Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Mobile Protection Overview
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing the BYOD Management Gap: the evolution of enterprise mobility.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
© Copyright RES Software. v2012-Mar30. RES HyperDrive Patrik Zander, Product Manager 1.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Security considerations for mobile devices in GoRTT
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Riva – Sync GoldMine to Exchange and Office 365 Server-side sync | No plug-ins required Neil Graham Riva Specialist Riva CRM Integration ext.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
User and Device Management
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
#SummitNow Managing Mobile Content Wednesday 13 th November 2013 Mike Hatfield, Lead Engineer Mobile Apps, Alfresco Marc Dubresson, Dir. Mobile Product.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Mobile Devices in the Corporate World
The time to address enterprise mobility is now
Hybrid Cloud Web Filtering Platform
Distributed Asset Management Making The Business Case
Mobile Data Solutions Inc
Cloud-First, Modern Windows Management and Security
Mobile Device Management
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
Getting Started.
MICROSOFT AZURE ISV PROFILE: ONEBE
Getting Started.
COMPLETE BUSINESS TEXTING SOLUTION
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Managing BYOD Legal IT’s Next Great Challenge

Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview of mobile device management technologies  Case Study: Holland & Hart

The BYOD Trend – Some History  Employee use of company owned computers  Using laptops to access the internet  Drove usage policies and technology controls  RIM Blackberry delivers first mobile device  Apple iPhone changes everything

BYOD Benefits and Challenges  Benefits  Improved responsiveness  Improved accessibility  Greater flexibility  Challenges  IT support of a wide range of mobile vendors and operating environments  Secure access to firm data  Mitigate risk of unsecure personal apps

Smartphones lost/stolen in 2011 Only 7% Recovered 70 million 5 Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

Have mobile device breaches 17% of businesses 6 Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

Best Practices  Registering devices to insure security:  Virus protection, authentication, encryption  Provisioning of firm-authorized apps  IT use monitoring  User education  Compliance with firm security policies  Mobile Device registration with IT  Password protection  Use of unsanctioned apps  Lost/stolen devices

Mobile Device Management  IT Control of mobile device usage  Enforce authorized and secure access  Requires investment, resources and Administration  Central server  Manages all policies and employee access  Provides secure connection to firm data/applications  MDM mobile apps for user authentication and control enforcement of third-party apps

MDM Functions  Mobile app distribution  Auto install firm supported apps and updates  Policy management  User authentication policies  Sanctioned and blacklisted apps  Inventory management  Track employee usage  Optimize service plans

MDM Functions  Security management  Block noncompliant devices form the network  Password Protection  Block specific apps  Secure connections to firm data  Encryption  Require device level encryption  MDM secure container encryption

MDM Functions  Data Loss Prevention  Creates secure container on mobile device  Custom MDM apps for secure , calendar and browsers  Enforce encryption and selective wipe  Control file synchronization  Control file access outside secure container  File save, print, copy/paste, attachment  Mobile apps outside the secure container

MDM Case Study Scott Ainslie, Technical Operations Manager Holland & Hart 12

Real World MDM - History  Blackberries to iPhones – How we got here  What do we do about it?  Protecting the mobile inbox  More than just on phones - Tablets  Time entry  Documents  Intranet/VPN

Present Solution  Firm issued phone, personal tablet  iPhone vs Android – Windows Phone?  Firm data requires firm management  Mobile Device technology policy  Encryption  Lock times  Certificates  Support  Official Apps (Time, DM, VPN)

Current Projects  Network Access Control (NAC/NAP)  Enterprise replacement for Dropbox  Desktop Virtualization  Beyond phones & tablets – laptops  Mobilize the Intranet  MS Office device subscription

&& QQ AA 16

Thank you for attending our webinar. If you wish to view this presentation again, please contact us at: OR Secure Document Delivery Blog blog.biscom.com On the Web biscomdeliveryserver.com Phone (800)  Whitepapers  Case Studies  and more 17