Anda di halaman 1dari 25

MANAGING AND SECURING BYOD

Legal ITs Next Great Challenge

AGENDA
The BYOD Trend Evolution of Mobile Technology

Best Practices for Managing Mobile Device Usage


Overview of Mobile Device Management Technologies BYOD Management Strategies and Trends

THE BYOD TREND SOME HISTORY


Employee use of company owned computers

Using laptops to access the Internet


Drove usage policies and technology controls

RIM BlackBerry delivers first mobile device Apple iPhone changes everything

BYOD
Benefits

BENEFITS AND CHALLENGES


Improved responsiveness
Improved accessibility Greater flexibility

Challenges
IT support of a wide range of mobile vendors and operating environments Secure access to firm data Mitigate risk of unsecure personal apps

70 MILLION
ONLY 7% RECOVERED

SMARTPHONES LOST/STOLEN IN 2011

Source: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers

17% OF BUSINESSES
HAVE MOBILE DEVICE BREACHES
Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater

BEST PRACTICES
Registering devices to ensure security: Virus protection, authentication, encryption Provisioning of firm-authorized apps IT use monitoring User education Compliance with firm security policies Mobile Device registration with IT Password protection Use of unsanctioned apps Lost/stolen devices

MOBILE DEVICE MANAGEMENT

MOBILE DEVICE STRATEGY


Security Application Portfolio

Policies
Who Pays? Backing Up Devices

HOW DO YOU SUPPORT MOBILITY?


Who is responsible for equipment?

IT staff availability and training


Mobile device OS and security upgrades Mobile Device Management platform

Is your firm website mobile friendly?

MOBILE DEVICE MANAGEMENT


Not new!

Optimize functionality
Increase security Compliance

Is MDM a requirement for BYOD?

SMARTPHONES HAVE BECOME ANARCHY IN A POCKET


Source: Tom Henderson, ITWORLD.com

THEY HAVE THE POWER OF A FULL DESKTOP SYSTEM OF JUST A DECADE AGO, AND THAT POWER IS INCREASING QUICKLY .

WHY NOW?
BYOD

Malicious threats
Control Application Portfolio Lost and Stolen Phones

Access Control and Auditing


Compliance Growing device inventory Native functions and features dont cut it Changes to Microsoft Exchange licensing costs

MDM IS SUBJECT TO THE WEAKNESS OF THE UNDERLYING PLATFORM


Source: May 18, 2012 COMPUTERWORLD.com, Matt Hamblem

GOOGLE ONLY PROVIDED 16 APIs, COMPARED TO MORE THAN 500 APIs FOR THE LATEST VERSION OF BLACKBERRY .

SOLUTION OPTIONS
On-premise

Service-based
Hybrid

COMMON FEATURES
Device provisioning and configuration

Policy application
Security Backup / restore

Remote lock and wipe


Sandboxing

Activity logging Reporting / dashboard

ADVANCED FEATURES
Network access control

Application deployment and management


Firmware updates Diagnostics Network usage and support Mobile asset tracking and management

Troubleshooting and diagnostic tools Remote control Remote administration GPS tracking and 'breadcrumb' mapping

MOST COMMON PLATFORMS


Common in Legal: Airwatch MobileIron McAfee Fiberlink (MaaS360) Good BlackBerry
For BlackBerry Devices

USEFUL FEATURE COMPARISONS


http://mobiwm.com/mdm-comparison/

http://www.bluefishwireless.net/wpcontent/uploads/2012/06/Bluefish-MGMT-MDM-ComparisonChart.pdf
Gartner: Magic Quadrant for Mobile Device Management Software 2012

SELECTION CRITERIA
Enrollment

Ease
Self service

Administration Ongoing Management Scalability Device Support

LICENSING MODELS
Perpetual license

Subscription
Per devices Per user

Minimum number of devices?

MINDSHIFTS EXPERIENCE

FUTURE OF MDM
Commoditized

Management tools with features built into devices


Open Mobile Alliance (OMA) OMA Device Management Protocol

MDM absorbed into management platforms


Mobile Application Management (MAM) Mobile Information Management (MIM)

Q & A

THANK YOU
Charlie Magliato
Biscom
Legal Program Director CMagliato@Biscom.com (978) 367-3592

Pat Sklodowski
mindSHIFT Technologies, Inc.
Managing Director, Legal Professional Services Patrick.Sklodowski@mindSHIFT.com (856) 425-0029

www.Biscom.com/Legal

www.mindSHIFT.com

Anda mungkin juga menyukai