1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their...
-
Upload
fabian-place -
Category
Documents
-
view
218 -
download
1
Transcript of 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their...
![Page 1: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/1.jpg)
11
March 20, 2014
A SIMPLE APPROACH TO BYOD
![Page 2: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/2.jpg)
WHAT THEY DON’T WANT IS:
Company monitoring of their personal activities or restriction of the apps they rely on
Interruption of their calendar, contacts, phone and texting functions
Invasion or deletion of their personal data
USERS WANT EASE OF USE
Brooklyn gives IT the security they need andEmployees the freedom they demand.
COMPANIES WANT SAFE DATAWHAT THEY DON’T WANT IS:
Corporate data distributed on thousands of devicesUsers resorting to personal email or other insecure
means of maintaining productivity
THE STATE OF BYOD
![Page 3: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/3.jpg)
![Page 4: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/4.jpg)
DEVICE MANAGEMENT, CONTAINERIZATION:
Data is synchronized to the device Tools to mitigate risk if the device is lost or stolen
Device tracking, app control, monitoring Remote wiping of device
FIRST GENERATION SOLUTIONS
BYOD LANDSCAPE
ISSUES:
User acceptance of BYOD policy Legal ramifications of having access to personal data Questionable security
User’s won’t tell you that they lost a device Remote wipe – airplane mode, shielded bags Cracking tools can hack a container quickly
“HEAVY” model not applicable for all users
![Page 5: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/5.jpg)
NEXT GENERATION LIGHT SOLUTION
ZIXONE
o Email data never resides on the device
o No need to manage the device
o No concerns if the device is lost/stolen
o No issues when an employee leaves the organization
o Easier to work with contractors
o Avoid legal issues
o Computer Fraud and Abuse Act
o Litigation/Legal Holds
![Page 6: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/6.jpg)
NEXT GENERATION LIGHT SOLUTION
ZIXONE
o Users retain complete control
o No monitoring, restrictions or risk of data loss
o Users continue to use the device as it was intended
o Firewalling of personal data
o Limits company liability
o Avoid wrongful dismissal and discrimination claims
o Native functionality and UI of the device is maintained
o Notifications, Alerts
o Contact lookup
o Phoning
o Texting
![Page 7: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/7.jpg)
NEXT GENERATION LIGHT SOLUTION
ZIXONE
o Compliance reporting
o Simplifies the procedures to deal with a lost device
o No data to worry about – a big plus!
o Immediately disable the account
o Check the server to see what, if any, messages were accessed
o Allows you to quickly and succinctly ascertain the exposure
![Page 8: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/8.jpg)
8
ZixONE app that delivers a view of corporate email, calendar and contacts on mobile devices
ZixONE server connects to Exchange or Office365
Efficient, secure protocols deliver information quickly
ZIXONECOMPONENTS
![Page 9: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/9.jpg)
ZixONEService
ZIXONEARCHITECTURE
Low bandwidth, high performance link usingpatent-pending fetching and caching techniquesoptimized for wireless data communications.
![Page 10: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/10.jpg)
ZIXONE
![Page 11: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/11.jpg)
ZIXONE
![Page 12: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/12.jpg)
ZIXONE ADMINISTRATION
![Page 13: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/13.jpg)
ZIXONE ADMINISTRATION
![Page 14: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/14.jpg)
ZIXONE ADMINISTRATION
![Page 15: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/15.jpg)
ZIXONE ADMINISTRATION
![Page 16: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/16.jpg)
ZIXONE ADMINISTRATION
![Page 17: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/17.jpg)
ZixOne Admin – Audit Trail
![Page 18: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/18.jpg)
HEAVY SOLUTIONS VS ZIXONEHEAVY SOLUTION ZIXONE
Data on the device Yes No
Ability to monitor, restrict functionality
Yes No
Wipe the device YesUser must tell. Must be Online. Risky.
No
Seamless integration with native functions and UI
No Yes
Legal ramifications of access to personal data
Yes No
Easy compliance reporting No Yes
Data bandwidth usage Normal 2/3 less
Full iOS and Android support Maybe?Some restrictions on iOS upgrading. Not all Android versions and devices.
Yes
![Page 19: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/19.jpg)
19
ZIXONE STRATEGY COMPARISON
MDM
Containeri-zation
Native Controls
Virtualization
Browser-Based Services
ZixOne
Corporate
Needs
Corporate Data Protection: Corporate data does not reside on mobile devices and is not in jeopardy when off-line. Employee Work Enablement: Employees have simple, full access to the most used mobile application – email. Prevent Legal Claims: Liability is removed, because businesses cannot access personal data.
Employee
Demands
Employee Convenience: Easy connection to life and work on the devices they choose without any impairments. Employee Control: Employees control their devices, their apps and their personal data. Employee Privacy Personal activities and data cannot be monitored by their company.
![Page 20: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/20.jpg)
NEXT GENERATION LIGHT SOLUTION
ZIXONE
o Analysts recommend a two-pronged approach to BYOD
o A Heavy solution where it is actually needed
o A LIGHT solution where only email, calendar and contacts are required
o Easy Cloud Deployment
o Exchange 2007 and up
o Office365
o iOS 6.0 and up
o Android 2.3 and up
![Page 21: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/21.jpg)
NEXT GENERATION LIGHT SOLUTION
ZIXONE
o Final Thoughts
o #1 source of data breach is via lost/stolen devices
o 133 devices lost per minute
o “Heavy” solutions serve a purpose but are not scalable
o 42% of companies have tried a first generation solution
o 60% not happy (admin complexity, inadequate security)
o 60% of companies that support BYOD limit deployment due to privacy and personal data concerns
o Most employees only require email, calendar and contacts
o …and we’re just getting started!
![Page 22: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.](https://reader037.fdocuments.net/reader037/viewer/2022103111/5518c12a550346b31f8b55a4/html5/thumbnails/22.jpg)
NEXT GENERATION LIGHT SOLUTION
ZIXONE
#nodataonthedevice