BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.

Slides:



Advertisements
Similar presentations
BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.
Advertisements

Security for Mobile Devices
Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
The Office of Information Technology Network Access Control (NAC) Anthony Espinoza Information Security Officer UTSA Office of Information Security.
Introducing the Mason Infotech BYOD Commercial Smart Solution Presented by Mark Powelll-Mason Infotech Ltd January 2013.
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
SMARTPHONE & TABLET CONSIDERATIONS. Smartphones and Tablets – PROVIDE VALUE FOR COUNCILS Enables mobility - Streamline business process - Remote access.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Improving Connections for the Mobile Worker Theron Dodson Ascendent Systems August 9.
©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Clinic Security and Policy Enforcement in Windows Server 2008.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Computer Services Overview. Computer Services Offices Main Office: D ‐ 127 Phone: 652 ‐ 4335 Hours: 8:30 am to 5:00 pm Monday ‐ Friday Academic Computer.
Systems technologies // healthcare solutions. What is messenger? Multi-user messaging platform Sends messages to: Wireless Telephones (WiFi / DECT) Pocket.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Secure Bring Your Own Device (BYOD) for Higher Education Name Title .
The Complete Solution Wireless Services. Understanding your Wireless Requirements Infrastructure is Key Budget Coverage Capacity Management Security Integration.
Bring Your Own Device in HCPSS. What is BYOD? BYOD stands for Bring Your Own Device Students and staff are welcome to bring their personal devices such.
Chapter 2 Securing Network Server and User Workstations.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Data management with mobile devices © 2014 wheresjenny.com Data management with mobile devices.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
11/8/2012Proprietary & Confidential1. Enhancing the learning environment to… Increase student & teacher competencies in technology Support the integration.
C C Introduction to Tivoli Endpoint Manager 8.2 Joe Saylor Tivoli Endpoint Manager Solutions Architect.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Moving to BYOD Gary Audin 1.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
Data Management With Mobile Devices ©2015 albert-learning.com Data management with mobile devices.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Phase 4: Manage Deployment
Barracuda Mobile Device Manager
BYOD: Short-term Gain Without Long-term Pain?
Information Technology (IT) Department
Introduction to Cisco Identity Services Engine (ISE)
Acer Technical Support Number
Acer Support New Zealand Number
CIS 349 Possible Is Everything/tutorialrank.com
CYB 110 Competitive Success/snaptutorial.com
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
CIS 349 Education for Service/tutorialrank.com
CIS 349 Education for Service/snaptutorial.com
Office 365 Security Assessment Workshop
What are IAM Key Processes.
Netop Vision Product presentation Göteborg 1.
Chapter 10. Mobile Device Security
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

BYOD Guide Created using iThoughts [...] [...]

BYOD Guide

Introduction Who is this for? Implications of BYOD Implications of no BYOD What is your policy? – Authentication – End Point Security – Access Control

Discovery Type/Class of Device – Class of Device IT Managed User Managed – Type of Device Laptop Tablet Smart Phone Other

Discovery Type/Class of User – Known Super User Departmental User Contractor – Unknown Contractor Guest

Discovery Location – Office – Home – Public Wi-Fi Hote Spot – Hotel – Non-corporate Office Time of Day/Day of Week

Discovery Bandwidth Allocation – Per Device – Per User – Per Application Application/Service

Telephony Support Type/Class of Device Features – Single Number – Presence – Mobility

Define Access Policies Security Policy Alignment Network Services – Known User HR Involvement – New Employee Policy – Leavers Policy IT Managed Device – Laptop – Tablet

Define Access Policies User Managed Device – Corporate Location – Home – Other Location – Unknown User User Managed Device – Corporate Location Telephony – Corporate Handset

Define Access Policies Staff Contractor – Personal Handset Staff Contractor – HR Involvement New Employee Policy Leavers Policy

Design, Specification & Deployment Goals - what do you want to achieve? Design & Architecture Resilience/Redundancy Integration Define User Groups Profile - what can we find out about the device? Posture - what are we checking?

Design, Specification & Deployment Enforcement - what action do we take? Implementation - how do we install? Setting Expectations Determine Timescales Scheduling User Group Regression Plans Proof of Concept

Design, Specification & Deployment – Users – User Devices – Objectives – Pre-test – Success Criteria – Stakeholders – Sign Off

Management On Boarding – IT Staff Impact – Automation Monitoring – Diagnostics – Logging – Compliance and Auditing

Management – Reporting – Alarms – Incident Response – Revocation Security Policy Aligment – Users – IT Managed Device

Management – User Managed Device – HR Implications – Change Management – Security Audit – Review Process

Next Steps Call Marie on +44 (0) Marie -