Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

23
www.soti.net The BYOD of Tomorrow: BYOD 2.0 SOTI Inc. Presents Security Challenges in Enterprise Mobility Management

Transcript of Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Page 1: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

www.soti.net

The BYOD of Tomorrow:BYOD 2.0

SOTI Inc. Presents

Security Challenges in Enterprise Mobility Management

Page 2: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

What is BYOD 1.0?

• BYOD 1.0 was the first wave of mobile device management that controlled the entire device

• BYOD 1.0 was inadequate as a tactical solution, forcing mutual sacrifices to be made by employers and employees

• BYOD 1.0 as a policy framework was not fully baked, was too device-centric, and didn’t focus on the complete mobility lifecycle

Source: Gartner

Page 3: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

What is BYOD 2.0?BYOD 2.0 is the rapid evolution of BYOD 1.0• BYOD 2.0 is the evolution towards managing the apps

necessary for enterprise to secure corporate privacy while maintaining personal privacy

• Forbes coined BYOD 2.0 as “The move away from either business or employee-owned centricity, and toward the intersection of the two”

• BYOD 2.0 is the most radical change to the economics and the culture of client computing in business

Source: Gartner

Page 4: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Source: Gartner

The BYOD ShiftToday vs Tomorrow

• BYOD will dominate enterprise in 2020

• 45% of enterprise will need to support BYOD

• 40% of enterprises will provide both corporate-liable and BYOD

Page 5: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Popularity of BYODRiding the BYOD Wave

• By 2015, the number of employees using mobile applications in the workplace will double

• By 2016, organizations will spend over $300/employee/year on mobile applications, security, management and support

• By 2017, half of employers will require employees to supply their own device for work purposes

Source: Gartner

Page 6: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Generation Y Employees:• 75% actively use personal mobile devices in the

workplace

• 35% couldn't go a day without checking their social media networks

• 47% wouldn't manage 24 hours without sending a text

• 66% believe IT has no right to monitor or restrict behavior, even on company-issued devices on corporate networks

• 52% of IT professionals say that they believe employees follow IT policies BUT 71% of Gen Y workforce actively disobey company rules

Pushing IT Limits

Page 7: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Drivers of BYOD

• Interoperability of connected “devices”

• Multiple device usage will prompt the increase in pairing devices and services for home and work

• The Internet of Things will heighten the need for BYOD security

• New form factors will continue to emerge, and these devices will be brought to work

Page 8: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Why Secure BYOD?

“My work will not supply me with apps. I’m just going to download them myself.”

“I just got the new iPad. I will connect to the office network.”

“I can’t find a secure network at my local coffee shop…I will use the open Wi-Fi.”

BYOD is changing the culture of the business environment

Page 9: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Top-5 Trends in BYOD & Mobile Security• The number one benefit of BYOD is greater employee

satisfaction and productivity

• A majority of companies are concerned about loss of and unauthorized access to data

• Encryption is the most used risk control measure for mobile devices

• The biggest impact of mobile security threats is the need for additional IT resources to manage them

• The most popular mobile business applications are email, calendar and contact management

Source: Lumension

Page 10: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Mobile Security ConsiderationsMore IT security challenges and less control

• 40% of devices are consumer owned

• 80% of professionals will use 2 or more devices by next year

• Less than 1/3 of companies enforce any security policies, controls, or encryption on these personal devices

• Corporate systems and data are more accessible than ever

Source: Gartner

Page 11: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Summary Policy Considerations

BYOD Policy

PlatformSupport

OS SupportMobile registration

Pre-Enrollment Checks

Policy complianceRooted / Jail-broken devices

End user Agreement

Monitoring, remote support, data storage

Device Ownership

Employee vs. corporation owned devices

Authentication

Passcode parametersPKI and SSO

Encryption

Data at rest or in motionHandling breaches

WiFi /VPN Access

WiFi rulesCorp network, apps & data

Mobile Apps

Granular accessApp complianceBL / WL of apps

Mobile Data

Data loss preventionAutomatic actions

Telecom Expenses

Voice/data roaming policies

Device Loss /Employee Departure

Decommission devicesBackup Data

77 % of organizations are most concerned about protecting business and employee data

Source: Lumension

Page 12: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

The Great DivideEmployees say…

70%of employees access the corporate

network with personal devices

88%of employees view their

personal devices as secure

IT thinks…

37%of IT managers think employees are accessing the corporate network from personal device

77%of IT managers see risk of infection from

BYOD mobile devices as very high

Source: Security InfoWatch

Page 13: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

The Challenges of BYOD

• Security

• Risk of Data Leakage

• Risking Viruses and Malware

• Additional skills required for help support

• Managing multi-platform devices

Page 14: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Recommendations for BYOD StrategyImpactsBYOD drivers innovation by increasing the number of mobile application users in the workforce

BYOD drives employee satisfaction

BYOD can be used as a cost reduction and avoidance mechanism

BYOD increases risk and changes expectations

Top Recommendations• Look for opportunities throughout the entire workforce where mobility could

drive substantial innovation• Pursue platform-agnostic application platforms

• Assess where your organization sits vs others in your industry

• Decide on how many forms of BYOD you will support• Determine when, how and how much you will subsidize business use of personal devices

• Establish clear policies for BYOD• Invest in key technologies to separate enterprise and personal applications and data• Establish user self-support and third-party support options• Specify what platforms will be supported

Source: Gartner

Page 15: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

BYOD risksYou can’t protect what you can’t control

• Security risks

• Safeguarding corporate data

• Malware, viruses, and hacking

• Secure remote access

• Compliance and privacy

• Lost or stolen devices

• Parting employee data recovery

Page 16: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Enable your mobility strategyEstablish Clear BYOD Policies

• Clear Security Policies

• Protect Limit VPN access

• Protect Corporate Data

• Application control strategies make BYOD policies more secure

• Clearly communicate the separation of work from fun

Page 17: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Optimize your mobility strategyBest practices and policy enforcement are essential

• Are you subject to controls such as HIPAA or PCI DSS?

• If a device is lost, can you wipe the data?

• Do employees know what rights they give up when using a mobile device?

Page 18: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Secure your mobility strategyManage BYOD with EMM

• Enroll devices• Application Catalog• Self-Serve Portal• Content Library• Configure Wi-Fi/VPN• Wipe Corporate Data• Email Policies• Detect Jail-broken/rooted devices

Page 19: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Best Practices• Registering devices to ensure security

• Virus protection, authentication, encryption

• Provisioning of enterprise-authorized apps

• IT should be able to remotely monitor

• User education • Compliance with firm security policies• Mobile Device registration with IT• Password protection• Use of unsanctioned apps• Lost/stolen devices

Page 20: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

SOTI is the World’s Most Trusted EMM Vendor12,000+ customers, millions of devices managed worldwide

Since 1995, SOTI Inc. has been developing industry - leading technology that solves the unique challenges involved in managing, securing, supporting and tracking mobile devices.

Global Reach:

- 80,000+ customers across 170+ countries- 12,000+ customers using SOTI MobiControl EMM software - Millions of devices worldwide

Page 21: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Mobility Management Lifecycle

Page 22: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

SOTI provides the tools and solutions to make BYOD environments safe and productive ecosystems for today’s IT administrators

SOTI is the proven leader in innovative technology solutions for enterprise mobility

SOTI’s MobiControl is an award-winning EMM solution for mobile and desktop computing devices 

Page 23: Soti et LMLTechnologie - Bring your own device - BYOD - Mobilité et vous!

Questions?

Questions?

•www.moncourtierinformatique.com•www.lmltechnologie.com• 514-898-7379, #120