1 / 36

Agenda

Graduating to Mobility through eLearning. Agenda. A Look at Mobility in Higher Education Proliferation of Devices in the Classroom Getting to “There” from “Here” Getting Buy-in at Harvard SEAS Steps to Graduate to Secure Mobility at Harvard SEAS

sancha
Download Presentation

Agenda

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Graduating to Mobility through eLearning Agenda • A Look at Mobility in Higher Education • Proliferation of Devices in the Classroom • Getting to “There” from “Here” • Getting Buy-in at Harvard SEAS • Steps to Graduate to Secure Mobility at Harvard SEAS • Harvard SEAS’s Current & Future Mobility Initiatives • Q & A

  2. Mobile Timeline for Higher Education

  3. Mobile Timeline for Higher Education 1990sDesktop computers eTextbooks Publishers take advantage of popular tablets, expanding their catalogues and offering rental digital books that expire after a semester or two Clickers Student handheld clicker allows professors to poll or quiz students and receive results in real-time 1999 2005 2007 2010 2011 2013 iPads iPads enter the classroom Digital Learning Communities Students in today’s classrooms can create their own apps, web pages, blogs and collaborate with a diverse global community Interactive Whiteboards Traditional whiteboard was reinvented using a touch or pen sensitive display, projector and computer

  4. Proliferation of Devices in the ClassroomTrends, Risks & Challenges

  5. Trends: Personal Mobile Device Use

  6. Mobile Devices in the Workplace

  7. Risks & Challenges: How do we protect data & identities? Harvard is a high-value target for such threats

  8. Risks and Challenges: An Evolving Landscape

  9. Risks and Challenges: Consequences of Inaction • Legal Repercussions: • Penalties For Mass. Personal Information Law Violation - 201 CMR 17.00 • Up to $50,000 per improper disposal • Maximum of $5,000 per violation • The Massachusetts Attorney General can come after you • Above penalties don't include lost business, dealing with irate customers, mailing out letters, and other associated costs • First Fine: $110,000 • Impact to Reputation • Rapidly growing population of devices: “It will only get MORE complex”

  10. Risks and Challenges: What are other schools doing? • Some schools are using an MDM vendor, others are leveraging resources they already own • AirWatch clients include Georgetown, Indiana University & UCLA • Stanford has developed their own solution • Yale also offers an MDM solution to their customers

  11. Getting to “There” from “Here”What do we need to be doing?How do we sell mobile security in higher education?

  12. Identify WHY You are Doing This “If you don’t have a mobile strategy, you don’t have a future strategy.” Eric Schmidt (Google)

  13. Identify WHY you are doing this • Allowing mobile devices in your environment "because faculty want them" ISN'T enough of a reason • What do mobile devices bring to the table? • How does the use of mobile devices ENABLE the pedagogy at Harvard? • These are no longer just status symbols...they are useful devices. • These are the functions that you want to embrace, enable, and foster • How could the use of mobile devices INHIBIT the pedagogy or even HARM the school?

  14. Security is the main reasons companies hesitate to embrace mobile

  15. Understand WHO you are doing this for? • People are not opposed to being secure… • As long as they don’t have to take steps they consider excessive • If a policy/control is inhibiting their ability to work, they will find a way around it • Any monitoring should be appropriate for your organization • When does it help the user? • When does it protect the organization? • When is it just intrusive? "The Net interprets censorship as damage and routes around it." John Gilmore (EFF).

  16. Understand WHO you are doing this for? • Universities have a high number of exceptions • EMBRACE this fact and PLAN for it in your mobile strategy • Turn your Exceptions into Use Cases (IDENTIFY exceptions and plan for them) • Strategy should acknowledge an appropriate level of flexibility • Any tools you consider should include the ability secure devices with custom (and reusable) policies • You should be able to manage a large percentage of your customers with a small number of policies

  17. Getting Buy-in at Harvard SEASWhere are the resistors?How do we get past resistance?

  18. Resistance Just treat them the same way we do laptops. I don’t want to lock my phone…what if I forget the code? It’s my device, not Harvard’s! Harvard Approved Vendors don’t provide these services in the way we want… It’s a violation of my privacy! Lock codes are annoying! We’re a school, not a bank! I don’t want Harvard to be able to track my location! MDM products are EXPENSIVE! If I lock my iPad down, my kids can’t use it! The faculty will never go for it

  19. How can you overcome resistance? Find champions Start with groups which alreadyhave an interest in protecting data Finance and HR offices Make it personal People are more likely to change bad habits to protect their own data Faculty member whose phone was stolen Build success stories Make it more than just a security tool Only consider tools which add functionality Many tools can maintain a library of useful documents and links Make it an app that people will actually want to install (Campus map, academic calendar, shuttle schedule & cafeteria menu)

  20. Steps to Graduate to Secure Mobility at Harvard SEAS

  21. HarvardSEAS’s Mobility Initiatives • Today’s devices need a solution to monitor, control and protect the enterprise– across devices, apps, data and the network

  22. Mobile Device Security Requirements

  23. Mobile App Security Requirements

  24. Mobile Network Security Requirements

  25. Mobile Data Security Requirements

  26. Importance of Enterprise Mobility Management in Higher Ed Same goals

  27. Key Enablers for EMM at Harvard SEAS • Enable us to help our customers follow Harvard’s policies and standards • Phased approach to implementation: PIN/password, encryption, locate, lock, and wipe Lock your device with a PIN/passcode Ensure your deviceis encrypted Ensure your device gets wiped if lost or stolen

  28. Harvard SEAS’s Current & Future Mobility Initiatives with AirWatch

  29. Security Solutions End-to-End Security • AirWatch provides solutions to meet almost all of the above requirements • Harvard SEAS started AirWatch pilot project in February 2013 – options and initial results in end-to-end mobile security management User Security • Authenticate users via basic or directory-based authentication via AD/LDAP, SAML, smart-card or tokens • Require two-factor user authentication

  30. Device Security • Monitor: Corporate, employee-owned or shared devices • Configure device security policies based on device ownership • Control: Set up enrollment restrictions to block users or devices based on platform, version, etc. • Require acceptance of Terms of Use before granting access • Require device passcode with configurable complexity and length • Enforce restrictions on device features, apps and web browsing • Detect compromised devices and perform automated actions • Recover a lost or stolen device through GPS location tracking • Protect: Perform a remote device lock or wipe (full/enterprise)

  31. Application Security • Monitor: Provide inventory of mobile apps installed on devices • Authenticate users and verify device security before granting access to the Enterprise App Catalog • Control: Restrict native apps on a device, including YouTube, Siri and Camera • Enforce application compliance policies and monitor status • Disable access to corporate apps if the device is compromised, non-compliant or user has left the company • Protect: Whitelist or blacklist publicly available apps

  32. Data Security • Monitor: Track mobile user access to data • Control: Control access and share of data across applications • Protect: Encrypt data at rest on device and SD card and in transit according to industry standards

  33. Network Security • Monitor: View all devices enrolled in your enterprise via interactive dashboard • Control: Configure certificate-based access to corporate Email, VPN and Wi-Fi networks • Integrate with F5, Cisco, Juniper, etc. for ultimate VPN network security • Protect: Block unknown devices from connecting to corporate networks • Use AirWatch APIs to allow MDM policies and compliance into your network control lists

  34. Questions? Preston Winn, Director of Business Development for Education Solutions, AirWatch IndirAvdagic, Director of Information Security and Risk Management, Harvard University

More Related