This document discusses bringing your own device (BYOD) policies and strategies. It summarizes a pilot program run by Cambridgeshire County Council to test a mobile device management solution. The pilot found high levels of interest from staff to use personal devices for work. It also found that the software tested provided secure email, calendar and attachment access. Based on the pilot's success, the document recommends fully implementing the mobile device management solution for all staff by end of year.
Web application security - Emstell Technology ConsultingAyoob Kalathingal
Introduction to the basics of Web Application Security and Security testing.
Presentation delivered by Emstell Director Ayoob at the Info Sec Conference Kuwait
Intel IT's Identity and Access Management JourneyIntel IT Center
Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizations want to move more diverse data to more places, and more people need access via more services and devices. Managing all this is a big task for information security. Learn about Intel IT's approach to IDAM redesign and IT best practices for enhanced security and a better user experience.
Ivanti solutions are designed to aid, ease, and speed your IT modernization and unification efforts. From advanced asset, endpoint, IT and business service management, to security and reporting and analytics, Ivanti bridges the gap between product lines to automate and secure your digital workplace.
ECAT an Ireland Based Software Organization which helps in digitizing Audit and Inspection process to make it clear, transparent and operationally efficient.
Presentation the internet of things - are organizations ready for a multi-tr...Rick Bouter
Presentation the internet of things - are organizations ready for a multi-trillion dollar prize - Karl Bjurström, Capgemini Consulting - digital transformation
Web application security - Emstell Technology ConsultingAyoob Kalathingal
Introduction to the basics of Web Application Security and Security testing.
Presentation delivered by Emstell Director Ayoob at the Info Sec Conference Kuwait
Intel IT's Identity and Access Management JourneyIntel IT Center
Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizations want to move more diverse data to more places, and more people need access via more services and devices. Managing all this is a big task for information security. Learn about Intel IT's approach to IDAM redesign and IT best practices for enhanced security and a better user experience.
Ivanti solutions are designed to aid, ease, and speed your IT modernization and unification efforts. From advanced asset, endpoint, IT and business service management, to security and reporting and analytics, Ivanti bridges the gap between product lines to automate and secure your digital workplace.
ECAT an Ireland Based Software Organization which helps in digitizing Audit and Inspection process to make it clear, transparent and operationally efficient.
Presentation the internet of things - are organizations ready for a multi-tr...Rick Bouter
Presentation the internet of things - are organizations ready for a multi-trillion dollar prize - Karl Bjurström, Capgemini Consulting - digital transformation
Updating Legacy Systems: Making the Financial Case for a Modernization Project ILM Professional Services
Most people associate the term “legacy system” with old code, but a true legacy system is any application that is difficult to update. A two-year-old app can already be in a legacy state if it’s unscalable.
Many companies put off updating a legacy system, even when they accept its limitations. It can be a hard sell to replace functioning systems, but the longer it is put off, the more expensive it ultimately becomes.
This deck outlines the financial reasons for updating a legacy system.
Mobile Workspaces Go Where You Go [Infographic]Citrix
Mobility is more than a product, a tool, or an individual piece of technology – it is a ubiquitous work style that transcends legacy IT by delivering apps, desktops, files, and services seamlessly to any users, on any device, over any network.
Visit our website to learn more: http://bit.ly/1skzFy5
Contextual Security and Application Control for Virtualized DesktopsIvanti
Daas and VDI continue to provide anwhere, secure access from any device to corporate workspaces. As the user is more mobile than ever before, security, compliance, and licensing requirements demand additional contextual control over virtual applications and desktops. Join this webinar to see how Ivanti and Device Trust can help.
In this presentation we will talk about how entrepreneurs with their Leadership, Management Skills and Knowledge of “Enterprise Solutions” and how to make business a success. An insight into the History and Concept of Enterprise Solution.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Identity and Access Management Playbook CISO Platform 2016Aujas
Checklist Playbook for CISO, CSO and Information Risk & Security Managers to plan and implement a successful IAM (Identity and Access Management) program. It covers Access Governance and Identity Administration, Single Sign On (SSO), Privileged Identity Management, and more.
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
Comparing traditional workspaces to digital workspacesCitrix
The unprecedented adoption and convergence of mobility, cloud,
virtualization, and cyber security technologies is rendering
Traditional Workspaces a thing of the past. Digital workspaces are
becoming powerful competitive differentiators in all industries as
businesses are seeking new levels of agility in their processes and
service delivery methods and provide greater flexibility for their
employees.
Ditch the Surplus Software and Hardware Spend that's Weighing you DownIvanti
Advance your ITAM Program with these Top 6 Best Practices
Are you still struggling to keep tabs on your software and hardware with spreadsheets? Break free in 2019! Spreadsheets are cumbersome and difficult to maintain. Let Ivanti ITAM help you to go beyond spreadsheets and basic inventory and asset tracking.
Join our ITAM experts to explore the top 6 Things to think about when starting or advancing your ITAM program to better help balance costs and risks in your organization.
How to Stay on Top of Users' Identities and their Access RightsIvanti
With the widespread adoption of cloud services and mobile devices, today’s modern IT environment has experienced rapid change. Your users now need access to dozens of applications to do their jobs from day one. Onboarding users has become more complex and time-consuming for IT, especially if undertaken manually. And when users leave or change roles, deprovisioning access to applications is often last on the list of tasks or slips through cracks completely.
How do you give an increasingly diverse and mobile group of users, access to the applications they need and stop them circumnavigating IT to get what they want? To keep your users productive, the best solution is a policy-driven identity and access management (IAM) system to ensure they are accurately identified from day one and to automatically remove access when a user leaves. By providing access to only the systems, applications and data your users need you also reduce the attack vector, common when users have more entitlement than required.
Today, security is so much more than just a firewall. As we saw in our recent webinar, co-hosted with Microsoft to discuss their new Enterprise Mobility + Security Suite (EMS), breaches are resulting from weak end-user passwords or error, as well as a lax attitude toward SaaS and third party "Shadow IT." Add to that infrastructure complexity brought on by cloud and hybrid environments and everything you knew about security is changing.
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primend
Nutikasutajad soovivad olla internetti ühendatud igal ajal ja igal pool. Tavaliselt on just ettevõtte juhtkonnas ja müügiosakonnas keskmisest rohkem selliseid kasutajaid. Kuidas ehitada arvutivõrk, mis pakuks nutikasutajatele vajalikku teenust ja oleks seejuures turvaline.
Implementing PeopleSoft 9.2 During the Age of the CloudEmtec Inc.
Why should PS HCM 9.2 should be considered when implementing an HCM solution. Learn what the benefits are for organizations and what strategies are needed to make the leap from your current solution and business processes to PS 9.2
Mobile device management solution helps you to secure ,monitor and manage the mobile device across the enterprise. It must balance corporate security and personal privacy
With incredible feature lists, Enterprise Mobile Apps have taken a huge turn in the technology landscape. What more exhilarating functionalities can we expect from it in the future. Check it out!
Updating Legacy Systems: Making the Financial Case for a Modernization Project ILM Professional Services
Most people associate the term “legacy system” with old code, but a true legacy system is any application that is difficult to update. A two-year-old app can already be in a legacy state if it’s unscalable.
Many companies put off updating a legacy system, even when they accept its limitations. It can be a hard sell to replace functioning systems, but the longer it is put off, the more expensive it ultimately becomes.
This deck outlines the financial reasons for updating a legacy system.
Mobile Workspaces Go Where You Go [Infographic]Citrix
Mobility is more than a product, a tool, or an individual piece of technology – it is a ubiquitous work style that transcends legacy IT by delivering apps, desktops, files, and services seamlessly to any users, on any device, over any network.
Visit our website to learn more: http://bit.ly/1skzFy5
Contextual Security and Application Control for Virtualized DesktopsIvanti
Daas and VDI continue to provide anwhere, secure access from any device to corporate workspaces. As the user is more mobile than ever before, security, compliance, and licensing requirements demand additional contextual control over virtual applications and desktops. Join this webinar to see how Ivanti and Device Trust can help.
In this presentation we will talk about how entrepreneurs with their Leadership, Management Skills and Knowledge of “Enterprise Solutions” and how to make business a success. An insight into the History and Concept of Enterprise Solution.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Identity and Access Management Playbook CISO Platform 2016Aujas
Checklist Playbook for CISO, CSO and Information Risk & Security Managers to plan and implement a successful IAM (Identity and Access Management) program. It covers Access Governance and Identity Administration, Single Sign On (SSO), Privileged Identity Management, and more.
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
Comparing traditional workspaces to digital workspacesCitrix
The unprecedented adoption and convergence of mobility, cloud,
virtualization, and cyber security technologies is rendering
Traditional Workspaces a thing of the past. Digital workspaces are
becoming powerful competitive differentiators in all industries as
businesses are seeking new levels of agility in their processes and
service delivery methods and provide greater flexibility for their
employees.
Ditch the Surplus Software and Hardware Spend that's Weighing you DownIvanti
Advance your ITAM Program with these Top 6 Best Practices
Are you still struggling to keep tabs on your software and hardware with spreadsheets? Break free in 2019! Spreadsheets are cumbersome and difficult to maintain. Let Ivanti ITAM help you to go beyond spreadsheets and basic inventory and asset tracking.
Join our ITAM experts to explore the top 6 Things to think about when starting or advancing your ITAM program to better help balance costs and risks in your organization.
How to Stay on Top of Users' Identities and their Access RightsIvanti
With the widespread adoption of cloud services and mobile devices, today’s modern IT environment has experienced rapid change. Your users now need access to dozens of applications to do their jobs from day one. Onboarding users has become more complex and time-consuming for IT, especially if undertaken manually. And when users leave or change roles, deprovisioning access to applications is often last on the list of tasks or slips through cracks completely.
How do you give an increasingly diverse and mobile group of users, access to the applications they need and stop them circumnavigating IT to get what they want? To keep your users productive, the best solution is a policy-driven identity and access management (IAM) system to ensure they are accurately identified from day one and to automatically remove access when a user leaves. By providing access to only the systems, applications and data your users need you also reduce the attack vector, common when users have more entitlement than required.
Today, security is so much more than just a firewall. As we saw in our recent webinar, co-hosted with Microsoft to discuss their new Enterprise Mobility + Security Suite (EMS), breaches are resulting from weak end-user passwords or error, as well as a lax attitude toward SaaS and third party "Shadow IT." Add to that infrastructure complexity brought on by cloud and hybrid environments and everything you knew about security is changing.
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primend
Nutikasutajad soovivad olla internetti ühendatud igal ajal ja igal pool. Tavaliselt on just ettevõtte juhtkonnas ja müügiosakonnas keskmisest rohkem selliseid kasutajaid. Kuidas ehitada arvutivõrk, mis pakuks nutikasutajatele vajalikku teenust ja oleks seejuures turvaline.
Implementing PeopleSoft 9.2 During the Age of the CloudEmtec Inc.
Why should PS HCM 9.2 should be considered when implementing an HCM solution. Learn what the benefits are for organizations and what strategies are needed to make the leap from your current solution and business processes to PS 9.2
Mobile device management solution helps you to secure ,monitor and manage the mobile device across the enterprise. It must balance corporate security and personal privacy
With incredible feature lists, Enterprise Mobile Apps have taken a huge turn in the technology landscape. What more exhilarating functionalities can we expect from it in the future. Check it out!
This presentation provides information and tips to assist accountants and audits in introducing cloud technologies into their business. Auditflow - www.auditflow.com - offers a range of innovative audit compliance solutions. Mediasphere - www.mediasphere.com.au - builds websites and client portals for accountants and auditors globally.
Contact Tony Carrucan on tonyc@mediasphere.com.au for more information
Securing the Remote Working EnvironmentDizzion, Inc.
Remote working is a growing trend, but with it is the increasingly important question of how to keep remote workers and environments secure. Review requirements, key considerations and best practices for enabling secure remote working.
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
We've all seen the SD-WAN 101 - combatting jitter, latency and packet loss. But here's what your customers are REALLY up against today. These are the use cases they want you to talk to them about.
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information.
This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from.
Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.
Ensuring the security of information and applications is a critical priority fir all organizations, particularly those on the healthcare field. The architecture and features of the right enterprise image-viewer enable medical images and information to be securely and conveniently accessible to users from anywhere in the world, without compromising network or information security.
This guide describes strategies to ensure your enterprise images are fully secure, even when you provide the flexibility of mobile health solutions to practitioners.
http://offers.calgaryscientific.com/resolutionmd4-guides
SailPoint is a centralized identity management solution that allows organizations to manage employee authorizations, digital identities, data security, network management, compliance, and more. CyberArk is used to access local admin accounts, domain admin accounts, service accounts, and other privileged accounts simply and safely.
Your firm needs to be committed to protecting information assets, including personal data and client documents. As a trusted advisor to our clients, the expectation is that we are aware of threats and are guarding their data. Data privacy and information security are fundamental components of doing business today, no matter how large your firm is.
In this paper we will look at three specific ways of protecting our clients:
1. Protection through our ability to research and improve intellectual capital
2. Protection through policies, procedures and processes
3. Protection by securing client data
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
This is the presentation I recently gave regarding cloud computing and the risks which are often not thought through.
Looks at the cloud from an Information Security and compliance aspect which is often forgotten.
Best wishes,
Jared Carstensen
Experitest & Capgemini held a co-webinar on the topic: A Secure Mobile Testing Cloud Resource - Accessible Anytime Anywhere. This interactive webinar will help you to learn more about a Cloud solution that offers features, functions and benefits for each member of the mobile-applications development team:
* For developers an easy reproduction of bugs and the ability to reserve a time slot;
* For QA managers, how to plan in advance device usage and control applications under test;
* For device lab managers a 24x7 continuous testing environment;
* For manual QA testers learn to emulate keyboards for devices and script automation;
* For automation engineers, automate tests via desktop, reserve devices, & generate reports;
* For the security team, resource access from the cloud within your company firewall;
* For executives – reduce user-device procurement costs, speed time-to-market, and improve user/customer experiences.
Security is a high priority when developing and testing mobile apps for companies that are sensitive to security. Access to a provider’s Cloud-hosted testing resources may be convenient and cost-effective, but the security of that environment falls under their control. What was originally a solution becomes a risk to your institution’s data and information.
Among other challenges faced by developers and testers using generic Cloud testing resources:
* Securing a location for devices.
* Concentrating a central pool of devices accessed by offsite development and testing teams;
* Distribution of work across geographically isolated teams;
* Specific device identification and availability;
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
Similar to Mobile in the Workplace - Alan Shields (20)
6. Infrastructure must cover:
Connection
As these devices will not be directly connected to your network, you need a secure method
of connection.
Authentication
If you can, best to use something you already use such a Active Directory or other similar
LDAP services.
Security
Beyond the network connection, you must have a means of managing/ administrating
these devices. This is often called “Mobile Device Management”.
Data access
Not all these devices will have the capability to connect to your normal network file storage
so consider more agnostic methods of data access such a SharePoint, internal versions of
“DropBox” or other WebDAV/FTP functionality.
10. So, what are we doing in
Cambridgeshire?
Dynamic Mobile Exchange (DME) by Excitor
Good for Enterprise by Good Technology
11. The Pilot was run to determine some of the
following:
Suitability of the software (incl. usability and
security)
Acceptance by staff to use their own devices
Effectiveness of “light-touch” training and support
To determine and calculate any cost
savings/benefits
14. Acceptance
The Pilot was limited to 50 users and to get volunteers, messages
were posted on the Council’s intranet pages. Within 3 days we
had over 150 requests. Whilst that does not seem many out of a
5,000-strong user base, it proved there was some appetite for staff
wanting to use their own devices.
16. Suitability
70% of pilot users found sending and receiving emails as “Easy” or “Very Easy”.
69% found handling attachments “Easy” or “Acceptable”.
50% rated the calendar functionality as “Easy” or “Very Easy”.
Other functionality (i.e. Contacts, Tasks etc.) was only used by a very small number of pilot
users.
Acceptance
69% of pilot users rated the DME product as either “Essential” or “Very Useful”.
Only 4% of pilot users stated that running the DME client affected either their handset’s
performance and/or battery life.
77% of pilot users wished to continue using the service after the pilot had ended.
Training and Support
98% of pilot users rated downloading and installing the software as “Easy” or “Very Easy”.
77% of pilot users rated the training documentation as either “Good” or “Excellent”.
18. In summary
In summary, BYOD (or UYOD) is here to stay and will become a demand
from both your current and future employees. However, don’t (seriously)
comprise your security – get the right product and have a clearly defined
BYOD user policy that outlines what you expect from the employee and
what they can expect from you. Indeed, BYOD is s culture change for you
IT department. No longer will they have ultimate control of who uses what
and where. However, in reality, that control is probably being lost already
by staff using their own devices in a non-managed, unsecure way.
Introducing a proper BYOD strategy will wrestle just enough
of that control back to hopefully make everyone happy.
19. Next Steps…
…in Cambridgeshire?
Plan to have the DME product in full production and available to
all suitable users by the end of the calendar year. This includes a
slight delay as we are also migrating our email system from
Exchange 2003 to 2010.
Good morning/afternoon.[Comment on time slot if appropriate]I’m Alan Shields, Strategy and Architecture Team Manager for Cambridgeshire County Council.Don’t be confused about the LGSS logo, Cambridgeshire has a shared services agreement with Northampton County Council and Norfolk City Council, and that’s what we call ourselves. However, I am still and employee of and get paid by Cambridgeshire County Council.
Currently, it is very difficult to miss the many news articles and web sites either extolling the virtues or warning of the dangers of either “Consumerisation” or “Bring Your Own Device (BYOD)”. Now, just a point of clarification - Consumerisation is not BYOD. However BYOD is a subset of the overall Consumerisation trend.[click]It’s even got a T Shirt!!!
Going back to BYOD, it also appears that many companies, even with a very tenuous linkage to the subject, see themselves as the panacea to every IT Manager’s dreams. [click]However, in my opinion, BYOD is nothing new and not really what we should all be talking about. [click]
On a personal note, I have been “bringing my own device” to work ever since I got my first mobile phone in 1999. I loved my WAP-enabled Nokia 7110! I might have even used it to make business related calls, before I got the privilege of a corporate mobile. If you extend the definition of “device” a little further, then by using my own car for company purposes, would also falls into the area of BYOD or BYOC.[click]At this point I am not going to cover the once popular initiative of “bring your daughter to work” which is a completely different flavour of BYOD![click]
So, what has changed and created this explosion in the media. True, more people now have smart phones and are very comfortable in using them as part of their everyday life. This is very attractive to businesses that see possible savings in equipment costs and training. I do not doubt these drivers, but “bringing” you own device is only part of the story. Once I have my device at work, what can I use it for? Therefore, I propose a change of title. Not BYOD, but UYOD – “Use Your Own Device”. [click] [click]And this is the point companies should start developing their strategy and polices to allow their staff the freedom to choose how they interact with the business and their colleagues.Now, if you accept the premise that allowing staff to bring and use their own devices, is a valuable strategy, the next two tasks are to setup a suitable infrastructure to accommodate BYOD and define how what “uses” they want to put these devices to. Let’s first concentrate on the infrastructure required: [click]
[Talk to slide]
Communication: The first and obvious use would be communication. As well as making phone calls, this would include access to the corporate email system and a global directory. There a many companies that offer products that enable such use, depending on your businesses’ security requirements.[click]Information: A second use is access to information. As stated earlier, examples would be the ability to access a company’s intranet, SharePoint sites and other web-based resources. Again, many suppliers offer solutions that have a level of granularity that can control what device can access what resource and have the ability to clearly distinguish between corporately owned devices and ones owned by staff.[click]Transaction: Lastly, (as I am not going to cover “Others”) one of the most valuable aspects of general mobile computing is to complete transaction at the point of delivery. Now I’m not proposing that staff use their own devices for the majority of transactions, but internal ones such as expense or over-time claims could be candidates. [click] Others [click]
Now, it must be remembered that a business will not have the same control over some else’s equipment as they would have their own. Ideally you want a “light-touch” approach either requiring the user to download and install a simple app or to get them to use a web-based or thin application. This could be internally hosted or even cloud-based.Also remember not to take the “O” on BYOD to literally. The device can be corporately owned, but maintained and supported by the users. This still gives organisation control over device types.[click]Now I know the soothsayers of the security industry will be up in arms with all the potential for data leakage and security breaches. I do not disagree. But we must move with the times and there are solutions in the market place now that are achieving the right balance between protecting our valuable data and allowing users a high level of flexibility when it comes to accessing this data.[click]
So, what are we doing in Cambridgeshire? We decided to run a small pilot and evaluated two potential products that both met our functional and security requirements.[click]
•Dynamic Mobile Exchange (DME) by Excitor•Good for Enterprise by Good TechnologyBoth products allow access to corporate email, calendar and contacts from a user’s personal device, without compromising security. After a short “desktop” exercise evaluating both functionality and cost of each product, DME was chosen to take forward to the pilot stage. We partnered with CNS in the implementation and support of the product.[click] Wait [click]
[Talk to slide]
Security:Once downloaded and installed (via the appropriate “App” store), (pilot only covered iOS and Android devices) by the user, the DME product creates a virtual container on your device. This is often called “Containerisation”, and in my opinion is the only way to implement BYOD. Within this secure container are tools that allow you to access Council resources in an extremely secure manner. These include you usual PIM applications and a secure Web browser. Any data (i.e. emails, attachments etc.) that are accessed via DME, remain in that container and cannot “leak” out onto the rest of the device. If you want to edit documents, DME comes with its own document editor. Nothing needs to “leave” the container.There is also the ability to write your own applications that can sit within the container, but this was not part of the pilot.All data remains encrypted at all times using strong encryption, and is only decrypted to memory while it is displayed on screen. Equally, all communication with the server is also encrypted.If in the unfortunate event that the device is lost, because all Council data is held within this separate container, if a device is lost, we can send out a command to delete this container if and when the device connects to a network again. This will not affect and data, applications etc. that are outside of the container.[click]
Security:Once downloaded and installed (via the appropriate “App” store), (pilot only covered iOS and Android devices) by the user, the DME product creates a virtual container on your device. This is often called “Containerisation”, and in my opinion is the only way to implement BYOD. Within this secure container are tools that allow you to access Council resources in an extremely secure manner. These include you usual PIM applications and a secure Web browser. Any data (i.e. emails, attachments etc.) that are accessed via DME, remain in that container and cannot “leak” out onto the rest of the device. If you want to edit documents, DME comes with its own document editor. Nothing needs to “leave” the container.There is also the ability to write your own applications that can sit within the container, but this was not part of the pilot.All data remains encrypted at all times using strong encryption, and is only decrypted to memory while it is displayed on screen. Equally, all communication with the server is also encrypted.If in the unfortunate event that the device is lost, because all Council data is held within this separate container, if a device is lost, we can send out a command to delete this container if and when the device connects to a network again. This will not affect and data, applications etc. that are outside of the container.[click]
Acceptance:The Pilot was limited to 50 users and to get volunteers, messages were posted on the Council’s intranet pages. Within 3 days we had over 150 requests. Whilst that does not seem many out of a 5,000-strong user base, it proved there was some appetite for staff wanting to use their own devices.[click]
Training and Support:This was a difficult issue as we were dealing with other people’s property. However, for the Pilot, we decided to take an extremely light-touch approach to both support and training. After all, these were devices people were already using and should be familiar with them already.Users were asked to download and install the application themselves, with a set of simple instructions and the generic user guides (from Excitor) were posted onto a corporate SharePoint site. We also created a discussion forum on the same site and set-up a dedicated support email address. They were told the email address was there only means of support. As a result we only had one member of staff who did not successfully get up and running, without additional help. [click]
Before I go on to Savings & Benefits, towards the end of the pilot we sent all users an evaluation questionnaire to complete. Briefly these are the results:[click]
To be honest, the pilot was too small and short to gain any reliable conclusions. That said, yes you do save on not supplying the devices, paying for the data tariffs and training costs can be parried down, but you still need an infrastructure and support is still an unknown quantity. However, a benefit could easily be user satisfaction. After all they aren’t going to complain about a device they got themselves and even if they do, then they will replace it for something better. Also, there is the “cool” factor of using the latest technology which will no doubt rub off onto the image of you organisation.As an aside, in the evaluation questionnaire, approximately 66% of pilot users that already have a BlackBerry stated they would prefer to use the DME product.[click]
[Talk to slide][click]
Next steps In Cambridgeshire? Well we plan to have the DME product in full production and available to all suitable users by the end of the calendar year. This includes a slight delay as we are also migrating our email system from Exchange 2003 to 2010.[click]