• Save
The Three Critical Steps for Effective BYOD Management
 

The Three Critical Steps for Effective BYOD Management

on

  • 475 views

Some of the biggest challenges facing IT organizations today are managing BYOD and establishing effective BYOD policy. ...

Some of the biggest challenges facing IT organizations today are managing BYOD and establishing effective BYOD policy.
As BYOD becomes a reality for more organizations, IT professionals find themselves in an ongoing tug of war between managing corporate risk and ensuring employee privacy and satisfaction.
How do you strike a balance between protecting corporate data on an employee's personal device without instituting invasive levels of control and oversight over their personal data and activities?
View this webinar on the three critical steps for BYOD management to learn how. You'll discover how to:
· Keep corporate data secure in a BYOD environment
· Effectively manage and protect corporate data without the need to manage the entire device
· Establish a BYOD policy that increases employee productivity and satisfaction

Statistics

Views

Total Views
475
Views on SlideShare
475
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management Presentation Transcript

  • The Three Critical Steps for Effective BYOD Management Webinar – January 2014
  • Speaker Introductions Jonathan Foulkes VP Mobile Product Management Kaseya Alex Brandt Vice President, Americas Kaseya 2
  • Key Technology Trends Major changes in how we deliver reliable, available and secure IT services www.kaseya.com 3
  • Three steps 1. Keep corporate data secure in a BYOD environment 2. Effectively manage BYOD 3. Establish a BYOD policy that increases employee productivity and satisfaction 4
  • Keeping data secure - Risks • Increased risk of information loss to: – Terminated users – Physical device loss – Open access to IT business resources – Data sharing practices – Malware & viruses 5
  • Keeping data secure • Information should be secured at all points – Source – In-transit – At the endpoint 6
  • Keeping data secure • Risks of productivity apps – No policy management – Exposure via synch to other end-points – Oversharing – Compliance gaps – No local encryption – Many others 7
  • Keeping data secure • Scope of access – What can users access? – From where? – Using what tools? • Audit – Compliance – Who saw what, when? • Protection from – Malware theft – Extraction 8
  • Options for Managing and Protecting Data on Mobiles • Traditional: – Manage the Device – Control the apps – Put it on the network (via VPN) 9
  • MDM - Not a great fit for BYOD • Users react negatively to intrusive policies • Impacts the user experience of personal use • Visibility of personal Apps, location and other info not welcome – In some industries, a liability • • • • 10 Complex High administrative overhead Still leaves many security gaps Reactive in many ways
  • So, what’s the answer? • An approach that focuses control, security and communications at the Application layer – Leave device in users control – Requires only basic internet connectivity – Policies only affect corporate-supplied apps 11
  • The Answer – Containerization 12
  • Span of device control limits solutions 13
  • Containerization addresses BYOD 14
  • Container Characteristics • • • • • • • • 15 Security is Job #1 User authentication Device association Policy retrieval and enforcement Data loss prevention Encryption Secure connectivity Respond to central control
  • Container Examples Kaseya BYOD Suite Browser 16 Docs Mail
  • Kaseya Secure Browser - Intranet and Internet access - Single sign-on for NTLM - Administrator defined list of resources - Proxy white list - Encrypted caches 17 Secure Browser
  • Kaseya Secure Docs • Secure document access - Create, view, edit, store • Manage documents - Copy, move, delete Secure Docs • Built-in ‘Office’ editors • Word, Excel, PowerPoint, PDF annotation • Secure local storage • Multiple WebDAV sources - Including SharePoint, GroupWise, NetApp and NAS - Real-time latest versions, no synch required 18
  • Kaseya Secure Mail • Secure email using ActiveSync • Mobile ‘Outlook’-like functionality • Includes PIM - Calendar, tasks, contacts • Fully integrated with BYOD Suite - Open Intranet URLs in Browser - Open attachments in Docs - Start new emails w/attachments selected in Docs 19 Secure Mail
  • BYOD Policies • Good policies are – Easy to deploy – Easy for users to adopt and follow – Low overhead – Low impact on users and IT – High security and control – Deliver compliance – High business value 20
  • BYOD Education • Segregating business vs. personal – Use the secure browser to access work – Use native browser for personal • Information is what’s critical – Data loss prevention starts with users – The right tools make it easier 21
  • Three steps 1. Keep corporate data secure in a BYOD environment 2. Effectively manage BYOD without managing the device 3. Establish a BYOD policy that increases employee productivity and satisfaction 22
  • Since 2000: The IT Management Solution for MSPs and Mid-Market Enterprises •Over 10,000 customers with presence in over 20 countries –Serving many industries: finance, healthcare, retail, manufacturing, education, government, technology, military and others •Gartner Magic Quadrant 2013 –Visionary: Client Management Tools 23
  • Since 2000: The IT Management Solution for MSPs and Mid-Market Enterprises •New management team and backing from Insight Venture Partners in 2013 •New acquisitions: –Rover Apps for BYOD –Zyrion Traverse for Cloud & Network Monitoring –365 Command for Office 365 administration 24
  • Kaseya: The IT Management Solution for MSPs and Mid-Market Enterprises 25
  • Q&A & Final Thoughts Q&A and Final Thoughts Contact us: 1 (877) 926-0001 alexbrandt@kaseya.com Learn more: www.kaseya.com * Complete the poll in the right window *