SlideShare a Scribd company logo
www.utgsolutions.com
@utgsolutions 678.730.0345
Dell’s Five Best Practices for
Maximizing Mobility Benefits while
Maintaining Compliance with Data
Security and Privacy Regulations
www.utgsolutions.com
@utgsolutions 678.730.0345
Inside
ü  Tips for deploying or expanding BYOD
programs while remaining compliant
ü  Recommendations for securing and controlling
access to devices, data and networks
ü  Guidance for deploying solutions designed to
help ease BYOD management and compliance
www.utgsolutions.com
@utgsolutions 678.730.0345
Carefully Align BYOD with Security
Dell recommends that companies carefully
align their bring-your-own-device (BYOD)
program with data security and privacy
regulations to avoid any pitfalls concerning
compliance.
www.utgsolutions.com
@utgsolutions 678.730.0345
BYOD Comes with a Cost
While BYOD initiatives can be great for
employees, they often pose a potential
nightmare for employers as failure to comply
with regulations can result in companies
suffering financial penalties, litigation and
damage to their reputation.
www.utgsolutions.com
@utgsolutions 678.730.0345
HIPAA
For example, to meet Health Insurance
Portability and Accountability Act (HIPAA)
standards, healthcare providers, insurers,
employers, schools and other organizations
must secure access to all patient healthcare and
payment information.
www.utgsolutions.com
@utgsolutions 678.730.0345
PCI DSS
Likewise, to comply with the Payment Card
Industry Data Security Standard (PCI DSS),
merchants must protect cardholder
information for credit, debit and other types of
payment cards.
www.utgsolutions.com
@utgsolutions 678.730.0345
Protect Your Private Information
Even in sectors with fewer regulations,
organizations are under increasing pressure to
protect private information.
For that reason, Dell advocates the following
five best practices for protecting regulated data
and employee privacy:
www.utgsolutions.com
@utgsolutions 678.730.0345
Identify, Confirm and Protect Regulated Data
Start by identifying all regulated data and
then determining which data will be
generated on, accessed from, stored on, or
transmitted by BYO devices.
Once regulated data has been identified,
organizations can decide on the best
strategies for protecting it and ensuring
compliance.
www.utgsolutions.com
@utgsolutions 678.730.0345
Identify, Confirm and Protect Regulated Data
Heavily regulated data may require a multifaceted
approach, including a combination of:
ü  Encryption to keep data safe in the event of a
breach
ü  Secure workspaces to keep regulated data from
commingling with personal information
ü  Virtualization for heightened IT control of
applications and the data they access
www.utgsolutions.com
@utgsolutions 678.730.0345
Identify, Confirm and Protect Regulated Data
ü  Data leakage protection (DLP) to control which
data mobile employees can transmit through
BYO devices and to prevent the transfer of
regulated data from a secure app to an insecure
app
ü  The ability to remotely wipe data from a device,
if necessary.
www.utgsolutions.com
@utgsolutions 678.730.0345
Control Access to Data and Networks
ü  Deploy solutions for monitoring, tracking and
controlling access rights according to a user’s
identity, device type, location, time of access
and resources accessed.
ü  In addition, prevent employees from accessing
data on unsecured (or jailbroken) devices or
transmitting unsecured data using their own
device.
www.utgsolutions.com
@utgsolutions 678.730.0345
Control Access to Data and Networks
ü  A complete solution for identity and access management
(IAM), firewalls and virtual private networks can protect
data and networks.
ü  It also can help control administrative complexity and
support numerous device types, operating systems, user
roles, data types and regulatory requirements.
ü  The solution should make it simple for authorized users
to access information and resources from personally
owned devices to maximize mobile flexibility and
productivity.
www.utgsolutions.com
@utgsolutions 678.730.0345
Secure Devices
ü  Demand extra security for employee-owned
devices.
ü  As a first step, require a password to access
devices or the secure workspaces on them.
ü  In addition, a smart card reader or fingerprint
reader can prevent unauthorized access to
tablets and laptops if they are lost, stolen or
inadvertently used by family or friends.
www.utgsolutions.com
@utgsolutions 678.730.0345
Develop Compliant Apps with Proof of Compliance
Be sure the applications developed for mobiles devices
maintain compliance.
To assess application compliance, ask the following
questions:
ü  Can the multifactor authentication required for
enterprise applications be employed on smartphones?
ü  Are the mobile devices storing sensitive information as
an employee interacts with an enterprise application?
www.utgsolutions.com
@utgsolutions 678.730.0345
Develop Compliant Apps with Proof of Compliance
ü  Does a secure web session expire in the same amount of
time on a tablet as it would on a corporate desktop?
ü  To assist with the application compliance process, many
companies enlist the help of an application development
consultant with experience and expertise in ensuring the
compliance of mobile apps.
ü  To show proof of compliance, be sure the solution
supports appropriate reports and audit trails while
controlling complexity.
www.utgsolutions.com
@utgsolutions 678.730.0345
Train Employees on the Importance of Maintaining Compliance
ü  Employees must understand the critical
importance of adhering to regulations and
potential consequences of compliance failures.
ü  Mobile employees must be especially sensitive
to potential breaches while outside corporate
walls.
ü  A signature on a document promising
adherence to rules is not enough. Ongoing
education is essential.
www.utgsolutions.com
@utgsolutions 678.730.0345
Overcoming Mobility Compliance Challenges with
Dell Mobility/BYOD Solutions
ü  End-user computing
devices
ü  Wireless networking
ü  Secure remote access
ü  Next-gen firewalls
ü  IAM
ü  Enterprise mobility
management
ü  Services.
UTG’s extensive portfolio of Dell mobility solutions includes:
www.utgsolutions.com
@utgsolutions 678.730.0345
www.utgsolutions.com
@utgsolutions 678.730.0345
Delivering Complete and Connected Software Solutions
UTG Dell solutions empower companies of all sizes to experience the
“Power to Do More”by delivering scalable yet simple-to-use solutions
that can increase productivity, responsiveness and efficiency.
UTG solutions are uniquely positioned to address today’s most
pressing business and IT challenges with holistic, connected
solutions across five core solution areas, encompassing data center
and cloud management, information management, mobile
workforce management, security and data protection.
We help customers simplify IT, mitigate risk and accelerate business
results.
www.utgsolutions.com
@utgsolutions 678.730.0345
Thank you!
www.utgsolutions.com
Reference:
http://www.dell.com/learn/us/en/uscorp1/press-releases/2014-07-22-dell-mobility-data-security-privacy-
regulations

More Related Content

What's hot

You cant secure yesterday
You cant secure yesterdayYou cant secure yesterday
You cant secure yesterday
NetDef
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
IBM Sverige
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
Huntsman Security
 
Data Driven Security in SSAS
Data Driven Security in SSASData Driven Security in SSAS
Data Driven Security in SSAS
Mike Duffy
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
Wilfred Barretto
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
EnclaveSecurity
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
bradley_g
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
José Carlos Álvarez
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
Southern Cross Group Services
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
C/D/H Technology Consultants
 
AmeriTech_Healthcare Technology Guide
AmeriTech_Healthcare Technology GuideAmeriTech_Healthcare Technology Guide
AmeriTech_Healthcare Technology Guide
Robert Gordon
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
Mighty Guides, Inc.
 
Byod
ByodByod
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
Jose Ivan Delgado, Ph.D.
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Symantec LATAM
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
Logicalis Australia
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire
 

What's hot (19)

You cant secure yesterday
You cant secure yesterdayYou cant secure yesterday
You cant secure yesterday
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Data Driven Security in SSAS
Data Driven Security in SSASData Driven Security in SSAS
Data Driven Security in SSAS
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
AmeriTech_Healthcare Technology Guide
AmeriTech_Healthcare Technology GuideAmeriTech_Healthcare Technology Guide
AmeriTech_Healthcare Technology Guide
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Byod
ByodByod
Byod
 
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 

Viewers also liked

Dell Company Presentation
Dell Company PresentationDell Company Presentation
Dell Company Presentation
Deepankar Nath
 
Dell marketing strategy @gd
Dell marketing strategy @gdDell marketing strategy @gd
Dell marketing strategy @gd
Gaurav Dakhore
 
PPT On Dell
PPT On DellPPT On Dell
PPT On Dell
Time Rahul
 
Dell Case Study
Dell Case StudyDell Case Study
Dell Case Study
Raminder Pal Singh
 
Dell's Marketing Strategy
Dell's Marketing StrategyDell's Marketing Strategy
Dell's Marketing Strategy
KoichiTachiya
 
Dell presentation
Dell presentationDell presentation
Dell presentation
'Shantunu Ghosh'
 
Dell case study (management)
Dell case study (management)Dell case study (management)
Dell case study (management)
Vineeth Kamisetty
 

Viewers also liked (7)

Dell Company Presentation
Dell Company PresentationDell Company Presentation
Dell Company Presentation
 
Dell marketing strategy @gd
Dell marketing strategy @gdDell marketing strategy @gd
Dell marketing strategy @gd
 
PPT On Dell
PPT On DellPPT On Dell
PPT On Dell
 
Dell Case Study
Dell Case StudyDell Case Study
Dell Case Study
 
Dell's Marketing Strategy
Dell's Marketing StrategyDell's Marketing Strategy
Dell's Marketing Strategy
 
Dell presentation
Dell presentationDell presentation
Dell presentation
 
Dell case study (management)
Dell case study (management)Dell case study (management)
Dell case study (management)
 

Similar to Five Best Practices for Maximizing Mobility Benefits

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
ManageEngine
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
IBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
#TheFraudTube
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
Icomm Technologies
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
joellemurphey
 
Business Intelligence Research Project
Business Intelligence  Research Project Business Intelligence  Research Project
Business Intelligence Research Project
MartinaErowoOjonah
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
UL Transaction Security
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
DMIMarketing
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
Wavestone
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
Citrix
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
Sandy DiFranco
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 

Similar to Five Best Practices for Maximizing Mobility Benefits (20)

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docxREVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
REVIEW OF GOOGLE’S CYBER SECURITY POLICYNAMEINSTRUCTOR’S N.docx
 
Business Intelligence Research Project
Business Intelligence  Research Project Business Intelligence  Research Project
Business Intelligence Research Project
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 

More from United Technology Group (UTG)

Windows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern BusinessWindows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern Business
United Technology Group (UTG)
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
United Technology Group (UTG)
 
10 things you should know about cybersecurity
10 things you should know about cybersecurity10 things you should know about cybersecurity
10 things you should know about cybersecurity
United Technology Group (UTG)
 
12 questions to ask a prospective MSP
12 questions to ask a prospective MSP12 questions to ask a prospective MSP
12 questions to ask a prospective MSP
United Technology Group (UTG)
 
7 cloud security tips
7 cloud security tips7 cloud security tips
7 cloud security tips
United Technology Group (UTG)
 
9 Things A Cloud Provider Should Offer
9 Things A Cloud Provider Should Offer9 Things A Cloud Provider Should Offer
9 Things A Cloud Provider Should Offer
United Technology Group (UTG)
 
2015 Microsoft Office 365: Beyond Email
2015 Microsoft Office 365: Beyond Email2015 Microsoft Office 365: Beyond Email
2015 Microsoft Office 365: Beyond Email
United Technology Group (UTG)
 
Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365
United Technology Group (UTG)
 

More from United Technology Group (UTG) (8)

Windows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern BusinessWindows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern Business
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
10 things you should know about cybersecurity
10 things you should know about cybersecurity10 things you should know about cybersecurity
10 things you should know about cybersecurity
 
12 questions to ask a prospective MSP
12 questions to ask a prospective MSP12 questions to ask a prospective MSP
12 questions to ask a prospective MSP
 
7 cloud security tips
7 cloud security tips7 cloud security tips
7 cloud security tips
 
9 Things A Cloud Provider Should Offer
9 Things A Cloud Provider Should Offer9 Things A Cloud Provider Should Offer
9 Things A Cloud Provider Should Offer
 
2015 Microsoft Office 365: Beyond Email
2015 Microsoft Office 365: Beyond Email2015 Microsoft Office 365: Beyond Email
2015 Microsoft Office 365: Beyond Email
 
Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Five Best Practices for Maximizing Mobility Benefits

  • 1. www.utgsolutions.com @utgsolutions 678.730.0345 Dell’s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations
  • 2. www.utgsolutions.com @utgsolutions 678.730.0345 Inside ü  Tips for deploying or expanding BYOD programs while remaining compliant ü  Recommendations for securing and controlling access to devices, data and networks ü  Guidance for deploying solutions designed to help ease BYOD management and compliance
  • 3. www.utgsolutions.com @utgsolutions 678.730.0345 Carefully Align BYOD with Security Dell recommends that companies carefully align their bring-your-own-device (BYOD) program with data security and privacy regulations to avoid any pitfalls concerning compliance.
  • 4. www.utgsolutions.com @utgsolutions 678.730.0345 BYOD Comes with a Cost While BYOD initiatives can be great for employees, they often pose a potential nightmare for employers as failure to comply with regulations can result in companies suffering financial penalties, litigation and damage to their reputation.
  • 5. www.utgsolutions.com @utgsolutions 678.730.0345 HIPAA For example, to meet Health Insurance Portability and Accountability Act (HIPAA) standards, healthcare providers, insurers, employers, schools and other organizations must secure access to all patient healthcare and payment information.
  • 6. www.utgsolutions.com @utgsolutions 678.730.0345 PCI DSS Likewise, to comply with the Payment Card Industry Data Security Standard (PCI DSS), merchants must protect cardholder information for credit, debit and other types of payment cards.
  • 7. www.utgsolutions.com @utgsolutions 678.730.0345 Protect Your Private Information Even in sectors with fewer regulations, organizations are under increasing pressure to protect private information. For that reason, Dell advocates the following five best practices for protecting regulated data and employee privacy:
  • 8. www.utgsolutions.com @utgsolutions 678.730.0345 Identify, Confirm and Protect Regulated Data Start by identifying all regulated data and then determining which data will be generated on, accessed from, stored on, or transmitted by BYO devices. Once regulated data has been identified, organizations can decide on the best strategies for protecting it and ensuring compliance.
  • 9. www.utgsolutions.com @utgsolutions 678.730.0345 Identify, Confirm and Protect Regulated Data Heavily regulated data may require a multifaceted approach, including a combination of: ü  Encryption to keep data safe in the event of a breach ü  Secure workspaces to keep regulated data from commingling with personal information ü  Virtualization for heightened IT control of applications and the data they access
  • 10. www.utgsolutions.com @utgsolutions 678.730.0345 Identify, Confirm and Protect Regulated Data ü  Data leakage protection (DLP) to control which data mobile employees can transmit through BYO devices and to prevent the transfer of regulated data from a secure app to an insecure app ü  The ability to remotely wipe data from a device, if necessary.
  • 11. www.utgsolutions.com @utgsolutions 678.730.0345 Control Access to Data and Networks ü  Deploy solutions for monitoring, tracking and controlling access rights according to a user’s identity, device type, location, time of access and resources accessed. ü  In addition, prevent employees from accessing data on unsecured (or jailbroken) devices or transmitting unsecured data using their own device.
  • 12. www.utgsolutions.com @utgsolutions 678.730.0345 Control Access to Data and Networks ü  A complete solution for identity and access management (IAM), firewalls and virtual private networks can protect data and networks. ü  It also can help control administrative complexity and support numerous device types, operating systems, user roles, data types and regulatory requirements. ü  The solution should make it simple for authorized users to access information and resources from personally owned devices to maximize mobile flexibility and productivity.
  • 13. www.utgsolutions.com @utgsolutions 678.730.0345 Secure Devices ü  Demand extra security for employee-owned devices. ü  As a first step, require a password to access devices or the secure workspaces on them. ü  In addition, a smart card reader or fingerprint reader can prevent unauthorized access to tablets and laptops if they are lost, stolen or inadvertently used by family or friends.
  • 14. www.utgsolutions.com @utgsolutions 678.730.0345 Develop Compliant Apps with Proof of Compliance Be sure the applications developed for mobiles devices maintain compliance. To assess application compliance, ask the following questions: ü  Can the multifactor authentication required for enterprise applications be employed on smartphones? ü  Are the mobile devices storing sensitive information as an employee interacts with an enterprise application?
  • 15. www.utgsolutions.com @utgsolutions 678.730.0345 Develop Compliant Apps with Proof of Compliance ü  Does a secure web session expire in the same amount of time on a tablet as it would on a corporate desktop? ü  To assist with the application compliance process, many companies enlist the help of an application development consultant with experience and expertise in ensuring the compliance of mobile apps. ü  To show proof of compliance, be sure the solution supports appropriate reports and audit trails while controlling complexity.
  • 16. www.utgsolutions.com @utgsolutions 678.730.0345 Train Employees on the Importance of Maintaining Compliance ü  Employees must understand the critical importance of adhering to regulations and potential consequences of compliance failures. ü  Mobile employees must be especially sensitive to potential breaches while outside corporate walls. ü  A signature on a document promising adherence to rules is not enough. Ongoing education is essential.
  • 17. www.utgsolutions.com @utgsolutions 678.730.0345 Overcoming Mobility Compliance Challenges with Dell Mobility/BYOD Solutions ü  End-user computing devices ü  Wireless networking ü  Secure remote access ü  Next-gen firewalls ü  IAM ü  Enterprise mobility management ü  Services. UTG’s extensive portfolio of Dell mobility solutions includes:
  • 19. www.utgsolutions.com @utgsolutions 678.730.0345 Delivering Complete and Connected Software Solutions UTG Dell solutions empower companies of all sizes to experience the “Power to Do More”by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. UTG solutions are uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected solutions across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. We help customers simplify IT, mitigate risk and accelerate business results.