Sie sind auf Seite 1von 27

Do BYOD the Right Way

An InformationWeek Webcast Sponsored by

Webcast Logistics

Todays Presenters

Jonathan Feldman, Contributing Editor, InformationWeek John Herrema, SVP Corporate Strategy, Good Technology

Achieving BYOD Balance


Bring-your-own-device, and the tensions between security and usability Jonathan Feldman

Ideal IT customer

IT, by nature, gets unhappy ones too.

CIOs Only Get A Few Happy Notes

BYOD Delights Customers

One Year Ago: IT Staffs BYOD Reaction

But believe it or not, the world did NOT come to an end.

Where are you on the BYOD trail?


Choose all that apply to your company:
IT worked with business units to assess risks & benefits prior to enacting policy Defined BYOD policy prior to MDM rollout Defined BYOD policy after MDM rollout Rolled out MDM without new policies Heck, no, were never doing BYOD

Success Starts & Ends With Trust & Accountability

Too Many Controls For Too Little Risk Harms Trust & Hampers Business

BYOD Can Work

but only if its not IT vs the organization More info & discussion @_jfeldman jf@feldman.org 828-333-4663

Doing BYOD the Right Way

John Herrema SVP Corporate Strategy Good Technology, Inc. March 2012

BYOD already happening, fast becoming standard practice


Source: Good Technology BYOD Survey, October 2011 Survey of Goods Top 400 Customers, n=108

Life Sciences Government(Local) Communications Software Entertainment/Media Retail/Wholesale Legal Government (Federal) Transportation/Logistics Manufacturing Professional Services Healthcare Finance/Insurance 0% Currently Support 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

1 1 2 3 3 4 5 6 7 9 13 14 40

Planning to Support, Next 6 Months

Planning to Support, 6-12 Months

Considering, But No Specific Timeframe Not Planning to Support

72% already support formal BYOD programs 4% plan to do so in next 6 months, 15% considering Only 9% have no plans to support

Critical BYOD Considerations


1.

DEFINE BUSINESS OBJECTIVES


Mobile Expansion Cost Reduction

2.

DEFINE BYOD PROGRAM ELEMENTS


Eligibility Enablement & Support Reimbursement (if any) Acceptable Use Privacy Policy Policy Violations

3.

IMPLEMENT SUPPORTING SOLUTIONS


Security, Data Loss Prevention, and Compliance Device Management Self-Service

Risks in todays mobile environment


Device Risk:
Consumer-focused, limited security Inconsistent from one platform to next Explicitly designed to share & replicate data

User-based Risk:
Devices, apps used without IT knowledge They dont comply with IT security policies For better or worse, theres an app for that! Users purposely replicate data on device and in cloud (Dropbox, Box.net, etc.)

Enterprise Risk:
User passion for device choice and flexibility makes circumvention more likely Exposes agency to data breaches Prevents security policy consistency

MDM to the rescue? - not exactly


Inconsistent policies, variable support for hardware encryption

Relies on limited, often inconsistent native security implementations

Most policies implemented at device, not app level

No separation between personal and business data and apps

No practical way to prevent native and prosumer apps from leaking data

No ability to prevent data leakage

Goods answer secure container


Personal Data
Devices remain personal, untouched by enterprise
No need to restrict

Enterprise Data
Enterprise data control
Password and app policies Data loss prevention Selective remote wipe Encryption OTA and at rest

personal services or apps


No privacy issues Justifies shared

BYOD expense

Freely access personal apps and data


iCloud Personal apps Games Music Pictures Videos

Access corporate apps


Email & PIM Intranets and collaboration

tools (e.g. Sharepoint)


Web-enabled apps Enterprise apps

Flexible management options


1 2 3

BYOD
Container Management

GovernmentIssued
Container Management + Device Wipe

GovernmentIssued
Container + Whole Device Management

About Good Technology the leader in multiplatform enterprise mobility


Over 3,000 deployments of iOS/Android solution since launch in December 2009 7 of Fortune 10; 50 of the Fortune 100; 8 of top 10 financial; 5 of top 10 healthcare Only iOS/Android solution certified for use by DoD, DHS, DARPA, federal government Over 70% of largest customers already formally supporting BYOD
Financial Services

Government/ Public Sector

Healthcare/ Life Sciences

High-Tech

Pro Services/ Legal

Thank You! Questions?

Q&A Session

Jonathan Feldman Contributing Editor InformationWeek

John Herrema SVP Corporate Strategy Good Technology

Resources
To View This or Other Events On-Demand Please Visit: http://www.netseminar.com

For more information please visit:

Das könnte Ihnen auch gefallen