Upload
others
View
18
Download
0
Embed Size (px)
Citation preview
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 1
BYOD (Bring Your Own Device) Randy Gower – Good Technology
Today’s Agenda
BYOD Trends, Challenges & Adoption
Key Considerations, Policy, & Best
Practices, Survey Results
Security Risks
Panel Discussion
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 2
A Changing Mobility Landscape
… and increasing demand for
wide variety of Enterprise Apps
Changing Mobility Landscape
… To proliferation of personal devices with rich mobile OSs
From a homogeneous set of corporate-issued devices …
The Consumerization of IT
AND….
The IT-ization of the Consumer
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 3
Mobility & Consumerization of devices State of the CIO Survey, CIO magazine, January 2012
Social Media/ Networking
10%
Ubiquitous data (big data)
19%
Mobility
28%
Technology as a service (cloud)
30%
Consumerization of desktop / devices
14%
Q: In your opinion, which of the following trends will have the most profound effect on the CIO role in the future?
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 4
Gartner’s Data Center Conference, São Paulo
CIOs have to learn to lose control
a little bit… and let it go. David Coyle, Research VP of IT operations, Gartner April 12, 2012
Survey Results: 88% of execs report BYOD happening
65% of C-Levels report that consumerization of IT is a top priority.
25% of IT budgets to manage IT consumerization.
60% of companies are now adapting IT infrastructure to accommodate
employees’ personal technologies.
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 5
To “Protect” & “Serve”
The Balance:
Allowing employees to use new expensive, small
shiny objects for work
Encourage flexibility & choice
Great user experience. i.e. Don’t cripple device
Don’t invade privacy - “avoid big brother approach”
PROTECT CORPORATE DATA
CIO has a big responsibility….
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 6
Risks in today’s mobile environment
Device Risk:
Consumer-focused, limited security
Inconsistent from one platform to next
User-based Risk:
Devices, apps used without IT
knowledge
They don’t comply with IT security
policies Enterprise Risk:
User passion for device choice and
flexibility makes circumvention more
likely
Exposes organization to data
breaches
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 7
Access to work data on personal devices
■ Users are used to ubiquitous access to personal data
They are demanding the same access for work data
■ Users really want to access their work data on their own
mobile devices
They don’t want two devices
They want to use the latest, cool, expensive mobile
device
■ Potential win’s for all
Save CapEx by not buying the devices
Save OpEx by not paying for the data plans
Make users productive & happy in the process
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 8
“The How” - Tends to be immediate focus of CIO
What should our BYOD Policy be?
What is our competition doing around BYOD?
What are our peers doing around BYOD?
“The Why” - Many reasons for BYOD adoption by companies
Employee satisfaction
Allow device choice
Recruitment of young talent
Barrier to corporate device enablement is high
Increase of user mobile productivity (Integration of business & personal
life
Cost savings
The “How” vs. the “Why”
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 9
At a Minimum:
Maintain control over corporate data security
Expand the use of mobility while minimizing the cost
Examples of Key Business Objectives:
1. Reduce Mobile Spend
2. Boost productivity & worker mobility
3. Device Choice
What are the mobility business objectives?
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 10
■ The large Finance/Insurance and Healthcare companies dominate BYOD
■ Most info-driven orgs reap most benefit from BYOD
■ 77 percent modified their policies to support BYOD
BYOD Company Size & Industry
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 11
Critical BYOD Considerations
1. Define Business Objectives
Mobile Expansion
Cost Reduction
2. Define BYOD Program Elements
Eligibility
Enablement & Support
Reimbursement (if any)
Acceptable Use
Privacy
Policy Violations
3. Implement Supporting Solutions
Device Management
Self-Service
Security, Data Loss, and Compliance
What devices should we support?
What applications & data should be available?
Should we reimburse, provide stipend?
Should there be restrictions – data roaming?
Do we reimburse even for after-hours?
What’s our liability?
What levels of support?
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 12
Critical BYOD Considerations
■ End User Agreement – sample info
Eligibility
Company responsibilities
User responsibilities
Expectation of privacy (or lack thereof)
Audits/Investigations (eDiscovery)
Lost/stolen/third party access
Wipe device/selective wipe
Remember: it is a privilege, not a right.
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 13
Critical BYOD Considerations
■ Support Model
Full Service Help Desk Support
Self Service – Social Media Collaboration
Managed Service – 3rd Party
Combination
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 14
Critical BYOD Considerations
■ Global Regional Differences
Work Laws
Data Privacy Issues (illegal to wipe an
entire device)
Security Concerns (China)
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 15
Critical BYOD Considerations
■ Cost Considerations
License Fee/Subscription
Product Support
Infrastructure
Infrastructure Support
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 16
50% - employees cover all costs
25% - Stipend
20% - Expense
5% - Pay for Device only
* Consistent with Forrester Study
BYOD Costs for Employees
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 17
Enterprises and government IT organizations are grappling with
How do I secure non-Blackberry devices?
How do I minimize data loss on consumer mobile devices?
How do I support personally-owned and corporate issued devices cost-
effectively?
How do I manage personally-owned devices while respecting
employee privacy?
Creates New Challenges
Easy mobility combined with powerful consumer devices significantly increases the risk of unplanned exposure of company information.
Four Architectural Approaches to Limit Business Risk on Consumer Smartphones and Tablets – Dec 2010, John Girard, Ken Dulaney
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 18
High Level Plan
■ Get Executive
Sponsorship
■ Build a cross-functional
team
■ IT, Security, Legal, HR,…
■ Outline the program
■ Eligibility
■ OS Platforms
■ Who pays for devices/service
■ Support model
■ Update IT Policy
■ Create End User
Agreement
■ Develop implementation
plan
■ Pilot with a small group of
users
■ During and after
implementation, poll
users for satisfaction
■ Made incremental
improvements
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 19
BYOD
Panel Discussion
BYOD Panel Discussion
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 20
■ Moderator – Randy Nunez, Tech Specialist – Mobile
Computing, Ford Motor Company
Format
■ The moderator will introduce the panelist
■ The moderator will ask several starter questions of
each panelist
■ We will then take questions from the audience
■ Please wait for a microphone so that everyone can
hear your question
■ Specify if the question is for a specific panelist or
any/all of the panelists
■ The panelists may abstain from answering any
question
BYOD Panel Discussion - Format
©2011 Good Technology, Inc. All Rights Reserved. Company Confidential 21
BYOD Panel Discussion - Panelists
Matt Hovey
General
Motors
Don Beyer
Oakwood
Healthcare
System
Tim Thurnau
Ally Financial,
Inc.