BYOD Industry Trends and Best Practices - Philly Tech Week
1. BYOD: Industry Trends
and Best Practices
Presented by Chris Corbet
ccorbet@fiberlink.com
1
2. About Fiberlink
Industry Recognition
• Founded in 1991
• HQ in Blue Bell, PA MDM Magic Quadrant
Critical Capabilities for MDM
• Enterprise Mobility
Management (EMM)
Named Innovator in Cloud MDM
• MaaS360 Platform
Clear Choice Test Winner for MDM
• 100% Cloud-Based
• Over 1M Devices Best Mobile Service
2
4. Mobile Device Management
Competitive Advantage
Smartphones & Tablets
BYOD
Apps
iOS
Android
Windows
Customer Experience
Compliance & Regulations
Data Security
End User Privacy
4
5. The Enterprise Mobility Dilemma
25% of tablets
The enterprise is mobile for enterprises
in 2011*
70% choose their
Employees are consumers device for work*
Devices are diverse Process lags choices Stakes are high
*Source: Forrester
5
6. Some BYOD Program Stats
Does your company support a BYOD Program?
Yes
Next 6 months
32%
Next 12 months
40%
Unsure
No; corporate only
4%
11%
How is BYOD cost reimbursed at your
13% company?
19%
Employees receive stipend
Employees submit expense
reports
56% We do not reimburse
24%
6
7. BYOD Program Stats Cont’
How are you managing employee-owned devices today?
26%
31%
Mobile device management (MDM) solution
Native email controls
No controls in place
43%
7
195 Responses
8. BYOD Program Stats Cont’
What are your biggest concerns with BYOD support?
100%
92%
90%
80%
70%
60%
50% 46%
42%
39% 40%
40%
30%
25%
20%
10%
0%
Having visibility into all Securing corporate data on Potential employee privacy Inability to blacklist Additional help desk Requests to support new
devices used for work the device issues applications support devices
8
206 Responses
10. 10 Steps to BYOD Success
1. Creating a comprehensive BYOD policy
2. Measuring your mobile footprint
3. Simplify user enrollment
4. Configure policies over the air
5. Provide self service capabilities
6. Protect personal information (PII)
7. Isolate corporate data
8. Continuously monitor automated actions
9. Manage data usage
10.Track the ROI of BYOD
10
11. Creating a Comprehensive BYOD Policy
• Who’s buying?
• Opt in/Acceptable Usage Policy
• Which devices will you support?
– What’s important?
• Carrier/manufacturer?
• Passcode?
• Encryption (device/email)?
• Email setting deployment?
• Apps?
• What are you security requirements?
– External regulations, HIPAA
– Industry vertical
• Will you leverage a MDM solution to help manage these
devices?
– In MaaS360, 27% of all devices are tagged as personal devices
– 86% of those are iOS
11
12. Measuring your Mobile Footprint
• Do you have ActiveSync enabled today?
• Do you know how many devices are connecting
today?
– No ActiveSync reporting
– PowerShell guru
– No access to look 15%
– No device level block1% ActiveSync is open (mobile devices are
automatically enabled by end-user)
3%
• Knowing will help 45%
ActiveSync is closed (admin manually
enables mobile devices)
identify who needs to Auto-quarantine is enabled in Exchange
be enrolled to the
2010
Use of a custom tool or PowerShell
program and old device 35% Script
cleaned up. We don't allow mobile devices to access
Exchange
12
13. Simplify Enrollment and Device Configuration
• Keep the enrollment simple and fast
– Simple URL
• Corporate credentials vs. passcode?
– Over the Air
– Notification when complete
• Configure the Device
– Push Email settings
– Push WiFi/VPN settings
– Require a passcode
– Set device restrictions
13
14. Provide Self Service Capabilities
• An End User Portal will help cut down on the
number of calls to your IT teams
• Allow the user to do basic items
– Lock
– Reset password
– Locate
– Wipe
• View information about compliance state
– Remediate issues
14
15. Protect Personal Information (PII)
• Personally Identifiable Information is a hot
topic as of late
– Privacy laws
– Personal safety
• Are you allowed or should you be allowed to??
– View location history Information
– Locate a personal device
– View a list of software installed for personal use
15
16. Isolate Corporate Data
• Isolating and managing corporate data is the
probably the biggest concern of allowing
personal devices to the network
– ActiveSync account
– Wireless settings
– VPN configuration
– Enterprise apps
– Documents
• Selective Wipe solves this problem
– Today we know that of all “wipes” of personal
devices in MaaS360, 86% are selective wipes
16
17. Continuous Monitoring
• It is important to monitor the state of your devices
– Are they enrolled?
– Are they compliant?
– What apps are users installing?
– Have they read the document you pushed?
• Take automated actions based on state
– Stay enrolled
– OS version control
– App compliance
– Encryption status
– Jailbreak/root detection
• Notify, Block, Selective Wipe, Full Wipe
17
18. Manage Data Usage
• Help users help themselves
– Provide an easy way for them to track and be
alerted to their current data usage
• Usage policies based on different segments
– Set roaming and in-network megabit limits
– Create threshold notifications
– Enable/disable roaming via policy
• Help them understand the benefits of using Wi-
Fi where available
• Reporting and trending
• And, of course, proactively manage any
corporate provisioned devices as well
18
19. Track the ROI of BYOD
• Calculate and present on cost differential of BYOD
program and IT’s impact on the bottom line
– Corporate-owned model:
• Device purchase cost
• The cost of a fully subsidized data plan
• The cost of recycling the device every few years
• Warranty plans
• IT time and labor managing the program
– BYOD
• The cost of a partially subsidized
data plan (if applicable)
• The cost of a management platform
• Subtract eliminated costs
• Increased productivity
19
20. 10 Steps to BYOD Success
1. Creating a comprehensive BYOD policy
2. Measuring your mobile footprint
3. Simplify user enrollment
4. Configure policies over the air
5. Provide self service capabilities
6. Protect personal information (PII)
7. Isolate corporate data
8. Continuously monitor automated actions
9. Manage data usage
10.Track the ROI of BYOD
20