5 essential tips for creating an effective byod policy

40
5 Essential Tips for Creating an Effective BYOD Policy Nov 5, 2013

Upload: kaseya

Post on 20-Aug-2015

590 views

Category:

Technology


2 download

TRANSCRIPT

5 Essential Tips for Creating an Effective BYOD Policy

Nov 5, 2013

Speaker Introductions

Steve Brasen,

Managing Research Director

Enterprise Management Associates (EMA)

Alex Brandt

Vice President, Americas

Kaseya

Jonathan Foulkes

VP Mobile Product Management

Kaseya

Agenda

Slide 3 © 2013 Enterprise Management Associates, Inc.

• Empowering a Mobile Workforce

• Key Concepts in BYOD

• 5 Essential BYOD Tips

• #1 Securing Business Data

• #2 Isolating Business Resources

from users’ Personal Resources

• #3 Establishing User-Focused

Policies

• #4 Reducing the Costs of

Enterprise Mobility

• #5 Achieving Business Value

• Conclusions

Empowering a Mobile Workforce

• The Value of Workforce Mobility

• Increased Productivity

• Enhanced Business Agility

• Improved Employee Satisfaction

Slide 4 © 2013 Enterprise Management Associates, Inc.

Empowering a Mobile Workforce

• Enterprise IT requirements are expanding to support workforce

mobility

• End users are demanding unprecedented access to business

resources:

• Applications

• Data

• Services

Slide 5 © 2013 Enterprise Management Associates, Inc.

Empowering a Mobile Workforce

Slide 6 © 2013 Enterprise Management Associates, Inc.

• The Two Faces of Mobility

• Provide access to business resources

from any location

Office, home, remote

Supports device portability

• Provide access to business resources

from any device or OS

iOS, Android, BlackBerry, Windows

Supports app and data portability

Key Concepts is BYOD

Slide 7 © 2013 Enterprise Management Associates, Inc.

• The majority of devices used for business purposes

are employee owned…

Key Concepts is BYOD

Slide 8 © 2013 Enterprise Management Associates, Inc.

• Regardless of the owner, the majority of mobile devices

are employed for both business and personal tasks

9.28%

90.72%

Used only forbusiness tasks

Used for bothbusiness andpersonal tasks

Key Concepts is BYOD

Slide 9 © 2013 Enterprise Management Associates, Inc.

• Bring Your Own Device (BYOD) practices enable the secure

delivery of business applications, data, and services to mobile

endpoints without restricting users’ personal use of the devices

• Business IT resources must be

easily accessible

always available

high performing

cost-effective

able to meet business and regulatory

compliance requirements

#1 Securing Business Data

© 2013 Enterprise Management Associates, Inc.

#1 Securing Business Data

• Workforce mobility Increases

business risks

• Increased opportunities for data loss

Physical device loss

Terminated users

Unsecured data sharing practices

Open access to business IT resources

Slide 11 © 2013 Enterprise Management Associates, Inc.

• Other security concerns

Viruses / malware

Rooting / jailbreaking

• All business data needs to be secured

at the source, in transit, and on the

endpoint

#1 Securing Business Data

• High-risk data-sharing practices by industry…

Slide 12 © 2013 Enterprise Management Associates, Inc.

#1 Securing Business Data

• Enhanced Security

• Data Loss Protection

Lock & wipe

Should affect only business apps

and data

Enable secure data sharing

Restrict access to unsecure data sharing

Email, messaging, Dropbox, USB

drives, etc.

Data encryption

• Application Protection

White / Black listing

• Authentication

Password management

VPN access

Other communication methods

• Rooting & Jailbreaking Detection Slide 13 © 2013 Enterprise Management Associates, Inc.

#2 Isolating Business Resources from

Users’ Personal Resources

© 2013 Enterprise Management Associates, Inc.

#2 Isolating Business Resources from Users’

Personal Resources

• Business IT resources must be managed separate from users’

personal resources

Slide 15 © 2013 Enterprise Management Associates, Inc.

• These include:

• Apps

• Data

• Web access

• Email

• Database access

• Remote business

access

#2 Isolating Business Resources from Users’

Personal Resources

Slide 16 © 2013 Enterprise Management Associates, Inc.

• Containerization isolates and secures business resources while

enabling centralized management

Remote User Devices

Android

BlackBerry

iOS

Windows Phone/RT/Pro

Enterp

rise IT R

esou

rces

Enterprise AppStore Static Apps Virtual Apps Web Apps

Centralized Data Repository

Business Services Email

Messaging Databases

Remote Access

Secure Access & Delivery Music Isolated

Business IT Resources • Data • Apps • Services

#3 Establishing User-Focused

Processes

© 2013 Enterprise Management Associates, Inc.

#3 Establishing User-Focused Processes

• User access to business resources must be: • Consistent

• Intuitive

• Fast

• Easy

Slide 18 © 2013 Enterprise Management Associates, Inc.

• Non-impactful to other device

uses

• Frustrated users are unhappy

users • Likely to complain about the

service

• Experience significant

performance impacts

• Reflects badly on IT operations

and the business

• Users should not have to “jump through hoops” to do their job

#3 Establishing User-Focused Processes

• Flexibility

• Each organization has a

unique set of requirements for:

Security & compliance

Supported devices

IT resources to be made

available

User roles and tasks

Slide 19 © 2013 Enterprise Management Associates, Inc.

• There is no “one size fits all” management process

Endpoint management solutions must be flexible enough to support any set

of enterprise requirements

All endpoint support services must by eminently customizable to meet

individual user needs

#3 Establishing User-Focused Processes

• Enable user self-service

• Provide user portals for accessing data, apps

and services

Include integrated authorization process

Enable user-initiated service requests

• Enterprise application store

Single point for accessing all business

applications

Application downloads

Commercial application

Proprietary application

Application virtualization

Approved web applications

Slide 20 © 2013 Enterprise Management Associates, Inc.

#4 Reducing the Costs of Enterprise

Mobility

© 2013 Enterprise Management Associates, Inc.

#4 Reducing the Costs of Enterprise Mobility

• Direct costs associated with

supporting workforce mobility: • Infrastructure costs

• Implementation costs

• Software licenses

Slide 22 © 2013 Enterprise Management Associates, Inc.

• Indirect costs associated with

supporting workforce mobility

• Administrator time and effort

Increased environment complexity

• Compliance attainment

#4 Reducing the Costs of Enterprise Mobility

• Centralized management simplifies administrative efforts

• “Single pane of glass” for monitoring and managing all mobile endpoints

• Allows processes to be standardized

Enables role-based grouping

Slide 23 © 2013 Enterprise Management Associates, Inc.

• Consolidated asset tracking –

single data repository

Physical devices

Applications

Licenses

• Unified reporting

Enabling holistic views across all

endpoints

Simplifies event correlation and

root cause analysis

Supports compliance auditing and

on-going status identification

#5 Achieving Business Value

© 2013 Enterprise Management Associates, Inc.

#5 Achieving Business Value

• Supporting BYOD empowers end users with the freedom to

perform business tasks on any device they choose and in any

way they wish to perform them without compromising enterprise

requirements

Slide 25 © 2013 Enterprise Management Associates, Inc.

• This allows the workforce to focus

principally on the performance of

their job requirement rather than

on the manipulation of the

technology, resulting in:

• Increased productivity

• Enhanced business agility

• Improved employee satisfaction

#5 Achieving Business Value

• Reducing mundane management efforts frees-up administrators

to perform business-focused tasks, such as:

Slide 26 © 2013 Enterprise Management Associates, Inc.

• Introduce new IT services

• Proactively prevent service

disruptions

• Improve IT service delivery

• Enhance user experiences

• Achieve business goals

• Reduce costs

• Increase the profitability of the

business

Conclusions

Slide 27 © 2013 Enterprise Management Associates, Inc.

• Rather than focusing on physical devices

or individual operating systems, a

centralized management solution should

be implemented to “serve-up” application

and data resources consistently to all

endpoints

• Containerization offers a secure and

reliable method for isolating business

resources to ensure they meet business

requirements without impacting user

productivity or satisfaction

• With a user-centric approach to

workforce mobility, users are liberated to

securely access essential IT resources

on any device they choose so they can

focus on the more critical tasks of

achieving enterprise goals

Poll Question

1. Support BYOD, but looking for better alternatives

2. Do not support BYOD yet, interested in learning how to

3. No mobile solution yet, interested in a unified solution

Please indicate your BYOD interest:

Kaseya and BYOD

•Embracing containers

•Delivering security

•BYOD friendly model

•Providing easy deployments

•Reduced mobility costs

Browser Docs Mail

Kaseya BYOD Suite

30

31

Sneak Peek

An ideal solution for BYOD

33

• Access vital business information located behind the

corporate firewall - With or without VPN

- With or without MDM

• Secure containers for browsing , email and doc editing

- Tunnel to intranet apps, internet or network files and folders

- Email / PIM

- Create, view, edit, store documents

• On-premise gateway for integration and security

• Private communications channel

Who Are We?

Our solutions empower people to proactively manage and control IT assets remotely, easily and efficiently from one integrated Web-based platform

Industry standard for IT automation solutions & services

Key Facts

• Founded in 2000

• Over 10,000 customers with presence in over 20 countries

• Offered as SaaS or on-premise

• Enterprises and Service Providers

• Serving customers across many industries: government, military, healthcare, finance, education, retail and others.

Washington

California Virginia

Florida

The Netherlands British Isles

UK France Germany

South Africa

India

China

Singapore

Australia .

It Has Been an Exciting Year!

• Gartner Magic Quadrant 2013 – Visionary • New management and backing from Insight Venture Partners

Why Kaseya?

A single Kaseya user can proactively

manage 1,000s of automated IT

systems tasks in the same amount of

time required by a team of technicians

using other techniques.

www.kaseya.com

www.kaseya.com

Discover the

State of IT

• Systems

• Assets

• Mobile Devices

• Network Devices

Manage the

State of IT

• Scheduling

• Procedures

• API/Messaging

Automate the

State of IT

• Reporting

• Dashboards

• Interactive Data Views

IT Configuration Management

Asset Management

Security

Business Continuity

Service Delivery

Systems Monitoring

• Remote Management

• Software Deployment

• Power Management

• Image Deployment

• Desktop Migration

• Mobile Device

Management

• Network Discover & AD

• Hardware/Software

• Asset Management

• Virtual Machine

Management

• AntiVirus

• AntiMalware

• Patch Management

• Software Updates

• Image Backup

• Image Virtualization

• File & Folder Backup

• Service Desk/Ticketing

• Policy Management

• Service Billing

• Policy Compliance

• Time Tracking

• Systems Checks & Alerts

• Agent Monitoring

• Enterprise Monitoring

• Agent-less Monitoring

• Log Monitoring

Unified Management

Q&A & Final Thoughts

Contact us:

1 (877) 926-0001

[email protected]

Learn more:

www.kaseya.com

* Complete the poll in the right window *