mobilizing contract employees with instant email, apps and content

18
Mobilizing the Contingent Workforce Instant Email, Apps & Content 1 Rob Patey | Michelle Cook | Matt Shaver

Upload: maas360-by-fiberlink

Post on 14-Jul-2015

158 views

Category:

Mobile


0 download

TRANSCRIPT

Mobilizing the Contingent Workforce Instant Email, Apps & Content

1

Rob Patey | Michelle Cook | Matt Shaver

Agenda

Contract Employee Landscape Use cases: extending data to

your extended workforce Policy setting: secure access to

corporate resources Q&A

2

Data & Device: EMM Security Diversity BYOD Type “Temp”o

3

Mobile & Contingent, The Numbers Say Manage

4 #Mobile4All

• 8% RISE in 2014 Temp Workers • 3+ Devices carried on avg • 7% RISE Mobile help desk calls

– 23% Enrollment (email, WiFi) – 20% App Control – 16% Unlock – PW reset

• 3M stolen/lost smartphones in ’13 • Data loss against compliance

– Billions of recorded lost revenue ‘20 » Incalculable Brand/PR damage

Poll Question #1

What is your current mobile security? a) None b) Ask users nicely to PW lock c) MDM: Free d) MDM: Cloud or On-Prem Paid e) Secure email & Calendar (Additional PW) f) Secure mobile suite: content, docs, web

(email)

5 #Mobile4All

BYOD: The Contingent Mobile Security Template

6 #Mobile4All

• BYOD: Data AND/OR Device EMM – Privacy concerns addressed w/

mobile data security – Provisioning data – not costly

hardware – Policies for security by OS

specifics and broad • Contingent considers user group

granularity

Industry Use Cases

Extending data to your extended workforce

7

Poll Question #2

• What’s your industry? a) Healthcare b) Finance c) Education d) Government e) Manufacturing f) Retail g) Other

8 #Mobile4All

Consultants, Temporary Workers and Freelancers

• Use Case Example: Dr. Smith consults at both ABC Health System and U of Health:

• How do you provide access to your corporate network if they are already connected to another health system’s network?

• How do you make sure your data doesn’t mix with the other health system’s data?

• How do you make sure your data is secure and protected?

9

Standalone SPS • Configure work persona:

Container Passcode Email Calendar Contacts Docs Browser Apps

• Selective wipe • Jailbreak/root detection • Encrypted and password

protected

#Mobile4All

BYOD: End-User Privacy • Majority of contingent workforce use their own mobile devices • MaaS360 Secure Productivity Suite can help balance protecting your corporate

data and end-user privacy • Standalone SPS ONLY manages and has visibility to the container and never the

device • Full MDM product provides Personally Identifiable Information (PII) controls

10

Mobile Enterprise Gateway for Internal Resources Simple & secure access to enterprise intranet sites & internal SharePoint sites, Windows File Shares & other enterprise file stores on a mobile device

11

– No need for user to initiate a device-level VPN connection – Protect data with robust security policies & DLP controls – No changes to your network or firewall security settings

Enterprise Web Servers

Enterprise Apps

Mobile Enterprise Gateway™

Windows File Shares

Internal SharePoint

Shared Device Support Between Shifts Share a single device with multiple users Reduce device purchasing costs Maximize device utilization Log in to apply user specific settings – Authentication with Active Directory or

MaaS360 local – Email, Wi-Fi, VPN, Apps, Docs

Log out to remove settings Maintain an audit trail of users Ideal for a number of use cases such as: – An iPad shared amongst doctors on rotating shifts – An iPhone shared for retail demonstrations – An iPad shared by shift workers on the manufacturing floor

12 #Mobile4All

Contextual Event Management – Hourly Employees Labor laws require paying employees if they check email or work off the clock Contextual policies can help prevent access to corporate data during off hours Location-Based Policies – Physical location (e.g. Address) – Network connection (e.g. SSID)

Time-Based Policies – Assign group persona policies based on:

• Time of day • Days of the week

13 #Mobile4All

Mobile Threat Management

• Reduce the risk of malware collecting sensitive data • Restrict access to enterprise resources • Prevent deployment of containers into jailbroken or

rooted device • Restrict content sharing between enterprise apps on

malware-infected devices

14 #Mobile4All

Policy Setting Secure access to corporate resources

15

Security is Key

16

FIPS 140-2 Compliant 256-bit AES Encryption

#Mobile4All

Poll Question #3

• What are your most sought after controls? Select all that apply. a) Email b) Intranets c) Apps d) Time/geo Controls

17 #Mobile4All

Questions?

• Forum – announcements, discussions and questions

• Blog • Webinars • Resources • Social media

Visit the MaaSters Center to discuss IT in the cloud: MaaS360.com/maasters

#Mobile4All