Six Steps to a Solid Mobility Policy
in 2014
Richard Absalom and David Lingenfelter
Today’s agenda
1.
2.
3.
4.
5.
6.
7.
8.

Introduction: what mobile can do for you
Step 1: Security
Step 2: Employee privacy...
Ovum overview
• Leading independent global IT & Telecoms Research &
Analysis firm
• 150 analysts covering a broad set of t...
Fiberlink overview

2013 and 2012 Magic Quadrant Leader
for Mobile Device Management

• 10 Years in Enterprise Mobility
Ma...
Poll question
How would you classify your organization’s
posture on mobility at this time?
A. Struggling with mobile pract...
Introduction
What mobile can do for you

#MobilityPolicy14

6
Mobile working has obvious benefits
• Increased flexibility
• Increased productivity
• Increased engagement
• Every policy...
A mobility policy doesn’t just mean
formalizing BYOD…
• … But it does need to address the drivers of this behavior
56.8%
o...
Industry needs
• Retail, medical, education and finance
– FINRA
– HIPAA

• Mobile and cloud are driving change
• Informati...
Step 1: Security
Maintaining control of corporate data

#MobilityPolicy14

10
Mobile – a CIO’s security nightmare?
• Data is always at risk at three
points: the network, the
application and the device...
Confusion of security solutions
• What can I use to secure corporate data
on mobile devices?
–
–
–
–
–
–
–

MDM?
MAM?
NAC?...
Protection shifts
• System protection then, data
protection now
• Data access and security
– Workstations
– Laptops
– Mobi...
Poll question
What percentage of employees in your
organization use laptops, smartphones and tablets
for work?
A.
B.
C.
D....
Poll question
What technologies are you using in your mobile
strategy (select all that apply)?
A.
B.
C.
D.
E.
F.
G.
H.
#Mo...
Step 2: Employee privacy
Balancing security with data privacy rights

#MobilityPolicy14

16
Organizations face a legal conundrum
 Data being accessed on a
personal device needs to be
secured. If it is lost, the
or...
Approach on a geographic and vertical basis
 There are numerous
similarities, but data privacy
legislation differs from
c...
What businesses can and cannot do
 Different businesses, different
locations, different concerns

Business
Type

 Exampl...
Step 3: Eligibility
Giving the right access to the right people

#MobilityPolicy14

20
BYOD across all areas of business…

Source Ovum: Global BYOD Survey 2013 : N2012 = 4038, N2013 = 4371

#MobilityPolicy14

...
A mobile policy that applies to everyone
 Are different policies and rules
required for different employees
or department...
One size doesn’t fit all

#MobilityPolicy14

23
Step 4: Acceptable usage policy
Setting standards and dealing with policy violations

#MobilityPolicy14

24
Drawing the lines around acceptable use
 Striking a balance between
freedom to work in preferred
manner and the need to s...
Multiple policies

#MobilityPolicy14

26
Step 5: Technical support
Understanding who is responsible for what

#MobilityPolicy14

27
Understanding responsibilities in a BYOD scenario
 Who is responsible for technical support:
the IT desk or the individua...
Whose responsibility is it?

#MobilityPolicy14

29
Step 6: Reimbursement and TCO
Understanding the impact on the bottom line

#MobilityPolicy14

30
A realistic view on cost to go mobile
 What is the cost of the required
technical support and management,
including any t...
Research & Analysis
• Bring Your Own Device (BYOD) implementation
– Increase productivity - 37 minutes/week (global averag...
For more information

Follow-up:
richard.absalom@ovum.com
dlingenfelter@fiberlink.com

Make informed business and technolo...
Upcoming SlideShare
Loading in …5
×

Six Steps to a Solid Mobility Policy featuring Ovum

460 views

Published on

In Part 1, we shared key trends to watch and consider as you build your mobile plan for 2014. In this presentation, we'll take a deeper dive to help you develop your company's mobile policy to fully embrace the BYOD trend, enable employees to be productive on any device they choose, and keep corporate data secure.

Ovum analyst, Richard Absalom, outlines Ovum's 6 recommended areas to consider when building a mobility policy:

- Security: Safeguarding corporate-sensitive data
- Employee privacy: Defining clear boundaries between monitoring corporate and personal usage
- Eligibility: Identifying which employees are suitable for your policy
- Acceptable use and dealing with policy violations: Educating users to comply with policy regulations
- Technical support: Determining responsibility for dealing with device malfunctions
- Reimbursement and total cost of ownership: Drawing the line for corporate expenses

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
460
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
11
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Six Steps to a Solid Mobility Policy featuring Ovum

  1. 1. Six Steps to a Solid Mobility Policy in 2014 Richard Absalom and David Lingenfelter
  2. 2. Today’s agenda 1. 2. 3. 4. 5. 6. 7. 8. Introduction: what mobile can do for you Step 1: Security Step 2: Employee privacy Step 3: Eligibility Step 4: Acceptable use and dealing with policy violations Step 5: Technical support Step 6: Reimbursement and TCO Q&A #MobilityPolicy14 2
  3. 3. Ovum overview • Leading independent global IT & Telecoms Research & Analysis firm • 150 analysts covering a broad set of technologies and markets • Providing strategic advice to telecoms operators, IT vendors, service providers and enterprise IT leaders • Headquartered in London • 24 Month history of investment in understanding consumerization behaviors #MobilityPolicy14 3
  4. 4. Fiberlink overview 2013 and 2012 Magic Quadrant Leader for Mobile Device Management • 10 Years in Enterprise Mobility Management (EMM) • High customer success rate • 5,000 Customers across all verticals • Millions of devices on MaaS360 platform • 450 Employees worldwide • Recently acquired by IBM #MobilityPolicy14 4
  5. 5. Poll question How would you classify your organization’s posture on mobility at this time? A. Struggling with mobile practices around BYOD, data security and mobile apps B. Developed and implemented a crawl, walk, run strategy C. Mature mobile policy program in place D. Mature mobile policy & supporting security and support technology (EMM) #MobilityPolicy14 5
  6. 6. Introduction What mobile can do for you #MobilityPolicy14 6
  7. 7. Mobile working has obvious benefits • Increased flexibility • Increased productivity • Increased engagement • Every policy needs to have the goal of business process improvement at its root #MobilityPolicy14 7
  8. 8. A mobility policy doesn’t just mean formalizing BYOD… • … But it does need to address the drivers of this behavior 56.8% of full-time employees access corporate data from a personally owned smartphone or tablet – whether their IT department likes it or not Source Ovum: Global BYOD Survey 2013 : N = 4371 #MobilityPolicy14 8
  9. 9. Industry needs • Retail, medical, education and finance – FINRA – HIPAA • Mobile and cloud are driving change • Information access #MobilityPolicy14 9
  10. 10. Step 1: Security Maintaining control of corporate data #MobilityPolicy14 10
  11. 11. Mobile – a CIO’s security nightmare? • Data is always at risk at three points: the network, the application and the device • Consumerization means that all of these threats are multiplied #MobilityPolicy14 11
  12. 12. Confusion of security solutions • What can I use to secure corporate data on mobile devices? – – – – – – – MDM? MAM? NAC? IAM? Virtualization? Containerization? All of the above? #MobilityPolicy14 12
  13. 13. Protection shifts • System protection then, data protection now • Data access and security – Workstations – Laptops – Mobile devices • Which solution? There is no right answer. #MobilityPolicy14 13
  14. 14. Poll question What percentage of employees in your organization use laptops, smartphones and tablets for work? A. B. C. D. #MobilityPolicy14 1-24% 25-49% 50-74% 75-100% 14
  15. 15. Poll question What technologies are you using in your mobile strategy (select all that apply)? A. B. C. D. E. F. G. H. #MobilityPolicy14 Active Sync MDM (Mobile Device Management) MAM (Mobile Application Management) NAC (Network Access Control) IAM (Identity and Access Management) Virtualization Containerization None 15
  16. 16. Step 2: Employee privacy Balancing security with data privacy rights #MobilityPolicy14 16
  17. 17. Organizations face a legal conundrum  Data being accessed on a personal device needs to be secured. If it is lost, the organization is responsible – not the individual  However… they must also respect the privacy rights of their employees #MobilityPolicy14 17
  18. 18. Approach on a geographic and vertical basis  There are numerous similarities, but data privacy legislation differs from country to country (e.g. the US has no single law)…  And between verticals (see US US Health Insurance Portability and Accountability Act ) #MobilityPolicy14 18
  19. 19. What businesses can and cannot do  Different businesses, different locations, different concerns Business Type  Examples:  Geolocation  Culture #MobilityPolicy14 Security Focus 19 Business Location
  20. 20. Step 3: Eligibility Giving the right access to the right people #MobilityPolicy14 20
  21. 21. BYOD across all areas of business… Source Ovum: Global BYOD Survey 2013 : N2012 = 4038, N2013 = 4371 #MobilityPolicy14 21
  22. 22. A mobile policy that applies to everyone  Are different policies and rules required for different employees or departments?  e.g. can the CEO get access to more than the secretary?  What do Sales, Marketing, HR etc. need? #MobilityPolicy14 22
  23. 23. One size doesn’t fit all #MobilityPolicy14 23
  24. 24. Step 4: Acceptable usage policy Setting standards and dealing with policy violations #MobilityPolicy14 24
  25. 25. Drawing the lines around acceptable use  Striking a balance between freedom to work in preferred manner and the need to secure data  What steps will be taken if there is a policy violation – does it depend on the severity or accumulation of offences? #MobilityPolicy14 25
  26. 26. Multiple policies #MobilityPolicy14 26
  27. 27. Step 5: Technical support Understanding who is responsible for what #MobilityPolicy14 27
  28. 28. Understanding responsibilities in a BYOD scenario  Who is responsible for technical support: the IT desk or the individual?  Will users be responsible for some applications and / or services and IT others? If so, which?  To what extent are users expected to keep their devices up to date with the latest patches, OS upgrades, etc.? #MobilityPolicy14 28
  29. 29. Whose responsibility is it? #MobilityPolicy14 29
  30. 30. Step 6: Reimbursement and TCO Understanding the impact on the bottom line #MobilityPolicy14 30
  31. 31. A realistic view on cost to go mobile  What is the cost of the required technical support and management, including any third party software implementations?  In a BYOD deployment: who pays for the hardware, air time and data connection? Does reimbursing use of personal call / data plans make sense? #MobilityPolicy14 31
  32. 32. Research & Analysis • Bring Your Own Device (BYOD) implementation – Increase productivity - 37 minutes/week (global average) • 81 Minutes/week US • 4 Minutes/week Germany – Value increased by $350/mobile user – 198 Million BYOD devices worldwide • Expected to double by 2016 – BYOD employees choose smartphones and pay $965 out-of-pocket #MobilityPolicy14 32
  33. 33. For more information Follow-up: richard.absalom@ovum.com dlingenfelter@fiberlink.com Make informed business and technology decisions: Ovum.com Visit the MaaSters Center to discuss IT in the cloud: MaaS360.com/maasters • Forum – announcements, discussions and questions • Blog • Webinars • Resources • Social media

×