5 Essential Tips for Creating an
Effective BYOD Policy
Nov 5, 2013
Speaker Introductions
Steve Brasen,
Managing Research Director
Enterprise Management Associates (EMA)

Jonathan Foulkes
VP...
Agenda
• Empowering a Mobile Workforce

• Key Concepts in BYOD
• 5 Essential BYOD Tips
• #1 Securing Business Data
• #2 Is...
Empowering a Mobile Workforce

• The Value of Workforce Mobility

• Increased Productivity

• Enhanced Business Agility

•...
Empowering a Mobile Workforce

• Enterprise IT requirements are expanding to support workforce
mobility
• End users are de...
Empowering a Mobile Workforce

• The Two Faces of Mobility
• Provide access to business resources

from any location


Of...
Key Concepts is BYOD

• The majority of devices used for business purposes
are employee owned…

Slide 7

© 2013 Enterprise...
Key Concepts is BYOD

• Regardless of the owner, the majority of mobile devices
are employed for both business and persona...
Key Concepts is BYOD

• Bring Your Own Device (BYOD) practices enable the secure
delivery of business applications, data, ...
#1 Securing Business Data

© 2013 Enterprise Management Associates, Inc.
#1 Securing Business Data

• Workforce mobility Increases
business risks
• Increased opportunities for data loss


Physic...
#1 Securing Business Data

• High-risk data-sharing practices by industry…

Slide 12

© 2013 Enterprise Management Associa...
#1 Securing Business Data
• Enhanced Security
• Data Loss Protection


Lock & wipe
 Should affect only business apps
and...
#2 Isolating Business Resources from
Users’ Personal Resources

© 2013 Enterprise Management Associates, Inc.
#2 Isolating Business Resources from Users’
Personal Resources
• Business IT resources must be managed separate from users...
#2 Isolating Business Resources from Users’
Personal Resources
• Containerization isolates and secures business resources ...
#3 Establishing User-Focused
Processes

© 2013 Enterprise Management Associates, Inc.
#3 Establishing User-Focused Processes
• User access to business resources must be:
•
•
•
•
•

Consistent
Intuitive
Fast
E...
#3 Establishing User-Focused Processes

• Flexibility
• Each organization has a

unique set of requirements for:


Securi...
#3 Establishing User-Focused Processes

• Enable user self-service
• Provide user portals for accessing data, apps

and se...
#4 Reducing the Costs of Enterprise
Mobility

© 2013 Enterprise Management Associates, Inc.
#4 Reducing the Costs of Enterprise Mobility

• Direct costs associated with
supporting workforce mobility:
• Infrastructu...
#4 Reducing the Costs of Enterprise Mobility
• Centralized management simplifies administrative efforts
• “Single pane of ...
#5 Achieving Business Value

© 2013 Enterprise Management Associates, Inc.
#5 Achieving Business Value
• Supporting BYOD empowers end users with the freedom to
perform business tasks on any device ...
#5 Achieving Business Value
• Reducing mundane management efforts frees-up administrators
to perform business-focused task...
Conclusions
• Rather than focusing on physical devices
or individual operating systems, a
centralized management solution ...
Poll Question
Please indicate your BYOD interest:
1. Support BYOD, but looking for better alternatives
2. Do not support B...
Kaseya and BYOD
•Embracing containers
•Delivering security
•BYOD friendly model
•Providing easy deployments
•Reduced mobil...
Kaseya BYOD Suite

Browser

30

Docs

Mail
31
Sneak Peek
An ideal solution for BYOD
• Access vital business information located behind the
corporate firewall
- With or without VPN...
Who Are We?
Industry standard for IT
automation solutions & services
Our solutions empower people to
proactively manage an...
Key Facts
• Founded in 2000

• Over 10,000 customers with presence in over 20 countries
• Offered as SaaS or on-premise
• ...
It Has Been an Exciting Year!
• Gartner Magic Quadrant 2013 –
Visionary

• New management and backing from
Insight Venture...
Why Kaseya?
A single Kaseya user can proactively
manage

1,000s

of

automated

IT

systems tasks in the same amount of
ti...
www.kaseya.com
Unified Management
Discover the
State of IT
•
•
•
•

Manage the
State of IT

Systems
Assets
Mobile Devices
Network Devices...
Q&A & Final Thoughts

Contact us:
1 (877) 926-0001
alexbrandt@kaseya.com

Learn more:
www.kaseya.com

* Complete the poll ...
Upcoming SlideShare
Loading in …5
×

5 Essential Tips for Creating An Effective BYOD Policy

996 views

Published on

Bring Your Own Device (BYOD) policies are a critical component of leading companies’ IT offerings today, giving employees the freedom and satisfaction of working on the devices that they prefer. Organizations implementing BYOD require a means of ensuring corporate control and security of enterprise data and applications, without controlling users’ personal use of devices or the personal data on them.

Join this highly informative webinar where Research Director, Steve Brasen of analyst firm Enterprise Management Associates (EMA), and Mobility expert Jonathan Foulkes of Kaseya will share their experience and knowledge on how you find the balance between employee freedom and corporate security and the key elements that can help organizations achieve the right BYOD strategy.

Attend this webinar, and you’ll walk away with essential tips in the following areas:

1. Keeping corporate data secure in a BYOD model
2. Drawing the line between managing the data and the device
3. How your policy choices affect user productivity and acceptance of BYOD
4. How to reduce the effort and cost of BYOD management
5. Creating business value through BYOD

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
996
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

5 Essential Tips for Creating An Effective BYOD Policy

  1. 1. 5 Essential Tips for Creating an Effective BYOD Policy Nov 5, 2013
  2. 2. Speaker Introductions Steve Brasen, Managing Research Director Enterprise Management Associates (EMA) Jonathan Foulkes VP Mobile Product Management Kaseya Alex Brandt Vice President, Americas Kaseya
  3. 3. Agenda • Empowering a Mobile Workforce • Key Concepts in BYOD • 5 Essential BYOD Tips • #1 Securing Business Data • #2 Isolating Business Resources from users’ Personal Resources • #3 Establishing User-Focused Policies • #4 Reducing the Costs of Enterprise Mobility • #5 Achieving Business Value • Conclusions Slide 3 © 2013 Enterprise Management Associates, Inc.
  4. 4. Empowering a Mobile Workforce • The Value of Workforce Mobility • Increased Productivity • Enhanced Business Agility • Improved Employee Satisfaction Slide 4 © 2013 Enterprise Management Associates, Inc.
  5. 5. Empowering a Mobile Workforce • Enterprise IT requirements are expanding to support workforce mobility • End users are demanding unprecedented access to business resources: • Applications • Data • Services Slide 5 © 2013 Enterprise Management Associates, Inc.
  6. 6. Empowering a Mobile Workforce • The Two Faces of Mobility • Provide access to business resources from any location  Office, home, remote  Supports device portability • Provide access to business resources from any device or OS   Slide 6 iOS, Android, BlackBerry, Windows Supports app and data portability © 2013 Enterprise Management Associates, Inc.
  7. 7. Key Concepts is BYOD • The majority of devices used for business purposes are employee owned… Slide 7 © 2013 Enterprise Management Associates, Inc.
  8. 8. Key Concepts is BYOD • Regardless of the owner, the majority of mobile devices are employed for both business and personal tasks 9.28% Used only for business tasks 90.72% Slide 8 Used for both business and personal tasks © 2013 Enterprise Management Associates, Inc.
  9. 9. Key Concepts is BYOD • Bring Your Own Device (BYOD) practices enable the secure delivery of business applications, data, and services to mobile endpoints without restricting users’ personal use of the devices • Business IT resources must be  easily accessible  always available  high performing  cost-effective  able to meet business and regulatory compliance requirements Slide 9 © 2013 Enterprise Management Associates, Inc.
  10. 10. #1 Securing Business Data © 2013 Enterprise Management Associates, Inc.
  11. 11. #1 Securing Business Data • Workforce mobility Increases business risks • Increased opportunities for data loss  Physical device loss  Terminated users  Unsecured data sharing practices  Open access to business IT resources • Other security concerns  Viruses / malware  Rooting / jailbreaking • All business data needs to be secured at the source, in transit, and on the endpoint Slide 11 © 2013 Enterprise Management Associates, Inc.
  12. 12. #1 Securing Business Data • High-risk data-sharing practices by industry… Slide 12 © 2013 Enterprise Management Associates, Inc.
  13. 13. #1 Securing Business Data • Enhanced Security • Data Loss Protection  Lock & wipe  Should affect only business apps and data  Enable secure data sharing  Restrict access to unsecure data sharing  Email, messaging, Dropbox, USB drives, etc.  Data encryption • Application Protection  White / Black listing • Authentication  Password management  VPN access  Other communication methods • Rooting & Jailbreaking Detection Slide 13 © 2013 Enterprise Management Associates, Inc.
  14. 14. #2 Isolating Business Resources from Users’ Personal Resources © 2013 Enterprise Management Associates, Inc.
  15. 15. #2 Isolating Business Resources from Users’ Personal Resources • Business IT resources must be managed separate from users’ personal resources • These include: • Apps • Data • Web access • Email • Database access • Remote business access Slide 15 © 2013 Enterprise Management Associates, Inc.
  16. 16. #2 Isolating Business Resources from Users’ Personal Resources • Containerization isolates and secures business resources while enabling centralized management Music Isolated Business IT Resources • • • Data Apps Services Secure Access & Delivery Enterprise AppStore Static Apps Virtual Apps Web Apps Enterprise IT Resources Centralized Data Repository Remote User Devices Business Services Android BlackBerry iOS Windows Phone/RT/Pro Slide 16 Email Messaging Databases Remote Access © 2013 Enterprise Management Associates, Inc.
  17. 17. #3 Establishing User-Focused Processes © 2013 Enterprise Management Associates, Inc.
  18. 18. #3 Establishing User-Focused Processes • User access to business resources must be: • • • • • Consistent Intuitive Fast Easy Non-impactful to other device uses • Frustrated users are unhappy users • Likely to complain about the service • Experience significant performance impacts • Reflects badly on IT operations and the business • Users should not have to “jump through hoops” to do their job Slide 18 © 2013 Enterprise Management Associates, Inc.
  19. 19. #3 Establishing User-Focused Processes • Flexibility • Each organization has a unique set of requirements for:  Security & compliance  Supported devices  IT resources to be made available  User roles and tasks • There is no “one size fits all” management process   Slide 19 Endpoint management solutions must be flexible enough to support any set of enterprise requirements All endpoint support services must by eminently customizable to meet individual user needs © 2013 Enterprise Management Associates, Inc.
  20. 20. #3 Establishing User-Focused Processes • Enable user self-service • Provide user portals for accessing data, apps and services   Include integrated authorization process Enable user-initiated service requests • Enterprise application store  Single point for accessing all business applications  Application downloads  Commercial application  Proprietary application  Application virtualization  Approved web applications Slide 20 © 2013 Enterprise Management Associates, Inc.
  21. 21. #4 Reducing the Costs of Enterprise Mobility © 2013 Enterprise Management Associates, Inc.
  22. 22. #4 Reducing the Costs of Enterprise Mobility • Direct costs associated with supporting workforce mobility: • Infrastructure costs • Implementation costs • Software licenses • Indirect costs associated with supporting workforce mobility • Administrator time and effort  Increased environment complexity • Compliance attainment Slide 22 © 2013 Enterprise Management Associates, Inc.
  23. 23. #4 Reducing the Costs of Enterprise Mobility • Centralized management simplifies administrative efforts • “Single pane of glass” for monitoring and managing all mobile endpoints • Allows processes to be standardized  Enables role-based grouping • Consolidated asset tracking – single data repository  Physical devices  Applications  Licenses • Unified reporting  Enabling holistic views across all endpoints  Simplifies event correlation and root cause analysis  Slide 23 Supports compliance auditing and on-going status identification © 2013 Enterprise Management Associates, Inc.
  24. 24. #5 Achieving Business Value © 2013 Enterprise Management Associates, Inc.
  25. 25. #5 Achieving Business Value • Supporting BYOD empowers end users with the freedom to perform business tasks on any device they choose and in any way they wish to perform them without compromising enterprise requirements • This allows the workforce to focus principally on the performance of their job requirement rather than on the manipulation of the technology, resulting in: • Increased productivity • Enhanced business agility • Improved employee satisfaction Slide 25 © 2013 Enterprise Management Associates, Inc.
  26. 26. #5 Achieving Business Value • Reducing mundane management efforts frees-up administrators to perform business-focused tasks, such as: • Introduce new IT services • Proactively prevent service disruptions • Improve IT service delivery • Enhance user experiences • Achieve business goals • Reduce costs • Increase the profitability of the business Slide 26 © 2013 Enterprise Management Associates, Inc.
  27. 27. Conclusions • Rather than focusing on physical devices or individual operating systems, a centralized management solution should be implemented to “serve-up” application and data resources consistently to all endpoints • Containerization offers a secure and reliable method for isolating business resources to ensure they meet business requirements without impacting user productivity or satisfaction • With a user-centric approach to workforce mobility, users are liberated to securely access essential IT resources on any device they choose so they can focus on the more critical tasks of achieving enterprise goals Slide 27 © 2013 Enterprise Management Associates, Inc.
  28. 28. Poll Question Please indicate your BYOD interest: 1. Support BYOD, but looking for better alternatives 2. Do not support BYOD yet, interested in learning how to 3. No mobile solution yet, interested in a unified solution
  29. 29. Kaseya and BYOD •Embracing containers •Delivering security •BYOD friendly model •Providing easy deployments •Reduced mobility costs
  30. 30. Kaseya BYOD Suite Browser 30 Docs Mail
  31. 31. 31
  32. 32. Sneak Peek
  33. 33. An ideal solution for BYOD • Access vital business information located behind the corporate firewall - With or without VPN - With or without MDM • Secure containers for browsing , email and doc editing - Tunnel to intranet apps, internet or network files and folders - Email / PIM - Create, view, edit, store documents • On-premise gateway for integration and security • Private communications channel 33
  34. 34. Who Are We? Industry standard for IT automation solutions & services Our solutions empower people to proactively manage and control IT assets remotely, easily and efficiently from one integrated Web-based platform
  35. 35. Key Facts • Founded in 2000 • Over 10,000 customers with presence in over 20 countries • Offered as SaaS or on-premise • Enterprises and Service Providers • Serving customers across many industries: government, military, healthcare, finance, education, retail and others. The Netherlands Washington British Isles Germany UK France Virginia California Florida China India Singapore . South Africa Australia
  36. 36. It Has Been an Exciting Year! • Gartner Magic Quadrant 2013 – Visionary • New management and backing from Insight Venture Partners
  37. 37. Why Kaseya? A single Kaseya user can proactively manage 1,000s of automated IT systems tasks in the same amount of time required by a team of technicians using other techniques.
  38. 38. www.kaseya.com
  39. 39. Unified Management Discover the State of IT • • • • Manage the State of IT Systems Assets Mobile Devices Network Devices • Scheduling • Procedures • API/Messaging IT Configuration Management • • • Remote Management Software Deployment Power Management • • • Image Deployment Desktop Migration Mobile Device Management Asset Management • Network Discover & AD • Hardware/Software AntiVirus AntiMalware • Reporting • Dashboards • Interactive Data Views Business Continuity • • Image Backup Image Virtualization • File & Folder Backup • • Policy Compliance Time Tracking • • Agent-less Monitoring Log Monitoring Service Delivery • • Asset Management Virtual Machine Management Security • • Automate the State of IT • • • Service Desk/Ticketing Policy Management Service Billing Systems Monitoring • • Patch Management Software Updates • • • Systems Checks & Alerts Agent Monitoring Enterprise Monitoring www.kaseya.com
  40. 40. Q&A & Final Thoughts Contact us: 1 (877) 926-0001 alexbrandt@kaseya.com Learn more: www.kaseya.com * Complete the poll in the right window *

×