Successfully reported this slideshow.

Best Practices for Implementing a Bring Your Own Device (BYOD) Program

1,910 views

Published on

Everyone is talking about Bring Your Own Device (BYOD). This webinar explores how enterprises can embrace BYOD with the confidence offered by mobile device management solutions.

Learn more: http://trials.maas360.com/forms/register_service_m.php?id=320&A=SM_slideshare&O=RP

Published in: Technology
  • Be the first to comment

Best Practices for Implementing a Bring Your Own Device (BYOD) Program

  1. 1. Best Practices for Implementing a BringYour Own Device (BYOD) Program Presented by Val Hetrick 1
  2. 2. Tweet about today’s webinar!@MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in the chat window to tweet about today’s webinar @MaaS360
  3. 3. 10 Steps to BYOD Success 1. Creating a comprehensive BYOD policy 2. Measuring your mobile footprint 3. Simplify user enrollment 4. Configure policies over the air 5. Provide self service capabilities 6. Protect personal information (PII) 7. Isolate corporate data 8. Continuously monitor automated actions 9. Manage data usage 10.Track the ROI of BYOD 3
  4. 4. Poll Question • Does your organization have a BYOD policy? – Yes – No – In progress 4
  5. 5. Some BYOD Program StatsDoes your company support a BYOD Program? Yes 32% 40% Next 6 months Next 12 months Unsure 4% No; corporate only 11% 13% If you have a BYOD plan in place, do you reimburse your employees for data usage cost? 28% Yes No 72% 5
  6. 6. Poll Question • How are BYOD costs reimbursed at your company? – Employees receive stipend – Employees submit expense reports – We do not reimburse 6
  7. 7. What are users saying about BYOD? 7
  8. 8. What are users saying about BYOD? 8
  9. 9. Poll Question • How are you managing employee-owned devices today? – Mobile device management (MDM) solution – Native email platform controls – No controls in place 9
  10. 10. Creating a Comprehensive BYOD Policy • Who’s buying? • Opt in/Acceptable Usage Policy • Which devices will you support? – What’s important? • Carrier/manufacturer? • Passcode? • Encryption (device/email)? • Email setting deployment? • Apps? • What are you security requirements? – External regulations, HIPAA – Industry vertical • Will you leverage a MDM solution to help manage these devices? – In MaaS360, 22% of all devices are tagged as personal devices – 86% of those are iOS 10
  11. 11. Poll Question • What are your biggest concerns with BYOD support? (Select all that apply) – Having visibility into all devices used for work – Securing corporate data on the device – Potential employee privacy issues – Inability to blacklist applications – Additional helpdesk support – Requests to support new device 11
  12. 12. Measuring your Mobile Footprint • Do you have ActiveSync enabled today? • Do you know how many devices are connecting today? – No ActiveSync reporting – PowerShell guru – No access to look 15% – No device level block1% ActiveSync is open (mobile devices are automatically enabled by end-user) 3% • Knowing will help 45% ActiveSync is closed (admin manually enables mobile devices) identify who needs to Auto-quarantine is enabled in Exchange be enrolled to the 2010 Use of a custom tool or PowerShell program and old device 35% Script cleaned up. We dont allow mobile devices to access Exchange 12
  13. 13. Simplify Enrollment and Configure the Device • Keep the enrollment simple and fast – Simple URL • Corporate credentials vs. passcode? – Over the Air – Notification when complete • Configure the Device – Push ActiveSync settings – Require a passcode – Set device restrictions 13
  14. 14. Provide Self Service Capabilities • An End User Portal will help cut down on the number of calls to your IT teams • Allow the user to do basic items – Lock – Reset password – Locate – Wipe • View information about compliance state – Remediate issues 14
  15. 15. Protect Personal Information (PII) • Personally Identifiable Information is a hot topic as of late – Privacy laws – Personal safety • Are you allowed or should you be allowed to?? – View location history Information – Locate a personal device – View a list of software installed for personal use 15
  16. 16. Isolate Corporate Data • Isolating and managing corporate data is the probably the biggest concern of allowing personal devices to the network – ActiveSync account – Wireless settings – VPN configuration – Enterprise apps – Documents • Selective Wipe solves this problem – Today we know that of all “wipes” of personal devices in MaaS360, 86% are selective wipes 16
  17. 17. Continuous Monitoring • It is important to monitor the state of your devices – Are they enrolled? – Are they compliant? – What apps are users installing? – Have they read the document you pushed? • Take automated actions based on state – Stay enrolled – Version control – App compliance – Encryption status – Jailbreak/root detection • Notify, Block, Selective Wipe, Full Wipe 17
  18. 18. Manage Data Usage • Help users help themselves – Provide an easy way for them to track and be alerted to their current data usage • Usage policies based on different segments – Set roaming and in-network megabit limits – Create threshold notifications – Enable/disable roaming via policy • Help them understand the benefits of using Wi- Fi where available • Reporting and trending • And, of course, proactively manage any corporate provisioned devices as well 18
  19. 19. Track the ROI of BYOD• Calculate and present on cost differential of BYOD program and IT’s impact on the bottom line – Corporate-owned model: • Device purchase cost • The cost of a fully subsidized data plan • The cost of recycling the device every few years • Warranty plans • IT time and labor managing the program – BYOD • The cost of a partially subsidized data plan (if applicable) • The cost of a management platform • Subtract eliminated costs • Increased productivity 19
  20. 20. Let’s continue the conversation!@MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in the chat window to tweet about today’s webinar @MaaS360
  21. 21. 2012 Global Mobile Award “Best Enterprise Mobile Service” Judged on introducing the most Who we beat: innovative mobile tools to help • MobileIron corporate users work smarter • Good Technology and do business better on • Virtela Technology the move. Other Category Winners 21
  22. 22. Questions or follow-up?Wrap-up vhetrick@fiberlink.com jpappano@fiberlink.com• Upcoming Webinars (http://maasters.maas360.com/webinars) – April 12 – Ten Mysteries of Android• Past Webinars (http://links.maas360.com/webinars) – The new iPad Goes to Work – Best Practices for Testing Mobile Applications – What’s New in Ice Cream Sandwich• Plus lots of How-To content on our website – Mobile Device Management Best Practices • http://links.maas360.com/mdm – Mobile Device Management Glossary • http://links.maas360.com/mdm_glossary• The Q&A Continues… – Got more questions? Find us after the webinar on the MaaSters Center! • http://links.maas360.com/todaysWebinar 22
  23. 23. Q&A 23

×