manage the invasion of consumer technology

Upload: dany-aravindraj

Post on 05-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Manage the Invasion of Consumer Technology

    1/30

    Practical IT Research that Drives Measurable Results

    1Info-Tech Research Group

    Manage the Invasion of Consumer Technology

  • 8/2/2019 Manage the Invasion of Consumer Technology

    2/30

    Introduction

    Info-Tech Research Group 2

    IT is often wary of connecting personal mobile devices to the corporate network. While not withoutits risks, the benefits usually outweigh the minimal costs. Learn to efficiently and safely manage the

    influx of consumer technology.

    This solution set provides practical steps to take when considering or implementing an official stance on the use ofconsumer technology in the workplace. It will help readers understand that:

    Like it or not, consumer technology is invading the enterprise. Recent increases in the prevalenceand variety of smart mobile devices make them an unavoidable issue to consider.

    Allowing personal devices in the workplace boosts productivity and end-user satisfaction. Themajority of organizations are allowing them and having great success doing so.

    There are several different mobile platforms. Each has its own nuances. Understand them and simplifythe management of a personal mobile fleet.

    It is not risk-free. Learn about the technologies that can help mitigate potential damage.

    Safely merging the consumer and the enterprise begins with compliance. Draft a policy and hold

    training sessions to help employees deal properly with incidents and keep them from happening in the firstplace.

    If you cant beat them, join them.It is safer to facilitate connecting personal mobile devices to the corporatenetwork than have end-users connect without ITs oversight.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    3/30

    Executive Summary

    Info-Tech Research Group 3

    The last two years have seen a marked increase in end-user comfort with smart phones, resultingin a greater number of employees bringing in personal technology to aid with performing their jobfunctions.

    83% of organizations surveyed by Info-Tech allow personal mobile devices on their corporatenetworks, though most do so only after an employee has signed a policy highlighting the rights ofIT and the end-user regarding data on the device.

    Regardless of whether users are bringing in tablets or smart phones, the majority of ITs job on themanagement side remains the same. Focus on policy creation, management and enforcement.

    Determine what level of mobile security your organization requires Minimum,Basic,EnhancedorLockdown and implement policies and technology checks and balances accordingly.

    Remote wipe and over-the-air encryption are the most common security functionalities put inplace by organizations at all levels of the security spectrum to mitigate the threat of sensitive dataleakage.

    Understand that all mobile platforms are not created equal; each has its strengths and weaknesses.BlackBerry is the most popular personal device on the corporate network due to embeddedinfrastructure and advanced out-of-the-box security functionality.

    Finally, securing end-user compliance with internal mobile policy is the largest contributor tosuccessfully managing a fleet of personal mobile devices on the corporate network.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    4/30

    Strategize

    3

    Understand

    1

    Implement

    4

    Evaluate

    2

    Allow personal mobile technology in the enterprise to boost

    productivity and end-user satisfaction.

    Dont dismiss personal mobile devices without consideration; there arebenefits to be had by allowing end users to connect their personal mobiledevices to the corporate network.

    Think nobodys doing it? 83% of your peers are allowing personal mobiledevices on the network.

    Determine what level of mobile security is best for your organization.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    5/30

    Do Not Allow Personal Devices

    Allow Personal Devices

    17%

    83%

    Support consumer technology & an increasingly tech-savvy

    workforce to improve productivity

    Info-Tech Research Group 5

    BlackBerry, Apple iOS, Android, and Windows Mobilemake up the majority of allowed personal devices on

    corporate networks.

    N = 144

    *Respondents were asked to select all that apply,resulting in a cumulative total greater than 100%.

    83% of organizations allow end users to connectpersonal mobile devices to the corporate network.

    New technology is often met with disdain from the IT group.Understand that new technology

    is brought into the workplace by end-users as a facilitator of job functions.

    Organizations that allowed devices other than BlackBerry, iOS, Android and Windows Mobile weredrastically less successful than those that did not. Allow personal devices on the network, but stick tothe major players to avoid being trapped in a mobile device jungle.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    6/30

    Embrace tech-savvy end-users; they are assets to the firm

    Info-Tech Research Group 6

    The onus of new technology introduction in the workplace has shifted from IT to the end-user.

    80% of survey respondents cited end-user demandas the primary driver forallowing personal mobile devices on the network.

    IT

    The flow of new devices to theend-user was governed by IT.

    Users were not tech-savvy enough totake advantage of personaltechnology in the workplace and

    limited themselves to what wasprovided to perform their job roles.

    Pre-2008IT brings technology to the end-user

    Post-2008

    IT

    End-users have become moredemanding about technology.

    The flow of new technology into theworkplace has shifted from adedicated IT group to the user.

    Employees are now concerned withusing the latest technology toperform their jobs more efficiently,and demand that IT keeps up.

    End-users bring technology to IT

  • 8/2/2019 Manage the Invasion of Consumer Technology

    7/30

    Dont get mired in definitions; manage any mobile device that

    connects to the corporate network

    Info-Tech Research Group 7

    Smart phones make up the majority of mobile devices connecting to the corporate

    network, but some users may push for tablets and readers. Dont panic. The variance indevices does not matter if you have the right management strategy in place.

    Tablets and smart phones access the corporate network in very similar ways. BetweeniPhones and iPads, for example, there is no difference in the mobile managementpolicies needed.

    TabletsSmartphones

    Employees use these devices to...

    Check corporate e-mail Text message Instant messaging Connect to the Internet through corporate

    WiFi networks Maintain and reference corporate calendars

  • 8/2/2019 Manage the Invasion of Consumer Technology

    8/30

    Dont try to quantify innovation & productivity benefits,

    but understand that they are real

    Info-Tech Research Group 8

    There is no accurate way to quantify the innovation and productivity benefits foremployees, but understand that with improved business connectivity,you canexpect the following changes:

    Because end-users will

    Check and respond totheir e-mail more often

    after-hours.

    Experience quicker

    Turn-around time ontime-sensitive e-mails.

    Third-party apps can be your friend.

    Android, BlackBerry and iOS all haveindependent app stores, which containmobile applications, some of which areaimed at improving productivity (thoughsome are productivity killers). Look intoapps aimed at corporate productivity andconnectivity for quick wins withemployees. Apps designed to transferSMS text messages over data networks asopposed to cellular networks, for

    example, allow users to send unlimitedtext messages. Most personal devices canalso connect to virtual desktops.

    Be more aware of theiravailability.

    Meeting setup times.

    Generally be more intouch with theorganization.

    Flow of informationbetween internal andexternal parties.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    9/30

    Case Study: YMCAs experience with cost reduction

    Info-Tech Research Group 9

    Industry: Non-ProfitSegment: Small Enterprise

    Source: Information Technology Executive

    Pain Point

    Administering andpaying for corporatedevices was significantlydriving up costs.

    The organization neededto find a way to maintainconnectivity withemployees, but remove

    the cost burden ofmaintaining corporateliable mobile devices.

    Solution

    Allowed senior employeesto keep corporate-issuedphones, but mandatedthat data and voicecontracts were personallyheld.

    Junior employees werestripped of mobile

    devices and encouragedto bring in personaldevices to connect to thenetwork.

    Saved $48,000 a year inmobile contracts alone.

    Even if they were alreadygiven corporate devices,employees can beconvinced to attachpersonal mobile devicesto the network.

    If the cost of managing acorporate mobile device

    fleet is becoming aburden on IT, considerswitching to a personaldevice setup. Giftformerly corporatedevices to soften the blowof transferring the cost toemployees.

    Insight

    We had a reduction in costs from no longer covering themonthly bills. We were spending about $4,000 a month incontracts and now we spend nothing.

    -IT Executive, YMCA

  • 8/2/2019 Manage the Invasion of Consumer Technology

    10/30

    Embrace the Apple effect: the iPhone 3G exploded by being a

    multi-function communications & recreational device

    Info-Tech Research Group 10

    The introduction of Apples iPhone 3G in 2008 spurred a smart phone craze

    among recreational end-users, raising their comfort with technology.

    The iPhone 3Gs carrier-subsidized pricing opened thedoors to smart phone adoptionfor the common man.

    With a subsidized price of $200 in2008, 48% of iPhone 3G adopterswere from households earningbetween $25 000 and$50 000 annually.

    The iPhone 3G was viewed asthe first practical convergencedevice; it eliminated the needfor multiple devices.

    The price tag of the iPhone and anaccompanying plan were not feasiblefor lower-income markets as aphone. But the value gained fromeliminating the need to purchasemultiple devices spurred adoption ofthe iPhone as an affordable does-it-all gadget.

    Source: comScore

    Smart phones, and the iPhone in particular, are appealing to a newdemographic and satisfying demand for a single device for communicationand entertainment, even as consumers weather the economy by cuttingback on gadgets.

    - ComScore

  • 8/2/2019 Manage the Invasion of Consumer Technology

    11/30

    Define your security needs based on the sensitivity of your data,

    and act accordingly to optimize device management

    Info-Tech Research Group 11

    The level of policy enforcement and security your organization requires iscontingent upon regulatory compliance requirements and data sensitivity.

    Minimum Basic Enhanced Lockdown

    Companies that do notprovide employees with anysensitive data (e.g. tradesecrets, fiscal information,and press releases) do not

    need to invest ininfrastructure to increasedevice security. Creatingend-user mobile devicepolicies and conductingtraining for suchorganizations is oftenunnecessary.

    Companies that areconcerned with employeescarrying sensitive data intheir corporate e-mailaccounts must create a

    mobile device policy toenforce the right to remotewipe user devices andmandate passwordprotection. End-user trainingon policy and compliance arealso required.

    Enhanced security measuresmust be taken byorganizations that havehighly sensitive data inemployee in-boxes and

    calendars. Theseorganizations must develop amobile device policy,conduct training, andconsider limiting adoption toonly devices with over-the-air encryption, such asBlackBerry.

    Lockdown is necessary forthose organizations thatmust adhere to regulatorycompliance and housepotentially damaging

    business data on end-userdevices. In general, theseorganizations should onlybeconsidering BlackBerry.Those that accept otherdevices must implementthird-party managementtools, policies, conducttraining, and limit device

    adoption.

    Organizations with more employees had less success in allowing personal devices ontheir networks. Large organizations should be particularly stringent in mitigating therisks of incorporating consumer technology, and look towards Enhanced and Lockdownlevels of mobile security.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    12/30

    Understand Strategize

    3

    Evaluate

    2

    Implement

    4

    Multiple mobile platforms exist for end-users; understand the

    nuances of each.

    RIMs BlackBerry offering excels at security, but iOS and Android havetraditionally been morefun; these lines of differentiation are beginning toblur as BlackBerrys get morefun, while iOS and Android become more

    enterprise-appropriate.

    The majority of organizations allow BlackBerrys and iPhones on thecorporate network, with Android catching up fast.

    Match your level of required mobile security to the platforms you can andcannot accommodate on the network.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    13/30

    Three players dominate the smart phone market

    Info-Tech Research Group 13

    Developed by Canadiancompany Research In Motion,the BlackBerry was introducedto the market in 2002.

    Unlike the Android and iOS

    offerings, BlackBerry has alimited app store.

    Requires implementation ofBlackBerry Enterprise Server(BES) or BES Express tointegrate with the corporatee-mail infrastructure.

    Security is the platforms biggeststrength, as data is encrypted onthe device and over the air witha native BES setup.

    Developed by California-basedApple Inc., iOS runs only onApple devices, such as iPhone,iPod Touch, and iPad.

    The original iPhone OS was

    introduced on Apples firstiPhone in 2007.

    The OS is updated with newreleases of the iPhone and alsosees regular patching betweenmajor updates.

    The Apple app store is thelargest of any mobile platform,now carrying over 300,000apps.

    The security offering of iOS(renamed from iPhone OS) isless robust than BlackBerry, butis adequate for mostorganizations and can beimproved with 3rd partytechnology.

    Seeded by Google in 2005,Android-based handsets startedto become available in 2008.

    Unlike BlackBerry and iOS,Android is not a manufacturer-

    specific OS and runs onhandsets from a variety ofmanufacturers.

    The OS is the only one of the bigthree available as open sourceunder the Apache SoftwareLicense.

    While not as large as the iOSapp store, the Androidapplication pool is growingquickly, and contains over100,000 apps.

    Security offering is slightly lesseffective than iOS out of the box,as Android does not support asmany ActiveSync IT policies.

    Ranked first among all smart

    phone OSes sold in the US forthe 2nd quarter of 2010 at 33%.

    Each available platform offers benefits and disadvantages relative to competing solutions; moreimportantly, the cost of infrastructure will be impacted by what you decide to support.

    BlackBerry Apple iOS Android

  • 8/2/2019 Manage the Invasion of Consumer Technology

    14/30

    BlackBerry dominates the market in terms of security features,

    but offers little to recreational end-users

    Info-Tech Research Group 15

    Company

    Headquarters

    Primary Advantage

    Research In Motion (RIM)

    Waterloo, Ontario

    Security features are largelyahead of competitors.

    Primary Disadvantage

    Smallest app store

    68% of businesses allow BlackBerrys on their corporate network.

    Bottom line: as the security leader, there is no reason to disallowBlackBerry. For businesses with compliance regulations or sensitive

    data, it may be the only option.

    Security. Native security features beat out iOS and Android.Dedication to enterprise. RIM dominates in the enterprise,and would like to keep it that way. BlackBerrys and the upcomingRIM PlayBook tablet will continue to focus on business featuresbut are rapidly catering to the consumer market as well.

    Physical keyboard. Most business uses require quick text-based communication. Many users find that a physical keyboardhas an advantage over the touch-screen-only input of the iPhoneand some Android devices.

    The ugly duckling.With the exception of the touch-screen-equipped BlackBerry Torch, the buttons and menus of BlackBerrysare starting to look dated. A non-intuitive interface means morehelp desk calls asking which thing to press to make it do that thing.

    Smaller app store. Having fewer apps than other platforms maylimit on-the-go productivity that requires specific software, and beless appealing to users.

    Strengths

    Challenges

  • 8/2/2019 Manage the Invasion of Consumer Technology

    15/30

    Offering the largest app store & strong multimedia capabilities,

    Apples iOS is the peoples choice

    Info-Tech Research Group 15

    Company

    Headquarters

    Primary Advantage

    Apple Inc.

    Primary Disadvantage

    Cupertino, California

    Largest app store &community

    Security is lacking incomparison to the BlackBerry

    Employee demand.With the recent introduction of the iPhone 4and iPad, iOS devices lead in new connections to corporatenetworks in 2010.Ease of use.A user-friendly interface and walled-off app storemean more employees using their devices without issue, and fewercries for the IT departments help.The most apps, the most fun. There are plenty of productivityapps in Apples massive store, allowing employees to keep in touchon the go. The hardware is ideal for consuming media.

    50% of businesses allow iOS devices on their corporate network.

    Enterprise ready? Although Apple is finally taking enterpriseseriously with iOS 4, the corporate environment is still not the iOSdevices native habitat. BlackBerry is at the top of the enterprisefood chain.

    The most apps, the most fun. The same multimedia and appcapabilities that aid productivity can distract from corporate goals.More apps also means more potential for security breaches oraccidental sharing of sensitive data.

    Bottom line: give the people what they want. Allow iOS devices unlessthere are specific reasons not to.

    Strengths

    Challenges

  • 8/2/2019 Manage the Invasion of Consumer Technology

    16/30

    Android remains the only open source offering in the big three,

    and is gaining market share quickly

    Info-Tech Research Group 16

    Company

    Headquarters

    Primary Advantage

    Google Inc.

    Primary Disadvantage

    Menlo Park, California

    Open source OS

    Concerns about applicationsstoring and distributing

    private information

    Future proof.Androids are taking over the world. Googles OS isthe fastest growing platform of 2010, with a thriving ecosystem ofhardware and apps. Android is unlikely to self-destruct any timesoon.Open development.An open development platform allows easy

    access to productivity apps, or development of custom apps to fitthe organization's needs, without the hassle of requiring third-party approval.

    30% of businesses allow Androids on their corporate network.

    The cost of openness is security. Fraudulent apps can andhave been developed to gather and transmit sensitive informationfor nefarious purposes. Determining an apps trustworthiness is leftto the end user, who may not always be the best judge.

    Fragmented. With a variety of devices made by several differentcompanies, some with custom versions of the OS, demand forsupport may be more frequent and more taxing compared to themore focused iOS and BlackBerry lineups.

    Bottom line: you will encounter an Android soon. Learn to deal withits potential security limitations.

    Strengths

    Challenges

  • 8/2/2019 Manage the Invasion of Consumer Technology

    17/30

    Windows Phone & Symbian round out the top five, but are

    significantly less popular among North American end-users

    Info-Tech Research Group 17

    Microsofts Windows Mobile OS hasbeen on phones since 2000.

    Windows Mobile is being phased outto make room for its successor,

    Windows Phone 7. Early buzz pegs Windows Phone 7 as

    impressive, but it remains to be seen ifit will be another mobile OScontender, or too little too late.

    Open development, but tightlycontrolled app store.

    Typical security features present, withsome extra protection for good

    measure. Exchange and Mobile Office are useful

    in enterprise, but primary audience isconsumer market.

    Originally owned by Finnishcorporation Nokia, the Symbian OShas been on smart devices since 2000and became open-source in 2010.

    Symbian is the worldwide leader,powering nearly half of all smartphones sold, but lacks penetration inNorth America.

    Runs on a variety of phones. Open development platform, but

    certain capabilities requireauthentication.

    Security has been a problem, but

    increasingly stringent apprequirements have alleviated mostthreats.

    Compatible with Microsoft enterprisesolutions, such as ExchangeActiveSync.

    First appeared on the Palm Pre smartphone in 2009.

    Palm was recently purchased byHewlett-Packard. HP is dedicated to

    updating webOS and leveraging it intonew smart phones, as well as tabletsand other devices.

    Although webOS does not currentlyhave a large market share, HPsenthusiasm makes it worth watching.

    Runs only on Palm branded devices. Uses existing technologies such as

    HTML5, Java, and CSS for easy

    development. Development requiresregistration, but is open and free forin-house applications.

    Focus on integrating email, calendars,and social networking (includingExchange ActiveSync support)facilitates constant connectivity.

    Windows Mobile Symbian OS webOS

  • 8/2/2019 Manage the Invasion of Consumer Technology

    18/30

    A few management solutions embrace many platforms

    Info-Tech Research Group 18

    Although each platform has its own challenges and idiosyncrasies, there are commonalitiesthat make managing them less daunting than it first appears.

    All platforms discussed here support MicrosoftExchange ActiveSync for e-mail, contacts,calendars, and tasks.

    Basic security features, such as requiring a PIN,are present on all modern devices.

    The fundamental connectivity apps e-mail,contacts, and calendar are native to all devicesand fairly intuitive to an increasinglytechnology-educated workforce.

    Tablet computers have emerged from obscuritywearing the same operating systems as smartphones, and they are managed in exactly the

    same way.

    The sharpest divide is between BlackBerry andall other platforms. Management solutions suchas BlackBerry Enterprise Server only work withBlackBerry. Third-party solutions like GoodTechnology, MobileIron, and Sybase iAnywhere,

    work with everything but BlackBerry.

    BES 3rd Party Exchange

  • 8/2/2019 Manage the Invasion of Consumer Technology

    19/30

    Understand Strategize

    3

    Evaluate Implement

    4

    There are various risks involved with each platform; learn what they

    are, and how to mitigate them most effectively.

    Data leakage and increasing support costs are the organizations primaryarguments against personal mobile device adoption.

    Remote Wipe and Over-the-Air (OTA) Encryption are the most effective

    ways to ensure lost or stolen devices do not leak sensitive information,and that information is not intercepted while in transit.

    Third-party infrastructure, such as Good Technology, Sybase iAnywhere,or Mobile Iron are effective tools for organizations with Enhanced orLockdown mobile security requirements.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    20/30

    Technological features, such as remote wipe and over-the-air

    (OTA) encryption, decrease data security risks

    Info-Tech Research Group 20

    Native functionality on the BlackBerry via BES and BES Express, iOS and Android

    devices require third-party infrastructure, including Exchange ActiveSync, to implementremote wipe and OTA encryption.

    Remote Wipe

    Remote wipe functionality provides ITwith the access to wipe a device back to

    factory defaults in the event it is lost orstolen. Organizations that requireEnhanced or Lockdown levels of mobilesecurity must include a remote wipeagreement in their mobile policy andinvest in 3rd party infrastructure to enableremote wipe on iOS and Android devices.

    OTA Encryption

    OTA encryption allows IT to encryptmessages in transit between corporate

    mobile devices. The encryption preventsthem from being intercepted and decodedby a third party. Again, this is largely aconcern for organizations that requireEnhanced or Lockdown levels of mobilesecurity. An investment in third-partyinfrastructure is required to enable this

    functionality on iOS and Android devices.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    21/30

    Leverage Exchange ActiveSync mailbox policies across Android &

    iOS personal devices to minimize security threats

    Info-Tech Research Group 21

    Exchange ActiveSync mailbox policies enable IT to apply a common set of policy andsecurity settings to individual or grouped users to efficiently control data connections to

    personal devices.

    At a minimum, implement the following Exchange ActiveSync policies across varying levels of mobile security:

    A full listing of available Exchange ActiveSyncpolicies is available via Microsoft TechNet, here.

    Minimum Basic Enhanced Lockdown

    Password enabled

    Remote wipe

    Minimum, plus thefollowing:

    Device encryption enabled

    Basic, plus the following:

    Require device encryption

    Password expiration

    Over-the-air encryption via3rd party infrastructure

    Enhanced, plus thefollowing:

    Require encrypted S/MIMEmessages

    Require storage cardencryption

    Minimum device passwordcomplex characters

    Maximum failed passwordattempts

    d h d l

    http://technet.microsoft.com/en-us/library/bb123484.aspxhttp://technet.microsoft.com/en-us/library/bb123484.aspx
  • 8/2/2019 Manage the Invasion of Consumer Technology

    22/30

    Consider third-party servers as critical to

    successfully managing personal mobile devices

    Info-Tech Research Group22

    45%

    of organizations that are facing issues with end-user policy compliance adopt third-partyinfrastructure to manage personal mobile devices.

    49%

    59%

    Exchange

    50%

    +20%

    51%

    BES Third-Party

    54%

    49%

    Use

    Do Not Use

    Organizations that use third-party infrastructure to managepersonal mobile devices were 20% more successful than thosethat did not.

    Third-party infrastructure, such as Mobile Iron,iAnywhere Afaria, and Good Technology enableadvanced encryption and management functionality.

    Organizations that adopted third-party infrastructureto aid with personal mobile device management weremarkedly more successful than those that did not.

    Using a [third-party] server is a little bit morecostly than not, but with sensitive data it is

    the best option. The third-party server makesour iPhones as secure as the BlackBerrys wehave on the server.

    - IT Director, Entertainment

    DegreeofSuccess

  • 8/2/2019 Manage the Invasion of Consumer Technology

    23/30

    Understand StrategizeEvaluate Implement

    4

    Draft a policy and conduct training sessions to ensure users abide by

    it to mitigate security risks.

    Having employees sign a personal device mobile acceptable use policythat outlines the rights of IT is critical to data security, especially in theevent of loss or theft.

    Signing a policy isnt enough; run training seminars with employees toensure they understand the policys nuances.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    24/30

    Draw a line in the sand: tell end users what they can and cant

    do to decrease the effect on support costs

    Info-Tech Research Group 24

    Do support end-users with the following problems: Dont support end-users with the following problems:

    My phone wont receive e-mails.

    My phone and calendar wont sync.

    My phone cant access Active Directory.

    My phone wont turn on.

    My phone is frozen.

    My screen is cracked.

    In short, when it comes to personal device support, focus on mitigating connectivityissues with corporate infrastructure. Leave end-users to manage their own deviceswhen it comes to hardware and support issues.

    52% of respondents strongly agreed with the following statement:Help desk support requirements have increased[since allowing personal devices on the network].

    n = 113

    The majority of surveyrespondents interviewed saw anincrease in support costs afterpermitting personal devices on thenetwork. Those that did not

    focused heavily on developing apolicy that outlined resolutionoptions for common issues.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    25/30

    Mobile Security Incidents

    Organizations that saw mobile securityincidents decrease were deemed moresuccessful than those that had not.

    Helpdesk Support Requirements

    Organizations that saw helpdesk supportrequirements decrease were deemed moresuccessful than those that had not.

    Accessibility for Remote Employees

    Organizations that saw accessibility for remoteemployees increase were deemed moresuccessful than those that had not.

    Costs

    Organizations that saw costs decrease weredeemed more successful than those that hadnot.

    Success was defined by survey respondentsrating of the following factors:

    Maximize the potential for success by securing user compliance

    with internal personal mobile standards

    Info-Tech Research Group 25

    Policy training and enforcement, coupled with technologicalenforcement, are the largest drivers of user compliance.

    User compliance is the single largest predictor of success whenallowing personal mobile devices onto the corporate network,accounting for 13.5% of the variance in success.

    PolicyTraining

    Technological

    Enforcement

    PolicyEnforcement

    UserCompliance

    54%

    7%

    35%

    Contribution to user compliance.

    User ComplianceDrivers

  • 8/2/2019 Manage the Invasion of Consumer Technology

    26/30

    Develop a policy to ensure that end users are informed of

    what is & is not acceptable

    Info-Tech Research Group 26

    ITs right to remote wipe mobile devices in the eventof loss, theft, malware infection or complianceincident.

    ITs right to refuse access to the corporate network toany end-user deemed unfit.

    The expectations of the end-user to adhere to strictdata confidentiality standards.

    The requirement that end-users implementalphanumeric passwords on mobile devices.

    The level of support end-users can expect from theinternal service-desk regarding personal mobiledevices.

    Use thePersonal Mobile Device Acceptable UsePolicy to outline:

    http://www.infotech.com/research/it-personal-mobile-device-remote-wipe-waiverhttp://www.infotech.com/research/it-personal-mobile-device-acceptable-use-policyhttp://www.infotech.com/research/it-personal-mobile-device-acceptable-use-policyhttp://www.infotech.com/research/it-personal-mobile-device-acceptable-use-policyhttp://www.infotech.com/research/it-personal-mobile-device-acceptable-use-policyhttp://www.infotech.com/research/it-personal-mobile-device-remote-wipe-waiver
  • 8/2/2019 Manage the Invasion of Consumer Technology

    27/30

    Conduct training sessions to reinforce the policy &

    provide behavioral examples

    Info-Tech Research Group 27

    The purpose of the personal mobile device acceptableuse policy.

    The major points of the personal mobile device

    acceptable use policy, especially security andexpectations.

    A case study highlighting appropriate actions incommon situations, such as device loss or theft.

    Consequences for failing to adhere to the policy.

    ITs rights regarding wiping, restoring, and managingpersonal mobile devices.

    Use thePersonal Mobile Device Policy TrainingSlideshow to reiterate and highlight:

    R d t it d it th f t f t

    http://www.infotech.com/research/it-personal-mobile-device-policy-training-slideshowhttp://www.infotech.com/research/it-personal-mobile-device-policy-training-slideshowhttp://www.infotech.com/research/it-personal-mobile-device-policy-training-slideshowhttp://www.infotech.com/research/it-personal-mobile-device-policy-training-slideshow
  • 8/2/2019 Manage the Invasion of Consumer Technology

    28/30

    Respondents cited securityas the foremost reason for notallowing personal mobile devices on the corporate network

    Info-Tech Research Group 28

    Data and corporate security remain the largest factors against personal mobile devicesin the workplace, but support, policy enforcement, lack of control, and corporateliability also remain significant detractors from adoption.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    29/30

    Corporate mobile devices soon to be a thing of the past

    Info-Tech Research Group 29

    As personal mobiles infiltrate the organization, the days of corporately owned devices are numbered.

    83% of survey respondents allow personal mobile devices on the corporate network; Info-Tech believes thisto be the beginning of an increasing trend, resulting in adoption of personal mobile devices. The increase inpersonal devices coupled with the continued pressure on IT to reduce spend will result in corporate devicesgoing the way of the dinosaur in favor of personal mobile devices.

    Current industry rates show Android to be the #2 player in the mobile platform market, and gaining quickly.Info-Tech believes that the development potential of the platform and the multi-manufacturer support it hasreceived, Android will be the uncontested market leader by 2013.

    Android will be the number one mobile platform by 2013.

    App stores are currently using the quantity of apps as a selling point for the recreational user. Info-Techbelieves this driver will begin to dissipate as app stores converge on functionality, with resulting quality andusefulness becoming primary drivers.

    The differentiators between app stores across platforms will move from quantity of apps to quality & usefulness.

    Info-Tech predicts major upcoming changes in the way usersperceive and interact with mobile devices.

  • 8/2/2019 Manage the Invasion of Consumer Technology

    30/30

    Summary

    Info-Tech Research Group 30

    Consumer technology is invading the workplace. However, unlike an alien invasion, incomingpersonal devices bring great potential benefits to humanity and to the IT department. Reducedcosts and increased productivity follow tech-savvy employees into the enterprise.

    The current big three mobile platforms BlackBerry, Apple iOS, and Android each have theirstrengths and weaknesses. Understand how to leverage the strengths and avoid the weaknesses ofevery personal device that comes in.

    Stick to the major mobile platforms to avoid management headaches, but be up to speed on the lesspopular offerings, and realize that a variety of platforms does not always mean a variety of

    management techniques and technology.

    Define your security requirements and take a personal device stance that aligns with them. At aminimum, have a password policy and enable remote wipe as an option. Consider more advancedoptions and/or third-party management technology, if users are storing sensitive data.

    Focus on the biggest determinant of success: user compliance. Have a clear policy, and train usersto be aware of how to properly use their device in conjunction with the corporate network. Put

    down limits on what IT can help with, to avoid increased support costs.

    Info-Tech believes that corporately-owned devices are being driven off the planet in favor of thenew rulers-of-mobile in the enterprise:personal devices. Adapt or face extinction.

    http://www.infotech.com/research/it-personal-mobile-device-remote-wipe-waiverhttp://www.infotech.com/research/it-personal-mobile-device-remote-wipe-waiver