How to Empower and Secure Employees’ Mobile Email in a BYOD World
How do you empower employees yet retain control?
With an estimated 80% of corporate IP stored in email, it is the single most powerful collaboration tool, yet the most important repository to protect. The consumerisation of IT is upon us. Employees are demanding mobile email on corporate devices and with the rise of smartphones, on personal devices too.
What is the best way to approach mobile email?
44. “There is, perhaps, a call to
action here… otherwise
smart workers will use the
initiative you presumably
pay them for to work
around the limitations.”
Dale Vile
Disconnect between what the business thinks they use and what employees do
For the first time in history, consumers have access to better IT at home than at work
I want to use the device I want to
Smartphones
Tablets
Laptops
PC
Social Media
240 Additional hours worked per year by the average mobile worker- iPass
91% of mobile workers will check their smartphone during downtime
87% of mobile workers will use their tablets for work – only 41% of tablets are corp. provided
87% of mobile workers will use their tablets for work – only 41% of tablets are corp. provided
The people who actually BYOD are most likely to be your most innovative workers
There is, perhaps, a call to action here for… otherwise smart workers will use the initiative you presumably pay them for to work around the limitations.
Enable your HERO’s
The people who actually BYOD are most likely to be your most innovative workers
power laptop users make 44% more money, use more collaboration apps, and carry an average of three devices wherever they go."
Also more likely to communte longer distances and be part of a distributed team
HERO’s want tech that think makes them more efficient
Not holds them back
And represents their personal brand
BIN?
Benefits
Staffing- Retention, Happiness, Hiring
More efficient, More productive, More responsive, More Agile
How do I enable employees to be productive
Glass half full or half empty?
Email is the “Killer” smartphone app
The only Universal communication tool- over 1 trillion attachments are sent every day in email
So it’s not surprising then an estimated 80% of corporate IP is contained within email
Having email gives employees access the corporate archive- tip of the iceberg
So we need to give email to our employees in a safe, secure way
How do I secure access to corporate email and reduce the risk of data loss
Glass half full or half empty?
We started by putting ourselves in your shoes
How do we enable productivity while minimising risk of loss
Supporting Multiple devices- allow users to make their own choices
Securely access information, view, collaborate
Because we already know that 63% of data loss was on a mobile device- Ponenmon
And we already know that 80% of Corporate IP is stored in email
Carry very little on the device
Evolve to the Cloud data security paradigm- secure the data, not the device
IT’s role is emerging as the data custodian
To protect and empower the enterprise
If we want the benefits of BYOD we need to move away from control over the device to liberating the data
Making data work for you and your people
Don’t let your data go to die in an archive
We used to make email easy, Starting this year, we’ll be making email more useful, productive
Add value to the business- don’t be looking over your shoulder
There have been two polarised approaches?
Glass half full or half empty?
Lock it all Down
Draconian
Secure
Trust Everyone
Easy and Open
Zero security
There is a Middle ground?
All good security decisions are done with GRC. Evaluate the risk posed by the data.
MDM- Exchange 2010 has significantly improved MDM. Enforcing PIN lock and remote wipe.
Deletion- control. How can you be sure everything is deleted?
But we still need to solve the problems of having the data on the device
Mimecast iPhone App
Archive Search- all your data available on the device. Full email function and control. Forward, reply.
Online authentication
The cultural shift in that’s happening in IT is palpable- BYOD is driving- visible manifestation and Cloud
Laptops- big mailboxes are still a risk
Archiving with great search and online authentication makes sure your data is always safe.
More advanced MDM features are available from other vendors if you’re not on Exchange 2010 or have additional requirements
http://www.sap.com/campaigns/2011_04_mobility/assets/GartnerReport_MDM_MQ_April2011.pdf
The cultural shift in that’s happening in IT is palpable- BYOD is driving- visible manifestation and Cloud
It’s about losing the shackles
Moving from managing infrastructure to manging data and the glue