SlideShare a Scribd company logo
1 of 16
Mobility in the Workplace
Manage • Optimize • Secure™ – Since 1987
Today
1. Mobility is the most disruptive technology
since PC introduced in 1981.
2. Mobility growth:
• Mobile devices (2b) > desktops (1.3b)
• Mobile traffic exceeded desktop in 2015
• Online time via mobility at 51% in USA
• Mobile commerce 30% at $104.5B in ‘15
3. Traditional mobile device=SwissArmyknife:
• Assistant, tour guide, gamer, entertainer
• Camera, compass, flashlight, scanner
• Alert, monitor, and sense
Slide 2 Copyright 2016Bryley Systems Inc.
Trends
1. Integration:
• Lifestyle – Fitness or gaming; image
• Social integration – Search, messaging,
video: Facebook video exceeds YouTube
2. Emerging technologies:
• AI – Siri/Cortana; hands-free in vehicles
• Wearables – Wrist-ware, fitness trainers,
eye-ware, ear-ware, etc. – 39.5 million
3. Other changes:
• Cell-service price wars
• Cell-bandwidth freed by emerging Wi-Fi
Slide 3 Copyright 2016Bryley Systems Inc.
Players
1. Software (operating system and apps):
• Apple (iOS)
• Google (Android)
• Microsoft (Windows Phone)
2. Cellular service:
• AT&T
• Sprint
• Verizon
3. Social: Facebook, Twitter, LinkedIn
• Facebook
• Twitter
Slide 4 Copyright 2016Bryley Systems Inc.
Workplace
1. Blurring social-media lines*:
• Social-advocacy programs in the office
• Social messaging apps have 4B users
• Social-media advertising – Look like posts
and tweets targeted with precision – $24B
• Social video – Facebook > YouTube
2. Bring your own device (BYOD):
• Organization does not own the device
• Outside of control and protection
• Mixes organization data with personal data
*Ryan Holmes, HootSuite CEO: 2016 Biggest Social Media Trends for Business
Slide 5 Copyright 2016Bryley Systems Inc.
Workplace (continued)
3. Compliance:
• Massachusetts 201 CMR 17 (2010)
• HIPPA (1996)
• Sarbanes Oxley (2002)
4. Employee state-of-mind:
• Access from anywhere; anytime
• Extends reach of corporate applications
• Happier, productive employees or over-
loaded and burnt out?
Slide 6 Copyright 2016Bryley Systems Inc.
Threats
1. Most-common issues:
• Poor user habits: Password, 2-factor, loss
• Lack of encrypted transmission: BT+Wi-Fi
• Out-of-date, unpatched OS and apps
• Lack of malware protection
• Unencrypted sensitive data
2. Example: Android Bankosy (2014)*:
• Locks device and steals 2nd-factor
passcode via call-forwarding
• Matches passcode to user credentials
* Android malware steals one-time passcodes Jeremy Kirk at CIO on 1/12/16
Slide 7 Copyright 2016Bryley Systems Inc.
Other risks
1. Applications:
• Email – Confidential data not encrypted
• File-sharing service – Unrestricted access
2. Accessories:
• Credit-card readers – SSL encrypt while
processing, no local storage, password
• Remote control – Password & encrypted
• Storage (SD cards) – Encrypted
• Door locks – Password
• Anti-theft keychains
• Scanners
Slide 8 Copyright 2016Bryley Systems Inc.
Security
1. Policies
2. Training
3. Enforcement
See the Bryley Systems’ whitepaper: Protect
your mobile device.
Slide 9 Copyright 2016Bryley Systems Inc.
Security – Policies
1. Device:
• Anti-malware and updates/patches
• Encrypt data
• Backups
2. User:
• Complex passwords with auto-lock
• Browser high-security mode
3. Remote access:
• Encrypted transmission
• Provide virtualized access
• Do not store data locally
Slide 10 Copyright 2016Bryley Systems Inc.
Security – Training
1. Authentication and encryption:
• Password and biometrics
• Require two-factor
• Encrypt data
2. Reduce risk of loss or theft:
• Vigilance
• Phone-tracking apps
• Physical-locking device
3. Safely deploy new applications:
• Specific guidelines
• Enforcement mechanism
Slide 11 Copyright 2016Bryley Systems Inc.
Security – Training (continued)
4. Securely backup data
• Scheduled and verified
• Restrict online
• Tethering
5. Wi-Fi connection:
• Encrypt wireless transmission
• Man-in-the-Middle Attacks (MITM)
• Use Bluetooth cautiously in public
6. Dispose of properly:
• Remove all data
• Wipe internal storage
Slide 12 Copyright 2016Bryley Systems Inc.
Security – Enforcement
1. Mobile Device Management (MDM):
• Central administration aided by software
• Deploy, secure, integrate, monitor, and
manage all mobile devices
• Enforce user-security policy
• Recover lost/stolen devices
• Control mobile-device applications
• Airwatch, MobileIron, Kaseya, Exchange
2. Virtual Private Network (VPN):
• Point-to-point encrypted tunnel
• VPN appliance validates device
Slide 13 Copyright 2016Bryley Systems Inc.
3. Encryption:
• Requires authentication to unencrypt
• Add to device, folders, transmissions
4. Anti-malware:
• Avast – 9/10; $15/year
• AVG – 7/10; $15/year
• BitDefender – 8/10; $15/year
• Malwarebytes – Free
5. Backup:
• Content creation: Tablets and notebooks
• Access files via VPN or Cloud
Slide 14 Copyright 2016Bryley Systems Inc.
Security – Enforcement (continued)
Security – Enforcement (continued)
6. First steps:
• Backup where needed
• Deploy anti-malware app
• Enable on-board encryption
• Require password with auto-lock
• Enforce two-factor authentication
• Update through managed patching
• Require VPN access to organization data
Slide 15 Copyright 2016Bryley Systems Inc.
Mobility in Business
Gavin Livingstone
Bryley Systems Inc.
GLivingstone@Bryley.com
Manage • Optimize • Secure™ – Since 1987

More Related Content

What's hot

Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Network security basics
Network security basicsNetwork security basics
Network security basicsSkillspire LLC
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computererashmi1234
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 

What's hot (20)

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Computer security
Computer securityComputer security
Computer security
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Computer security and
Computer security andComputer security and
Computer security and
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 

Similar to Bryley - mobility in the work place

Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology MobileWorxs
 
Mobile Data Security Software Market Is Fast Approaching, Says Research
Mobile Data Security Software  Market Is Fast Approaching, Says ResearchMobile Data Security Software  Market Is Fast Approaching, Says Research
Mobile Data Security Software Market Is Fast Approaching, Says Researchshikhasony666
 
Mobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfMobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfshikhasony666
 
Mobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfMobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfshikhasony666
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Chapter 8
Chapter 8Chapter 8
Chapter 8uabir
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 

Similar to Bryley - mobility in the work place (20)

Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Mobile Data Security Software Market Is Fast Approaching, Says Research
Mobile Data Security Software  Market Is Fast Approaching, Says ResearchMobile Data Security Software  Market Is Fast Approaching, Says Research
Mobile Data Security Software Market Is Fast Approaching, Says Research
 
Mobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfMobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdf
 
Mobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfMobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdf
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 

Recently uploaded

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Bryley - mobility in the work place

  • 1. Mobility in the Workplace Manage • Optimize • Secure™ – Since 1987
  • 2. Today 1. Mobility is the most disruptive technology since PC introduced in 1981. 2. Mobility growth: • Mobile devices (2b) > desktops (1.3b) • Mobile traffic exceeded desktop in 2015 • Online time via mobility at 51% in USA • Mobile commerce 30% at $104.5B in ‘15 3. Traditional mobile device=SwissArmyknife: • Assistant, tour guide, gamer, entertainer • Camera, compass, flashlight, scanner • Alert, monitor, and sense Slide 2 Copyright 2016Bryley Systems Inc.
  • 3. Trends 1. Integration: • Lifestyle – Fitness or gaming; image • Social integration – Search, messaging, video: Facebook video exceeds YouTube 2. Emerging technologies: • AI – Siri/Cortana; hands-free in vehicles • Wearables – Wrist-ware, fitness trainers, eye-ware, ear-ware, etc. – 39.5 million 3. Other changes: • Cell-service price wars • Cell-bandwidth freed by emerging Wi-Fi Slide 3 Copyright 2016Bryley Systems Inc.
  • 4. Players 1. Software (operating system and apps): • Apple (iOS) • Google (Android) • Microsoft (Windows Phone) 2. Cellular service: • AT&T • Sprint • Verizon 3. Social: Facebook, Twitter, LinkedIn • Facebook • Twitter Slide 4 Copyright 2016Bryley Systems Inc.
  • 5. Workplace 1. Blurring social-media lines*: • Social-advocacy programs in the office • Social messaging apps have 4B users • Social-media advertising – Look like posts and tweets targeted with precision – $24B • Social video – Facebook > YouTube 2. Bring your own device (BYOD): • Organization does not own the device • Outside of control and protection • Mixes organization data with personal data *Ryan Holmes, HootSuite CEO: 2016 Biggest Social Media Trends for Business Slide 5 Copyright 2016Bryley Systems Inc.
  • 6. Workplace (continued) 3. Compliance: • Massachusetts 201 CMR 17 (2010) • HIPPA (1996) • Sarbanes Oxley (2002) 4. Employee state-of-mind: • Access from anywhere; anytime • Extends reach of corporate applications • Happier, productive employees or over- loaded and burnt out? Slide 6 Copyright 2016Bryley Systems Inc.
  • 7. Threats 1. Most-common issues: • Poor user habits: Password, 2-factor, loss • Lack of encrypted transmission: BT+Wi-Fi • Out-of-date, unpatched OS and apps • Lack of malware protection • Unencrypted sensitive data 2. Example: Android Bankosy (2014)*: • Locks device and steals 2nd-factor passcode via call-forwarding • Matches passcode to user credentials * Android malware steals one-time passcodes Jeremy Kirk at CIO on 1/12/16 Slide 7 Copyright 2016Bryley Systems Inc.
  • 8. Other risks 1. Applications: • Email – Confidential data not encrypted • File-sharing service – Unrestricted access 2. Accessories: • Credit-card readers – SSL encrypt while processing, no local storage, password • Remote control – Password & encrypted • Storage (SD cards) – Encrypted • Door locks – Password • Anti-theft keychains • Scanners Slide 8 Copyright 2016Bryley Systems Inc.
  • 9. Security 1. Policies 2. Training 3. Enforcement See the Bryley Systems’ whitepaper: Protect your mobile device. Slide 9 Copyright 2016Bryley Systems Inc.
  • 10. Security – Policies 1. Device: • Anti-malware and updates/patches • Encrypt data • Backups 2. User: • Complex passwords with auto-lock • Browser high-security mode 3. Remote access: • Encrypted transmission • Provide virtualized access • Do not store data locally Slide 10 Copyright 2016Bryley Systems Inc.
  • 11. Security – Training 1. Authentication and encryption: • Password and biometrics • Require two-factor • Encrypt data 2. Reduce risk of loss or theft: • Vigilance • Phone-tracking apps • Physical-locking device 3. Safely deploy new applications: • Specific guidelines • Enforcement mechanism Slide 11 Copyright 2016Bryley Systems Inc.
  • 12. Security – Training (continued) 4. Securely backup data • Scheduled and verified • Restrict online • Tethering 5. Wi-Fi connection: • Encrypt wireless transmission • Man-in-the-Middle Attacks (MITM) • Use Bluetooth cautiously in public 6. Dispose of properly: • Remove all data • Wipe internal storage Slide 12 Copyright 2016Bryley Systems Inc.
  • 13. Security – Enforcement 1. Mobile Device Management (MDM): • Central administration aided by software • Deploy, secure, integrate, monitor, and manage all mobile devices • Enforce user-security policy • Recover lost/stolen devices • Control mobile-device applications • Airwatch, MobileIron, Kaseya, Exchange 2. Virtual Private Network (VPN): • Point-to-point encrypted tunnel • VPN appliance validates device Slide 13 Copyright 2016Bryley Systems Inc.
  • 14. 3. Encryption: • Requires authentication to unencrypt • Add to device, folders, transmissions 4. Anti-malware: • Avast – 9/10; $15/year • AVG – 7/10; $15/year • BitDefender – 8/10; $15/year • Malwarebytes – Free 5. Backup: • Content creation: Tablets and notebooks • Access files via VPN or Cloud Slide 14 Copyright 2016Bryley Systems Inc. Security – Enforcement (continued)
  • 15. Security – Enforcement (continued) 6. First steps: • Backup where needed • Deploy anti-malware app • Enable on-board encryption • Require password with auto-lock • Enforce two-factor authentication • Update through managed patching • Require VPN access to organization data Slide 15 Copyright 2016Bryley Systems Inc.
  • 16. Mobility in Business Gavin Livingstone Bryley Systems Inc. GLivingstone@Bryley.com Manage • Optimize • Secure™ – Since 1987