5 essential tips for creating an effective byod policy
TRANSCRIPT
Speaker Introductions
Steve Brasen,
Managing Research Director
Enterprise Management Associates (EMA)
Alex Brandt
Vice President, Americas
Kaseya
Jonathan Foulkes
VP Mobile Product Management
Kaseya
Agenda
Slide 3 © 2013 Enterprise Management Associates, Inc.
• Empowering a Mobile Workforce
• Key Concepts in BYOD
• 5 Essential BYOD Tips
• #1 Securing Business Data
• #2 Isolating Business Resources
from users’ Personal Resources
• #3 Establishing User-Focused
Policies
• #4 Reducing the Costs of
Enterprise Mobility
• #5 Achieving Business Value
• Conclusions
Empowering a Mobile Workforce
• The Value of Workforce Mobility
• Increased Productivity
• Enhanced Business Agility
• Improved Employee Satisfaction
Slide 4 © 2013 Enterprise Management Associates, Inc.
Empowering a Mobile Workforce
• Enterprise IT requirements are expanding to support workforce
mobility
• End users are demanding unprecedented access to business
resources:
• Applications
• Data
• Services
Slide 5 © 2013 Enterprise Management Associates, Inc.
Empowering a Mobile Workforce
Slide 6 © 2013 Enterprise Management Associates, Inc.
• The Two Faces of Mobility
• Provide access to business resources
from any location
Office, home, remote
Supports device portability
• Provide access to business resources
from any device or OS
iOS, Android, BlackBerry, Windows
Supports app and data portability
Key Concepts is BYOD
Slide 7 © 2013 Enterprise Management Associates, Inc.
• The majority of devices used for business purposes
are employee owned…
Key Concepts is BYOD
Slide 8 © 2013 Enterprise Management Associates, Inc.
• Regardless of the owner, the majority of mobile devices
are employed for both business and personal tasks
9.28%
90.72%
Used only forbusiness tasks
Used for bothbusiness andpersonal tasks
Key Concepts is BYOD
Slide 9 © 2013 Enterprise Management Associates, Inc.
• Bring Your Own Device (BYOD) practices enable the secure
delivery of business applications, data, and services to mobile
endpoints without restricting users’ personal use of the devices
• Business IT resources must be
easily accessible
always available
high performing
cost-effective
able to meet business and regulatory
compliance requirements
#1 Securing Business Data
• Workforce mobility Increases
business risks
• Increased opportunities for data loss
Physical device loss
Terminated users
Unsecured data sharing practices
Open access to business IT resources
Slide 11 © 2013 Enterprise Management Associates, Inc.
• Other security concerns
Viruses / malware
Rooting / jailbreaking
• All business data needs to be secured
at the source, in transit, and on the
endpoint
#1 Securing Business Data
• High-risk data-sharing practices by industry…
Slide 12 © 2013 Enterprise Management Associates, Inc.
#1 Securing Business Data
• Enhanced Security
• Data Loss Protection
Lock & wipe
Should affect only business apps
and data
Enable secure data sharing
Restrict access to unsecure data sharing
Email, messaging, Dropbox, USB
drives, etc.
Data encryption
• Application Protection
White / Black listing
• Authentication
Password management
VPN access
Other communication methods
• Rooting & Jailbreaking Detection Slide 13 © 2013 Enterprise Management Associates, Inc.
#2 Isolating Business Resources from
Users’ Personal Resources
© 2013 Enterprise Management Associates, Inc.
#2 Isolating Business Resources from Users’
Personal Resources
• Business IT resources must be managed separate from users’
personal resources
Slide 15 © 2013 Enterprise Management Associates, Inc.
• These include:
• Apps
• Data
• Web access
• Database access
• Remote business
access
#2 Isolating Business Resources from Users’
Personal Resources
Slide 16 © 2013 Enterprise Management Associates, Inc.
• Containerization isolates and secures business resources while
enabling centralized management
Remote User Devices
Android
BlackBerry
iOS
Windows Phone/RT/Pro
Enterp
rise IT R
esou
rces
Enterprise AppStore Static Apps Virtual Apps Web Apps
Centralized Data Repository
Business Services Email
Messaging Databases
Remote Access
Secure Access & Delivery Music Isolated
Business IT Resources • Data • Apps • Services
#3 Establishing User-Focused Processes
• User access to business resources must be: • Consistent
• Intuitive
• Fast
• Easy
Slide 18 © 2013 Enterprise Management Associates, Inc.
• Non-impactful to other device
uses
• Frustrated users are unhappy
users • Likely to complain about the
service
• Experience significant
performance impacts
• Reflects badly on IT operations
and the business
• Users should not have to “jump through hoops” to do their job
#3 Establishing User-Focused Processes
• Flexibility
• Each organization has a
unique set of requirements for:
Security & compliance
Supported devices
IT resources to be made
available
User roles and tasks
Slide 19 © 2013 Enterprise Management Associates, Inc.
• There is no “one size fits all” management process
Endpoint management solutions must be flexible enough to support any set
of enterprise requirements
All endpoint support services must by eminently customizable to meet
individual user needs
#3 Establishing User-Focused Processes
• Enable user self-service
• Provide user portals for accessing data, apps
and services
Include integrated authorization process
Enable user-initiated service requests
• Enterprise application store
Single point for accessing all business
applications
Application downloads
Commercial application
Proprietary application
Application virtualization
Approved web applications
Slide 20 © 2013 Enterprise Management Associates, Inc.
#4 Reducing the Costs of Enterprise Mobility
• Direct costs associated with
supporting workforce mobility: • Infrastructure costs
• Implementation costs
• Software licenses
Slide 22 © 2013 Enterprise Management Associates, Inc.
• Indirect costs associated with
supporting workforce mobility
• Administrator time and effort
Increased environment complexity
• Compliance attainment
#4 Reducing the Costs of Enterprise Mobility
• Centralized management simplifies administrative efforts
• “Single pane of glass” for monitoring and managing all mobile endpoints
• Allows processes to be standardized
Enables role-based grouping
Slide 23 © 2013 Enterprise Management Associates, Inc.
• Consolidated asset tracking –
single data repository
Physical devices
Applications
Licenses
• Unified reporting
Enabling holistic views across all
endpoints
Simplifies event correlation and
root cause analysis
Supports compliance auditing and
on-going status identification
#5 Achieving Business Value
• Supporting BYOD empowers end users with the freedom to
perform business tasks on any device they choose and in any
way they wish to perform them without compromising enterprise
requirements
Slide 25 © 2013 Enterprise Management Associates, Inc.
• This allows the workforce to focus
principally on the performance of
their job requirement rather than
on the manipulation of the
technology, resulting in:
• Increased productivity
• Enhanced business agility
• Improved employee satisfaction
#5 Achieving Business Value
• Reducing mundane management efforts frees-up administrators
to perform business-focused tasks, such as:
Slide 26 © 2013 Enterprise Management Associates, Inc.
• Introduce new IT services
• Proactively prevent service
disruptions
• Improve IT service delivery
• Enhance user experiences
• Achieve business goals
• Reduce costs
• Increase the profitability of the
business
Conclusions
Slide 27 © 2013 Enterprise Management Associates, Inc.
• Rather than focusing on physical devices
or individual operating systems, a
centralized management solution should
be implemented to “serve-up” application
and data resources consistently to all
endpoints
• Containerization offers a secure and
reliable method for isolating business
resources to ensure they meet business
requirements without impacting user
productivity or satisfaction
• With a user-centric approach to
workforce mobility, users are liberated to
securely access essential IT resources
on any device they choose so they can
focus on the more critical tasks of
achieving enterprise goals
Poll Question
1. Support BYOD, but looking for better alternatives
2. Do not support BYOD yet, interested in learning how to
3. No mobile solution yet, interested in a unified solution
Please indicate your BYOD interest:
Kaseya and BYOD
•Embracing containers
•Delivering security
•BYOD friendly model
•Providing easy deployments
•Reduced mobility costs
An ideal solution for BYOD
33
• Access vital business information located behind the
corporate firewall - With or without VPN
- With or without MDM
• Secure containers for browsing , email and doc editing
- Tunnel to intranet apps, internet or network files and folders
- Email / PIM
- Create, view, edit, store documents
• On-premise gateway for integration and security
• Private communications channel
Who Are We?
Our solutions empower people to proactively manage and control IT assets remotely, easily and efficiently from one integrated Web-based platform
Industry standard for IT automation solutions & services
Key Facts
• Founded in 2000
• Over 10,000 customers with presence in over 20 countries
• Offered as SaaS or on-premise
• Enterprises and Service Providers
• Serving customers across many industries: government, military, healthcare, finance, education, retail and others.
Washington
California Virginia
Florida
The Netherlands British Isles
UK France Germany
South Africa
India
China
Singapore
Australia .
It Has Been an Exciting Year!
• Gartner Magic Quadrant 2013 – Visionary • New management and backing from Insight Venture Partners
Why Kaseya?
A single Kaseya user can proactively
manage 1,000s of automated IT
systems tasks in the same amount of
time required by a team of technicians
using other techniques.
www.kaseya.com
Discover the
State of IT
• Systems
• Assets
• Mobile Devices
• Network Devices
Manage the
State of IT
• Scheduling
• Procedures
• API/Messaging
Automate the
State of IT
• Reporting
• Dashboards
• Interactive Data Views
IT Configuration Management
Asset Management
Security
Business Continuity
Service Delivery
Systems Monitoring
• Remote Management
• Software Deployment
• Power Management
• Image Deployment
• Desktop Migration
• Mobile Device
Management
• Network Discover & AD
• Hardware/Software
• Asset Management
• Virtual Machine
Management
• AntiVirus
• AntiMalware
• Patch Management
• Software Updates
• Image Backup
• Image Virtualization
• File & Folder Backup
• Service Desk/Ticketing
• Policy Management
• Service Billing
• Policy Compliance
• Time Tracking
• Systems Checks & Alerts
• Agent Monitoring
• Enterprise Monitoring
• Agent-less Monitoring
• Log Monitoring
Unified Management
Q&A & Final Thoughts
Contact us:
1 (877) 926-0001
Learn more:
www.kaseya.com
* Complete the poll in the right window *