Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.

Similar presentations


Presentation on theme: "Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview."— Presentation transcript:

1 Managing BYOD Legal IT’s Next Great Challenge

2 Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview of mobile device management technologies  Case Study: Holland & Hart

3 The BYOD Trend – Some History  Employee use of company owned computers  Using laptops to access the internet  Drove usage policies and technology controls  RIM Blackberry delivers first mobile device  Apple iPhone changes everything

4 BYOD Benefits and Challenges  Benefits  Improved responsiveness  Improved accessibility  Greater flexibility  Challenges  IT support of a wide range of mobile vendors and operating environments  Secure access to firm data  Mitigate risk of unsecure personal apps

5 Smartphones lost/stolen in 2011 Only 7% Recovered 70 million 5 Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

6 Have mobile device breaches 17% of businesses 6 Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

7 Best Practices  Registering devices to insure security:  Virus protection, authentication, encryption  Provisioning of firm-authorized apps  IT use monitoring  User education  Compliance with firm security policies  Mobile Device registration with IT  Password protection  Use of unsanctioned apps  Lost/stolen devices

8 Mobile Device Management  IT Control of mobile device usage  Enforce authorized and secure access  Requires investment, resources and Administration  Central server  Manages all policies and employee access  Provides secure connection to firm data/applications  MDM mobile apps for user authentication and control enforcement of third-party apps

9 MDM Functions  Mobile app distribution  Auto install firm supported apps and updates  Policy management  User authentication policies  Sanctioned and blacklisted apps  Inventory management  Track employee usage  Optimize service plans

10 MDM Functions  Security management  Block noncompliant devices form the network  Password Protection  Block specific apps  Secure connections to firm data  Encryption  Require device level encryption  MDM secure container encryption

11 MDM Functions  Data Loss Prevention  Creates secure container on mobile device  Custom MDM apps for secure e-mail, calendar and browsers  Enforce encryption and selective wipe  Control file synchronization  Control file access outside secure container  File save, print, copy/paste, email attachment  Mobile apps outside the secure container

12 MDM Case Study Scott Ainslie, Technical Operations Manager Holland & Hart 12

13 Real World MDM - History  Blackberries to iPhones – How we got here  What do we do about it?  Protecting the mobile inbox  More than just email on phones - Tablets  Time entry  Documents  Intranet/VPN

14 Present Solution  Firm issued phone, personal tablet  iPhone vs Android – Windows Phone?  Firm data requires firm management  Mobile Device technology policy  Encryption  Lock times  Certificates  Support  Official Apps (Time, DM, VPN)

15 Current Projects  Network Access Control (NAC/NAP)  Enterprise replacement for Dropbox  Desktop Virtualization  Beyond phones & tablets – laptops  Mobilize the Intranet  MS Office 2013 - 5 device subscription

16 && QQ AA 16

17 Thank you for attending our webinar. If you wish to view this presentation again, please contact us at: sales@biscom.com OR 978-367-3592.sales@biscom.com Secure Document Delivery Blog blog.biscom.com On the Web biscomdeliveryserver.com Twitter @biscominc Phone (800) 477-2472  Whitepapers  Case Studies  and more 17


Download ppt "Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview."

Similar presentations


Ads by Google