Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

5 Essential Tips for Creating An Effective BYOD Policy

487
views

Published on

Bring Your Own Device (BYOD) policies are a critical component of leading companies’ IT offerings today, giving employees the freedom and satisfaction of working on the devices that they prefer. …

Bring Your Own Device (BYOD) policies are a critical component of leading companies’ IT offerings today, giving employees the freedom and satisfaction of working on the devices that they prefer. Organizations implementing BYOD require a means of ensuring corporate control and security of enterprise data and applications, without controlling users’ personal use of devices or the personal data on them.

Join this highly informative webinar where Research Director, Steve Brasen of analyst firm Enterprise Management Associates (EMA), and Mobility expert Jonathan Foulkes of Kaseya will share their experience and knowledge on how you find the balance between employee freedom and corporate security and the key elements that can help organizations achieve the right BYOD strategy.

Attend this webinar, and you’ll walk away with essential tips in the following areas:

1. Keeping corporate data secure in a BYOD model
2. Drawing the line between managing the data and the device
3. How your policy choices affect user productivity and acceptance of BYOD
4. How to reduce the effort and cost of BYOD management
5. Creating business value through BYOD

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
487
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 5 Essential Tips for Creating an Effective BYOD Policy Nov 5, 2013
  • 2. Speaker Introductions Steve Brasen, Managing Research Director Enterprise Management Associates (EMA) Jonathan Foulkes VP Mobile Product Management Kaseya Alex Brandt Vice President, Americas Kaseya
  • 3. Agenda • Empowering a Mobile Workforce • Key Concepts in BYOD • 5 Essential BYOD Tips • #1 Securing Business Data • #2 Isolating Business Resources from users’ Personal Resources • #3 Establishing User-Focused Policies • #4 Reducing the Costs of Enterprise Mobility • #5 Achieving Business Value • Conclusions Slide 3 © 2013 Enterprise Management Associates, Inc.
  • 4. Empowering a Mobile Workforce • The Value of Workforce Mobility • Increased Productivity • Enhanced Business Agility • Improved Employee Satisfaction Slide 4 © 2013 Enterprise Management Associates, Inc.
  • 5. Empowering a Mobile Workforce • Enterprise IT requirements are expanding to support workforce mobility • End users are demanding unprecedented access to business resources: • Applications • Data • Services Slide 5 © 2013 Enterprise Management Associates, Inc.
  • 6. Empowering a Mobile Workforce • The Two Faces of Mobility • Provide access to business resources from any location  Office, home, remote  Supports device portability • Provide access to business resources from any device or OS   Slide 6 iOS, Android, BlackBerry, Windows Supports app and data portability © 2013 Enterprise Management Associates, Inc.
  • 7. Key Concepts is BYOD • The majority of devices used for business purposes are employee owned… Slide 7 © 2013 Enterprise Management Associates, Inc.
  • 8. Key Concepts is BYOD • Regardless of the owner, the majority of mobile devices are employed for both business and personal tasks 9.28% Used only for business tasks 90.72% Slide 8 Used for both business and personal tasks © 2013 Enterprise Management Associates, Inc.
  • 9. Key Concepts is BYOD • Bring Your Own Device (BYOD) practices enable the secure delivery of business applications, data, and services to mobile endpoints without restricting users’ personal use of the devices • Business IT resources must be  easily accessible  always available  high performing  cost-effective  able to meet business and regulatory compliance requirements Slide 9 © 2013 Enterprise Management Associates, Inc.
  • 10. #1 Securing Business Data © 2013 Enterprise Management Associates, Inc.
  • 11. #1 Securing Business Data • Workforce mobility Increases business risks • Increased opportunities for data loss  Physical device loss  Terminated users  Unsecured data sharing practices  Open access to business IT resources • Other security concerns  Viruses / malware  Rooting / jailbreaking • All business data needs to be secured at the source, in transit, and on the endpoint Slide 11 © 2013 Enterprise Management Associates, Inc.
  • 12. #1 Securing Business Data • High-risk data-sharing practices by industry… Slide 12 © 2013 Enterprise Management Associates, Inc.
  • 13. #1 Securing Business Data • Enhanced Security • Data Loss Protection  Lock & wipe  Should affect only business apps and data  Enable secure data sharing  Restrict access to unsecure data sharing  Email, messaging, Dropbox, USB drives, etc.  Data encryption • Application Protection  White / Black listing • Authentication  Password management  VPN access  Other communication methods • Rooting & Jailbreaking Detection Slide 13 © 2013 Enterprise Management Associates, Inc.
  • 14. #2 Isolating Business Resources from Users’ Personal Resources © 2013 Enterprise Management Associates, Inc.
  • 15. #2 Isolating Business Resources from Users’ Personal Resources • Business IT resources must be managed separate from users’ personal resources • These include: • Apps • Data • Web access • Email • Database access • Remote business access Slide 15 © 2013 Enterprise Management Associates, Inc.
  • 16. #2 Isolating Business Resources from Users’ Personal Resources • Containerization isolates and secures business resources while enabling centralized management Music Isolated Business IT Resources • • • Data Apps Services Secure Access & Delivery Enterprise AppStore Static Apps Virtual Apps Web Apps Enterprise IT Resources Centralized Data Repository Remote User Devices Business Services Android BlackBerry iOS Windows Phone/RT/Pro Slide 16 Email Messaging Databases Remote Access © 2013 Enterprise Management Associates, Inc.
  • 17. #3 Establishing User-Focused Processes © 2013 Enterprise Management Associates, Inc.
  • 18. #3 Establishing User-Focused Processes • User access to business resources must be: • • • • • Consistent Intuitive Fast Easy Non-impactful to other device uses • Frustrated users are unhappy users • Likely to complain about the service • Experience significant performance impacts • Reflects badly on IT operations and the business • Users should not have to “jump through hoops” to do their job Slide 18 © 2013 Enterprise Management Associates, Inc.
  • 19. #3 Establishing User-Focused Processes • Flexibility • Each organization has a unique set of requirements for:  Security & compliance  Supported devices  IT resources to be made available  User roles and tasks • There is no “one size fits all” management process   Slide 19 Endpoint management solutions must be flexible enough to support any set of enterprise requirements All endpoint support services must by eminently customizable to meet individual user needs © 2013 Enterprise Management Associates, Inc.
  • 20. #3 Establishing User-Focused Processes • Enable user self-service • Provide user portals for accessing data, apps and services   Include integrated authorization process Enable user-initiated service requests • Enterprise application store  Single point for accessing all business applications  Application downloads  Commercial application  Proprietary application  Application virtualization  Approved web applications Slide 20 © 2013 Enterprise Management Associates, Inc.
  • 21. #4 Reducing the Costs of Enterprise Mobility © 2013 Enterprise Management Associates, Inc.
  • 22. #4 Reducing the Costs of Enterprise Mobility • Direct costs associated with supporting workforce mobility: • Infrastructure costs • Implementation costs • Software licenses • Indirect costs associated with supporting workforce mobility • Administrator time and effort  Increased environment complexity • Compliance attainment Slide 22 © 2013 Enterprise Management Associates, Inc.
  • 23. #4 Reducing the Costs of Enterprise Mobility • Centralized management simplifies administrative efforts • “Single pane of glass” for monitoring and managing all mobile endpoints • Allows processes to be standardized  Enables role-based grouping • Consolidated asset tracking – single data repository  Physical devices  Applications  Licenses • Unified reporting  Enabling holistic views across all endpoints  Simplifies event correlation and root cause analysis  Slide 23 Supports compliance auditing and on-going status identification © 2013 Enterprise Management Associates, Inc.
  • 24. #5 Achieving Business Value © 2013 Enterprise Management Associates, Inc.
  • 25. #5 Achieving Business Value • Supporting BYOD empowers end users with the freedom to perform business tasks on any device they choose and in any way they wish to perform them without compromising enterprise requirements • This allows the workforce to focus principally on the performance of their job requirement rather than on the manipulation of the technology, resulting in: • Increased productivity • Enhanced business agility • Improved employee satisfaction Slide 25 © 2013 Enterprise Management Associates, Inc.
  • 26. #5 Achieving Business Value • Reducing mundane management efforts frees-up administrators to perform business-focused tasks, such as: • Introduce new IT services • Proactively prevent service disruptions • Improve IT service delivery • Enhance user experiences • Achieve business goals • Reduce costs • Increase the profitability of the business Slide 26 © 2013 Enterprise Management Associates, Inc.
  • 27. Conclusions • Rather than focusing on physical devices or individual operating systems, a centralized management solution should be implemented to “serve-up” application and data resources consistently to all endpoints • Containerization offers a secure and reliable method for isolating business resources to ensure they meet business requirements without impacting user productivity or satisfaction • With a user-centric approach to workforce mobility, users are liberated to securely access essential IT resources on any device they choose so they can focus on the more critical tasks of achieving enterprise goals Slide 27 © 2013 Enterprise Management Associates, Inc.
  • 28. Poll Question Please indicate your BYOD interest: 1. Support BYOD, but looking for better alternatives 2. Do not support BYOD yet, interested in learning how to 3. No mobile solution yet, interested in a unified solution
  • 29. Kaseya and BYOD •Embracing containers •Delivering security •BYOD friendly model •Providing easy deployments •Reduced mobility costs
  • 30. Kaseya BYOD Suite Browser 30 Docs Mail
  • 31. 31
  • 32. Sneak Peek
  • 33. An ideal solution for BYOD • Access vital business information located behind the corporate firewall - With or without VPN - With or without MDM • Secure containers for browsing , email and doc editing - Tunnel to intranet apps, internet or network files and folders - Email / PIM - Create, view, edit, store documents • On-premise gateway for integration and security • Private communications channel 33
  • 34. Who Are We? Industry standard for IT automation solutions & services Our solutions empower people to proactively manage and control IT assets remotely, easily and efficiently from one integrated Web-based platform
  • 35. Key Facts • Founded in 2000 • Over 10,000 customers with presence in over 20 countries • Offered as SaaS or on-premise • Enterprises and Service Providers • Serving customers across many industries: government, military, healthcare, finance, education, retail and others. The Netherlands Washington British Isles Germany UK France Virginia California Florida China India Singapore . South Africa Australia
  • 36. It Has Been an Exciting Year! • Gartner Magic Quadrant 2013 – Visionary • New management and backing from Insight Venture Partners
  • 37. Why Kaseya? A single Kaseya user can proactively manage 1,000s of automated IT systems tasks in the same amount of time required by a team of technicians using other techniques.
  • 38. www.kaseya.com
  • 39. Unified Management Discover the State of IT • • • • Manage the State of IT Systems Assets Mobile Devices Network Devices • Scheduling • Procedures • API/Messaging IT Configuration Management • • • Remote Management Software Deployment Power Management • • • Image Deployment Desktop Migration Mobile Device Management Asset Management • Network Discover & AD • Hardware/Software AntiVirus AntiMalware • Reporting • Dashboards • Interactive Data Views Business Continuity • • Image Backup Image Virtualization • File & Folder Backup • • Policy Compliance Time Tracking • • Agent-less Monitoring Log Monitoring Service Delivery • • Asset Management Virtual Machine Management Security • • Automate the State of IT • • • Service Desk/Ticketing Policy Management Service Billing Systems Monitoring • • Patch Management Software Updates • • • Systems Checks & Alerts Agent Monitoring Enterprise Monitoring www.kaseya.com
  • 40. Q&A & Final Thoughts Contact us: 1 (877) 926-0001 alexbrandt@kaseya.com Learn more: www.kaseya.com * Complete the poll in the right window *