Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

5 Considerations for a Successful BYOD Strategy

952 views

Published on

Bring your own device (BYOD) is becoming the rule rather than the exception which has created a new set of challenges for IT. A BYOD strategy can help you get a grasp on your mobile devices. But with the right security solution, it can also save you time, money, and the sanity of your help desk. Watch this webcast to understand how BYOD impacts your security and what to look for in a BYOD solution.

Learn more about BYOD here: http://bit.ly/Ob1Giz

Published in: Technology
  • Be the first to comment

  • Be the first to like this

5 Considerations for a Successful BYOD Strategy

  1. 1. 5 Considerations for aSuccessful BYOD StrategyBarbara Hudson, Global Product Marketing Manager, Mobile Data Protection
  2. 2. Poll Question PlaceholderAre employees in your organization allowed to usepersonal devices for work?•No and no plans•No but planning to allow•Yes, for email only•Yes, for email and other systems•Don’t know/other
  3. 3. What we’ll talk about• What is BYOD?• Mobile Revolution, the Post PC era?• BYOD: What to consider 1. Users 2. Devices 3. Apps 4. Infrastructure 5. Security• Choosing a BYOD solution• Q&A
  4. 4. What is BYOD? Personal smartphones, tablets, etc. being used at work Define what BYOD means – for you Consumerizationno two There are probably of IT? organizations where When employees pay for their it means exactly own devices and plans the same Bring Your Own Technology
  5. 5. The mobile revolution
  6. 6. The big shift 2000 2012 1.3 million 1.2 billion devices devices Source: Kleiner, Perkins, Caufield, Byers, Dec 2012
  7. 7. The Post-PC era? Not yet. BUT 5% PCs are evolving - New interfaces 29% 66% - New form factorsData source: ZDNetPhoto source: Fujitsu7
  8. 8. The multi-device user 1.96 mobile devices used for work in 2012 iPass Mobile Workforce Report, 2012 (Tablets, smartphones and mobile phones)
  9. 9. All work and no play Smartphones and tablets add 2 hours to the working day Source: Pixmania Study, telegraph.co.uk 31.10.12, Photo: Getty Images
  10. 10. BYOD: 5 Considerations
  11. 11. BYOD: The new IT challengeNew challenges for IT departments Device Diversity Mixed ownership Network accessCompliance & security IT productivity IT needs tools to control devices Many different apps Enterprise vs. Personal Apps User is the admin
  12. 12. 1. Users
  13. 13. Users have different needs My I need mobile iPads are smartphone is I am IT! access to my great for my lifeline sales data presenting
  14. 14. Know your users IT Sales Office staff Remote workers Smartphone 100% 100% 20% 100% Tablet 50% 70% 10% 50%Work remote 30% 80% 10% 100% Manager 5% 10% 15% 0%PC/Notebook 100% 100% 100% 100%Devices/user 2.5 2.7 1.3 2.5
  15. 15. 2. Devices
  16. 16. User devicesUser-owned devices- What happens in case of loss or theft?- Can you wipe the device?- What can you enforce?- Can you block applications?- How can you ensure data security?
  17. 17. Narrowing down  Look at experience in IT   Compare OS functionality   Decide which platforms  Define minimum OS version   Device model restrictions?   Device type restrictions?
  18. 18. The Acceptable Use PolicyScope• Which devices does it cover?• Corporate and personal devicesTechnical Requirements• Minimum OS• Encryption• Password• Anti-malware protectionUser Requirements• What happens when…• Back up of personal data
  19. 19. 3. Apps
  20. 20. All about apps• Potential risk from apps• Third-party app stores• Which workflows put sensitive data on personal devices?• What regulations apply to your region/industry?• How can apps benefit the mobile user?• Promote collaboration with supported tools
  21. 21. Mobile Application Management • Distribute in-house apps • Link to app store or upload • Blacklist/Whitelist apps • Deploy apps to devices Enterprise App Store • Manage volume purchases • iOS Managed Apps • View installed apps
  22. 22. Secure collaboration, e.g. cloud 64% of people think cloud storage is risky but 45% still go right ahead and use it. Sophos InfoSec Survey, 2012 The solution: End-to-end encryption22
  23. 23. 4. Infrastructure
  24. 24. Resources for BYODPersonnel• IT staff or dedicated resources• Decentralized management• Experience available On premise solution, SaaS or Managed ServiceNetwork infrastructure• WiFi set up• Connecting remote workers• Mobile access to internal systems Stay productive
  25. 25. Priority for business Application Control Next Generation Firewall • Real-time reports • Completely block or allow applications • Allocate bandwidth and prioritize by shaping traffic to requirements • Monitoring and reporting history25
  26. 26. Hotspot guest accessProvide controlled andlimited access• Managed, temporary Internet access for guests and others• Ticket management  Password of the day  Volume-based  Time-based26
  27. 27. 5. Security
  28. 28. Widespread lack of awareness89% =unaware67% =unsecured65% =unbothered
  29. 29. Explosion of Android malware No. of Android malware samples discovered each year 80000 70000 60000 50000 40000 30000 20000 10000 0 2010 2011 201229
  30. 30. Security threats BYOD• An unsecured device means unsecured data  You can insure your devices – but what is your data worth?• MDM helps enforce controls such as password, lock, etc.  If you’re not sure, you’re not secure• Protect Android devices with anti-malware protection  Users can remove protection, so needs to be enforced• Malicious websites can also target mobile users  Apply web protection to keep web threats at bay
  31. 31. Keep malware at bay Free Managed
  32. 32. 5 Considerations for BYOD 1. Users 2. Devices 3. Apps 4. Infrastructure 5. Security
  33. 33. Choosing an MDM solution Choose a flexible solution Ensure it can grow with you Look at security options Look at licensing Don’t bite off more than you can chew
  34. 34. Checklist for your BYOD solution MDM Buyers Guide (registration required)
  35. 35. And what about costs? 1 2 2 user devices licenses @ 50$ / license = 100$Better option 2 1 user 1 license devices
  36. 36. Additional resourcesMobile Security ToolkitSmartphones and Tablets forDummiesMDM Buyers GuideFree Android Security AppFree Trial -Endpoint, mobile, data and websecurity licensed by the user—not the device
  37. 37. Complete Security Endpoint Web Email Data Mobile NetworkReduce attack surface Protect everywhere Stop attacks and breaches Keep people working URL Filtering Web Application Endpoint Web Encryption Data Control Access control Automation WiFi security Firewall Protection for cloud Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help Application Mobile app Clean up Technical Device Control Secure branch Intrusion Firewall Control security support offices prevention Encryption Live Protection Email encryption
  38. 38. Staying ahead of the curveStaying ahead of the curve US and Canada facebook.com/securitybysophos 1-866-866-2802 NASales@sophos.com Sophos on Google+ UK and Worldwide linkedin.com/company/sophos + 44 1235 55 9933 Sales@sophos.com twitter.com/Sophos_News nakedsecurity.sophos.com 38

×