/
By: Melissa Varghese By: Melissa Varghese

By: Melissa Varghese - PowerPoint Presentation

lindy-dunigan
lindy-dunigan . @lindy-dunigan
Follow
406 views
Uploaded On 2015-09-20

By: Melissa Varghese - PPT Presentation

Nikhil Madhusudhana Stella Stephens Yang Shi BYOD Device Management Outline Problem Statement Solutions Virtualization Cost Analysis Legal Issue Business Implementation Questions BYOD The Risks ID: 134603

amp mobile byod device mobile amp device byod data access business www user http blackberry mdm network android devices app personal cost

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "By: Melissa Varghese" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

By:

Melissa VargheseNikhil MadhusudhanaStella StephensYang Shi

BYOD: Device ManagementSlide2

OutlineProblem StatementSolutions - Virtualization

Cost AnalysisLegal IssueBusiness ImplementationQuestionsSlide3

BYOD - The Risks

The sensitive data present on a device that is lost, stolen or in the possession of someone who leaves the company.

An infected personal device connecting to the corporate network.

Malicious apps downloaded by an user.Theft of data via uploading to a personal device.Slide4

44 percent of firms had a Bring Your Own Device (BYOD) policy in place in early 2012.

That number increased to 94 percent in 2013.http://www.forbes.com

BYODSlide5

The Problem

Can we set dynamic, context-aware policies? We don’t want employees accessing Facebook at work!

Can

we grant granular access to mobile apps? Can we segregate critical business apps from non-compliant or potentially malicious apps?

How can we prevent

leakage of

our

sensitive business data via mobile devices?

Can we monitor and profile mobile network traffic and

user

behavior?

BYOD.

Now What?Slide6

The Solution: MDM?Slide7

MDM Issue –

All or NothingSlide8

The Solution: Virtualization?

http://www.vmware.com/Slide9

Client-Side Hypervisor

http://www.datacenterknowledge.com/Slide10

App Sandboxes/Containers

https://developer.apple.com

Performance

ScalabilitySlide11

Secure Single App Containers

https://developer.apple.com

Single container support for:User Authentication

App and Data Usage PoliciesStored and Network Data EncryptionTime and location-based access controls

Vendors

:

Bitzer

Mobile

Mocana

(Mobile App Protection) OpenPeak

(Sector)Symantec (App Center Enterprise) Slide12

Virtualization in Mobile DevicesBlackBerry Technology

BlackBerry Balance AT&T Toggle Samsung KNOXVMwareHorizon Mobile Secure Workplace

http://

www.forbes.com

http://

goo.gl/g6e29G

Slide13

BlackBerry Enterprise Service

MDM for iOS, Android & Blackberry 10ContainmentBlackBerry Balance (BlackBerry 10 Only)Manage Work & Personal dataWork Space fully encryptedMinimal

training requirementsEmployee satisfaction improved

http://us.blackberry.com/Slide14

AT&T ToggleAndroid & Apple

iOSApplication on top of OSDual-personaCross-platform MDM featuresSecurityRemote lock & wipe (Selective wipe)Lockdown features (Bluetooth, Wi-Fi, camera) Email control policy

Real-time scanning (Android only)AT&T Mobile Enterprise ManagementApplication installed on device

www.business.att.comSlide15

Samsung KNOXSamsung Galaxy DevicesMDM

Built-in IT PoliciesActive Directory ReadySingle Sign-On CapabilityKNOX applicationPersonal & Work ModeSecurityVPN supportOn-Device EncryptionSmart Card Authentication

Device Theft Recoverywww.samsungknox.comSlide16

VMware Horizon MobilePartnered with SAP

Secure Workspace2 step Authentication to connect via Horizon View ClientType 2 HypervisorVMware Horizon ViewDesktop appears across the devicesSlide17

AirwatchContainerization of corporate email, browsing, content and applicationsDual personas, multiuser modeSecure file synchronization and sharing, both on-premises and in the cloud

Citrix - XenMobileStrong, broad set of enterprise mobile integrated offerings in all the major MDM areasDeep understanding of enterprise application and mobility needsLong history of supporting mobile endpoints and remote accessSecure containers for smartphones, tablets, Macs and

PCsMDX App container (sandbox)Worx mobile applications

Source: Gartner (May 2013)Other Strong Players Slide18

ComparisonSlide19

Virtualization Cost Analysis

Blackberry Balance

Pros-Provides highly secure email.Selective wipe of data and prevents corporate/personal data overlap.

IT can restrict server access.Cons-Only provides illusion of separation.Does not scale well.Cost- $$$$

AT & T toggle

Pros-

Quick to support new models, scalable to large population.

Easier to support new OS’s.

Rapid device certification and deployment.

Cons-

Slower to run than Hypervisors.

May still need addon security and MDM.Cost - $$$

Vmware Horizon mobilePros-Full encryption. Higher security than dual persona applications.No application modification.Runs Simultaneous instances of Android OS.Cons-

Available only for android OS

Limited cellphone models.

Cost - $$$$$Slide20

Device Monitoring

User Access Manager (UAM) provides user access, guest access management, device fingerprinting, and self-registration.

Endpoint Admission Defense (EAD) reduces network exposure and monitorsthe endpoints.

Network Traffic Analyzer (NTA) provides traffic monitoring and capacity planning.User Behavior Auditor (UBA) provides usage monitoring.The other things we can monitor:

All UDT Nodes

All network connections

All port details

Keystroke logger installed on devicesSlide21

Legal Issue of BYOD

No specific BYOD laws.Existing areas of law apply:Privacy law

Labor lawLaws relating to:

Stored CommunicationsComputer Fraud & AbuseInformation Security & PrivacyIndustries where laws are likely to apply BYOD even if not explicitly stated:

Government

Health Care

Finance

Electrical and Nuclear PowerSlide22

Business ImplementationSlide23

Business ImplementationSchool District

Teachers: feature phone assignedOver 500 teachersAll had personal phonesTablet for studentsHealthcarePatient DataDual PersonaAT&T ToggleiPhones or Android devices

Cloud based managegement Slide24

Questions