Mobile Asset Disposition in a BYOD World Craig Boswell HOBI International, Inc.

Slides:



Advertisements
Similar presentations
Mobile Devices/Smartphones Blackberry Treo Motorola Q iPhone.
Advertisements

1 Video Cloud for Business Enterprises Geng Lin CTO, IBM Alliance Cisco Systems P2P & Cloud Media Summit Los Angeles, CA May 6, 2010 Geng Lin CTO, IBM.
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Maximizer CRM Chris Dauth RapidCRM.
Mobile GIS.
McAfee One Time Password
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Corporate File Sharing Solution CORPORATE DROP-BOX.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Did You Know? Number of spam s sent each day? 100 billion.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
 At the end of this class, students are able to  Describe definition of input devices clearly  List out the examples of input devices  Describe.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Company/Product Overview. You have lots of files all over the place.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Telecommunications. General Information Industry: Telecommunication Industry Patent Number: (US Patent) Title: Electronic Device Security.
Looking to Build a Secure Enterprise Mobile Application? Here’s How! Mush Hakhinian Chief Security Architect Intralinks Mush Hakhinian Chief Security Architect.
Chapter 11 BSAD 145 Jason Smith Andrew Fleming. Introduction The Technology Camel Supporting Today’s End User End User Toolset 1. The Internet 2. Mobile.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Quick Start Guide (en) Communote 2.0. Communardo Software GmbH · Kleiststraße 10 a · D Dresden/Germany · +49 (351) ·
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
120204_ 1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Nico Malancea, IST Main point:  Employees using their own smartphones would allow companies to enjoy all of the same benefits of a mobile workforce.
HP Sales & Marketing Collateral Management Solution.
Time Collection with Mobile Devices Session Presented by JP Issock Quality Business Consulting.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
Outline Personal Computer Desktop Computer Mobile Computers and Mobile Devices - Notebook Computer - Tablet PC - Smart Phones and PDAs - Ebook Readers.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Software refer to all the programs that can be run on the computer.
TechOrchard Phil Poje, CEO. Benefits and Risks Data Breaches BYOD Mobile Device Management.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
Ruby Manager Overview Copyright 2006 VeriFone, Inc. All rights reserved. No part of this publication may be copied, distributed, stored in a retrieval.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Focus for the Future Technology-Related Proposals Daniel Ewart, CIO.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Total Enterprise Mobility Comprehensive Management and Security
sing Mobile data collection Using Mobile data collection SMS based system Smartphone System When to go for Mobile Implementation Edouard Legoupil Data.
What is Cloud Computing?
Phase 4: Manage Deployment
iPhones and iPads and iTunes, Oh My!
Cloud Computing Q&A Presented by:
Explain the five parts of an information system: people, procedures, software, hardware, and data.
Mobile Data Solutions Inc
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Mobile Apps – The Traveler Centric Future
Introduction to BYOD EIT, Author Gay Robertson, 2017.
IBM Global Financing IBM Asset Recovery Solutions
What this activity will show you
COMPLETE BUSINESS TEXTING SOLUTION
Interactive Media Technology
Presentation transcript:

Mobile Asset Disposition in a BYOD World Craig Boswell HOBI International, Inc.

Overview What are the key issues? Why is the solution difficult? How can my organization address the problem? Where do we go from here?

What are the key issues? Collection/Reverse logistics I dont own the device Everyone has one Data Destruction There is lots of corporate data There is lots of personal data Financial Return

Why is the solution difficult? Mobile devices including tablets and cellphones have become ubiquitous 300 million devices in the U.S. 2.5 billion devices worldwide Mobile devices have become an integral part of daily lives

Why is the solution difficult?

Why is the solution so difficult? Corporations need to establish plans and policies up front. IT departments need to treat mobile assets with the same type of management programs Devices are different, but need for thorough planning is the same

Why is the solution so difficult? When does end of life occur Lost device Stolen device Employee trade-in Corporate trade-in Defective device Buyback sale

Addressing the problem Logistics Unique challenges with mobile devices BYOD versus corporate owned devices require differing solutions Data access is a benefit not a right Risk analysis often determines logistics solution

Addressing the problem Logistics Secure storage for collected devices Secure shipping and serial number tracking Distributed shipping options Buyback as a solution for BYOD

Addressing the problem

Data destruction Erasure techniques must address all types of user input data on all devices Contacts s Text Messages Pictures Videos Games Web Logins UDID Interfaces PIN Numbers Applications Phone Numbers Tweets

Addressing the problem

Each device operating system represents data storage challenges Each OEMs implementation of the operating system can be different Different models from the same OEM can store information differently

Addressing the problem Segregate corporate data from personal data MDM solutions Policies Resets are not always a solution Unique mobile issues Blackberry PIN, UDI software

Addressing the problem Financial Return High value assets ASP for an iPhone $175 ASP for an iPad $220 ASP for a Blackberry $90 ASP for a desktop PC $45

Addressing the problem Financial Return Refresh cycles often on two year cycle Corporate deployments shifting to mobile devices Transportation and logistics cost can be managed due to size of devices Return can be a result of buyback process

Where do we go from here? Mobile devices continue to increase Mobile operating systems dominate Corporations depend on the producibility improvements of mobile computing Industry leaders need to address ownership, logistics, data security, and benefit from potential financial return