managing byod legal it’s next great challenge. agenda the byod trend – benefits and risks best...
TRANSCRIPT
Managing BYODLegal IT’s Next Great Challenge
Agenda
The BYOD Trend – benefits and risks Best practices for managing mobile device
usage Overview of mobile device management
technologies Case Study: Holland & Hart
The BYOD Trend – Some History
Employee use of company owned computers Using laptops to access the internet Drove usage policies and technology controls
RIM Blackberry delivers first mobile device Apple iPhone changes everything
BYOD Benefits and Challenges
Benefits Improved responsiveness Improved accessibility Greater flexibility
Challenges IT support of a wide range of mobile vendors and
operating environments Secure access to firm data Mitigate risk of unsecure personal apps
5
Smartphones lost/stolen in 2011
Only 7% Recovered
70 millionSource: 2012 Global State of Infosecurity Survey, PriceWaterhouseCoopers
6
Have mobile device breaches
17% of businesses
Source: Feb 10, 2012 Tabtimes.com, Doug Drinkwater
Best Practices
Registering devices to insure security: Virus protection, authentication, encryption
Provisioning of firm-authorized apps IT use monitoring User education
Compliance with firm security policies Mobile Device registration with IT Password protection Use of unsanctioned apps Lost/stolen devices
Mobile Device Management
IT Control of mobile device usage Enforce authorized and secure access Requires investment, resources and Administration Central server
Manages all policies and employee access Provides secure connection to firm data/applications MDM mobile apps for user authentication and control
enforcement of third-party apps
MDM Functions
Mobile app distribution Auto install firm supported apps and updates
Policy management User authentication policies Sanctioned and blacklisted apps
Inventory management Track employee usage Optimize service plans
MDM Functions
Security management Block noncompliant devices form the network Password Protection Block specific apps Secure connections to firm data
Encryption Require device level encryption MDM secure container encryption
MDM Functions
Data Loss Prevention Creates secure container on mobile device Custom MDM apps for secure e-mail, calendar and
browsers Enforce encryption and selective wipe Control file synchronization Control file access outside secure container
File save, print, copy/paste, email attachment Mobile apps outside the secure container
MDM Case StudyScott Ainslie, Technical Operations Manager
Holland & Hart
12
Real World MDM - History
Blackberries to iPhones – How we got here What do we do about it?
Protecting the mobile inbox
More than just email on phones - Tablets Time entry Documents Intranet/VPN
Present Solution
Firm issued phone, personal tablet iPhone vs Android – Windows Phone?
Firm data requires firm management Mobile Device technology policy Encryption Lock times Certificates Support Official Apps (Time, DM, VPN)
Current Projects
Network Access Control (NAC/NAP) Enterprise replacement for Dropbox Desktop Virtualization Beyond phones & tablets – laptops Mobilize the Intranet MS Office 2013 - 5 device subscription
&QA16
17
Thank you for attending our webinar.
If you wish to view this presentation again, please contact us at: [email protected] OR 978-367-3592.
Secure Document Delivery Blog
blog.biscom.com
On the Webbiscomdeliveryserver.com
Twitter@biscominc
Phone(800) 477-2472
Whitepapers Case Studies and more