BYOD: Striking a Balance    Employee Privacy and IT Governance    Presented by Jonathan Dale and special    guest Chris Ha...
Today’s agenda • Setting the scene • The need for control • Greater impact of BYOD • Risk/benefit assessment • Striking a ...
BYOD: Striking a BalanceEmployee Privacy and IT GovernanceChris HazeltonResearch Director, Mobile & Wireless
The 451 Group                451 Research is the flagship brand of The 451 Group and is focused on                the busi...
IT spending for Q2 2012                   451 Research, ChangeWave Research, Feb 2012                   n: 1,604
Growth of tablet use in the enterprise                    451 Research, ChangeWave Research, Feb 2012                    n...
Fiberlink Poll – Question Number One Describe your organization’s tablet adoption strategy A. Not purchasing, nor permitti...
Tablet market by OS for Q2 2012                   451 Research, ChangeWave Research, Feb 2012                   n: 1,604
iOS vs. Android in the Enterprise                    451 Research, ChangeWave Research, Feb 2012                    n: 1,604
Consumerization outpacing corporate liable• Overwhelming majority permit  employee liable devices  • 67.8% aware of device...
Fiberlink Poll – Question Number Two What approach has your organization taken towards BYOD program implementation? A. Alr...
Why is Mobile Device Management needed for BYOD• Implement iOS and Android as alternative to BlackBerry devices• Increase ...
Why MDM is good for End-Users and ITMobile is your primary device in work and life    …protect enterprise data       …also...
What BYOD means to End-UsersBYOD provides…  • More flexible work schedule  • Mobile extends work day – but work how you wa...
What BYOD means to IT            Competitive Advantage                             Tablets & Smartphones BYOD     iOS     ...
Real world risksProtect your customers, protect your company   • Mass 201 CMR 17.03     •   3(c) Developing security polic...
What MDM allows IT to doWhere MDM brings value • Quickly configure your device • Set security policies and enforcement rul...
What End-Users are concerned aboutCan “Big Brother”• Locate where I am at 3am on a Saturday night?• See which personal app...
Fiberlink Poll – Question Number Three What measures have your organization taken to account for end-user privacy? A. Not ...
What can IT do?What IT can do to satisfy corporate governance and end-user privacy1. Educate end-users2. Don’t go it alone...
Educate, educate, educate…Successful BYOD programs   •       Openly inform users why it is important to have MDM solution ...
Don’t go it aloneEngage Human Resources and Legal   • Communicate business need to current employees     •   Continuation ...
Setting the ground rulesRolling out MDM  • Start with basic but critical policies  • Password protection is good for every...
Hands off personal dataCorporate data and personal data   • Awareness of apps access corporate data   • Control the moveme...
PII is TMICertain MDM vendors make it possible to satisfy end-user concernsabout privacy of their personal information  • ...
MaaS360: Agility of the cloud for the pace of change in mobility  • Fast deployment     – Simple provisioning processes   ...
Thank You! Questions?                        27
Upcoming SlideShare
Loading in...5
×

BYOD: Striking a Balance. Employee Privacy and IT Governance

1,089

Published on

Special guest Chris Hazelton of the 451 Group joins Fiberlink to discuss how mobile device management can meet the needs of IT and employees by protecting personal information.

Learn more: http://trials.maas360.com/forms/register_service_m.php?id=320&A=SM_slideshare&O=RP

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,089
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
53
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Setting the sceneIT spending, tablet adoption, BYOD implementationThe need for controlMDM: a means to enforce the need for control when implementing BYODGreater impact of BYODIdentifying parties involvedRisk/benefit assessmentIT benefits/risks; End-User benefits/risksStriking a BalanceMaking end-users feel more comfortable about MDM through PII
  • 159 employees44 analysts
  • Viewed another way, we see the breakdown for companies that are increasing spending has gone up 4 points, steady state also is up 2 points, and the number of companies that are decreasing spend, or not spending at all ell sharply by over 7 points.
  • So what is IT investing in? IT has been steadily investing in tablets, and this is for corporate liable, or company issued tablets. This does not take into account the larger number of tablets being brought in by employees, or employee liable devices.
  • What does the tablet market look like today? Not only is it dominated by Apple, Apple’s share of planned buyers grew in the short term due to the latest iPad launch. Across the board, Apple was able to hold back competition in the enterprise.
  • MDM provides protection for all data Securing corporate data at restSecuring personal data PicturesEmailsBanking information
  • Personally Identifiable Information (PII) is Too Much Information (TMI)
  • Auto quarantine – how many devices are connected to EASSecurity capabilities support wipe encryption root/jailbreak detection alerts for compliance – don’t support remote wipe, set minimum OS for Android Delay email – to determine compliance
  • Upload T&C in enrollment process automate compliance education Force user to accept T&C
  • Store history of webMD searches? WHAT!?Your employee has every bar award Openly telling people where and what your doing IT can see where your device is, but consumer apps tell more Share only with your
  • BYOD: Striking a Balance. Employee Privacy and IT Governance

    1. 1. BYOD: Striking a Balance Employee Privacy and IT Governance Presented by Jonathan Dale and special guest Chris Hazelton from 451 Research1
    2. 2. Today’s agenda • Setting the scene • The need for control • Greater impact of BYOD • Risk/benefit assessment • Striking a balance 2 2
    3. 3. BYOD: Striking a BalanceEmployee Privacy and IT GovernanceChris HazeltonResearch Director, Mobile & Wireless
    4. 4. The 451 Group 451 Research is the flagship brand of The 451 Group and is focused on the business of enterprise IT innovation. 451 Research analysts provide critical and timely insight into the competitive dynamics of innovation in emerging technology segments including Information Management, Security, Mobility and Datacenter Technologies. Tier1 Research is a single-source research and advisory firm covering the multi-tenant datacenter, hosting, IT and cloud-computing sectors, blending the best of industry and financial research. Uptime Institute is ‘The Global Data Center Authority’ and a pioneer in the creation and facilitation of end-user knowledge communities to improve reliability and uninterruptible availability in datacenter facilities. TheInfoPro is a leading IT advisory and research firm that provides real-world perspectives on the customer and market dynamics of the enterprise information technology landscape, harnessing the collective knowledge and insight of leading IT organizations worldwide. ChangeWave Research is a research firm that identifies and quantifies ‘change’ in consumer spending behavior, corporate purchasing, and industry, company and technology trends.
    5. 5. IT spending for Q2 2012 451 Research, ChangeWave Research, Feb 2012 n: 1,604
    6. 6. Growth of tablet use in the enterprise 451 Research, ChangeWave Research, Feb 2012 n: 1,604
    7. 7. Fiberlink Poll – Question Number One Describe your organization’s tablet adoption strategy A. Not purchasing, nor permitting personally- owned tablets B. Not purchasing, but allowing personally-owned tablets C. Purchasing tablets in bulk, no personally- owned tablets D. Purchasing tablets in bulk and allowing personally-owned tablets 7
    8. 8. Tablet market by OS for Q2 2012 451 Research, ChangeWave Research, Feb 2012 n: 1,604
    9. 9. iOS vs. Android in the Enterprise 451 Research, ChangeWave Research, Feb 2012 n: 1,604
    10. 10. Consumerization outpacing corporate liable• Overwhelming majority permit employee liable devices • 67.8% aware of devices, have policies in place • 9.1% have no policy 76.9% Employee owned devices not allowed Aggregate of policies that allow BYOD 19.4% 451 Research Enterprise Mobility Survey, April2012 n: 165
    11. 11. Fiberlink Poll – Question Number Two What approach has your organization taken towards BYOD program implementation? A. Already implemented a BYOD program B. Will implement BYOD in next 6 months C. Plans to evaluate and purchase a MDM solution prior to BYOD implementation D. No BYOD program; no plans for implementation 11
    12. 12. Why is Mobile Device Management needed for BYOD• Implement iOS and Android as alternative to BlackBerry devices• Increase mobile security and compliance enforcement• Extend applications and content to devices• Reduce the cost of supporting mobile assets• Allow employees to use their own devices
    13. 13. Why MDM is good for End-Users and ITMobile is your primary device in work and life …protect enterprise data …also protect your personal data
    14. 14. What BYOD means to End-UsersBYOD provides… • More flexible work schedule • Mobile extends work day – but work how you want • Users can choose the device they want • Multiple devices – same apps and services
    15. 15. What BYOD means to IT Competitive Advantage Tablets & Smartphones BYOD iOS Apps Android BlackBerry Windows Customer ExperienceCompliance & Regulations Data Security End User Privacy
    16. 16. Real world risksProtect your customers, protect your company • Mass 201 CMR 17.03 • 3(c) Developing security policies for employees relating to the storage, access and transportation of records containing personal information outside of business premises. • 3(e) Preventing terminated employees from accessing records containing personal information
    17. 17. What MDM allows IT to doWhere MDM brings value • Quickly configure your device • Set security policies and enforcement rules • E-mail enablement • Troubleshoot device issues • Find your lost device • Wipe personal data when needed • Wipe only corporate data • Push the apps you need • Be compliant with regulations • … and much more
    18. 18. What End-Users are concerned aboutCan “Big Brother”• Locate where I am at 3am on a Saturday night?• See which personal apps I have installed?• Wipe my personal music and pictures without asking?• View my browser history?
    19. 19. Fiberlink Poll – Question Number Three What measures have your organization taken to account for end-user privacy? A. Not fully aware of privacy implications; looking to address moving forward B. Have implemented specific measures to account for privacy needs C. No plans to protect privacy of personally identifiable information at this time 19
    20. 20. What can IT do?What IT can do to satisfy corporate governance and end-user privacy1. Educate end-users2. Don’t go it alone3. Set the ground rules4. Hands off personal data5. PII is TMI
    21. 21. Educate, educate, educate…Successful BYOD programs • Openly inform users why it is important to have MDM solution • Explain what IT can and can not do to their personal device • Has formal acceptable use policies • Educate users about the additional risks posed by mobile devices • Both corporate data and personal data risks
    22. 22. Don’t go it aloneEngage Human Resources and Legal • Communicate business need to current employees • Continuation of business • Security for all data – personal, customer, and IP • Include mobile policies in new employee training • Device choice is an employee benefit • Set the expectation of device responsibility from the start
    23. 23. Setting the ground rulesRolling out MDM • Start with basic but critical policies • Password protection is good for everyone • Strong but acceptable passwords • Limit password attempts • Control device inactivity
    24. 24. Hands off personal dataCorporate data and personal data • Awareness of apps access corporate data • Control the movement of corporate documentsPrivacy for personal mobile apps • Mobile Banking • Social Networks • Healthcare apps
    25. 25. PII is TMICertain MDM vendors make it possible to satisfy end-user concernsabout privacy of their personal information • Disable administrators from viewing end-user’s personal application inventory; restricted only to apps that appear in the corporate app catalog • Deactivation of location services; geographical coordinates, WiFi SSID and IP address all remain private
    26. 26. MaaS360: Agility of the cloud for the pace of change in mobility • Fast deployment – Simple provisioning processes – Intuitive user interface • Effortless scalability – Instantly turn up devices, users, apps – Start small and easily expand up • Automatic upgrades – Continuous updates available instantly – No ongoing maintenance • Unmatched affordability – Zero infrastructure needed – All inclusive subscription price model 26
    27. 27. Thank You! Questions? 27
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×