From Device Selection to Data Protection: Selecting the Right Mobility Solutions

1,100 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,100
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Your presenter today will be Marco Nielsen, Marco is the VP of Services and the Chief Mobility Architect at Enterprise Mobile. He leads the company’s services division. As one of Enterprise Mobile’s senior technical experts, Marco participates in the most complex and challenging projects, drawing on his technical expertise. Today he’ll share some of the tips he’s formulated working with clients on building mobility strategy.
  • Just as with any other area of business, getting it right in the mobility space requires planning. Smart companies take into account not only device and app choices, but also infrastructure and management considerations before implementing mobile solutions.  Before delving into the nitty-gritty, though, consider taking a few key steps:Think about how mobility fits into your overall business strategy. What are your objectives and requirements? By linking mobility directly to your business strategy, you’ll focus on the right long-term solutions and budget avenues. Conduct a mobile platform risk assessment to understand potential risks and see which could be showstoppers and which have workarounds.
  • These days when it comes to mobility, from apps to devices, we are all well aware that employeesare bringing their own devices, their own apps and even their own networks to the workplace – with them their own set of security risks. Today, mobile platforms may provide separate virtual instances that allow segregation of work and personal data, which makes things easier on IT managers. In the meantime, it’s important to understand that the mobile space is changing rapidly. IT needs to be flexible and prepared to adapt to new solutions. As we dig into our discussion today, a lot of the factors I’ll recommend for making selections of apps, devices, management and infrastructure will keep the BYO era in mind – since 60% of companies now offer BYOD and that number is expected to rise to 90% in 2014 (according to Forrester Research)
  • Carefully defining security requirements/ policies will help narrow the scope. Make sure you include stakeholders and get their input.Consider a tool for provisioning, monitoring, and supporting employee devices. Mobile has matured, and moved past just e-mail. Most likely you have requests to support applications and data content and there is a large number of tools on the market. You may need to look at different solutions to protect your data if you take the route of no policies.As mobility becomes common place, you may also see a surge of use cases that you don’t have policies for. So it may be very important to revisit your policies frequently and make adjustments as time goes by.
  • Due to the sheer volume of vendors and device availability, Android will be hard to get around in coming years. Apple has finally crossed 50B apps downloaded from their store since 2007, but Google is right behind at 48B and in fewer years. Google is stating that they are now seeing 1.5M Android devices being activated on a daily basis.With Samsung KNOX and other vendors filling some of the platform gaps, it could be a secure and durable enterprise platform in the future. Next month we will see if Apple iOS 7 or other new offerings from Apple will keep them in the top after Steve Job’s passing.  The ease of use and simple management continues to be copied by other vendors.With Blackberry numbers in a downward spiral even with new offerings, Microsoft has become the new #3 runner but still has some work to do I believe to keep pace. Many IT customers I talk to would love to see a surge in Microsoft devices so that there is a common platform across the organization. New OS updates coming out later this year on both Windows Phone and the desktop may spur some.
  • When making the decision there are 4 key elements to consider. Keep these in mind as we walk through the following slides. Calpine example – Had setup a stern security policy, if devices didn’t check in after x days, they wanted to automatically wipe the devices. Due to an IT gitch, check-in connectivity was lost, and once restored devices reconnected and automatically wiped. Striking a balance between security, risk, and usability. For BYOD devices, support and usability may be important for success.
  • Is there a business strategy that includes mobility? Without a clear business strategy (requirements, goals), it is difficult to create a mobility strategy and solution set that makes sense long term. By linking it directly to your business strategy you will obtain clear goals, focusing on the right long term solutions (instead of short term), and even budget avenues.  For a larger company you may have the need to map out all the mobility use cases and treat each one separately. Involving all the stakeholders so you have buy-in and budget support.
  • Has a mobile platform risk assessment been done? It can be important to understand potential risks before making choices. Some of these risks could be migrated by the solution(s) chosen, or their product roadmaps. It is also important to understand which risks could be showstoppers or which have workarounds.Some of the top issues could include: Security risks -how much risk do you have by letting your corporate data on personal devices)Usability -how far do you want to lock down the devices with corporate data, How can you enable further usage by selecting the right secure solutionsE-mail -Depending on your security assessment you may want to invest into mobile device management solutions that can only allow managed devices to access corporate e-mail. On the network level, there is Network Access Control (NAC) solutions that integrate with mobile device management solutions to even prohibit access to specific subnets on your network.  Without a proper investigation and assessment you could be making the wrong decisions, and using budget and resources on the wrong solutions, or don’t have a long term plan for a complete solution.
  • Which mobile platforms or form factors have been considered to be included in the mobility strategy?  By solving the first two items, you may now have a better understanding on which mobile platforms would be best. But now different form factors and even usage may come into play. A few years a 10” tablet was all the rage, but now 7” and 8” tablets appear to be gaining a foothold for the best size and form factor for specific use case. Frequent discussions with your end-user customers may flush out more requirements. Accessories, life cycle services, SLAs, downtime having financial impacts, etc. Support - How will you support a large number of different devices, platforms, and operating systems? Perhaps you want to minimize this by limiting the options.Make sure your budget is aligned with the business goals. Perhaps a phased approach can be done to reduce short term costs and provide a long term plan.
  • Its all about the applications. Without applications, we would all still be just using mobile devices for e-mail type activates. Is there a mobile application strategy and aligns with your business strategy? Important application success factors and decisions can for example be: - How will your business critical data be used on mobile devices, - Can you use off the shelf, browser based, or custom developed solution – what development platform should you then use?- How will you support the end-users with the applications?
  • Has an application risk assessment been done? If the application is centered around critical business data it will be important to understand the risks on your application strategy.  Is data at rest and data in transit protected? Is any secondary authentication to access the data secure yet have end-user usability in mind? Will you use federated credentials?  How will you purchase/deploy/update applications to your corporate and/or BYOD mobile devices?
  • Make sure the proper stakeholders are involved, your end customers, business, IT security and legal.If you are planning to develop a custom application since this is critical to your business goals, important decisions will need to be made regarding support of mobile OS platforms, ongoing support of the custom code, development cycle and budget resources. Outsourcing the task may be cost effective, once the proper development solution has been researched. Also a common problem we have seen among customers is the use of 3rd party application development company who have gaps in the understanding of enterprise mobility compared to consumer based mobility. Application deployment through an in-house appstore, AppWrapping, Data Loss Prevention (DLP), MDM APIs, and yearly app certificate updating processes can be important for your strategy.
  • As we step away from the device and software components, the back-end infrastructure and support is also important to understand.Depending on your requirements, several things could be critical to the overall success.Identity Management – Certificates, Active Directory, AccountsCan you provide certificate management to your managed devices? Will you be using Active Directory/LDAP authentication?E-mail server proxy front end, etc.Are you protected from risks from BYOD devices?  How will you protect against rouge devices that end-users bring to work? NAC solutions, secure e-mail, secure browsing.Do you have a content management strategy for your mobile workforce? If you don’t provide a secure strategy, your end-users will probably already continue to use consumer solutions they already have. By looking at your business strategy, which solutions are being used to store information, you can look at solutions to also provide secure access to the same information on your mobile devices. This is a hot area at this time with many vendors, and it will be important to choose the right solution and direction.Does your mobility strategy include the necessary infrastructure support structure and application backend scalability? As with most companies, mobility projects often start small, with a single department or project and quickly become large and also a mandatory necessity. Some solutions can scale, others may need additional budget and infrastructure requirements. It could be necessary to look at these topics to understand the full cost of a solution. It will also be necessary to understand if your company can support fully hosted/cloud solutions, or if high-security is required and on premise solutions is the direction.   How will you support the solution? Do you have the necessary IT staff and resources?
  • Proper management of the technology is important. Many different solutions are now available on the market.In the beginning they were very device focused, now we have application management, and perhaps the future will bring tighter network controls as well.Some critical factors are: Look at your priorities - what do you want to do first, what is most important. Then determine your management strategy. What is important and business critical for lifecycle management?  How will you deploy the solution.
  • GlobalizationDo you have international travelers or staff across the world? If you are a global organization, can you be staffed 24/7 with the proper resources with the right technical knowledge?Do you have different language requirements?How will manage the mobile operator support in different countries?
  • Do you have regular reviews to adapt to changes in the mobility and solution ecosystem? Many have a hard time keeping up to speed on mobility. New devices are appearing every quarter. Devices are becoming obsolete under 12 months. New features, NFC, device types (Glass/Watch) are also appearing. The device models and form factors chosen in the beginning of a project, might not be available later in the time.
  • SupportWhat level of help desk services will end-users have access to?  Especially for BYOD this could get complex.Do you allow remote administration of specific solutions with delegated permissions? How will you accommodate VIP/CxO service levels? Does your business and mobility strategy provide the necessary support and resources? Would you rather pay for staffing up your own help desk to cover for peaks, or pay a fixed monthly fee?
  • As you can see, it isn’t easy to put all the right components of a mobile strategy in place. Many companies either have a hard time keeping up to speed or would rather focus on their core competencies. They choose instead to rely on Mobility-as-a-Service (MaaS) providers to put a mobility strategy on track and implement best-in-class management solutions
  • From Device Selection to Data Protection: Selecting the Right Mobility Solutions

    1. 1. Selecting the RightMobility Solutions: FromDevices to DataProtectionPresenter: Marco NielsenVice President, Servicesmnielsen@enterprisemobile.com
    2. 2.  Marco Nielsen, VP of Services, Enterprise MobileMarco is an internationally recognizedexpert in mobile device managementand mobile devices, with nearly 20 years’experience spanning systemsarchitecture, operating systems,hardware and communications. Marcobrings a broad perspective on how todesign and deliver a successful enterprisemobility initiative.
    3. 3. Today we’ll help you navigate by offeringguidance on: Proliferation of devicesand apps Factors to consideringwhen choosing Planning required tomake the right choice Decision making beyondjust devices
    4. 4. deviceappnetwork
    5. 5. • Carefully definesecurityrequirements andpolicies• Consider a tool forprovisioning,monitoring, andsupportingemployee devices• Ignore the risksassociated with nopolicies• Limit policies toemployees that arealready mobile
    6. 6. ManageabilityMobilityStrategy &SolutionsUsabilitySupportSecurityManageability
    7. 7.  By linking it directly toyour business strategyyou will obtain: clear goals focusing on the rightlong term solutions(instead of short term) budget avenues
    8. 8. RiskAssessment
    9. 9.  Security risks - how much risk do youhave by letting your corporate dataon personal devices) Usability - how far do you want tolock down the devices withcorporate data, E-mail - Depending on your securityassessment you may want to investinto mobile device managementsolutions that can only allowmanaged devices to accesscorporate e-mail.
    10. 10.  Usability/Security Support Budget/Investment
    11. 11. Business CriticalDataApplication RiskAssessmentRequirementsgatheringIs there a mobile applicationstrategy and aligns with yourbusiness strategy?
    12. 12. Business CriticalDataApplication RiskAssessmentRequirementsgatheringHas an application riskassessment been done?
    13. 13. Business CriticalDataApplication RiskAssessmentRequirementsgathering Requirements gathering◦ Data Protection◦ Usability/Security◦ Custom development◦ AppWrapping◦ Workflows & Updates◦ Budget/Investment◦ Support
    14. 14. Identity managementProtection from risks with BYOD,rouge devicesContent management strategyMobility strategySupport
    15. 15. BusinessCriticalElementsGlobalNeedsSupport &ProcessesEcosystemReviews
    16. 16. BusinessCriticalElementsGlobalNeedsSupport &ProcessesEcosystemReviews
    17. 17. BusinessCriticalElementsGlobalNeedsSupport &ProcessesEcosystemReviews
    18. 18. BusinessCriticalElementsGlobalNeedsSupport &ProcessesEcosystemReviews
    19. 19.  Steps to making informed mobility decisions:◦ Review requirements and policies◦ Consider key factors like usability, security,manageability, and support◦ Ask the right questions around device selection, appselection, device management and infrastructure◦ Stay informed◦ Get help from a Mobility-as-a-Service provider.
    20. 20.  Marco - mnielsen@enterprisemobile.com Follow ushttps://twitter.com/entmobilehttp://www.linkedin.com/company/enterprise-mobilehttps://www.facebook.com/entmobile
    21. 21. While every care has been taken to ensure that the information in this document iscorrect, Enterprise Mobile cannot accept (and hereby disclaims) any responsibility forloss or damage caused by errors or omissions. All rights reserved. No part of thisdocument may be reproduced without the prior permission of Enterprise Mobile. 2013 Enterprise Mobilewww.enterprisemobile.comThank you!

    ×