1 / 17

Managing BYOD

Managing BYOD. Legal IT’s Next Great Challenge. Agenda. The BYOD Trend – benefits and risks Best practices for managing mobile device usage Overview of mobile device management technologies Case Study: Holland & Hart. The BYOD Trend – Some History. Employee use of company owned computers

annot
Download Presentation

Managing BYOD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Managing BYOD Legal IT’s Next Great Challenge

  2. Agenda • The BYOD Trend – benefits and risks • Best practices for managing mobile device usage • Overview of mobile device management technologies • Case Study: Holland & Hart

  3. The BYOD Trend – Some History • Employee use of company owned computers • Using laptops to access the internet • Drove usage policies and technology controls • RIM Blackberry delivers first mobile device • Apple iPhone changes everything

  4. BYOD Benefits and Challenges • Benefits • Improved responsiveness • Improved accessibility • Greater flexibility • Challenges • IT support of a wide range of mobile vendors and operating environments • Secure access to firm data • Mitigate risk of unsecure personal apps

  5. 70 million Smartphones lost/stolen in 2011 Only 7% Recovered Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

  6. 17% of businesses Have mobile device breaches Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

  7. Best Practices • Registering devices to insure security: • Virus protection, authentication, encryption • Provisioning of firm-authorized apps • IT use monitoring • User education • Compliance with firm security policies • Mobile Device registration with IT • Password protection • Use of unsanctioned apps • Lost/stolen devices

  8. Mobile Device Management • IT Control of mobile device usage • Enforce authorized and secure access • Requires investment, resources and Administration • Central server • Manages all policies and employee access • Provides secure connection to firm data/applications • MDM mobile apps for user authentication and control enforcement of third-party apps

  9. MDM Functions • Mobile app distribution • Auto install firm supported apps and updates • Policy management • User authentication policies • Sanctioned and blacklisted apps • Inventory management • Track employee usage • Optimize service plans

  10. MDM Functions • Security management • Block noncompliant devices form the network • Password Protection • Block specific apps • Secure connections to firm data • Encryption • Require device level encryption • MDM secure container encryption

  11. MDM Functions • Data Loss Prevention • Creates secure container on mobile device • Custom MDM apps for secure e-mail, calendar and browsers • Enforce encryption and selective wipe • Control file synchronization • Control file access outside secure container • File save, print, copy/paste, email attachment • Mobile apps outside the secure container

  12. MDM Case Study • Scott Ainslie, Technical Operations Manager • Holland & Hart

  13. Real World MDM - History • Blackberries to iPhones – How we got here • What do we do about it? • Protecting the mobile inbox • More than just email on phones - Tablets • Time entry • Documents • Intranet/VPN

  14. Present Solution • Firm issued phone, personal tablet • iPhone vs Android – Windows Phone? • Firm data requires firm management • Mobile Device technology policy • Encryption • Lock times • Certificates • Support • Official Apps (Time, DM, VPN)

  15. Current Projects Network Access Control (NAC/NAP) Enterprise replacement for Dropbox Desktop Virtualization Beyond phones & tablets – laptops Mobilize the Intranet MS Office 2013 - 5 device subscription

  16. Q & A

  17. Thank you for attending our webinar. If you wish to view this presentation again, please contact us at: sales@biscom.comOR 978-367-3592. Secure Document Delivery Blog blog.biscom.com • On the Web • biscomdeliveryserver.com Twitter @biscominc Phone(800) 477-2472 • Whitepapers • Case Studies • and more

More Related