1 / 25

Managing and Securing BYOD

Managing and Securing BYOD. Legal IT’s Next Great Challenge. Agenda. The BYOD Trend – Evolution of Mobile Technology Best Practices for Managing Mobile Device Usage Overview of Mobile Device Management Technologies BYOD Management Strategies and Trends. The BYOD Trend – Some History.

sierra
Download Presentation

Managing and Securing BYOD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Managing and Securing BYOD Legal IT’s Next Great Challenge

  2. Agenda • The BYOD Trend – Evolution of Mobile Technology • Best Practices for Managing Mobile Device Usage • Overview of Mobile Device Management Technologies • BYOD Management Strategies and Trends

  3. The BYOD Trend – Some History • Employee use of company owned computers • Using laptops to access the Internet • Drove usage policies and technology controls • RIM BlackBerry delivers first mobile device • Apple iPhone changes everything

  4. BYOD –Benefits and Challenges • Benefits • Improved responsiveness • Improved accessibility • Greater flexibility • Challenges • IT support of a wide range of mobile vendors and operating environments • Secure access to firm data • Mitigate risk of unsecure personal apps

  5. 70 millionSmartphones lost/stolen in 2011 Only 7% Recovered Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

  6. 17% of businesses Have mobile device breaches Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

  7. Best Practices • Registering devices to ensure security: • Virus protection, authentication, encryption • Provisioning of firm-authorized apps • IT use monitoring • User education • Compliance with firm security policies • Mobile Device registration with IT • Password protection • Use of unsanctioned apps • Lost/stolen devices

  8. Mobile Device Management

  9. Mobile Device Strategy

  10. How Do You Support Mobility? • Who is responsible for equipment? • IT staff availability and training • Mobile device OS and security upgrades • Mobile Device Management platform • Is your firm website mobile friendly?

  11. Mobile Device Management • Not new! • Optimize functionality • Increase security • Compliance • Is MDM a requirement for BYOD?

  12. Smartphones have become anarchy in a pocket They have the power of a full desktop system of just a decade ago, and that power is increasing quickly. Source: Tom Henderson, ITWORLD.com

  13. Why Now? • BYOD • Malicious threats • Control Application Portfolio • Lost and Stolen Phones • Access Control and Auditing • Compliance • Growing device inventory • Native functions and features don’t cut it • Changes to Microsoft Exchange licensing costs

  14. MDM is subject to the weakness of the underlying platformGoogle only provided 16 APIs, compared to more than 500 APIs for the latest version of BlackBerry. Source: May 18, 2012 COMPUTERWORLD.com, Matt Hamblem

  15. Solution Options • On-premise • Service-based • Hybrid

  16. Common Features • Device provisioning and configuration • Policy application • Security • Backup / restore • Remote lock and wipe • Sandboxing • Activity logging • Reporting / dashboard

  17. Advanced Features • Network access control • Application deployment and management • Firmware updates • Diagnostics • Network usage and support • Mobile asset tracking and management • Troubleshooting and diagnostic tools • Remote control • Remote administration • GPS tracking and 'breadcrumb' mapping

  18. Most Common Platforms Common in Legal: • Airwatch • MobileIron • McAfee • Fiberlink (MaaS360) • Good • BlackBerry • For BlackBerry Devices

  19. Useful Feature Comparisons • http://mobiwm.com/mdm-comparison/ • http://www.bluefishwireless.net/wp-content/uploads/2012/06/Bluefish-MGMT-MDM-Comparison-Chart.pdf • Gartner: Magic Quadrant for Mobile Device Management Software 2012

  20. Selection Criteria • Enrollment • Ease • Self service • Administration • Ongoing Management • Scalability • Device Support

  21. Licensing Models • Perpetual license • Subscription • Per devices • Per user • Minimum number of devices?

  22. mindSHIFT’s Experience

  23. Future of MDM • Commoditized • Management tools with features built into devices • Open Mobile Alliance (OMA) • OMA Device Management Protocol • MDM absorbed into management platforms • Mobile Application Management (MAM) • Mobile Information Management (MIM)

  24. Q & A

  25. Thank You • Charlie Magliato • BiscomLegal Program DirectorCMagliato@Biscom.com • (978) 367-3592 • www.Biscom.com/Legal • Pat Sklodowski • mindSHIFT Technologies, Inc.Managing Director, Legal Professional Services Patrick.Sklodowski@mindSHIFT.com • (856) 425-0029 • www.mindSHIFT.com

More Related