aisha visram presentacion bmobilew 2015 rev 2
TRANSCRIPT
![Page 1: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/1.jpg)
Enterprise Mobile: Solving the ChallengesAisha Visram
![Page 3: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/3.jpg)
Three Key Take-Aways
• Mobile access transforms the way we think about work, And, its not going away.
• Unmanaged personal devices at work is the major cause of security risk
• There is no single, unicorn solution
![Page 4: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/4.jpg)
Agenda
• The Mobile landscape: consumer vs. enterprise
• Creating a Mobility Program
• The challenges
• The role of EMM
• Final conclusions
![Page 5: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/5.jpg)
The Mobile Landscape
![Page 6: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/6.jpg)
Everyone has a Smartphone: 64% vs. 18% in 2009
![Page 7: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/7.jpg)
Smartphones are already Replacing Desktop/Laptops
![Page 8: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/8.jpg)
Millennials = Largest Generation in the Workforce this Year
![Page 9: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/9.jpg)
What does that Mean?
87% - Smartphone never leaves their side
34% - Prefer to collaborate online than in person
45% -Use Personal Smartphones for work purposes
![Page 10: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/10.jpg)
Enterprise Mobility
• IT spending for iPad® tablets - $16 billion in 2013
• 87% of global smartphone market is Android
• Average US employee carries 3 devices
• 70% of users doing work on personal devices, regardless of company policy
InformationWeek Jan 2014
Mobile Landscape
![Page 11: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/11.jpg)
Remarkably, only 14% of companies have instituted a mobile device security policy.
![Page 12: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/12.jpg)
Creating a Mobility Program
![Page 13: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/13.jpg)
CIO Mandate
• Increase IT efficiency• Improve Employee Productivity• Help Customers Succeed
Measures of Success“ All employees accessing data they need to do their job from any mobile device.”
![Page 14: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/14.jpg)
Mobility Program Objectives
• Mobilize processes for smartphones/tablets
• Ensuring corporate data is protected on any device
• Balancing usability and security: “secure-able”
• Making users happy and productive
![Page 15: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/15.jpg)
What do employees/users want?
• Not to be a dinosaur! Employees are more productive on mobile devices they choose.
Measures of Success
![Page 16: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/16.jpg)
What do employees/users want?
• Increasing productivity without interrupting usability
• Easy access to company data and documents
• Manage both corporate and personal data
• Ambient security - it runs in the background if it needs to
• Privacy is protected
Measures of Success
![Page 17: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/17.jpg)
The Challenges
![Page 18: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/18.jpg)
• BYOD
• Which Mobile Apps to allow?
• Mobile Security
• Do we need an Enterprise Mobile Management Solution?
• Others?
Measures of SuccessWhat you Don’t Know CAN Hurt You…
Ponemon Institute March 2013
![Page 19: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/19.jpg)
Are we supposed to go BYOD?
62% of companies to allow BYOD by year’s end, more than 44% of organizations already allow BYOD.
Employee-owned smartphones and tablets used in the enterprise will exceed 1 billion by 2018 due to BYOD.
ComputerWorld, Aug 2013
![Page 20: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/20.jpg)
Are we supposed to go BYOD?
65% of employees said:
- Nothing has been communicated about BYOD- No official policy guidelines - Employees are not allowed to use their own
devices at work
ComputerWorld, Aug 2013
![Page 21: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/21.jpg)
Most Organizations underestimate Cloud App Usage by 90%
![Page 22: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/22.jpg)
Top 20 Cloud Apps in Enterprise
![Page 23: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/23.jpg)
Top apps used Globally - Messaging
![Page 24: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/24.jpg)
An example - Slack
![Page 25: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/25.jpg)
Risks to Enterprise
• Lost or stolen devices • Unauthorized access• Compromised device
• Malware
• Exposure of confidential information
Measures of SuccessMobility Security Incidents: Do the Benefits Outweigh the Risk?
21%• Perform data wipes
on personal devices when employees leave company
Ponemon Institute March 2013
![Page 26: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/26.jpg)
Breaches are due to compromised credentials
![Page 27: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/27.jpg)
Mobile Devices are Harvesting your Data
• Adware grew to 136% to 410,000 apps between 2013 to 2014, giving attackers access to personal information such as contacts
InformationWeek Jan 2014
![Page 28: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/28.jpg)
Can you trust your apps?
AppThority, 2014
![Page 29: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/29.jpg)
Mobile Malware
Mobile Malware
• 97% of mobile malware coming from third-party Android app stores in Asia and Middle East
• Apps carrying malware in Google Play Store is 0.1% (short shelf life if encountered)
Forbes, March 2014
![Page 30: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/30.jpg)
The Role of EMM
![Page 31: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/31.jpg)
Device Management BlueprintMeasures of Success
Privacy Protection
Security Management
Secure Configurations
Remote Wipe
Device Protection
App Management
Corp Integration
Device Management
![Page 32: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/32.jpg)
Mobile Device Management• Ease of deployment: 1000’s of mobile devices can be
remotely provisioned with corporate data and managed
• Selective wipe: removing corporate data, leaving the personal data on the device
• Enforcing device passcode and hardware encryption
• Device posture: if device is jailbroken/rooted, unencrypted, doesn’t have min OS, IT can prevent device from connecting to corporate network
• Disallow Screen Capture/Roaming/iCloud
![Page 33: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/33.jpg)
Mobile Device Management• Application Control: Requiring apps to be installed/removed, prevent app from being
backed up to iCloud/Google Cloud
• Securing email and attachments
– Protect email attachments: personal apps
– ActiveSync is not enough• Policies can be circumvented• Device posture is not detected and enforced
– Protect email attachments from being shared with personal applications
– Detect + block jailbreak/root devices– Cert-based authentication for email
![Page 34: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/34.jpg)
Mobile Application Management
• Per App VPN: • Apps can be automatically configured to
connect to VPN when they are launched• Not exposing entire device to the
corporate network• Improves performance• Privacy
• “Open In”
![Page 35: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/35.jpg)
Mobile Application Management
• Share data between: • Secure apps (Secure Secure)• Whitelist apps (Secure Secure & Managed)• With personal apps (Personal Secure)
![Page 36: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/36.jpg)
Final Conclusions
![Page 37: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/37.jpg)
• Figuring this out is critical to the success of your business
• Risk has to be balanced with usability
• Approach mobility as any other mission critical project – process, policy and accountability
![Page 38: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/38.jpg)
QUESTIONS?
![Page 39: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/39.jpg)
PARKING LOT
![Page 40: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/40.jpg)
Are we supposed to go BYOD?
• Should you go BYOD? • IT Leaders (60%): BYOD does not deliver on higher
customer satisfaction• Assessing the cost/benefit• IT Leaders (62%): BYOD does not lower IT expenses• Lowers capital expenditure, but may increase support
costs• BYOD for corporate-issued devices• Improve access and re-evaluate restrictive security
policies
ComputerWorld, Aug 2013
What do we make of conflicting data?
![Page 41: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/41.jpg)
Are we supposed to go BYOD?
1. Employees need to choose any mobile device/OS
2. Make sure access is easy for authorized users
My Top 11 for a Successful BYOD Program
![Page 42: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/42.jpg)
Are we supposed to go BYOD?
3. Pay attention to mobile use cases and LOB
My Top 11 for a Successful BYOD Program
![Page 43: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/43.jpg)
Are we supposed to go BYOD?
4. Communication plan. Be transparent with employees.
5. Manage data and not devices: • Mobile Application Management policies• Data and User classification• Isolate network• Detect and Contain• Unsecure networks and multi-auth
67% do not have policies in place that address sharing of corporate files in third-party cloud storage services.
Acronis, July 2013
My Top 11 for a Successful BYOD Program
![Page 44: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/44.jpg)
Are we supposed to go BYOD?
6. Separate personal data from corporate data
7. Don’t forget the basics: password protection & encryption!
8. Lost/stolen device? Wipe corp data and block
My Top 11 for a Successful BYOD Program
![Page 45: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/45.jpg)
Are we supposed to go BYOD?
6. Reduce corporate liability with private data
7. Involve stakeholders
8. Run a BYOD pilot!
My Top 11 for a Successful BYOD Program
![Page 46: Aisha visram presentacion bmobilew 2015 rev 2](https://reader036.vdocuments.pub/reader036/viewer/2022062313/55c991ebbb61eb4b408b4769/html5/thumbnails/46.jpg)
Mobile Corp Data Leakage
• Identify which mobile apps put corporate data at risk vs. which apps are benign
• Risky app behaviours• Transferring Contacts• Cloud-based file storage • Uses microphone• Accesses IMEI/UDID• Single Sign on (social networking)• Location tracking
• Mobile malware and spyware
Saves password on device in clear text
Links to credit card for auto-load
App Reputation – Identifying the Bad Guys