best practices for implementing a bring your own device (byod) program

23
1 Best Practices for Implementing a Bring Your Own Device (BYOD) Program Presented by Val Hetrick

Upload: maas360-by-fiberlink

Post on 13-May-2015

1.399 views

Category:

Technology


1 download

DESCRIPTION

Everyone is talking about Bring Your Own Device (BYOD). This webinar explores how enterprises can embrace BYOD with the confidence offered by mobile device management solutions. Learn more: http://trials.maas360.com/forms/register_service_m.php?id=320&A=SM_slideshare&O=RP

TRANSCRIPT

Page 1: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

1

Best Practices for Implementing a Bring

Your Own Device (BYOD) Program

Presented by Val Hetrick

Page 2: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

@MaaS360

Click the link in the chat window to tweet about today’s webinar

@MaaS360 [Share comments, continue Q&A, suggest future topics]

#MaaS360Webinar

Tweet about today’s webinar!

Page 3: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

3

10 Steps to BYOD Success

1. Creating a comprehensive BYOD policy2. Measuring your mobile footprint3. Simplify user enrollment4. Configure policies over the air5. Provide self service capabilities 6. Protect personal information (PII)7. Isolate corporate data 8. Continuously monitor automated actions9. Manage data usage 10.Track the ROI of BYOD

Page 4: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

4

Poll Question

• Does your organization have a BYOD policy?– Yes– No– In progress

Page 5: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

5

Some BYOD Program Stats

40%

13%11%

4%

32%

Does your company support a BYOD Program?

Yes

Next 6 months

Next 12 months

Unsure

No; corporate only

28%

72%

If you have a BYOD plan in place, do you reimburse your employees for data usage cost?

YesNo

Page 6: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

6

Poll Question

• How are BYOD costs reimbursed at your company?– Employees receive stipend– Employees submit expense reports– We do not reimburse

Page 7: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

7

What are users saying about BYOD?

Page 8: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

8

What are users saying about BYOD?

Page 9: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

9

Poll Question

• How are you managing employee-owned devices today?– Mobile device management (MDM) solution– Native email platform controls– No controls in place

Page 10: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

10

Creating a Comprehensive BYOD Policy

• Who’s buying?• Opt in/Acceptable Usage Policy• Which devices will you support?

– What’s important?• Carrier/manufacturer?• Passcode?• Encryption (device/email)?• Email setting deployment?• Apps?

• What are you security requirements?– External regulations, HIPAA– Industry vertical

• Will you leverage a MDM solution to help manage these devices?– In MaaS360, 22% of all devices are tagged as personal devices– 86% of those are iOS

Page 11: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

11

Poll Question

• What are your biggest concerns with BYOD support? (Select all that apply)– Having visibility into all devices used for work– Securing corporate data on the device– Potential employee privacy issues– Inability to blacklist applications– Additional helpdesk support– Requests to support new device

Page 12: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

12

Measuring your Mobile Footprint

• Do you have ActiveSync enabled today?• Do you know how many devices are

connecting today?– No ActiveSync reporting– PowerShell guru– No access to look– No device level block

• Knowing will helpidentify who needs tobe enrolled to theprogram and old devicecleaned up.

45%

35%

1% 3%

15%

ActiveSync is open (mobile devices are automatically enabled by end-user)

ActiveSync is closed (admin manually enables mobile devices)

Auto-quarantine is enabled in Exchange 2010

Use of a custom tool or PowerShell Script

We don't allow mobile devices to access Exchange

Page 13: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

13

Simplify Enrollment and Configure the Device

• Keep the enrollment simple and fast– Simple URL

• Corporate credentials vs. passcode?

– Over the Air– Notification when complete

• Configure the Device– Push ActiveSync settings– Require a passcode– Set device restrictions

Page 14: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

14

Provide Self Service Capabilities

• An End User Portal will help cut down on the number of calls to your IT teams

• Allow the user to do basic items– Lock– Reset password– Locate– Wipe

• View information about compliance state– Remediate issues

Page 15: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

15

Protect Personal Information (PII)

• Personally Identifiable Information is a hot topic as of late– Privacy laws– Personal safety

• Are you allowed or should you be allowed to??– View location history Information– Locate a personal device– View a list of software installed for personal

use

Page 16: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

16

Isolate Corporate Data

• Isolating and managing corporate data is the probably the biggest concern of allowing personal devices to the network– ActiveSync account– Wireless settings– VPN configuration– Enterprise apps– Documents

• Selective Wipe solves this problem– Today we know that of all “wipes” of personal

devices in MaaS360, 86% are selective wipes

Page 17: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

17

Continuous Monitoring

• It is important to monitor the state of your devices– Are they enrolled?– Are they compliant?– What apps are users installing?– Have they read the document you pushed?

• Take automated actions based on state– Stay enrolled– Version control– App compliance– Encryption status– Jailbreak/root detection

• Notify, Block, Selective Wipe, Full Wipe

Page 18: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

18

Manage Data Usage

• Help users help themselves – Provide an easy way for them to track and be

alerted to their current data usage

• Usage policies based on different segments– Set roaming and in-network megabit limits– Create threshold notifications– Enable/disable roaming via policy

• Help them understand the benefits of using Wi-Fi where available

• Reporting and trending• And, of course, proactively manage any

corporate provisioned devices as well

Page 19: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

19

Track the ROI of BYOD

• Calculate and present on cost differential of BYOD program and IT’s impact on the bottom line– Corporate-owned model:

• Device purchase cost• The cost of a fully subsidized data plan• The cost of recycling the device every few years• Warranty plans• IT time and labor managing the program

– BYOD• The cost of a partially subsidized data plan (if applicable)• The cost of a management platform• Subtract eliminated costs• Increased productivity

Page 20: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

@MaaS360

Click the link in the chat window to tweet about today’s webinar

@MaaS360 [Share comments, continue Q&A, suggest future topics]

#MaaS360Webinar

Let’s continue the conversation!

Page 21: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

21

“Best Enterprise Mobile Service”

Judged on introducing the most innovative mobile tools to help corporate users work smarter and do business better on the move.

Who we beat:• MobileIron • Good Technology • Virtela Technology

Other Category Winners

2012 Global Mobile Award

Page 22: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

22

Wrap-up• Upcoming Webinars (http://maasters.maas360.com/webinars)

– April 12 – Ten Mysteries of Android

• Past Webinars (http://links.maas360.com/webinars)

– The new iPad Goes to Work– Best Practices for Testing Mobile Applications– What’s New in Ice Cream Sandwich

• Plus lots of How-To content on our website – Mobile Device Management Best Practices

• http://links.maas360.com/mdm

– Mobile Device Management Glossary• http://links.maas360.com/mdm_glossary

• The Q&A Continues…– Got more questions? Find us after the webinar on the MaaSters Center!

• http://links.maas360.com/todaysWebinar

Questions or [email protected]

[email protected]

Page 23: Best Practices for Implementing a Bring Your Own Device (BYOD) Program

23

Q & A