Managing the mobile takeover

22
Managing the Mobile Takeover Caroline Tipton IT Marketing Manager, Spiceworks 6.27.13
  • date post

    18-Oct-2014
  • Category

    Technology

  • view

    177
  • download

    1

description

Let’s face it: The BYOD headache isn’t going away. Fret not, we’re all in IT together to prevent our sensitive business data from walking out the door. Check out these slides from SpicewWorld London to find out: - The technology to solve the issue head-on - Game plans when it comes to implementation - Security compliance solutions specific to Europe

Transcript of Managing the mobile takeover

Page 1: Managing the mobile takeover

Managing the Mobile Takeover

Caroline Tipton IT Marketing Manager, Spiceworks 6.27.13

Page 2: Managing the mobile takeover

•  Who gives a flip about mobile?

•  How do I craft a plan? •  How do I wrangle these

devices? •  How do I convince my users

to buy in?

What we’ll cover.

Page 3: Managing the mobile takeover

Risks (and rewards) are real.

•  Corporate data can be at risk.

•  More platforms mean more complexity.

•  There is a thin line between public and private data.

•  One size rarely fits all.

Page 4: Managing the mobile takeover
Page 5: Managing the mobile takeover

IT Pros anticipate a tidal wave of tablets

Page 6: Managing the mobile takeover

IT Pros anticipate a tidal wave of tablets

Page 7: Managing the mobile takeover

Smartphones are still in the game

Page 8: Managing the mobile takeover
Page 9: Managing the mobile takeover
Page 10: Managing the mobile takeover

So, what are my options?

BYOD    

-­‐No  cost  to  company  -­‐People  get  what  phone  they  

want−  

-­‐  Support  for  all  types  of  phones  

-­‐Personal  and  company  info  mixed  

-­‐  Users  can  just  say  “no”  to  

CYOD/Company  Subsidized  

-­‐  Company  has  expectaFons  of  behavior  on  phone  

-­‐  You  can  limit  the  phones  you  will  support  

-­‐  Part  of  the  cost  is  moved  to  the  organizaFon  

-­‐  Personal  and  company  info  mixed  

Company  Provided  

-­‐  You  have  full  and  total  control  

-­‐  You  control  the  device(s)  supported  

-­‐  No  mix  of  personal  data  

-­‐  Not  ideal  for  your  end  users  -­‐  Planning  phone  deployments  and  budgets  become  your  job  

+ + +

-­‐   -­‐  -­‐  

Page 11: Managing the mobile takeover

Create a policy that fits you.

Page 12: Managing the mobile takeover

Don’t forget about…

WiFi Email VPN

Support Acceptable use

Page 13: Managing the mobile takeover

What is MDM?

Inventory, Monitor, Manage

Page 14: Managing the mobile takeover

Rolling out your strategy

Page 15: Managing the mobile takeover

Get buy-in from above.

Page 16: Managing the mobile takeover

Prepare for the resistance.

•  Make it a benefit. •  Be empathetic. •  Be prepared to explain

and justify. •  Be transparent.

Page 17: Managing the mobile takeover

Get ready for the legwork.

You are going to be walking desk to desk… so be prepared for it.

Page 18: Managing the mobile takeover

Don’t make empty threats.

Page 19: Managing the mobile takeover

Rinse and repeat.

Page 20: Managing the mobile takeover

And don’t forget to track it!

Page 21: Managing the mobile takeover
Page 22: Managing the mobile takeover

Demo Time!