The Three Critical Steps
for Effective BYOD
Management
Webinar – January 2014
Speaker Introductions

Jonathan Foulkes
VP Mobile Product Management
Kaseya

Alex Brandt
Vice President, Americas
Kaseya

...
Key Technology Trends

Major changes in how
we deliver reliable,
available and secure IT
services
www.kaseya.com

3
Three steps
1. Keep corporate data secure in a BYOD
environment
2. Effectively manage BYOD

3. Establish a BYOD policy tha...
Keeping data secure - Risks

• Increased risk of information loss to:
– Terminated users
– Physical device loss
– Open acc...
Keeping data secure

• Information should be secured at all
points
– Source
– In-transit
– At the endpoint

6
Keeping data secure

• Risks of productivity apps
– No policy management
– Exposure via synch to other end-points
– Oversh...
Keeping data secure

• Scope of access
– What can users access?
– From where?
– Using what tools?

• Audit
– Compliance
– ...
Options for Managing and Protecting
Data on Mobiles

• Traditional:
– Manage the Device
– Control the apps
– Put it on the...
MDM - Not a great fit for BYOD

• Users react negatively to intrusive policies
• Impacts the user experience of personal u...
So, what’s the answer?

• An approach that focuses control,
security and communications at the
Application layer
– Leave d...
The Answer – Containerization

12
Span of device control limits
solutions

13
Containerization addresses BYOD

14
Container Characteristics

•
•
•
•
•
•
•
•
15

Security is Job #1
User authentication
Device association
Policy retrieval ...
Container Examples
Kaseya BYOD Suite

Browser

16

Docs

Mail
Kaseya Secure Browser
- Intranet and Internet access
- Single sign-on for NTLM
- Administrator defined list
of resources
-...
Kaseya Secure Docs
• Secure document access
- Create, view, edit, store

• Manage documents
- Copy, move, delete

Secure D...
Kaseya Secure Mail
• Secure email using ActiveSync
• Mobile ‘Outlook’-like
functionality
• Includes PIM
- Calendar, tasks,...
BYOD Policies

• Good policies are
– Easy to deploy
– Easy for users to adopt and follow
– Low overhead
– Low impact on us...
BYOD Education

• Segregating business vs. personal
– Use the secure browser to access work
– Use native browser for perso...
Three steps
1. Keep corporate data secure in a BYOD
environment
2. Effectively manage BYOD without
managing the device
3. ...
Since 2000: The IT Management
Solution for MSPs and Mid-Market
Enterprises

•Over 10,000 customers with presence in
over 2...
Since 2000: The IT Management
Solution for MSPs and Mid-Market
Enterprises

•New management team and backing
from Insight ...
Kaseya: The IT Management Solution
for MSPs and Mid-Market Enterprises

25
Q&A & Final Thoughts
Q&A and Final Thoughts

Contact us:
1 (877) 926-0001
alexbrandt@kaseya.com

Learn more:
www.kaseya.co...
Upcoming SlideShare
Loading in...5
×

The Three Critical Steps for Effective BYOD Management

344

Published on

Some of the biggest challenges facing IT organizations today are managing BYOD and establishing effective BYOD policy.
As BYOD becomes a reality for more organizations, IT professionals find themselves in an ongoing tug of war between managing corporate risk and ensuring employee privacy and satisfaction.
How do you strike a balance between protecting corporate data on an employee's personal device without instituting invasive levels of control and oversight over their personal data and activities?
View this webinar on the three critical steps for BYOD management to learn how. You'll discover how to:
· Keep corporate data secure in a BYOD environment
· Effectively manage and protect corporate data without the need to manage the entire device
· Establish a BYOD policy that increases employee productivity and satisfaction

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
344
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "The Three Critical Steps for Effective BYOD Management "

  1. 1. The Three Critical Steps for Effective BYOD Management Webinar – January 2014
  2. 2. Speaker Introductions Jonathan Foulkes VP Mobile Product Management Kaseya Alex Brandt Vice President, Americas Kaseya 2
  3. 3. Key Technology Trends Major changes in how we deliver reliable, available and secure IT services www.kaseya.com 3
  4. 4. Three steps 1. Keep corporate data secure in a BYOD environment 2. Effectively manage BYOD 3. Establish a BYOD policy that increases employee productivity and satisfaction 4
  5. 5. Keeping data secure - Risks • Increased risk of information loss to: – Terminated users – Physical device loss – Open access to IT business resources – Data sharing practices – Malware & viruses 5
  6. 6. Keeping data secure • Information should be secured at all points – Source – In-transit – At the endpoint 6
  7. 7. Keeping data secure • Risks of productivity apps – No policy management – Exposure via synch to other end-points – Oversharing – Compliance gaps – No local encryption – Many others 7
  8. 8. Keeping data secure • Scope of access – What can users access? – From where? – Using what tools? • Audit – Compliance – Who saw what, when? • Protection from – Malware theft – Extraction 8
  9. 9. Options for Managing and Protecting Data on Mobiles • Traditional: – Manage the Device – Control the apps – Put it on the network (via VPN) 9
  10. 10. MDM - Not a great fit for BYOD • Users react negatively to intrusive policies • Impacts the user experience of personal use • Visibility of personal Apps, location and other info not welcome – In some industries, a liability • • • • 10 Complex High administrative overhead Still leaves many security gaps Reactive in many ways
  11. 11. So, what’s the answer? • An approach that focuses control, security and communications at the Application layer – Leave device in users control – Requires only basic internet connectivity – Policies only affect corporate-supplied apps 11
  12. 12. The Answer – Containerization 12
  13. 13. Span of device control limits solutions 13
  14. 14. Containerization addresses BYOD 14
  15. 15. Container Characteristics • • • • • • • • 15 Security is Job #1 User authentication Device association Policy retrieval and enforcement Data loss prevention Encryption Secure connectivity Respond to central control
  16. 16. Container Examples Kaseya BYOD Suite Browser 16 Docs Mail
  17. 17. Kaseya Secure Browser - Intranet and Internet access - Single sign-on for NTLM - Administrator defined list of resources - Proxy white list - Encrypted caches 17 Secure Browser
  18. 18. Kaseya Secure Docs • Secure document access - Create, view, edit, store • Manage documents - Copy, move, delete Secure Docs • Built-in ‘Office’ editors • Word, Excel, PowerPoint, PDF annotation • Secure local storage • Multiple WebDAV sources - Including SharePoint, GroupWise, NetApp and NAS - Real-time latest versions, no synch required 18
  19. 19. Kaseya Secure Mail • Secure email using ActiveSync • Mobile ‘Outlook’-like functionality • Includes PIM - Calendar, tasks, contacts • Fully integrated with BYOD Suite - Open Intranet URLs in Browser - Open attachments in Docs - Start new emails w/attachments selected in Docs 19 Secure Mail
  20. 20. BYOD Policies • Good policies are – Easy to deploy – Easy for users to adopt and follow – Low overhead – Low impact on users and IT – High security and control – Deliver compliance – High business value 20
  21. 21. BYOD Education • Segregating business vs. personal – Use the secure browser to access work – Use native browser for personal • Information is what’s critical – Data loss prevention starts with users – The right tools make it easier 21
  22. 22. Three steps 1. Keep corporate data secure in a BYOD environment 2. Effectively manage BYOD without managing the device 3. Establish a BYOD policy that increases employee productivity and satisfaction 22
  23. 23. Since 2000: The IT Management Solution for MSPs and Mid-Market Enterprises •Over 10,000 customers with presence in over 20 countries –Serving many industries: finance, healthcare, retail, manufacturing, education, government, technology, military and others •Gartner Magic Quadrant 2013 –Visionary: Client Management Tools 23
  24. 24. Since 2000: The IT Management Solution for MSPs and Mid-Market Enterprises •New management team and backing from Insight Venture Partners in 2013 •New acquisitions: –Rover Apps for BYOD –Zyrion Traverse for Cloud & Network Monitoring –365 Command for Office 365 administration 24
  25. 25. Kaseya: The IT Management Solution for MSPs and Mid-Market Enterprises 25
  26. 26. Q&A & Final Thoughts Q&A and Final Thoughts Contact us: 1 (877) 926-0001 alexbrandt@kaseya.com Learn more: www.kaseya.com * Complete the poll in the right window *

×