4
Business Challenge: Control risk to the business while letting users keep their personal devices personal. Solution Benefits: Convenient access for BYOD users Secure access for the business Minimal investment—leverage existing access infrastructure and policies Increased user satisfaction and productivity An Opportunity for Increased Productivity and Collaboration Long gone are the days when people worked exclusively in front of their laptop or PC. Increasingly, employees get work done or collaborate with each other on the road or at home, often during flexible hours. Business moves faster, more efficiently and with more satisfaction when professionals can com- municate with their customers and partners quickly. The modern workforce can potentially continue working outside the office at any time of day, but to make that happen without cumbersome roadblocks, the workforce needs access to applications and resources from wherever they are, and the process needs to be natural, simple and secure. Consumerization of Mobile Devices An essential element of this trend toward higher productivity and business flexibility is the con- sumerization of mobile devices, which in most cases involves a transition to Bring Your Own Device (BYOD) policies. How business reacts to this trend will determine how effectively they capitalize on this unique opportunity. Increased BYOD—The Case for Higher Productivity Flash Point Paper Security BYOD—It’s Their Device, Not Yours 82% consider the ability to be tracked an invasion of their privacy 76% would not give their employer access to view what applications are on their personal device 75% would not allow their employer to install an app that gives the company the ability to locate them in exchange for access to corporate resources 82% are concerned to extremely concerned about their employer tracking websites they browse on personal devices during non-work time 86% are concerned to extremely concerned about the unauthorized deletion of their personal pictures, music, and email profiles __________ Source: www.maas360.com/maasters/blog/security-information/byod-beware-infographic/?A=PR

BYOD—The Case for Higher Productivity€¦ · challenges, but creating the complete mobile access solution that your users need will also involve the cloud. Accessing the Cloud

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BYOD—The Case for Higher Productivity€¦ · challenges, but creating the complete mobile access solution that your users need will also involve the cloud. Accessing the Cloud

Business Challenge:

Control risk to the business while letting users keep their personal devices personal.

Solution Benefits:

■ Convenient access for BYOD users

■ Secure access for the business

■ Minimal investment—leverage existing access infrastructure and policies

■ Increased user satisfaction and productivity

An Opportunity for Increased Productivity and CollaborationLong gone are the days when people worked exclusively in front of their laptop or PC. Increasingly, employees get work done or collaborate with each other on the road or at home, often during flexible hours. Business moves faster, more efficiently and with more satisfaction when professionals can com-municate with their customers and partners quickly. The modern workforce can potentially continue working outside the office at any time of day, but to make that happen without

cumbersome roadblocks, the workforce needs access to applications and resources from wherever they are, and the process needs to be natural, simple and secure.

Consumerization of Mobile DevicesAn essential element of this trend toward higher productivity and business flexibility is the con-sumerization of mobile devices, which in most cases involves a transition to Bring Your Own Device (BYOD) policies. How business reacts to this trend will determine how effectively they capitalize on this unique opportunity. Increased

BYOD—The Case for Higher Productivity

Flash Point PaperSecurity

BYOD—It’s Their Device, Not Yours82% consider the ability to be tracked an

invasion of their privacy 76% would not give their employer access

to view what applications are on their personal device

75% would not allow their employer to install an app that gives the company the ability to locate them in exchange for access to corporate resources

82% are concerned to extremely concerned about their employer tracking websites they browse on personal devices during non-work time

86% are concerned to extremely concerned about the unauthorized deletion of their personal pictures, music, and email profiles

__________

Source: www.maas360.com/maasters/blog/security-information/byod-beware-infographic/?A=PR

Page 2: BYOD—The Case for Higher Productivity€¦ · challenges, but creating the complete mobile access solution that your users need will also involve the cloud. Accessing the Cloud

Flash Point PaperBYOD—The Case for Higher Productivity

2

productivity won’t happen automatically. It’s all too easy for the business’ security concerns to squash new creative ways to change, meaning improving the way users interact, collaborate and conduct business.

Employees, contractors and partners need ac-cess to relevant information anytime from any device for both SaaS and Intranet services. Will IT organizations innovate on their existing infra-structure or will they segregate and constrain mobiles users?

And as SaaS applications become more im-portant to organizations, IT departments also need to ensure they’re enabling both BYOD and cloud access together.

Adding to the challenge is the need for cor-porations and other organizations to stay ag-gressive in managing their risk and keep their private information secure while enabling the business.

Leveraging Past Identity and Access Investments Today, it’s easy to forget how sophisticated we have become in the way we deliver informa-tion, applications and services throughout our organizations. By layering identity and access management onto corporate Intranets, orga-nizations provide a portal to allow employees the freedom to do what they need. That can includes searching for information dispersed throughout the organization, participating in interchanges of knowledge and collaborating with other organizations.

Not only do Intranets often represent a signifi-cant infrastructure investment in accumulat-ing, consolidating, storing and integrating all the various types of business information and services, they also offer access that is both convenient and secure. It’s no surprise that organizations that have invested in identity and access management have received, and continue to receive, enormous value from it. Intranets that contain robust identity and ac-cess management technologies can onboard users quickly, as well as provide a unified expe-rience and manage user authentication. And for organizations offering single sign-on, ap-plications are no longer islands but rather are part of a single, efficient and unified experience in which a user authenticates once and has ac-cess to everything. The question is whether or-ganizations can achieve the same benefits for their BYOD users.

Access Maturity While increased user productivity and user satisfaction often rank high on the list of busi-ness priorities, equally crucial is managing risk. Organizations have evolved their inter-nal processes and infrastructures to protect intellectual property, financial data or cus-tomer information. Organizations working in the healthcare or financial services industries must also deal with regulations, and as these

BYOD in the Intranet

Benefits:

■ Cost is shifted to their users (estimated 50% of companies are requiring employees to cover cost)

■ Users are happier and more productive

■ More business time—employees are more willing to respond to business emails during their personal time

■ Enterprise IT becomes more flexible and can adopt new work paradigms

■ Fuelled creativity—BYOD used in new ways to conduct business

Concerns:

■ Security issues related to having corporate data on personal devices

■ In reality IT isn’t completely off the hook in troubleshooting access from these devices

■ Access through VPN tends to be slow and complicated, and may be problematic or even unsupported

■ Enterprises need to educate their employees about security and corporate good practice in relation to accessing company data

Page 3: BYOD—The Case for Higher Productivity€¦ · challenges, but creating the complete mobile access solution that your users need will also involve the cloud. Accessing the Cloud

3www.microfocus.com

regulations get stricter, IT will continue to rely on traditional Intranets to comply with these rigorous access requirements. Organizations can’t afford to throw away their investment in secure access.

Build on What You Have The trick to a successful BYOD implementa-tion that isn’t overly expensive or complicated is for IT to extend current Intranet access in-vestments out to every user. When IT attempts to manage access at the device level, it can’t leverage its past investments. Instead, it has to reinvest in new application protection or ac-cess control. By concentrating on the identity of users, organizations can leverage existing Intranet capabilities, security and expertise in-stead of building replicate functionality.

This also means that IT organizations need to quit thinking of their Intranet as a place to protect with walls and more as a place to bring users to, regardless of where those users are located or the type of device they are using. Offering mobile access by integrating with existing resources solves many of BYOD’s challenges, but creating the complete mobile access solution that your users need will also involve the cloud.

Accessing the Cloud Increasingly, organizations obtain important business services from the cloud as SaaS-based offerings. Modern organizations need to deliver services to employees, partners and customers beyond what their IT controls. These services are hosted in the cloud, and access is most often provided by a separate identity and access control infrastructure. Many IT organizations take the approach that if they don’t control it, they shouldn’t have to manage it, especially when BYOD users are the ones accessing such services. Such a view is short sighted. There are many instances where complete sets of services are cloud-based, yet

access control and security is still very impor-tant to the business. IT has both a responsi-bility and an opportunity to protect access to sensitive business information regardless of location.

Micro Focus’s Holistic Approach to BYODSome IT organizations take a case-by-case approach to solving their BYOD access needs and end up with disconnected tools from a va-riety of vendors. It is often difficult to integrate these tools or build onto them. Micro Focus approaches identity-powered access holisti-cally, with solutions that solve more than one of today’s access problems.

Convenient Mobile AccessOrganizations are finding new ways to use mobile devices (tablets and smartphones) to increase efficiency and enable new business processes. But mobile devices don’t work the same as PC workstations. They usually don’t have an attached keyboard and the screen delivers a different user experience than a desktop or laptop. What’s quick and effort-less on a desktop can be cumbersome and time-consuming on a mobile device. Micro Focus makes accessing internal and SaaS appli cations quick, convenient and secure on mobile devices.

Control RiskJust because access needs to be convenient for your BYOD users doesn’t mean you can let your guard down when it comes to protecting private information such as intellectual prop-erty, customer information and regulated data. Micro Focus lets users quickly access a view of web-based applications, both internal and SaaS-hosted, on their mobile devices. The Micro Focus® solution provides benefits to IT as well by leveraging the existing infrastructure and ensuring that only the right people have access. And since Micro Focus focuses on

Only 20% of organizations believe that managing mobile devices

is the right approach to protecting their information.

Page 4: BYOD—The Case for Higher Productivity€¦ · challenges, but creating the complete mobile access solution that your users need will also involve the cloud. Accessing the Cloud

managing and delivering secure mobile access to protected services and not on managing or locking down the mobile device, our approach will work no matter what BYOD brings your way.

To learn how to leverage your current invest-ment to enable secure BYOD access for your employees and partners, visit here.

184-000031-001 | Q | 03/19 | © 2019 Micro Focus or one of its affiliates. Micro Focus and the Micro Focus logo, among others, are trademarks or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the property of their respective owners.

Contact us at:www.microfocus.com

Like what you read? Share it.

Identity-Powered Access Across the Board

Security Remains the Top Business Barrier to BYOD

Respondents who thought the following were extremely important:

57% said data protection

55% said securing access to various corporate resources

51% said controlling and knowing who has access to sensitive information

Access Fulfillment Access Certification Access Request Access Administration Delegated Administration

Access Authorization Single Sign-On User Authentication Authorization Enforcement Privileged Access Management

Access Monitoring Dashboards, Risks & Trends

Security & Activity Intelligence

Forensic Analytics & Reporting

Log Management Reporting

40% of organizations

aren’t confident in their

ability to secure Intranet

access from mobile devices.__________

Source: www.sans.org/reading-room/ analysts-program/SANS-survey-mobility