Presentation is loading. Please wait.

Presentation is loading. Please wait.

MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.

Similar presentations


Presentation on theme: "MANAGING AND SECURING BYOD Legal ITs Next Great Challenge."— Presentation transcript:

1 MANAGING AND SECURING BYOD Legal ITs Next Great Challenge

2 AGENDA The BYOD Trend – Evolution of Mobile Technology Best Practices for Managing Mobile Device Usage Overview of Mobile Device Management Technologies BYOD Management Strategies and Trends

3 THE BYOD TREND – SOME HISTORY Employee use of company owned computers Using laptops to access the Internet Drove usage policies and technology controls RIM BlackBerry delivers first mobile device Apple iPhone changes everything

4 BYOD – BENEFITS AND CHALLENGES Benefits Improved responsiveness Improved accessibility Greater flexibility Challenges IT support of a wide range of mobile vendors and operating environments Secure access to firm data Mitigate risk of unsecure personal apps

5 70 MILLION SMARTPHONES LOST/STOLEN IN 2011 ONLY 7% RECOVERED Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

6 17% OF BUSINESSES HAVE MOBILE DEVICE BREACHES Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

7 BEST PRACTICES Registering devices to ensure security: Virus protection, authentication, encryption Provisioning of firm-authorized apps IT use monitoring User education Compliance with firm security policies Mobile Device registration with IT Password protection Use of unsanctioned apps Lost/stolen devices

8 MOBILE DEVICE MANAGEMENT

9 MOBILE DEVICE STRATEGY

10 HOW DO YOU SUPPORT MOBILITY? Who is responsible for equipment? IT staff availability and training Mobile device OS and security upgrades Mobile Device Management platform Is your firm website mobile friendly?

11 MOBILE DEVICE MANAGEMENT Not new! Optimize functionality Increase security Compliance Is MDM a requirement for BYOD?

12 SMARTPHONES HAVE BECOME ANARCHY IN A POCKET THEY HAVE THE POWER OF A FULL DESKTOP SYSTEM OF JUST A DECADE AGO, AND THAT POWER IS INCREASING QUICKLY. Source: Tom Henderson, ITWORLD.com

13 WHY NOW? BYOD Malicious threats Control Application Portfolio Lost and Stolen Phones Access Control and Auditing Compliance Growing device inventory Native functions and features dont cut it Changes to Microsoft Exchange licensing costs

14 MDM IS SUBJECT TO THE WEAKNESS OF THE UNDERLYING PLATFORM GOOGLE ONLY PROVIDED 16 APIs, COMPARED TO MORE THAN 500 APIs FOR THE LATEST VERSION OF BLACKBERRY. Source: May 18, 2012 COMPUTERWORLD.com, Matt Hamblem

15 SOLUTION OPTIONS On-premise Service-based Hybrid

16 COMMON FEATURES Device provisioning and configuration Policy application Security Backup / restore Remote lock and wipe Sandboxing Activity logging Reporting / dashboard

17 ADVANCED FEATURES Network access control Application deployment and management Firmware updates Diagnostics Network usage and support Mobile asset tracking and management Troubleshooting and diagnostic tools Remote control Remote administration GPS tracking and 'breadcrumb' mapping

18 MOST COMMON PLATFORMS Common in Legal: Airwatch MobileIron McAfee Fiberlink (MaaS360) Good BlackBerry For BlackBerry Devices

19 USEFUL FEATURE COMPARISONS content/uploads/2012/06/Bluefish-MGMT-MDM-Comparison- Chart.pdf Gartner: Magic Quadrant for Mobile Device Management Software 2012

20 SELECTION CRITERIA Enrollment Ease Self service Administration Ongoing Management Scalability Device Support

21 LICENSING MODELS Perpetual license Subscription Per devices Per user Minimum number of devices?

22 MINDSHIFTS EXPERIENCE

23 FUTURE OF MDM Commoditized Management tools with features built into devices Open Mobile Alliance (OMA) OMA Device Management Protocol MDM absorbed into management platforms Mobile Application Management (MAM) Mobile Information Management (MIM)

24 &&QQAA

25 THANK YOU Charlie Magliato Biscom Legal Program Director (978) Pat Sklodowski mindSHIFT Technologies, Inc. Managing Director, Legal Professional Services (856)


Download ppt "MANAGING AND SECURING BYOD Legal ITs Next Great Challenge."

Similar presentations


Ads by Google