3 steps to safely bringing your own devices (byod)

30
vdcresearch.co m 1 © 2011 VDC Research Group, Inc. Mobile & Wireless 3 Steps to Safe Bring Your Own Devices (BYOD) Host and Moderator: David Krebs, VDC Research Sponsors; September 28, 2011

Upload: motorola-solutions

Post on 07-Nov-2014

1.484 views

Category:

Technology


3 download

DESCRIPTION

Exploring enterprise mobility challenges and opportunities as more and more mobile workers start using personal devices in the workplace.

TRANSCRIPT

Page 1: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com1© 2011 VDC Research Group, Inc.

Mobile & Wireless

3 Steps to Safe Bring Your Own Devices (BYOD)

Host and Moderator: David Krebs, VDC Research

Sponsors;

September 28, 2011

Page 2: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com2© 2011 VDC Research Group, Inc.

Mobile & Wireless

• Welcome

• Panelist Introductions

• BYOD market trends

• Motorola Solutions

• Cloudpath Networks

• Bradford Networks

• Question and Answers

• Wrap up

• Motorola XOOM and Apple iPad2 giveaway

Must be present to win!

Agenda

Page 3: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com3© 2011 VDC Research Group, Inc.

Mobile & Wireless

How many users are on your network?

<100 101-1000 1,001-10,000 >10,0000

50

100

150

200

250

Page 4: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com4© 2011 VDC Research Group, Inc.

Mobile & Wireless

How many different device types and OS do you expect to support?

5+ 3-4 1-20

50

100

150

200

250

300

Page 5: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com5© 2011 VDC Research Group, Inc.

Mobile & Wireless

How important is it to distinguish between corporate-owned and employee-owned devices?

Very Important Somewhat important Not important0

50

100

150

200

250

300

350

Page 6: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com6© 2011 VDC Research Group, Inc.

Mobile & Wireless

What are your concerns about supporting BYOD?

Device

sec

urity

(malw

are,

pat

ch, e

tc.)

Regist

ering

/Iden

tifyin

g de

vice

and

user

s

Device

con

figur

ation

for W

i-Fi s

ecur

ity

Downlo

ading

/sha

ring

illega

l/una

utho

rized

files

Role b

ased

acc

ess

0

50

100

150

200

250

Page 7: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com7© 2011 VDC Research Group, Inc.

Mobile & Wireless

• The population of mobile workers is rapidly increasing and has reached over 1 billion workers in 2011.

• Mobile workers demanding access to critical (corporate) information to enable real time distributed decision making and transaction processing.

• Consumerization driving shift in balance of power from corporate IT to the employee/consumer.

• Consequence is influx of personal devices and multiple OS platforms infiltrating enterprise environments.

• Large amounts of sensitive corporate data is and will be accessed on these mobile devices.

• With growing corporate support of personal devices critical to ensure key enterprise management and support policies that span the device lifecycle.

BYOD : Key Takeaways

Page 8: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com8© 2011 VDC Research Group, Inc.

Mobile & Wireless

Enterprise Mobility Challenges and OpportunitiesP

RIO

RIT

Y R

AN

KIN

G

Benefits & Business Drivers

1. Empower employees to be more productive

2. Improved customer service

3. Fast, reliable wireless communications

4. Improved decision making capabilities

5. Mobilization of business processes and line of business applications

1. Multiple platform support

2. Security and device management concerns

3. BYOD

4. Application and platform fragmentation

5. Lifecycle management

6. Applications deployment and management

Challenges

Page 9: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com9© 2011 VDC Research Group, Inc.

Mobile & Wireless

Employee purchased only: Any phone

Employee purchased only: Approved list

Both company and employee purchased: Any phone

Both company and employee purchased: Approved list

Company purchased only

0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% 45.0% 50.0%

2.3%

3.2%

12.5%

36.3%

45.6%

Mobile Policy for Smartphones

Over 50% of organizations provide some level of support for personal/individual devices

Enterprises Introducing BYOD Policies

Source: 2011 VDC Research survey of 864 mobile decision makers

Page 10: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com10© 2011 VDC Research Group, Inc.

Mobile & Wireless

Mobile & Wireless Solution Requirements Will Differ by Worker Type

Road Warriors & Executives

(Knowledge Workers)

Mobile Office Professional

(Corridor Warrior)

Campus Mobile Worker

• Wireless Email

• Dashboards

• BI/CI

• Mobile CRM

• Approvals

• Expense Reporting

• Workflow Management

Mobile Worker

Target Applications

Preferred Device

Technical Requirements

Field Mobile Worker (Task/Line Worker)

• Wireless Email

• Time & Attendance

• Approvals

• Workflow Management

• Mobile browser

• 4G+ GPS

• Push email

• Image capture

• Device Management

• 3rd-Party Apps

• Security support

• Push Email

• Active Sync

• Application Partitioning

• WiFi

• Mobile Browser

• 3G+ GPS (4G emerging)

• Image Capture

• Device Management

• 3rd-Party Apps

• Durability/Ruggedness

• DECT Functionality

• WiFi

• 3rd-Party Apps

• Image Capture

• Wireless Email

• Time & Attendance

• Approvals

• Workflow Management

• Time & Attendance

• Dispatching

• Workflow Management

• Vertical Applications

Mobile Worker Population

28.2M

111.6M

370.5M

196.6M

Page 11: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com11© 2011 VDC Research Group, Inc.

Mobile & Wireless

Organizations Are Moving Beyond Email to Enterprise Applications

Wireless email

Personalized contacts

Content/employee portal

Inventory management

Field service managament

Sales force management

Customer interation management

Logistics management

Workforce analytics and management

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%Fully deployed Rolling out or partial deployment Evaluating or pilotingNo plans Don't know

Source: 2011 VDC Research survey of 864 mobile decision makers

Page 12: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com12© 2011 VDC Research Group, Inc.

Mobile & Wireless

From on-boarding and policy management to end of life

Device and Application Management Critical to BYOD Success

Customer Issues

Deployment Complexity

Remote Management

Application Management

Security Management

LOWER TCO DATA SECURITY

OUT OF BOX EXPERIENCE EFFICIENT APP DEPLOYMENT

• OTA device provisioning• Software configuration

• Device diagnostics• OTA fixes• Validate settings

• OTA push of applications and updates

• Seamless version control

• Security• Remote lock and wipe

Page 13: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Page 13MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service

names are the property of their respective owners. © 2010 Motorola, Inc. All rights reserved.

B.Y.O.DBring Your Own DeviceConsiderations & Solution Components

Tajinder (TJ) MaanDirector Enterprise Networking & Communications (ENC)Motorola SolutionsSept 28th, 2011

Page 14: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Page 14MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service

names are the property of their respective owners. © 2010 Motorola, Inc. All rights reserved.

WiFi Network Considerations

IT Strategy

WLAN Design

Authentication

DeviceOn-boarding

AccessControl

Captive Portal or EmailAuto device configuration

Existing Infrastructure: Corporate SSID + Guest SSIDBYOD – Secure Separate SSID / Corporate SSID?

802.1x – PEAP / TLS Pre Shared Key

Role Based FirewallAccess Control Policies

What Personal Computing devices today & in future?

Page 15: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Page 15MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service

names are the property of their respective owners. © 2010 Motorola, Inc. All rights reserved.

ComplianceOn-BoardingInfrastructure

CONTROLLERS & ACCESS POINTS

PERFORMANCE & CAPACITY CONTROLS

WiNG5 ROLE BASED FIREWALL &

INTEGRATED WIPS

MSP AGENT

MOBILITY SERVICES PLATFORM

1. SmartRF2. AirTime Fairness3. Smart Band Control4. Smart Load Balance

CAPTIVE PORTAL

1. Hotspot Web Pages2. Built in Radius3. External LDAP

Express BYOD Solution

Motorola WiNG 5 Motorola MSP Motorola WiNG5

Page 16: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Page 16MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service

names are the property of their respective owners. © 2010 Motorola, Inc. All rights reserved.

ComplianceOn-BoardingInfrastructure

CONTROLLERS & ACCESS POINTS

PERFORMANCE & CAPACITY CONTROLS

WiNG5 ROLE BASED FIREWALL &

INTEGRATED WIPS

XpressConnect ON-BOARDING

1. SmartRF2. AirTime Fairness3. Smart Band Control4. Smart Load Balance

Advanced BYOD Solution

Motorola Cloudpath Bradford

NEXT GENERATIONNAC

1. Hotspot Web Pages2. Built in Radius3. External LDAP

WiNG 5CAPTIVE PORTAL

Page 17: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

Colorado.edu

Kevin KosterFounder, Technical Lead

Cloudpath Networks

Page 18: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

Keys to On-Boarding

Provide Simple Connectivity

Self-Service & Intuitive

Multiple Platforms

Scalable & Sustainable

Protect Users

Protect The Network

Without Compromising Security

Page 19: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

User/Device Authentication

Over-The-Air Encryption

Network Authentication

Open

No.

No.

Click to Join. Requires configuration

Security Considerations

Ease Of Initial Access

Usability Considerations

Ease of Ongoing Access Captive Portal Fatigue

Captive Portal Integrated

Integrated

Integrated

Standards-Based Policy No. Integrated

SSID SelectionWPA2-Enterprise

Automatic Reauthentication

Page 20: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

User/Device Authentication

Over-The-Air Encryption

Network Authentication

Open

No.

No.

Click to Join. Requires configuration

Security Considerations

Ease Of Initial Access

Usability Considerations

Ease of Ongoing Access Automatic ReauthenticationCaptive Portal Fatigue

Captive Portal Integrated

Integrated

Integrated

Standards-Based Policy No. Integrated

WPA2-Enterprise

SSID Selection

Page 21: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

SSID Selection

User/Device Authentication

Over-The-Air Encryption

Network Authentication

No.

No.

Requires configuration

Security Considerations

Ease Of Initial Access

Usability Considerations

Ease of Ongoing Access Captive Portal Fatigue

Captive Portal

Standards-Based Policy No.

Click to Join.

Integrated

Integrated

Integrated

Integrated

Automatic Reauthentication

Open WPA2-Enterprise

Page 22: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

XpressConnect On-Boarding

New user connects to open (guest) SSID.

Captive portal provides link for secure network.

XpressConnect configures and moves user.

Page 23: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

XpressConnect Capabilities

Install Client Certs & Trusted CAs

Interact with Microsoft CA & Others

Differentiate IT-Issued vs. BYOD

Millions of Users Worldwide

Credentials (PEAP) or Certs (TLS)

WPA2-Enterprise & PSK

Android, Apple iPad, iPhone, iPod

Windows, Mac OS X, Linux

Page 24: 3 Steps to Safely Bringing Your Own Devices (BYOD)

Qu

ick

. E

as

y.

Se

cu

re.

Keys to On-Boarding

Provide Simple Connectivity

Self-Service & Intuitive

Multiple Platforms

Scalable & Sustainable

Protect Users

Protect The Network

Without Compromising Security

WPA2-Enterprise

Page 25: 3 Steps to Safely Bringing Your Own Devices (BYOD)

©2011 Bradford Networks. All rights reserved.

Bring Your Own Device (BYOD)

Frank Andrus

CTO

Page 26: 3 Steps to Safely Bringing Your Own Devices (BYOD)

©2011 Bradford Networks. All rights reserved.26

BYOD and Your Business

Homogeneous Heterogeneous

APPLICATIONS

COMMUNICATIONS

DEVICES

Page 27: 3 Steps to Safely Bringing Your Own Devices (BYOD)

©2011 Bradford Networks. All rights reserved.27

BYOD and Your Business

ACCESSSECURITY

Striking a Balance

• Security vs. Accessibility• Enabling the business while protecting it

Visibility is Crucial

• Knowledge of who, what, where, when, how …• Network-wide, right out to point of access

Page 28: 3 Steps to Safely Bringing Your Own Devices (BYOD)

©2011 Bradford Networks. All rights reserved.28

Next-Generation NAC

An adaptive network security approach that leverages the entire network environment

Page 29: 3 Steps to Safely Bringing Your Own Devices (BYOD)

©2011 Bradford Networks. All rights reserved.29

Visibility and Automation

Page 30: 3 Steps to Safely Bringing Your Own Devices (BYOD)

vdcresearch.com30© 2011 VDC Research Group, Inc.

Mobile & Wireless

Stop by and see us at EDUCAUSE 2011Philadelphia, PA October 18-21

Booth #1739,1741 Booth #2007 Booth #701