kemtah it byod nlit draft 2.5-2012

13
NLIT 2012 Sun Valley Bringing Your Own Device (BYOD) Suppor?ng, Provisioning, and Financing

Upload: karate-karadi

Post on 07-Apr-2017

80 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Kemtah IT BYOD NLIT DRAFT 2.5-2012

NLIT%2012%Sun%Valley %%

Bringing%Your%Own%Device%(BYOD)%%Suppor?ng,%Provisioning,%and%

Financing%

Page 2: Kemtah IT BYOD NLIT DRAFT 2.5-2012

In%the%Beginning:%In%the%old%days%of%IT%we%may%have%used%somewhat%archaic%means….%%%%%%%%But%they%worked%and%were%rela?vely%inexpensive.%

Page 3: Kemtah IT BYOD NLIT DRAFT 2.5-2012

Let%there%be%light.%

•  Today%we%have%advanced%somewhat.%%

Page 4: Kemtah IT BYOD NLIT DRAFT 2.5-2012

But%there%is%a%fight!%

iPrecious!%

Page 5: Kemtah IT BYOD NLIT DRAFT 2.5-2012

The%Greatest%Concerns%for%CIOs%

•  Security%•  Produc?vity%•  Cost%

%%%%%%

•  Is%it%safe?%•  Does%it%work?%

•  Is%it%Economical?%%

Page 6: Kemtah IT BYOD NLIT DRAFT 2.5-2012

Mobile%Security%Threats%Android'Malware' iPhone'Hostage?'

Reference:%%hWp://www.maximumpc.com/ar?cle/news/hacker_holds_jailbroken_iphones_hostage_asks_ransom%Reference:%hWp://www.slashgear.com/symantec[android[

market[having[its[largest[malware[infec?on[ever[27211082/%

Page 7: Kemtah IT BYOD NLIT DRAFT 2.5-2012

COST'Some'Numbers:'%%

•  Intel%29,000%Mobile%Devices%58%%Employee%Owned.%

•  Cisco%BYOD%Gained%17[22%%Cost%Savings%(Only%one%known)%

•  Aberdeen%Group%Study:”While'CIOs'might'gloat'at'BYOD's'perceived'cost'savings—no'more'BlackBerry'purchases!—they'd'be'wrong'to'do'so.'Aberdeen'Group'found'that'a'company'with'1,000'mobile'devices'spends'an'extra'$170,000'per'year,'on'average,'when'they'use'a'BYOD'approach.”'

Reference:%%hWp://www.cio.com/ar?cle/703511/BYOD_If_You_Think_You_re_Saving_Money_Think_Again%

Page 8: Kemtah IT BYOD NLIT DRAFT 2.5-2012

Produc>vity?'''

Reference:%%New'Way'of'Work'Study,'VMware%Singapore%

Dual%Use:%44%%of%surveyed%employees%use%personal%devices%for%work%purposes.%Of%these,%94%%say%corporate%IT%is%aware.%%Policy%Restric?ons:%Singapore,%source%of%respondents%are%the%second[highest%in%IT%related%restric?ons%at%work%in%Asia%76%.%%Support:%43%%of%respondents%prefer%their%device%or%applica?on%even'without'IT'support.'%Sa?sfac?on:%50%%of%surveyed%report%less%stress%and%67%%admit%more%happiness%when%using%personal%devices%at%work.%63%'of'respondents'viewed'companies'which'allow'personal'device'and'applica>on'choice'as'more'progressive'and'the'preferred'employer.'%Efficiency%and%Efficacy:%60[70%%of%employees%surveyed%feel%more%effec?ve%and%efficient%when%using%their%own%tools.%

Page 9: Kemtah IT BYOD NLIT DRAFT 2.5-2012

How%do%we%do%it?%

•  Purchasing%•  Managing%

•  Securing%

Page 10: Kemtah IT BYOD NLIT DRAFT 2.5-2012

Bring%Your%Own%Device%

S>pend'•  Employee%gets%preferred%

device.%•  Increases%sa?sfac?on.%•  Increased%cost%due%to%billing%

management.%–  Industry%average%of%$17/

expense%report.%

•  Support%costs%may%increase%due%to%device/OS%fragmenta?on.%

%

Corporate'Purchased'•  All%device%corporate%owned.%•  Does%not%save%the%money%

on%HWLC.%•  Saves%money%on%support%

and%billing%reimbursement.%•  Sokware%development%

lifecycle%management%may%or%may%not%increase.%

Page 11: Kemtah IT BYOD NLIT DRAFT 2.5-2012

Mobile'Device'Management'%Key%Features:%•  Restric?ons%policies%•  VPNs%•  Geo%loca?on%(GPS)%•  Remote%wipe%•  Par?al%remote[wipe%•  Encrypted%containeriza?on%•  LDAP%integra?on%•  Repor?ng%•  Applica?on%inventory%

•  Blacklis?ng%•  Whitelis?ng%

•  Agent/Agentless%•  App%Push%and%Delete%•  Cost%/Licensing%•  Hos?ng%

•  Cloud,%On[premise,%Hosted%•  HA,%BCP%•  Database%

Page 12: Kemtah IT BYOD NLIT DRAFT 2.5-2012

Securing'•  Policy%

•  WriWen%Policy%•  Configura?on%Baselines%•  Acceptable%Use%Policy%(AUP)%•  Billing%and%Procurement%

•  Network%Access%Control%(NAC)%•  Device%Baseline%and%Profile%•  Encryp?on%

•  Hardware%and%Sokware%

•  Logging,%Audi?ng,%Repor?ng,%Remedia?on%

•  Network%Access%Control%(NAC)%%•  Quaran?ne%

%

CISCO%Iden?ty%Services%Engine%

SANS%1.  Device%Fingerprin?ng%2.  Handling%Applica?ons%3.  Excep?on%Handling%4.  Alterna?ve%Means%of%

Iden?fica?on%5.  Access%Controls%and%

Restric?ons%6.  Guest%Registra?on%%

Page 13: Kemtah IT BYOD NLIT DRAFT 2.5-2012

Takeaways'

•  Core%Areas:%– Security,%Produc?vity,%Cost%

•  Core%Phases:%– Discovery%– Requirements%Defini?on%– High[Level%Design%– Piliot/Proof%of%Concept%(POC)%

– Detailed%Design%– Phased%Implementa?on%

The%key%points%for%any%BYOD%program%are%its%security,%cost,%and%efficiency.%%It%is%vital%that%all%the%core%phases%are%covered%by%the%right%team%of%individuals%%Core%Team:%•  Project%Coordinator%•  Mobile%Architect%•  Network%Infrastructure%•  Informa?on%Assurance%•  Server%Infrastructure%•  Applica?on%Services/Support%•  Desktop%Support%•  Virtualiza?on/VDI%

%