BYOD: Striking a Balance. Employee Privacy and IT Governance
Upcoming SlideShare
Loading in...5

Like this? Share it with your network


BYOD: Striking a Balance. Employee Privacy and IT Governance

Uploaded on

Special guest Chris Hazelton of the 451 Group joins Fiberlink to discuss how mobile device management can meet the needs of IT and employees by protecting personal information. ...

Special guest Chris Hazelton of the 451 Group joins Fiberlink to discuss how mobile device management can meet the needs of IT and employees by protecting personal information.

Learn more:

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide
  • Setting the sceneIT spending, tablet adoption, BYOD implementationThe need for controlMDM: a means to enforce the need for control when implementing BYODGreater impact of BYODIdentifying parties involvedRisk/benefit assessmentIT benefits/risks; End-User benefits/risksStriking a BalanceMaking end-users feel more comfortable about MDM through PII
  • 159 employees44 analysts
  • Viewed another way, we see the breakdown for companies that are increasing spending has gone up 4 points, steady state also is up 2 points, and the number of companies that are decreasing spend, or not spending at all ell sharply by over 7 points.
  • So what is IT investing in? IT has been steadily investing in tablets, and this is for corporate liable, or company issued tablets. This does not take into account the larger number of tablets being brought in by employees, or employee liable devices.
  • What does the tablet market look like today? Not only is it dominated by Apple, Apple’s share of planned buyers grew in the short term due to the latest iPad launch. Across the board, Apple was able to hold back competition in the enterprise.
  • MDM provides protection for all data Securing corporate data at restSecuring personal data PicturesEmailsBanking information
  • Personally Identifiable Information (PII) is Too Much Information (TMI)
  • Auto quarantine – how many devices are connected to EASSecurity capabilities support wipe encryption root/jailbreak detection alerts for compliance – don’t support remote wipe, set minimum OS for Android Delay email – to determine compliance
  • Upload T&C in enrollment process automate compliance education Force user to accept T&C
  • Store history of webMD searches? WHAT!?Your employee has every bar award Openly telling people where and what your doing IT can see where your device is, but consumer apps tell more Share only with your


  • 1. BYOD: Striking a Balance Employee Privacy and IT Governance Presented by Jonathan Dale and special guest Chris Hazelton from 451 Research1
  • 2. Today’s agenda • Setting the scene • The need for control • Greater impact of BYOD • Risk/benefit assessment • Striking a balance 2 2
  • 3. BYOD: Striking a BalanceEmployee Privacy and IT GovernanceChris HazeltonResearch Director, Mobile & Wireless
  • 4. The 451 Group 451 Research is the flagship brand of The 451 Group and is focused on the business of enterprise IT innovation. 451 Research analysts provide critical and timely insight into the competitive dynamics of innovation in emerging technology segments including Information Management, Security, Mobility and Datacenter Technologies. Tier1 Research is a single-source research and advisory firm covering the multi-tenant datacenter, hosting, IT and cloud-computing sectors, blending the best of industry and financial research. Uptime Institute is ‘The Global Data Center Authority’ and a pioneer in the creation and facilitation of end-user knowledge communities to improve reliability and uninterruptible availability in datacenter facilities. TheInfoPro is a leading IT advisory and research firm that provides real-world perspectives on the customer and market dynamics of the enterprise information technology landscape, harnessing the collective knowledge and insight of leading IT organizations worldwide. ChangeWave Research is a research firm that identifies and quantifies ‘change’ in consumer spending behavior, corporate purchasing, and industry, company and technology trends.
  • 5. IT spending for Q2 2012 451 Research, ChangeWave Research, Feb 2012 n: 1,604
  • 6. Growth of tablet use in the enterprise 451 Research, ChangeWave Research, Feb 2012 n: 1,604
  • 7. Fiberlink Poll – Question Number One Describe your organization’s tablet adoption strategy A. Not purchasing, nor permitting personally- owned tablets B. Not purchasing, but allowing personally-owned tablets C. Purchasing tablets in bulk, no personally- owned tablets D. Purchasing tablets in bulk and allowing personally-owned tablets 7
  • 8. Tablet market by OS for Q2 2012 451 Research, ChangeWave Research, Feb 2012 n: 1,604
  • 9. iOS vs. Android in the Enterprise 451 Research, ChangeWave Research, Feb 2012 n: 1,604
  • 10. Consumerization outpacing corporate liable• Overwhelming majority permit employee liable devices • 67.8% aware of devices, have policies in place • 9.1% have no policy 76.9% Employee owned devices not allowed Aggregate of policies that allow BYOD 19.4% 451 Research Enterprise Mobility Survey, April2012 n: 165
  • 11. Fiberlink Poll – Question Number Two What approach has your organization taken towards BYOD program implementation? A. Already implemented a BYOD program B. Will implement BYOD in next 6 months C. Plans to evaluate and purchase a MDM solution prior to BYOD implementation D. No BYOD program; no plans for implementation 11
  • 12. Why is Mobile Device Management needed for BYOD• Implement iOS and Android as alternative to BlackBerry devices• Increase mobile security and compliance enforcement• Extend applications and content to devices• Reduce the cost of supporting mobile assets• Allow employees to use their own devices
  • 13. Why MDM is good for End-Users and ITMobile is your primary device in work and life …protect enterprise data …also protect your personal data
  • 14. What BYOD means to End-UsersBYOD provides… • More flexible work schedule • Mobile extends work day – but work how you want • Users can choose the device they want • Multiple devices – same apps and services
  • 15. What BYOD means to IT Competitive Advantage Tablets & Smartphones BYOD iOS Apps Android BlackBerry Windows Customer ExperienceCompliance & Regulations Data Security End User Privacy
  • 16. Real world risksProtect your customers, protect your company • Mass 201 CMR 17.03 • 3(c) Developing security policies for employees relating to the storage, access and transportation of records containing personal information outside of business premises. • 3(e) Preventing terminated employees from accessing records containing personal information
  • 17. What MDM allows IT to doWhere MDM brings value • Quickly configure your device • Set security policies and enforcement rules • E-mail enablement • Troubleshoot device issues • Find your lost device • Wipe personal data when needed • Wipe only corporate data • Push the apps you need • Be compliant with regulations • … and much more
  • 18. What End-Users are concerned aboutCan “Big Brother”• Locate where I am at 3am on a Saturday night?• See which personal apps I have installed?• Wipe my personal music and pictures without asking?• View my browser history?
  • 19. Fiberlink Poll – Question Number Three What measures have your organization taken to account for end-user privacy? A. Not fully aware of privacy implications; looking to address moving forward B. Have implemented specific measures to account for privacy needs C. No plans to protect privacy of personally identifiable information at this time 19
  • 20. What can IT do?What IT can do to satisfy corporate governance and end-user privacy1. Educate end-users2. Don’t go it alone3. Set the ground rules4. Hands off personal data5. PII is TMI
  • 21. Educate, educate, educate…Successful BYOD programs • Openly inform users why it is important to have MDM solution • Explain what IT can and can not do to their personal device • Has formal acceptable use policies • Educate users about the additional risks posed by mobile devices • Both corporate data and personal data risks
  • 22. Don’t go it aloneEngage Human Resources and Legal • Communicate business need to current employees • Continuation of business • Security for all data – personal, customer, and IP • Include mobile policies in new employee training • Device choice is an employee benefit • Set the expectation of device responsibility from the start
  • 23. Setting the ground rulesRolling out MDM • Start with basic but critical policies • Password protection is good for everyone • Strong but acceptable passwords • Limit password attempts • Control device inactivity
  • 24. Hands off personal dataCorporate data and personal data • Awareness of apps access corporate data • Control the movement of corporate documentsPrivacy for personal mobile apps • Mobile Banking • Social Networks • Healthcare apps
  • 25. PII is TMICertain MDM vendors make it possible to satisfy end-user concernsabout privacy of their personal information • Disable administrators from viewing end-user’s personal application inventory; restricted only to apps that appear in the corporate app catalog • Deactivation of location services; geographical coordinates, WiFi SSID and IP address all remain private
  • 26. MaaS360: Agility of the cloud for the pace of change in mobility • Fast deployment – Simple provisioning processes – Intuitive user interface • Effortless scalability – Instantly turn up devices, users, apps – Start small and easily expand up • Automatic upgrades – Continuous updates available instantly – No ongoing maintenance • Unmatched affordability – Zero infrastructure needed – All inclusive subscription price model 26
  • 27. Thank You! Questions? 27