SlideShare a Scribd company logo
1 of 21
BYOD: Industry Trends
   and Best Practices
           Presented by Chris Corbet
             ccorbet@fiberlink.com




  1
About Fiberlink
                                Industry Recognition
 • Founded in 1991

 • HQ in Blue Bell, PA            MDM Magic Quadrant
                               Critical Capabilities for MDM

 • Enterprise Mobility
   Management (EMM)
                              Named Innovator in Cloud MDM


 • MaaS360 Platform
                             Clear Choice Test Winner for MDM
 • 100% Cloud-Based

 • Over 1M Devices                 Best Mobile Service


                         2
BYOD TRENDS




              3
Mobile Device Management
             Competitive Advantage
                                 Smartphones & Tablets
 BYOD
                                               Apps
     iOS
     Android
     Windows
                                        Customer Experience

Compliance & Regulations
                                       Data Security
                    End User Privacy
                                4
The Enterprise Mobility Dilemma
                                                      25% of tablets
        The enterprise is mobile                      for enterprises
                                                         in 2011*


                                                      70% choose their
        Employees are consumers                       device for work*



 Devices are diverse           Process lags choices   Stakes are high




          *Source: Forrester
                                        5
Some BYOD Program Stats
Does your company support a BYOD Program?
                                      Yes

                                      Next 6 months
      32%
                                      Next 12 months
                        40%
                                      Unsure

                                      No; corporate only


      4%

            11%
                                                How is BYOD cost reimbursed at your
                  13%                                       company?


                                                             19%

                                                                            Employees receive stipend


                                                                            Employees submit expense
                                                                            reports
                                            56%                             We do not reimburse
                                                                   24%




                                            6
BYOD Program Stats Cont’
               How are you managing employee-owned devices today?




                                           26%
         31%




                                                            Mobile device management (MDM) solution
                                                            Native email controls
                                                            No controls in place




                              43%




                                          7
                                    195 Responses
BYOD Program Stats Cont’
                                   What are your biggest concerns with BYOD support?
100%
                                           92%
90%


80%


70%


60%


50%                                                                                                                          46%
                42%
                                                                       39%                                                                            40%
40%


30%
                                                                                                     25%

20%


10%


 0%
       Having visibility into all Securing corporate data on Potential employee privacy      Inability to blacklist   Additional help desk   Requests to support new
       devices used for work              the device                    issues                  applications                support                  devices



                                                                                   8
                                                                             206 Responses
MANAGING BYOD: BEST PRACTICES




               9
10 Steps to BYOD Success
 1. Creating a comprehensive BYOD policy
 2. Measuring your mobile footprint
 3. Simplify user enrollment
 4. Configure policies over the air
 5. Provide self service capabilities
 6. Protect personal information (PII)
 7. Isolate corporate data
 8. Continuously monitor automated actions
 9. Manage data usage
 10.Track the ROI of BYOD
                        10
Creating a Comprehensive BYOD Policy
 • Who’s buying?
 • Opt in/Acceptable Usage Policy
 • Which devices will you support?
    – What’s important?
       •   Carrier/manufacturer?
       •   Passcode?
       •   Encryption (device/email)?
       •   Email setting deployment?
       •   Apps?
 • What are you security requirements?
    – External regulations, HIPAA
    – Industry vertical
 • Will you leverage a MDM solution to help manage these
   devices?
    – In MaaS360, 27% of all devices are tagged as personal devices
    – 86% of those are iOS


                                        11
Measuring your Mobile Footprint
 • Do you have ActiveSync enabled today?
 • Do you know how many devices are connecting
   today?
    –   No ActiveSync reporting
    –   PowerShell guru
    –   No access to look                   15%

    –   No device level block1%                         ActiveSync is open (mobile devices are
                                                        automatically enabled by end-user)
                                  3%
 • Knowing will help                              45%
                                                        ActiveSync is closed (admin manually
                                                        enables mobile devices)


 identify who needs to                                  Auto-quarantine is enabled in Exchange


 be enrolled to the
                                                        2010



                                                        Use of a custom tool or PowerShell

 program and old device            35%                  Script




 cleaned up.                                            We don't allow mobile devices to access
                                                        Exchange




                                       12
Simplify Enrollment and Device Configuration

 • Keep the enrollment simple and fast
    – Simple URL
         • Corporate credentials vs. passcode?
    – Over the Air
    – Notification when complete
 • Configure the Device
    –   Push Email settings
    –   Push WiFi/VPN settings
    –   Require a passcode
    –   Set device restrictions



                                   13
Provide Self Service Capabilities

 • An End User Portal will help cut down on the
   number of calls to your IT teams
 • Allow the user to do basic items
    –   Lock
    –   Reset password
    –   Locate
    –   Wipe
 • View information about compliance state
    – Remediate issues




                          14
Protect Personal Information (PII)

 • Personally Identifiable Information is a hot
   topic as of late
    – Privacy laws
    – Personal safety
 • Are you allowed or should you be allowed to??
    – View location history Information
    – Locate a personal device
    – View a list of software installed for personal use




                              15
Isolate Corporate Data
 • Isolating and managing corporate data is the
   probably the biggest concern of allowing
   personal devices to the network
    –   ActiveSync account
    –   Wireless settings
    –   VPN configuration
    –   Enterprise apps
    –   Documents
 • Selective Wipe solves this problem
    – Today we know that of all “wipes” of personal
      devices in MaaS360, 86% are selective wipes

                             16
Continuous Monitoring
 • It is important to monitor the state of your devices
    –   Are they enrolled?
    –   Are they compliant?
    –   What apps are users installing?
    –   Have they read the document you pushed?
 • Take automated actions based on state
    –   Stay enrolled
    –   OS version control
    –   App compliance
    –   Encryption status
    –   Jailbreak/root detection
 • Notify, Block, Selective Wipe, Full Wipe

                                   17
Manage Data Usage
 • Help users help themselves
   – Provide an easy way for them to track and be
     alerted to their current data usage
 • Usage policies based on different segments
   – Set roaming and in-network megabit limits
   – Create threshold notifications
   – Enable/disable roaming via policy
 • Help them understand the benefits of using Wi-
   Fi where available
 • Reporting and trending
 • And, of course, proactively manage any
   corporate provisioned devices as well
                           18
Track the ROI of BYOD
• Calculate and present on cost differential of BYOD
  program and IT’s impact on the bottom line
   – Corporate-owned model:
      •   Device purchase cost
      •   The cost of a fully subsidized data plan
      •   The cost of recycling the device every few years
      •   Warranty plans
      •   IT time and labor managing the program
   – BYOD
      • The cost of a partially subsidized
      data plan (if applicable)
      • The cost of a management platform
      • Subtract eliminated costs
      • Increased productivity


                                        19
10 Steps to BYOD Success
 1. Creating a comprehensive BYOD policy
 2. Measuring your mobile footprint
 3. Simplify user enrollment
 4. Configure policies over the air
 5. Provide self service capabilities
 6. Protect personal information (PII)
 7. Isolate corporate data
 8. Continuously monitor automated actions
 9. Manage data usage
 10.Track the ROI of BYOD
                        20
Live MaaS360 Setup & Demo




                    21

More Related Content

What's hot

Harrison Group: "Devices, Consumption and the Digital Landscape"
Harrison Group: "Devices, Consumption and the Digital Landscape"Harrison Group: "Devices, Consumption and the Digital Landscape"
Harrison Group: "Devices, Consumption and the Digital Landscape"Digiday
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessChris Silva
 
How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedNalneesh Gaur
 
Retail Tech Adoption
Retail Tech AdoptionRetail Tech Adoption
Retail Tech AdoptionCompTIA
 
Apperian overview mwc2012
Apperian overview mwc2012Apperian overview mwc2012
Apperian overview mwc2012Chuck Goldman
 
Overcoming Barriers to UC Adoption-Bill Haskins of Wainhouse Research
Overcoming Barriers to UC Adoption-Bill Haskins of Wainhouse ResearchOvercoming Barriers to UC Adoption-Bill Haskins of Wainhouse Research
Overcoming Barriers to UC Adoption-Bill Haskins of Wainhouse ResearchChristina Inge
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprexKim Aarenstrup
 
Thought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMThought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMSolarWinds
 
Six steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceSix steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceInka Traktman
 
Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Ideaca
 
Mobility at a_crossroads
Mobility at a_crossroadsMobility at a_crossroads
Mobility at a_crossroadsMukesh Gupta
 
IBM Rational Solution for mobile
IBM Rational Solution for mobileIBM Rational Solution for mobile
IBM Rational Solution for mobileEric Cattoir
 
Online Video Collaboration for Manufacturing Industry - Full Report
Online Video Collaboration for Manufacturing Industry - Full ReportOnline Video Collaboration for Manufacturing Industry - Full Report
Online Video Collaboration for Manufacturing Industry - Full ReportAbhizar Bootwala
 

What's hot (17)

Enterprise Grade BYOD
Enterprise Grade BYODEnterprise Grade BYOD
Enterprise Grade BYOD
 
Harrison Group: "Devices, Consumption and the Digital Landscape"
Harrison Group: "Devices, Consumption and the Digital Landscape"Harrison Group: "Devices, Consumption and the Digital Landscape"
Harrison Group: "Devices, Consumption and the Digital Landscape"
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile Business
 
How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 branded
 
Retail Tech Adoption
Retail Tech AdoptionRetail Tech Adoption
Retail Tech Adoption
 
Case Study: Marvell
Case Study: MarvellCase Study: Marvell
Case Study: Marvell
 
Apperian overview mwc2012
Apperian overview mwc2012Apperian overview mwc2012
Apperian overview mwc2012
 
Overcoming Barriers to UC Adoption-Bill Haskins of Wainhouse Research
Overcoming Barriers to UC Adoption-Bill Haskins of Wainhouse ResearchOvercoming Barriers to UC Adoption-Bill Haskins of Wainhouse Research
Overcoming Barriers to UC Adoption-Bill Haskins of Wainhouse Research
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
Thought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMThought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDM
 
Six steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceSix steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforce
 
Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012
 
Mobility at a_crossroads
Mobility at a_crossroadsMobility at a_crossroads
Mobility at a_crossroads
 
IBM Rational Solution for mobile
IBM Rational Solution for mobileIBM Rational Solution for mobile
IBM Rational Solution for mobile
 
Online Video Collaboration for Manufacturing Industry - Full Report
Online Video Collaboration for Manufacturing Industry - Full ReportOnline Video Collaboration for Manufacturing Industry - Full Report
Online Video Collaboration for Manufacturing Industry - Full Report
 

Viewers also liked

Placing the placeless: Conversation with Rodrigo Rey Rosa
Placing the placeless: Conversation with Rodrigo Rey RosaPlacing the placeless: Conversation with Rodrigo Rey Rosa
Placing the placeless: Conversation with Rodrigo Rey RosaGuilherme Rodrigues Leite
 
How To Be a Good Youth Sports Coach
How To Be a Good Youth Sports Coach How To Be a Good Youth Sports Coach
How To Be a Good Youth Sports Coach ActiveSports
 
Succession process among africa owned business africa 3
Succession process among africa owned business africa 3Succession process among africa owned business africa 3
Succession process among africa owned business africa 3John Johari
 
Shatalsan baklavar
Shatalsan baklavarShatalsan baklavar
Shatalsan baklavarCopy Mn
 
Applied Mathematics by Dan Simpson
Applied Mathematics by Dan SimpsonApplied Mathematics by Dan Simpson
Applied Mathematics by Dan SimpsonBurning Eye
 
Spółka z o.o. eng
Spółka z o.o. engSpółka z o.o. eng
Spółka z o.o. engConsuldimo
 
This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...
This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...
This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...Burning Eye
 
Sermon Notes Creation Care - Welsh
Sermon Notes Creation Care - WelshSermon Notes Creation Care - Welsh
Sermon Notes Creation Care - WelshP4X
 
Michael ohre
Michael ohreMichael ohre
Michael ohreJbastedo2
 

Viewers also liked (17)

Placing the placeless: Conversation with Rodrigo Rey Rosa
Placing the placeless: Conversation with Rodrigo Rey RosaPlacing the placeless: Conversation with Rodrigo Rey Rosa
Placing the placeless: Conversation with Rodrigo Rey Rosa
 
Ms sql
Ms sqlMs sql
Ms sql
 
How To Be a Good Youth Sports Coach
How To Be a Good Youth Sports Coach How To Be a Good Youth Sports Coach
How To Be a Good Youth Sports Coach
 
Succession process among africa owned business africa 3
Succession process among africa owned business africa 3Succession process among africa owned business africa 3
Succession process among africa owned business africa 3
 
Ppt leuven verhaalt
Ppt leuven verhaaltPpt leuven verhaalt
Ppt leuven verhaalt
 
s1190206
s1190206s1190206
s1190206
 
Shatalsan baklavar
Shatalsan baklavarShatalsan baklavar
Shatalsan baklavar
 
Tips exam spa 2012
Tips exam spa 2012Tips exam spa 2012
Tips exam spa 2012
 
Applied Mathematics by Dan Simpson
Applied Mathematics by Dan SimpsonApplied Mathematics by Dan Simpson
Applied Mathematics by Dan Simpson
 
Spółka z o.o. eng
Spółka z o.o. engSpółka z o.o. eng
Spółka z o.o. eng
 
This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...
This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...
This Is A Poem b/w A Violation Of Expectation by Mairi Campbell Jack SAMPLE P...
 
Webcasting
WebcastingWebcasting
Webcasting
 
David Guetta
David GuettaDavid Guetta
David Guetta
 
Case study-Markigence
Case study-MarkigenceCase study-Markigence
Case study-Markigence
 
Sermon Notes Creation Care - Welsh
Sermon Notes Creation Care - WelshSermon Notes Creation Care - Welsh
Sermon Notes Creation Care - Welsh
 
Michael ohre
Michael ohreMichael ohre
Michael ohre
 
Diplomas 1
Diplomas 1Diplomas 1
Diplomas 1
 

Similar to BYOD Industry Trends and Best Practices - Philly Tech Week

Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise MobilityCompTIA
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondCompTIA
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationJay McBain
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012StalwartAcademy
 
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsThe Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsJay McBain
 
Enterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the EnterpriseEnterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the Enterprise[x]cube LABS
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012nerb13
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare3GDR
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloudKamesh Pemmaraju
 
IBM BP Kickoff 2013 - Jan Horsager, IDC
IBM BP Kickoff 2013 - Jan Horsager, IDCIBM BP Kickoff 2013 - Jan Horsager, IDC
IBM BP Kickoff 2013 - Jan Horsager, IDCIBM Danmark
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Thomas Roider
 
Innovating and enabling digital futures 12-07-2011
Innovating and enabling digital futures   12-07-2011Innovating and enabling digital futures   12-07-2011
Innovating and enabling digital futures 12-07-2011Jude Umeh
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsPrime Infoserv
 
Enterprise Mobility
Enterprise MobilityEnterprise Mobility
Enterprise MobilityYagmur Anish
 
Mobile Apps for Enterprises by Pozitron
Mobile Apps for Enterprises by PozitronMobile Apps for Enterprises by Pozitron
Mobile Apps for Enterprises by PozitronArabNet ME
 

Similar to BYOD Industry Trends and Best Practices - Philly Tech Week (20)

Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
BYOD
BYODBYOD
BYOD
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
 
BYOD Security Risks for Business
BYOD Security Risks for BusinessBYOD Security Risks for Business
BYOD Security Risks for Business
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and Consumerization
 
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
 
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsThe Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
 
Enterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the EnterpriseEnterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the Enterprise
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloud
 
IBM BP Kickoff 2013 - Jan Horsager, IDC
IBM BP Kickoff 2013 - Jan Horsager, IDCIBM BP Kickoff 2013 - Jan Horsager, IDC
IBM BP Kickoff 2013 - Jan Horsager, IDC
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
 
Innovating and enabling digital futures 12-07-2011
Innovating and enabling digital futures   12-07-2011Innovating and enabling digital futures   12-07-2011
Innovating and enabling digital futures 12-07-2011
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Enterprise Mobility
Enterprise MobilityEnterprise Mobility
Enterprise Mobility
 
Mobile Apps for Enterprises by Pozitron
Mobile Apps for Enterprises by PozitronMobile Apps for Enterprises by Pozitron
Mobile Apps for Enterprises by Pozitron
 

More from The Judge Group

Stop Letting Platforms Define your User
Stop Letting Platforms Define your UserStop Letting Platforms Define your User
Stop Letting Platforms Define your UserThe Judge Group
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014The Judge Group
 
Mobile Insights for 2014 J.Boye13 - Aarhus
Mobile Insights for 2014 J.Boye13 - AarhusMobile Insights for 2014 J.Boye13 - Aarhus
Mobile Insights for 2014 J.Boye13 - AarhusThe Judge Group
 
Making PA a Mobile Government Leader
Making PA a Mobile Government LeaderMaking PA a Mobile Government Leader
Making PA a Mobile Government LeaderThe Judge Group
 
Enterprise Mobility - CXO Talk
Enterprise Mobility - CXO TalkEnterprise Mobility - CXO Talk
Enterprise Mobility - CXO TalkThe Judge Group
 
Creating a Case for Mobility - Philly Tech Week
Creating a Case for Mobility - Philly Tech WeekCreating a Case for Mobility - Philly Tech Week
Creating a Case for Mobility - Philly Tech WeekThe Judge Group
 

More from The Judge Group (7)

Stop Letting Platforms Define your User
Stop Letting Platforms Define your UserStop Letting Platforms Define your User
Stop Letting Platforms Define your User
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014
 
Mobile Insights for 2014 J.Boye13 - Aarhus
Mobile Insights for 2014 J.Boye13 - AarhusMobile Insights for 2014 J.Boye13 - Aarhus
Mobile Insights for 2014 J.Boye13 - Aarhus
 
Making PA a Mobile Government Leader
Making PA a Mobile Government LeaderMaking PA a Mobile Government Leader
Making PA a Mobile Government Leader
 
Enterprise Mobility - CXO Talk
Enterprise Mobility - CXO TalkEnterprise Mobility - CXO Talk
Enterprise Mobility - CXO Talk
 
Mobile in 2015
Mobile in 2015Mobile in 2015
Mobile in 2015
 
Creating a Case for Mobility - Philly Tech Week
Creating a Case for Mobility - Philly Tech WeekCreating a Case for Mobility - Philly Tech Week
Creating a Case for Mobility - Philly Tech Week
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

BYOD Industry Trends and Best Practices - Philly Tech Week

  • 1. BYOD: Industry Trends and Best Practices Presented by Chris Corbet ccorbet@fiberlink.com 1
  • 2. About Fiberlink Industry Recognition • Founded in 1991 • HQ in Blue Bell, PA MDM Magic Quadrant Critical Capabilities for MDM • Enterprise Mobility Management (EMM) Named Innovator in Cloud MDM • MaaS360 Platform Clear Choice Test Winner for MDM • 100% Cloud-Based • Over 1M Devices Best Mobile Service 2
  • 4. Mobile Device Management Competitive Advantage Smartphones & Tablets BYOD Apps iOS Android Windows Customer Experience Compliance & Regulations Data Security End User Privacy 4
  • 5. The Enterprise Mobility Dilemma 25% of tablets The enterprise is mobile for enterprises in 2011* 70% choose their Employees are consumers device for work* Devices are diverse Process lags choices Stakes are high *Source: Forrester 5
  • 6. Some BYOD Program Stats Does your company support a BYOD Program? Yes Next 6 months 32% Next 12 months 40% Unsure No; corporate only 4% 11% How is BYOD cost reimbursed at your 13% company? 19% Employees receive stipend Employees submit expense reports 56% We do not reimburse 24% 6
  • 7. BYOD Program Stats Cont’ How are you managing employee-owned devices today? 26% 31% Mobile device management (MDM) solution Native email controls No controls in place 43% 7 195 Responses
  • 8. BYOD Program Stats Cont’ What are your biggest concerns with BYOD support? 100% 92% 90% 80% 70% 60% 50% 46% 42% 39% 40% 40% 30% 25% 20% 10% 0% Having visibility into all Securing corporate data on Potential employee privacy Inability to blacklist Additional help desk Requests to support new devices used for work the device issues applications support devices 8 206 Responses
  • 9. MANAGING BYOD: BEST PRACTICES 9
  • 10. 10 Steps to BYOD Success 1. Creating a comprehensive BYOD policy 2. Measuring your mobile footprint 3. Simplify user enrollment 4. Configure policies over the air 5. Provide self service capabilities 6. Protect personal information (PII) 7. Isolate corporate data 8. Continuously monitor automated actions 9. Manage data usage 10.Track the ROI of BYOD 10
  • 11. Creating a Comprehensive BYOD Policy • Who’s buying? • Opt in/Acceptable Usage Policy • Which devices will you support? – What’s important? • Carrier/manufacturer? • Passcode? • Encryption (device/email)? • Email setting deployment? • Apps? • What are you security requirements? – External regulations, HIPAA – Industry vertical • Will you leverage a MDM solution to help manage these devices? – In MaaS360, 27% of all devices are tagged as personal devices – 86% of those are iOS 11
  • 12. Measuring your Mobile Footprint • Do you have ActiveSync enabled today? • Do you know how many devices are connecting today? – No ActiveSync reporting – PowerShell guru – No access to look 15% – No device level block1% ActiveSync is open (mobile devices are automatically enabled by end-user) 3% • Knowing will help 45% ActiveSync is closed (admin manually enables mobile devices) identify who needs to Auto-quarantine is enabled in Exchange be enrolled to the 2010 Use of a custom tool or PowerShell program and old device 35% Script cleaned up. We don't allow mobile devices to access Exchange 12
  • 13. Simplify Enrollment and Device Configuration • Keep the enrollment simple and fast – Simple URL • Corporate credentials vs. passcode? – Over the Air – Notification when complete • Configure the Device – Push Email settings – Push WiFi/VPN settings – Require a passcode – Set device restrictions 13
  • 14. Provide Self Service Capabilities • An End User Portal will help cut down on the number of calls to your IT teams • Allow the user to do basic items – Lock – Reset password – Locate – Wipe • View information about compliance state – Remediate issues 14
  • 15. Protect Personal Information (PII) • Personally Identifiable Information is a hot topic as of late – Privacy laws – Personal safety • Are you allowed or should you be allowed to?? – View location history Information – Locate a personal device – View a list of software installed for personal use 15
  • 16. Isolate Corporate Data • Isolating and managing corporate data is the probably the biggest concern of allowing personal devices to the network – ActiveSync account – Wireless settings – VPN configuration – Enterprise apps – Documents • Selective Wipe solves this problem – Today we know that of all “wipes” of personal devices in MaaS360, 86% are selective wipes 16
  • 17. Continuous Monitoring • It is important to monitor the state of your devices – Are they enrolled? – Are they compliant? – What apps are users installing? – Have they read the document you pushed? • Take automated actions based on state – Stay enrolled – OS version control – App compliance – Encryption status – Jailbreak/root detection • Notify, Block, Selective Wipe, Full Wipe 17
  • 18. Manage Data Usage • Help users help themselves – Provide an easy way for them to track and be alerted to their current data usage • Usage policies based on different segments – Set roaming and in-network megabit limits – Create threshold notifications – Enable/disable roaming via policy • Help them understand the benefits of using Wi- Fi where available • Reporting and trending • And, of course, proactively manage any corporate provisioned devices as well 18
  • 19. Track the ROI of BYOD • Calculate and present on cost differential of BYOD program and IT’s impact on the bottom line – Corporate-owned model: • Device purchase cost • The cost of a fully subsidized data plan • The cost of recycling the device every few years • Warranty plans • IT time and labor managing the program – BYOD • The cost of a partially subsidized data plan (if applicable) • The cost of a management platform • Subtract eliminated costs • Increased productivity 19
  • 20. 10 Steps to BYOD Success 1. Creating a comprehensive BYOD policy 2. Measuring your mobile footprint 3. Simplify user enrollment 4. Configure policies over the air 5. Provide self service capabilities 6. Protect personal information (PII) 7. Isolate corporate data 8. Continuously monitor automated actions 9. Manage data usage 10.Track the ROI of BYOD 20
  • 21. Live MaaS360 Setup & Demo 21