Do Big Webinar: Information security in the era of smartphones

31
Promotion Partner Presented by Knowledge Partner Information security in the era of smartphones A secure and unified approach to manage mobile devices in the enterprise 1

Transcript of Do Big Webinar: Information security in the era of smartphones

Page 1: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

1

Information security in the era of smartphones

A secure and unified approach to manage mobile devices in the enterprise

Page 2: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Dechacca PonnappaIndustry AnalystDigital Transformation Practice

[email protected]

Page 3: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

3

Agenda

• Penetration of mobile devices at the workplace• New normal : Access to corporate information• IT challenges• Solutions to overcome the challenge • Benefits: securely managing devices• Case Study• MDM: Key points to remember• The future of Mobile Device Management• Note by Mr. Ayaz Siddiqui

Manager - Product Marketing (Managed Services)• Q&A session

Page 4: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Mobile devicesTheir penetration and entrance

into the corporate space

Page 5: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Global and India scenario - Mobile device penetrationNetwork Penetration and 3G Coverage has driven the growth of smart phones

Note: 3G coverage in the pie charts is represented as a percentage of 100. Source: ITU; Frost & Sullivan

North America10

0% 76%

10%14%

100%

110%

Europe

64%

140%

90% 10

0%

APAC

24%

39%

110%

65% 75

%

3G and 4G

3G Only

2G Only

Mobile Penetration

Broadband Penetration

Internet Penetration

LATAM

66%14%

20%

120%

85%

50%

Africa

82%

12% 6%

90%

27%

60%

India Breakdown $ Millions

2015 20190

10203040

050100150200250300

11.22

32.61

77.5

268.6

Revenue Units191%Growth

Page 6: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Exploding application usage on mobile devices globally

Source: EMC, Cisco, Frost & Sullivan Analysis

India leads mobile apps downloads in popular mobile stores: #3 in Google Play and #1 in Nokia OVI

X X~5 apps per device

~20 apps per device

~500 million smartphones

~44 million smartphones

~1.5 billion apps downloads

~10 billion apps downloadsEmployees are

increasingly using personaland professional apps on

the same device!

2013 2020

Page 7: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Use cases of personal mobile devices to access corporate data

• BYOD: Employees want to avoid the problem to carry 2 smart phones, one to access work related files and personal files. Hence use the same personal devices.

• Corporate owned devices: Mobile work force in some organisations are provided with corporate distributed devices to access company information on their job

E-mailsMobile

CRMAppManager

ApprovalApp

FieldService

App

ElectronicMedicalRecords

AppTimeSheetApp

TravelRequest

App

LeaveRequest

App

OrderStatusApp

Page 8: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

BYOD versus corporate owned mobile devices ...and their operating systems

Source: Frost & Sullivan analysis

Total Enterprise Devices 29.3

64.1

BYOD vis a vis Corporate owned device scenario in the enterprises

FY 15 FY 21

CAGR: 13.7%

CAGR: 19.7%

BYODCorporate owned mobile devices Can I use my device

at work?

Note: All figures are in Millions as on H2 FY 15

Page 9: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

The new normalProviding access to corporate data

on personal mobile devices

Page 10: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Why is it important for employees to use mobile devices at work

• Client relationships extend beyond office hours and this blurs lines between personal and official relationships

• Employees want to be connected to real time office information even during personal time and respond to emergency requests

• Employees would like to carry on non core official work during their personal time: eg: manage personal time sheets

• 50% of employees believe mobile devices improve work/life balance

• 40% feel mobility gives them control over how/when/where they work

• 30% use mobile devices to stay in touch with colleagues

• 21% access time-critical information• 20% use them to improve customer

experience• 50% of mobile enabled workers have

increased productivity in the last 2 years

Mobility in the workplace

Page 11: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Poll

How many employees bring and use their own mobile devices at your workplace?

Page 12: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Key challenges

Presented to IT by mobile devices

Page 13: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Business collaboration

Balancing between sharing and security• Secure identity and access

management• Secure file encryption

Enabling mobile devices Security

Eroding enterprise perimeter• Security against malwares• Lost/Stolen devices

The challenges: employee owned devices

Managing and monitoring users/devices• Managing multiple users• Managing multiple devices• Managing user policies• Securing employee privacy

Page 14: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Enterprise mobility solution

Challenges managing security & productivity

Page 15: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Enterprise Mobile Management (EMM) or Mobile Device Management (MDM)

The foundational and functional aspect of managing

Overcoming device security challenges

Configuration DocumentManagement

RemoteSupport

MobileSecurity

Management

MobileDevice

Management

MobileExpense

Management

BYOD Policy

Page 16: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Ente

rpris

e M

obile

Man

agem

ent (

EMM

)The facets of mobile device management in an enterprise

Configuration

BYOD PolicyDocument

Management

RemoteSupport

MobileDevice

Management

MobileSecurity

ManagementMobile

ExpenseManagement

Password policy Encryption

Control browser usage Device lock/unlock

Anti-virus protection Policy violation alert

Identifies jail broken/ rooted devices

Complete/selective device wipe

Locate the device Mobile application management

App blacklisting and white listing Mandatory apps

Enterprise app catalogue

Mass distribution of enterprise apps

Page 17: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge PartnerTime and location based policies

Ente

rpris

e M

obile

Man

agem

ent (

EMM

)The facets of mobile device management in an enterprise

Configuration

BYOD PolicyDocument

Management

RemoteSupport

MobileDevice

Management

MobileSecurity

ManagementMobile

ExpenseManagement

Usage reports and alerts

Dashboard management

Manages all device attributes, e.g., bluetooth etc.

User group creation Device launcher configuration

Back up and restore Kiosk mode

Page 18: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Ente

rpris

e M

obile

Man

agem

ent (

EMM

)The facets of mobile device management in an enterprise

Configuration

BYOD PolicyDocument

Management

RemoteSupport

MobileDevice

Management

MobileSecurity

ManagementMobile

ExpenseManagement

Mass distribution of documents Secure container

Secure access to share Point Support Office 365

Exchange active sync configuration

WiFi and VPN configuration

Remote device diagnostics and support

Page 19: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Enterprise mobility solution

Benefits: securely managing devices

Page 20: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Benefits of Mobile Device Management solutions for ITEasy setup

Configure mobiles and tablets with your email and network settings at the touch of a button.

Support as many devices as you needAbility to scale up or down to match any changes you make to your business, letting you add new devices within minutes or define and amend user profiles and groups to suit your organisations needs

Remote lock/wipe protects your data

If a device is lost, stolen, misused or shows any sign of attack, you can lock it or wipe it remotely in minutes.

Improve responsiveness

Research shows staff feel that using their own device for work increases their responsiveness, due to their familiarity with the device

Easily reach a distributed workforce

Securely send software updates from one central location to your whole workforce, no matter where they are located

Predictable costs

Comprises of simple monthly subscription based on the number of devices you are managing

Page 21: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

How do you get started with your MDM strategy?

• Support users in terms of governance, operational systems

• Identify which applications to mobilise • Provide one seamless network experience: Office LAN/Home W-fi/

Telecom network• Implement a holistic security strategy

• Identify the range of smartphones your business needs to support.

• Take a user-centric view towards mobility and understand users’ needs and expectations around communication, community, and productivity

Operational excellence

Applications, network and security

Diversity of devices

End user-centricity

Page 22: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Selecting an MDM solution provider: Key factors to review • Multi-OS platform

management capabilities• User policies• Key security features

• Industry-leading experience in providing MDM solutions

• Knowledge and trust is a big advantage for organizations to leverage, particularly in comparison to many of the start-up and young companies with little or no experience

• A leader to provide cross platform MDM solution for business customers

• Platform should support a fully integrated solution on all platforms

• A single unified interface

• A solution provider who has support presence in your local region

• Account managers dedicated to help you with post deployment governance practices

Management capabilities

Reputation and reliability of vendor

Availability of complete solution and functionalities

Vendor support-technical, sales

Page 23: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

What is not a perfect MDM solution

Employees are asked to carry two mobile devices, one for official and one for corporate purposes, in order to segregate the data between personal and enterprise use

MDM is suitable only for enterprise owned devices as it controls the whole device which may not be accepted for BYOD scenario

Not securing the corporate attachments downloaded or saved from enterprise links

Not having a alerting mechanism for non compliance , lost or stolen devices immediately

Page 24: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Poll

What mobile device security policies does your company deploy presently?

Page 25: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Case Study

Mobile Device Management

Page 26: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Case Study: Delivering the world’s largest devicemanagement platform for an oil company

Need for a Platform that can support 30,000 users with up to 3 devices each for resilience purposes during disaster

Challenge

Device Manager platform designed to give enterprises complete, centralised control over theirdevice fleet

SolutionBuilt highly redundant architecture to ensure the levels of resilience needed by the customer

Result

• Struggling to manage a vast estate of employee owned devices and diverse operating systems connecting to its Microsoft Exchange environment

• Built the device management platform to support a total of 90,000 devices – one of the largest in the world – 70% of which are employee-owned and 30% corporate-liable

Source: Dailyhunt, Frost & Sullivan analysis

• When new hires start work at the customer’s company, their devices are automatically on-boarded to the Device Manager platform and inherit the relevant policies .

• Contract employee devices are on-boarded to the platform at an average rate of2,000 per day

Page 27: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Mobile Device Management

The future

Page 28: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

Looking ahead

Source: Dailyhunt, Frost & Sullivan analysis

5

4

3

2

1MDM will be embedded with more stringent security features that Improves visibility and control with instant views of device compliance, inventory, protection, and health

MDM will reach a tipping point where users can self register without involvement of IT. This is an area of differentiation against competitors, for better value chain collaboration

MDM will reach a rapid and scalable deployment model where enterprises will reach out to a distributed workforce with granular or fine grained security policies for each individual

Geopolitical borders will blur. Employees around the globe will use mobile collaboration. This will become a significant pillar in every IT strategy.

Conditional and adaptive security for each user, application and multi-factor authentication will reach mainstream MDM.

Page 29: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

29

Ayaz Siddiqui Manager Product Marketing – Mobility Solutions

[email protected]

Page 30: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

30

QuestionsPlease enter any questions you may have into the

chat interface on your screen

Page 31: Do Big Webinar: Information security in the era of smartphones

Promotion PartnerPresented by Knowledge Partner

31

FeedbackFor more information on Mobile Device Management (MDM)

Email: [email protected]: 1800 266 1800

Request your valuable inputs at the end of the webinar. The feedback form will open automatically.