5 considerations for a successful byod strategy
DESCRIPTION
Bring your own device (BYOD) is becoming the rule rather than the exception which has created a new set of challenges for IT. A BYOD strategy can help you get a grasp on your mobile devices. But with the right security solution, it can also save you time, money, and the sanity of your help desk. Watch this webcast to understand how BYOD impacts your security and what to look for in a BYOD solution. Learn more about BYOD here: http://bit.ly/Ob1GizTRANSCRIPT
![Page 1: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/1.jpg)
5 Considerations for aSuccessful BYOD Strategy
Barbara Hudson, Global Product Marketing Manager, Mobile Data Protection
![Page 2: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/2.jpg)
Poll Question PlaceholderAre employees in your organization allowed to use personal devices for work?
•No and no plans•No but planning to allow•Yes, for email only•Yes, for email and other systems•Don’t know/other
![Page 3: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/3.jpg)
What we’ll talk about• What is BYOD?• Mobile Revolution, the Post PC era?• BYOD: What to consider
1. Users
2. Devices
3. Apps
4. Infrastructure
5. Security
• Choosing a BYOD solution• Q&A
![Page 4: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/4.jpg)
What is BYOD?
Consumerization of IT?
Personal smartphones, tablets, etc. being used at work
When employees pay for their own devices and plans
Bring Your Own Technology
Define what BYOD means – for you
There are probably no two organizations where
it means exactlythe same
![Page 5: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/5.jpg)
The mobile revolution
![Page 6: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/6.jpg)
The big shift
Source: Kleiner, Perkins, Caufield, Byers, Dec 2012
20001.3 million
devices
20121.2 billion devices
![Page 7: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/7.jpg)
BUTPCs are evolving
- New interfaces
- New form factors
The Post-PC era? Not yet.
7
Data source: ZDNetPhoto source: Fujitsu
66%
29%
5%
![Page 8: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/8.jpg)
The multi-device user
1.96 mobile devices used for
work in 2012iPass Mobile Workforce Report,
2012(Tablets, smartphones and mobile phones)
![Page 9: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/9.jpg)
All work and no playSmartphones and tablets add
2 hours to the working day
Source: Pixmania Study, telegraph.co.uk 31.10.12, Photo: Getty Images
![Page 10: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/10.jpg)
BYOD: 5 Considerations
![Page 11: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/11.jpg)
BYOD: The new IT challengeNew challenges for IT departments
IT needs tools to control devices
Mixed ownership
Many different apps
Network access
User is the admin
Compliance & security
Device Diversity
Enterprise vs. Personal Apps
IT productivity
![Page 12: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/12.jpg)
1. Users
![Page 13: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/13.jpg)
Users have different needs
I am IT!My
smartphone is my lifeline
I need mobile access to my
sales data
iPads are great for
presenting
![Page 14: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/14.jpg)
Know your users
100% 100% 20% 100%
50% 70% 10% 50%
30% 80% 10% 100%
5% 10% 15% 0%
100% 100% 100% 100%
2.5 2.7 1.3 2.5
SalesIT Office staff Remote workers
Smartphone
Tablet
Work remote
Manager
PC/Notebook
Devices/user
![Page 15: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/15.jpg)
2. Devices
![Page 16: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/16.jpg)
User devices
User-owned devices
- What happens in case of loss or theft?
- Can you wipe the device?
- What can you enforce?
- Can you block applications?
- How can you ensure data security?
![Page 17: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/17.jpg)
Narrowing down
Look at experience in IT
Compare OS functionality
Decide which platforms
Define minimum OS version
Device model restrictions?
Device type restrictions?
![Page 18: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/18.jpg)
The Acceptable Use PolicyScope
• Which devices does it cover?• Corporate and personal devices
Technical Requirements• Minimum OS• Encryption• Password• Anti-malware protection
User Requirements• What happens when…• Back up of personal data
![Page 19: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/19.jpg)
3. Apps
![Page 20: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/20.jpg)
• Potential risk from apps• Third-party app stores• Which workflows put sensitive data
on personal devices?• What regulations apply to your
region/industry?• How can apps benefit the mobile
user? • Promote collaboration with
supported tools
All about apps
![Page 21: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/21.jpg)
• Distribute in-house apps
• Link to app store or upload
• Blacklist/Whitelist apps
• Deploy apps to devices
• Manage volume purchases
• iOS Managed Apps
• View installed apps
Mobile Application Management
Enterprise App Store
![Page 22: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/22.jpg)
Secure collaboration, e.g. cloud
22
64% of people think cloud storage is risky but 45% still go right ahead and use it.
Sophos InfoSec Survey, 2012
Notebook
Cloud Storage
Mobile Device
The solution: End-to-end encryption
![Page 23: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/23.jpg)
4. Infrastructure
![Page 24: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/24.jpg)
Resources for BYODPersonnel• IT staff or dedicated resources• Decentralized management• Experience available
On premise solution, SaaS or Managed Service
Network infrastructure• WiFi set up• Connecting remote workers• Mobile access to internal systems
Stay productive
![Page 25: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/25.jpg)
Application Control
Next Generation Firewall • Real-time reports• Completely block or
allow applications• Allocate bandwidth and
prioritize by shaping traffic to requirements
• Monitoring and reporting history
Priority for business
25
![Page 26: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/26.jpg)
Hotspot guest accessProvide controlled and limited access• Managed, temporary
Internet access for guests and others
• Ticket management Password of the day Volume-based Time-based
26
![Page 27: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/27.jpg)
5. Security
![Page 28: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/28.jpg)
Widespread lack of awareness
89% = unaware
65% = unbothered
67% = unsecured
![Page 29: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/29.jpg)
29
Explosion of Android malware
2010 2011 20120
10000
20000
30000
40000
50000
60000
70000
80000
No. of Android malware samples discovered each year
![Page 30: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/30.jpg)
Security threats BYOD• An unsecured device means unsecured data
You can insure your devices – but what is your data worth?
• MDM helps enforce controls such as password, lock, etc. If you’re not sure, you’re not secure
• Protect Android devices with anti-malware protection Users can remove protection, so needs to be enforced
• Malicious websites can also target mobile users Apply web protection to keep web threats at bay
![Page 31: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/31.jpg)
Keep malware at bay
Free Managed
![Page 32: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/32.jpg)
5 Considerations for BYOD
1. Users
2. Devices
3. Apps
4. Infrastructure
5. Security
![Page 33: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/33.jpg)
Choosing an MDM solution
Choose a flexible solution
Ensure it can grow with you
Look at security options
Look at licensing
Don’t bite off more than you can chew
![Page 34: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/34.jpg)
Checklist for your BYOD solution
MDM Buyers Guide(registration required)
![Page 35: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/35.jpg)
And what about costs?
1 user
2 devices
2 licenses
1 user 2 devices 1 license
Better option
@ 50$ / license = 100$
![Page 36: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/36.jpg)
Additional resources
Mobile Security Toolkit
Smartphones and Tablets for Dummies
MDM Buyers Guide
Free Android Security App
Free Trial - Endpoint, mobile, data and web security licensed by the user—not the device
![Page 37: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/37.jpg)
Complete Security
Email Data Endpoint Mobile Web Network
Clean up
Automation
Visibility Local self-help
WiFi security
Keep people working
Technical support
Access control
Intrusion prevention
Anti-malware User education
Data Control
Stop attacks and breaches
Firewall
Email encryption
Virtualization
Endpoint Web Protection
Mobile Control
Secure branch offices
Encryption for cloud
Live Protection
Mobile app security
Protect everywhere
Web ApplicationFirewall
URL Filtering
Anti-spam Patch Manager
ApplicationControl
Encryption
Device Control
Reduce attack surface
![Page 38: 5 Considerations for a Successful BYOD Strategy](https://reader033.vdocuments.mx/reader033/viewer/2022051818/54bce94d4a7959815b8b45c2/html5/thumbnails/38.jpg)
38
US and Canada 1-866-866-2802
UK and Worldwide + 44 1235 55 9933
nakedsecurity.sophos.com
Staying ahead of the curveStaying ahead of the curve
facebook.com/securitybysophos
twitter.com/Sophos_News
Sophos on Google+
linkedin.com/company/sophos