BYOD Without the Hassles - March 2014


Published on

In just a few short years, BYOD went from nothing, to a major concern for IT and security professionals in just about every major organization. The first attempt to support BYOD was a knee-jerk reaction that focused on managing personally-owned devices in much the same way that corporate-owned laptops are managed.

Unfortunately, these approaches didn't do much to secure corporate data.

In this BYOD webinar, we'll introduce the 6 key requirements that you should demand from a next-generation BYOD solution.

Published in: Technology
1 Comment
  • BYOD will continue growing as mobile devices continue to play a greater role in our lives. Does BYOD come with headaches? Of course it does. However, security issues and IT management headaches (how do I support all those devices?) can be addressed by using new HTML5 technologies that enable users to connect to applications and systems without requiring IT staff to install anything on user devices. For example, Ericom AccessNow is an HTML5 RDP client that enables remote users to securely connect from iPads, iPhones and Android devices to any RDP host, including Terminal Server and VDI virtual desktops, and run their applications and desktops in a browser. This enhances security by keeping applications and data separate from personal devices.

    Since AccessNow doesn't require any software installation on the end user device – just an HTML5 browser, network connection, URL address and login details - IT staff end up with less support hassles. The volunteer or temporary employee that brings in their own device merely opens their HTML5-compatible browser and connects to the URL given them by the IT admin.

    Visit for more info.

    Please note that I work for Ericom
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

BYOD Without the Hassles - March 2014

  1. 1. BYOD Without the Hassles March 2014 Presenter: Rich Campagna, VP Products, Bitglass
  2. 2. Source: BYOD...
  3. 3. Source: BYOD Security...
  4. 4. Now What?
  5. 5. Next-Generation BYOD 6 Key Requirements
  6. 6. 1. Data is all you can control Devices Apps Data $ $ $$$$$$$$ Secure your data, not apps or devices Visibility/audit, compliance, loss/theft protection
  7. 7. 2. Lots and Lots of Devices... By 2017, majority of large companies will require BYOD BYOD Required BYOD policies will include laptops, and various operating systems More devices per employee Scale to more employees Support more device types License by user, not by device
  8. 8. 3. Clouds on the Horizon % of organizations adopting cloud apps by 2015 80% Future-proof for cloud apps Ver$cal   %  Gmail   %  O365   Construc)on,  Engineering   13.1%   7.4%   Media  &  Entertainment   21.0%   6.4%   Financial  Services   10.1%   6.5%   Educa)on  &  Non-­‐Profit   16.6%   10.0%   Regulated  Industries   9.5%   6.0%   Not-­‐regulated   17.7%   8.0%   Current cloud-based email adoption
  9. 9. 4. Save Time, Save $$ MDM more difficult to use than anticipated30% Difficulty with MDM implementation29% MDM scalability problems35% MDM difficult to integrate38% Low management overhead & complexity = OPEX savings immature
  10. 10. 5. User Experience Unhappy employees WILL “BYO-IT” Native apps, Familiar experience
  11. 11. 6. Privacy! Mixed-use devices Mixed-use apps Secure ONLY corporate data Respect employee privacy
  12. 12. Let’s Recap 1. Secure your data, not apps/devices 2. More employees on more devices 3. Future-proof for cloud apps 4. Minimize management overhead 5. Familiar user-experience 6. Respect employee privacy
  13. 13. Security & Compliance Mobile DLP, Clientless Selective Wipe, Access Control, etc. Audit & Visibility Audit Logs, Suspicious Activity Alerts, etc. Deploy in Minutes Lightweight, Easy-to-deploy Mobility Anywhere, any device; mobile and laptop Transparency Native experience for employees Privacy No capture of personal data Bitglass BYOD Security Meets Employee Expectations Solves IT Pain Points
  14. 14. Questions? Rich Campagna
  15. 15. Thank You!
  16. 16. Watermarked by Bitglass. Downloaded 2014-03-27 18:38 GMT by from Transaction UzRwNgoAFScAABxkERAAAADQ.