• Save
BYOD Industry Trends and Best Practices  -  Philly Tech Week
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

BYOD Industry Trends and Best Practices - Philly Tech Week

  • 2,566 views
Uploaded on

Fiberlink presentation on BYOD from Philly Tech Week Enterprise Mobility Workshop

Fiberlink presentation on BYOD from Philly Tech Week Enterprise Mobility Workshop

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,566
On Slideshare
2,566
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. BYOD: Industry Trends and Best Practices Presented by Chris Corbet ccorbet@fiberlink.com 1
  • 2. About Fiberlink Industry Recognition • Founded in 1991 • HQ in Blue Bell, PA MDM Magic Quadrant Critical Capabilities for MDM • Enterprise Mobility Management (EMM) Named Innovator in Cloud MDM • MaaS360 Platform Clear Choice Test Winner for MDM • 100% Cloud-Based • Over 1M Devices Best Mobile Service 2
  • 3. BYOD TRENDS 3
  • 4. Mobile Device Management Competitive Advantage Smartphones & Tablets BYOD Apps iOS Android Windows Customer ExperienceCompliance & Regulations Data Security End User Privacy 4
  • 5. The Enterprise Mobility Dilemma 25% of tablets The enterprise is mobile for enterprises in 2011* 70% choose their Employees are consumers device for work* Devices are diverse Process lags choices Stakes are high *Source: Forrester 5
  • 6. Some BYOD Program StatsDoes your company support a BYOD Program? Yes Next 6 months 32% Next 12 months 40% Unsure No; corporate only 4% 11% How is BYOD cost reimbursed at your 13% company? 19% Employees receive stipend Employees submit expense reports 56% We do not reimburse 24% 6
  • 7. BYOD Program Stats Cont’ How are you managing employee-owned devices today? 26% 31% Mobile device management (MDM) solution Native email controls No controls in place 43% 7 195 Responses
  • 8. BYOD Program Stats Cont’ What are your biggest concerns with BYOD support?100% 92%90%80%70%60%50% 46% 42% 39% 40%40%30% 25%20%10% 0% Having visibility into all Securing corporate data on Potential employee privacy Inability to blacklist Additional help desk Requests to support new devices used for work the device issues applications support devices 8 206 Responses
  • 9. MANAGING BYOD: BEST PRACTICES 9
  • 10. 10 Steps to BYOD Success 1. Creating a comprehensive BYOD policy 2. Measuring your mobile footprint 3. Simplify user enrollment 4. Configure policies over the air 5. Provide self service capabilities 6. Protect personal information (PII) 7. Isolate corporate data 8. Continuously monitor automated actions 9. Manage data usage 10.Track the ROI of BYOD 10
  • 11. Creating a Comprehensive BYOD Policy • Who’s buying? • Opt in/Acceptable Usage Policy • Which devices will you support? – What’s important? • Carrier/manufacturer? • Passcode? • Encryption (device/email)? • Email setting deployment? • Apps? • What are you security requirements? – External regulations, HIPAA – Industry vertical • Will you leverage a MDM solution to help manage these devices? – In MaaS360, 27% of all devices are tagged as personal devices – 86% of those are iOS 11
  • 12. Measuring your Mobile Footprint • Do you have ActiveSync enabled today? • Do you know how many devices are connecting today? – No ActiveSync reporting – PowerShell guru – No access to look 15% – No device level block1% ActiveSync is open (mobile devices are automatically enabled by end-user) 3% • Knowing will help 45% ActiveSync is closed (admin manually enables mobile devices) identify who needs to Auto-quarantine is enabled in Exchange be enrolled to the 2010 Use of a custom tool or PowerShell program and old device 35% Script cleaned up. We dont allow mobile devices to access Exchange 12
  • 13. Simplify Enrollment and Device Configuration • Keep the enrollment simple and fast – Simple URL • Corporate credentials vs. passcode? – Over the Air – Notification when complete • Configure the Device – Push Email settings – Push WiFi/VPN settings – Require a passcode – Set device restrictions 13
  • 14. Provide Self Service Capabilities • An End User Portal will help cut down on the number of calls to your IT teams • Allow the user to do basic items – Lock – Reset password – Locate – Wipe • View information about compliance state – Remediate issues 14
  • 15. Protect Personal Information (PII) • Personally Identifiable Information is a hot topic as of late – Privacy laws – Personal safety • Are you allowed or should you be allowed to?? – View location history Information – Locate a personal device – View a list of software installed for personal use 15
  • 16. Isolate Corporate Data • Isolating and managing corporate data is the probably the biggest concern of allowing personal devices to the network – ActiveSync account – Wireless settings – VPN configuration – Enterprise apps – Documents • Selective Wipe solves this problem – Today we know that of all “wipes” of personal devices in MaaS360, 86% are selective wipes 16
  • 17. Continuous Monitoring • It is important to monitor the state of your devices – Are they enrolled? – Are they compliant? – What apps are users installing? – Have they read the document you pushed? • Take automated actions based on state – Stay enrolled – OS version control – App compliance – Encryption status – Jailbreak/root detection • Notify, Block, Selective Wipe, Full Wipe 17
  • 18. Manage Data Usage • Help users help themselves – Provide an easy way for them to track and be alerted to their current data usage • Usage policies based on different segments – Set roaming and in-network megabit limits – Create threshold notifications – Enable/disable roaming via policy • Help them understand the benefits of using Wi- Fi where available • Reporting and trending • And, of course, proactively manage any corporate provisioned devices as well 18
  • 19. Track the ROI of BYOD• Calculate and present on cost differential of BYOD program and IT’s impact on the bottom line – Corporate-owned model: • Device purchase cost • The cost of a fully subsidized data plan • The cost of recycling the device every few years • Warranty plans • IT time and labor managing the program – BYOD • The cost of a partially subsidized data plan (if applicable) • The cost of a management platform • Subtract eliminated costs • Increased productivity 19
  • 20. 10 Steps to BYOD Success 1. Creating a comprehensive BYOD policy 2. Measuring your mobile footprint 3. Simplify user enrollment 4. Configure policies over the air 5. Provide self service capabilities 6. Protect personal information (PII) 7. Isolate corporate data 8. Continuously monitor automated actions 9. Manage data usage 10.Track the ROI of BYOD 20
  • 21. Live MaaS360 Setup & Demo 21