supporting byod without reservation: are we there yet?

9
- Samsung Tablet Photo - Supporting BYOD Without Reservation: Are We There Yet? Survey of IT pros explores security fears that may limit BYOD benefits

Upload: samsung-business-usa

Post on 15-Jul-2015

403 views

Category:

Technology


2 download

TRANSCRIPT

- Samsung Tablet Photo -

Supporting BYOD Without Reservation: Are We There Yet?Survey of IT pros explores security fears that may limit BYOD benefits

S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 1

Introduction 2

Security: The greatest BYOD concern 4

Securing BYOD: Effective steps IT pros can take 6

Comprehensive mobility management solution: 7 KnoxTM from Samsung

About Samsung 8

About the survey 8

Table of contents

S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 2

Introduction

In just a few short years, Bring Your Own Device (BYOD) has evolved from a less-than-welcome

trend for many businesses to a company-sanctioned everyday reality.1 The majority (85%) of

IT pros responding to a recent survey by Spiceworks indicate their organizations support BYOD

devices. This broad acceptance should come as no surprise, given the benefits that have emerged

from BYOD – everything from higher employee productivity and lower IT costs2 to improved

business continuity.3

BYOD Device Support

Laptops

Total Use BYOD Supported

Smartphones

Tablets

Wearables 10%5%

None of the above 0%15%

Not surprisingly, the top three employee-owned devices supported by survey respondents are

smartphones, tablets and laptops.

100%50%

97%57%

95%76%

88%61%

S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 3

BYOD Access to Corporate Assets

Email/

calendar/

contacts

0%

20%

40%

60%

80%

100%

99%

Company file-

sharing accounts

45%

Secure netw

ork

reourc

es

41%

Company m

obile

apps/software

35%

Other

2%

This white paper looks at the concerns that lead organizations to limit BYOD access to corporate

assets and at what might alleviate those concerns. It proposes an approach to addressing

specific challenges that could pave the way for organizations to support BYOD more broadly –

and thereby derive greater benefits from it.

I N T R O D U C T I O N

The majority (85%) of IT pros responding to a recent survey by Spiceworks indicate their organizations support BYOD devices.

!

What may be surprising, however, is that even though organizations in the survey widely accept

BYOD, 86% limit access to a handful of everyday office applications – and only 14% allow full

access to corporate assets. For this reason, the benefits they enjoy may also be limited.

S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 4

Security: The greatest BYOD concern

Concerns about

security/contro

l0%

20%

40%

60%

80%

100%

65%

Concerns about s

eparatin

g

personal/corp

orate

data

41%

Lack of need

Other

41%

Lack of dem

and

Don’t know

36%

Insuffi

cient monito

ring/

managem

ent tools

Lack of tim

e/resourc

es to

monito

r/m

anage access

30% 26%

Industry

standard

s/

complia

nce regulatio

ns

14% 3% 1%

When Spiceworks asked survey participants who restricted BYOD access why they did so, the

top answer by a substantial margin was concern about security, followed by concern about

keeping personal and corporate data separate. This is consistent with other reports about BYOD

concerns over the last several years. “CIOs hesitate to allow full BYOD access because they’re

balancing convenience and flexibility for employees with security and logistical concerns of

their employers,” says one industry observer.4 More recently, Computerworld reported on

some tricky IT issues that can arise when employees’ personal data starts presenting security

issues, such as malware that comes in from non-work websites that employees have visited via

personal device.5

Reasons for Restricted Access (asked of those not allowing full BYOD access)

S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 5

S E C U R I T Y : T H E G R E A T E S T B Y O D C O N C E R N

Separating personal and corporate data

Limited end-user knowledge

64%70%

Time/resources required to manage devices 53%

100%

Enforcing authentication 49%Cost of security solutions 45%

Increased network complexity 38%Lack of comprehensive security solutions 35%

End-user resistance 34%Limited knowledge to configure/

manage multiple device types34%

50%

When asked about the greatest challenge associated with securing access for BYOD, 70% of

survey respondents – including both those supporting and not supporting BYOD – cited limited

end-user knowledge about risk and security practices.

“CIOs hesitate to allow full BYOD access because they’re balancing convenience and flexibility for employees with security and logistical concerns of their employers.”

—Computerworld

Top Challenges with Securing Access for BYOD(asked of those supporting and not supporting BYOD)

S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 6

What can be done to make BYOD secure enough that organizations will feel free to allow

employees BYOD access to file sharing, network resources, and other critical applications and

capabilities? Expert recommendations include clearly establishing policies for how devices can

be used and educating employees to be sure they know about, understand and follow those

policies.6 Mobile device management (MDM) is also recommended, as it provides IT with the

tools to monitor employee devices and ensure they’re being used according to policy.7

But is this enough? These steps are important, but none of them – not even MDM – can provide a

full measure of mobile security. While more comprehensive mobile security technology solutions

are emerging to address the gap, what does IT need to see in these solutions? When asked what

factors they considered most important in a BYOD security solution, survey respondents most

frequently mentioned data protection and anti-virus/malware software.

Data protection 75%Anti-virus/malware software 70%

100%

Data loss prevention 54%Central management capabilities 54%

MDM 44%Remote management 43%

Secure container 43%Application control

Identity access management (IAM)

36%35%

50%

Securing BYOD: Effective steps IT pros can take

Important Factors in a BYOD Security Solution

S U P P O R T I N G B Y O D W I T H O U T R E S E R V A T I O N // 7

Comprehensive mobility management solution: Knox from Samsung

Samsung KnoxTM is a complete enterprise mobile solution that addresses all the top security

concerns IT pros report in the Spiceworks survey. Designed to enhance security of the open-

source Android platform, it provides hardware-level, OS-level and application-level security to

safeguard corporate data accessed on personal devices. With Knox, employees can use a single

device for both personal and business use without compromising business data security. Knox

features include:

• Comprehensive protection against malware attacks and hacking

• Multi-layered protection with biometric authentication for authorized device access

• A complete set of cloud-based MDM, IAM and security services that work across device platforms and enable single sign-on or mobile apps

• Remote device/application control through an IT admin or U.S.er portal

• Enhanced application sandbox to secure enterprise apps and prevent data leakage

• Best-in-class device management with more than 390 IT policies

• Compatible with existing enterprise infrastructure

With a multi-layered security model and industry-leading device management capabilities,

Knox meets the needs of even the most demanding business environments.

Learn more about Samsung Knox.

With a multi-layered security model and industry-leading device management capabilities, Knox meets the needs of even the most demanding business environments.

!

As a global leader in enterprise mobility and information technology, Samsung Business provides

a diverse portfolio of enterprise technologies including smartphones, wearables, tablets, digital

displays, hospitality TVs, printers and medical diagnostic equipment. We are committed to putting

the business customer at the core of everything we do by delivering comprehensive products,

solutions and services across diverse industries including retail, healthcare, hospitality, education

and government. For more information, please visit samsung.com/business or follow Samsung

Business via Twitter @SamsungBizUSA.

About Samsung Business

Samsung commissioned Spiceworks to conduct an online survey in November 2014 to profile

current BYOD practices and pain points. A total of 173 interviews were collected from IT pros

in the U.S. Forty-nine percent of the respondents came from organizations with fewer than 100

employees. Another 37% came from organizations with 100 to 499 employees, and 14% came

from organizations with 500 or more employees.

About the survey

Sources1 “Celebrating Five Years of BYOD With a Look Back,” Wired Innovation Insights, December 2014. http://insights.wired.com/profiles/blogs/celebrating-five-years-of-byod-with-a-look-back#axzz3LovxsSgj

2 “BYOD All About Benefits and Risks,” Wired Innovation Insights, September 2013. http://insights.wired.com/profiles/blogs/bring-your-own-device-benefits-and-risks#axz-z3LovxsSgj

3 “The Impact of BYOD on Business Continuity,” Tech Cocktail, November 2014. http://venturebeat.com/2013/03/05/small-businesses-not-huge-companies-will-lead-the-way-for-tablet-growth/

4 “Why will IT STILL not support BYOD?” IT World, May 2012. http://www.itworld.com/article/2726388/mobile/why-will-it-still-not-support-byod-.html

5 “Tech support’s NSFW problem,” Computerworld, October 2014. http://www.computerworld.com/article/2839235/tech-support-s-nsfw-problem.html

6 “Dos and Don’ts of BYOD,” PC, October 2014. http://www.pcmag.com/article2/0,2817,2470068,00.asp

7 “Keeping BYOD in Check: How to Enforce BYOD Policy,” CIO, September 2014. http://www.enterprisecioforum.com/en/blogs/ricknotsodelgadogmailcom/keeping-byod-check-how-enforce-byod-poli