interruption of their calendar, contacts, phone and texting functions

Download Presentation

March 20, 2014

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


March 20 2014

A SIMPLE APPROACH TO BYOD

March 20, 2014

1


March 20 2014

THE STATE OF BYOD

USERS WANT EASE OF USE

WHAT THEY DON’T WANT IS:

  • Company monitoring of their personal activities or restriction of the apps they rely on

  • Interruption of their calendar, contacts, phone and texting functions

  • Invasion or deletion of their personal data

COMPANIES WANT SAFE DATA

WHAT THEY DON’T WANT IS:

  • Corporate data distributed on thousands of devices

  • Users resorting to personal email or other insecure

    means of maintaining productivity

Brooklyn gives IT the security they need and

Employees the freedom they demand.


March 20 2014

BYOD LANDSCAPE

FIRST GENERATION SOLUTIONS

DEVICE MANAGEMENT, CONTAINERIZATION:

  • Data is synchronized to the device

  • Tools to mitigate risk if the device is lost or stolen

    • Device tracking, app control, monitoring

    • Remote wiping of device

ISSUES:

  • User acceptance of BYOD policy

  • Legal ramifications of having access to personal data

  • Questionable security

    • User’s won’t tell you that they lost a device

    • Remote wipe – airplane mode, shielded bags

    • Cracking tools can hack a container quickly

  • “HEAVY” model not applicable for all users


March 20 2014

ZIXONE

NEXT GENERATION LIGHT SOLUTION

  • Email data never resides on the device

    • No need to manage the device

    • No concerns if the device is lost/stolen

    • No issues when an employee leaves the organization

      • Easier to work with contractors

    • Avoid legal issues

      • Computer Fraud and Abuse Act

      • Litigation/Legal Holds


March 20 2014

ZIXONE

NEXT GENERATION LIGHT SOLUTION

  • Users retain complete control

    • No monitoring, restrictions or risk of data loss

    • Users continue to use the device as it was intended

  • Firewalling of personal data

    • Limits company liability

    • Avoid wrongful dismissal and discrimination claims

  • Native functionality and UI of the device is maintained

    • Notifications, Alerts

    • Contact lookup

      • Phoning

      • Texting


March 20 2014

ZIXONE

NEXT GENERATION LIGHT SOLUTION

  • Compliance reporting

    • Simplifies the procedures to deal with a lost device

    • No data to worry about – a big plus!

    • Immediately disable the account

    • Check the server to see what, if any, messages were accessed

    • Allows you to quickly and succinctly ascertain the exposure


March 20 2014

ZIXONE

COMPONENTS

  • ZixONEapp that delivers a view of corporate email, calendar and contacts on mobile devices

  • ZixONEserver connects to Exchange or Office365

  • Efficient, secure protocols deliver information quickly


March 20 2014

ZIXONE

ARCHITECTURE

ZixONE

Service

Low bandwidth, high performance link using

patent-pending fetching and caching techniques

optimized for wireless data communications.


March 20 2014

ZIXONE


March 20 2014

ZIXONE


March 20 2014

ZIXONE ADMINISTRATION


March 20 2014

ZIXONE ADMINISTRATION


March 20 2014

ZIXONE ADMINISTRATION


March 20 2014

ZIXONE ADMINISTRATION


March 20 2014

ZIXONE ADMINISTRATION


Zixone admin audit trail

ZixOne Admin – Audit Trail


March 20 2014

HEAVY SOLUTIONS VS ZIXONE


March 20 2014

ZIXONE STRATEGY COMPARISON


March 20 2014

ZIXONE

NEXT GENERATION LIGHT SOLUTION

  • Analysts recommend a two-pronged approach to BYOD

    • A Heavy solution where it is actually needed

    • A LIGHT solution where only email, calendar and contacts are required

  • Easy Cloud Deployment

    • Exchange 2007 and up

    • Office365

    • iOS 6.0 and up

    • Android 2.3 and up


March 20 2014

ZIXONE

NEXT GENERATION LIGHT SOLUTION

  • Final Thoughts

    • #1 source of data breach is via lost/stolen devices

    • 133 devices lost per minute

    • “Heavy” solutions serve a purpose but are not scalable

      • 42% of companies have tried a first generation solution

      • 60% not happy (admin complexity, inadequate security)

    • 60% of companies that support BYOD limit deployment due to privacy and personal data concerns

    • Most employees only require email, calendar and contacts

    • …and we’re just getting started!


March 20 2014

ZIXONE

NEXT GENERATION LIGHT SOLUTION

#nodataonthedevice


  • Login