46
Enterprise Mobile: Solving the Challenges Aisha Visram

Aisha visram presentacion bmobilew 2015 rev 2

Embed Size (px)

Citation preview

Page 1: Aisha visram presentacion bmobilew 2015 rev 2

Enterprise Mobile: Solving the ChallengesAisha Visram

Page 2: Aisha visram presentacion bmobilew 2015 rev 2

Follow: @MobileGuroo

LinkedIn: www.linkedin.com/in/aishavisram

Email: [email protected]

Page 3: Aisha visram presentacion bmobilew 2015 rev 2

Three Key Take-Aways

• Mobile access transforms the way we think about work, And, its not going away.

• Unmanaged personal devices at work is the major cause of security risk

• There is no single, unicorn solution

Page 4: Aisha visram presentacion bmobilew 2015 rev 2

Agenda

• The Mobile landscape: consumer vs. enterprise

• Creating a Mobility Program

• The challenges

• The role of EMM

• Final conclusions

Page 5: Aisha visram presentacion bmobilew 2015 rev 2

The Mobile Landscape

Page 6: Aisha visram presentacion bmobilew 2015 rev 2

Everyone has a Smartphone: 64% vs. 18% in 2009

Page 7: Aisha visram presentacion bmobilew 2015 rev 2

Smartphones are already Replacing Desktop/Laptops

Page 8: Aisha visram presentacion bmobilew 2015 rev 2

Millennials = Largest Generation in the Workforce this Year

Page 9: Aisha visram presentacion bmobilew 2015 rev 2

What does that Mean?

87% - Smartphone never leaves their side

34% - Prefer to collaborate online than in person

45% -Use Personal Smartphones for work purposes

Page 10: Aisha visram presentacion bmobilew 2015 rev 2

Enterprise Mobility

• IT spending for iPad® tablets - $16 billion in 2013

• 87% of global smartphone market is Android

• Average US employee carries 3 devices

• 70% of users doing work on personal devices, regardless of company policy

InformationWeek Jan 2014

Mobile Landscape

Page 11: Aisha visram presentacion bmobilew 2015 rev 2

Remarkably, only 14% of companies have instituted a mobile device security policy.

Page 12: Aisha visram presentacion bmobilew 2015 rev 2

Creating a Mobility Program

Page 13: Aisha visram presentacion bmobilew 2015 rev 2

CIO Mandate

• Increase IT efficiency• Improve Employee Productivity• Help Customers Succeed

Measures of Success“ All employees accessing data they need to do their job from any mobile device.”

Page 14: Aisha visram presentacion bmobilew 2015 rev 2

Mobility Program Objectives

• Mobilize processes for smartphones/tablets

• Ensuring corporate data is protected on any device

• Balancing usability and security: “secure-able”

• Making users happy and productive

Page 15: Aisha visram presentacion bmobilew 2015 rev 2

What do employees/users want?

• Not to be a dinosaur! Employees are more productive on mobile devices they choose.

Measures of Success

Page 16: Aisha visram presentacion bmobilew 2015 rev 2

What do employees/users want?

• Increasing productivity without interrupting usability

• Easy access to company data and documents

• Manage both corporate and personal data

• Ambient security - it runs in the background if it needs to

• Privacy is protected

Measures of Success

Page 17: Aisha visram presentacion bmobilew 2015 rev 2

The Challenges

Page 18: Aisha visram presentacion bmobilew 2015 rev 2

• BYOD

• Which Mobile Apps to allow?

• Mobile Security

• Do we need an Enterprise Mobile Management Solution?

• Others?

Measures of SuccessWhat you Don’t Know CAN Hurt You…

Ponemon Institute March 2013

Page 19: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

62% of companies to allow BYOD by year’s end, more than 44% of organizations already allow BYOD.

Employee-owned smartphones and tablets used in the enterprise will exceed 1 billion by 2018 due to BYOD.

ComputerWorld, Aug 2013

Page 20: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

65% of employees said:

- Nothing has been communicated about BYOD- No official policy guidelines - Employees are not allowed to use their own

devices at work

ComputerWorld, Aug 2013

Page 21: Aisha visram presentacion bmobilew 2015 rev 2

Most Organizations underestimate Cloud App Usage by 90%

Page 22: Aisha visram presentacion bmobilew 2015 rev 2

Top 20 Cloud Apps in Enterprise

Page 23: Aisha visram presentacion bmobilew 2015 rev 2

Top apps used Globally - Messaging

Page 24: Aisha visram presentacion bmobilew 2015 rev 2

An example - Slack

Page 25: Aisha visram presentacion bmobilew 2015 rev 2

Risks to Enterprise

• Lost or stolen devices • Unauthorized access• Compromised device

• Malware

• Exposure of confidential information

Measures of SuccessMobility Security Incidents: Do the Benefits Outweigh the Risk?

21%• Perform data wipes

on personal devices when employees leave company

Ponemon Institute March 2013

Page 26: Aisha visram presentacion bmobilew 2015 rev 2

Breaches are due to compromised credentials

Page 27: Aisha visram presentacion bmobilew 2015 rev 2

Mobile Devices are Harvesting your Data

• Adware grew to 136% to 410,000 apps between 2013 to 2014, giving attackers access to personal information such as contacts

InformationWeek Jan 2014

Page 28: Aisha visram presentacion bmobilew 2015 rev 2

Can you trust your apps?

AppThority, 2014

Page 29: Aisha visram presentacion bmobilew 2015 rev 2

Mobile Malware

Mobile Malware

• 97% of mobile malware coming from third-party Android app stores in Asia and Middle East

• Apps carrying malware in Google Play Store is 0.1% (short shelf life if encountered)

Forbes, March 2014

Page 30: Aisha visram presentacion bmobilew 2015 rev 2

The Role of EMM

Page 31: Aisha visram presentacion bmobilew 2015 rev 2

Device Management BlueprintMeasures of Success

Privacy Protection

Security Management

Secure Configurations

Remote Wipe

Device Protection

App Management

Corp Integration

Device Management

Page 32: Aisha visram presentacion bmobilew 2015 rev 2

Mobile Device Management• Ease of deployment: 1000’s of mobile devices can be

remotely provisioned with corporate data and managed

• Selective wipe: removing corporate data, leaving the personal data on the device

• Enforcing device passcode and hardware encryption

• Device posture: if device is jailbroken/rooted, unencrypted, doesn’t have min OS, IT can prevent device from connecting to corporate network

• Disallow Screen Capture/Roaming/iCloud

Page 33: Aisha visram presentacion bmobilew 2015 rev 2

Mobile Device Management• Application Control: Requiring apps to be installed/removed, prevent app from being

backed up to iCloud/Google Cloud

• Securing email and attachments

– Protect email attachments: personal apps

– ActiveSync is not enough• Policies can be circumvented• Device posture is not detected and enforced

– Protect email attachments from being shared with personal applications

– Detect + block jailbreak/root devices– Cert-based authentication for email

Page 34: Aisha visram presentacion bmobilew 2015 rev 2

Mobile Application Management

• Per App VPN: • Apps can be automatically configured to

connect to VPN when they are launched• Not exposing entire device to the

corporate network• Improves performance• Privacy

• “Open In”

Page 35: Aisha visram presentacion bmobilew 2015 rev 2

Mobile Application Management

• Share data between: • Secure apps (Secure Secure)• Whitelist apps (Secure Secure & Managed)• With personal apps (Personal Secure)

Page 36: Aisha visram presentacion bmobilew 2015 rev 2

Final Conclusions

Page 37: Aisha visram presentacion bmobilew 2015 rev 2

• Figuring this out is critical to the success of your business

• Risk has to be balanced with usability

• Approach mobility as any other mission critical project – process, policy and accountability

Page 38: Aisha visram presentacion bmobilew 2015 rev 2

QUESTIONS?

Page 39: Aisha visram presentacion bmobilew 2015 rev 2

PARKING LOT

Page 40: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

• Should you go BYOD? • IT Leaders (60%): BYOD does not deliver on higher

customer satisfaction• Assessing the cost/benefit• IT Leaders (62%): BYOD does not lower IT expenses• Lowers capital expenditure, but may increase support

costs• BYOD for corporate-issued devices• Improve access and re-evaluate restrictive security

policies

ComputerWorld, Aug 2013

What do we make of conflicting data?

Page 41: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

1. Employees need to choose any mobile device/OS

2. Make sure access is easy for authorized users

My Top 11 for a Successful BYOD Program

Page 42: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

3. Pay attention to mobile use cases and LOB

My Top 11 for a Successful BYOD Program

Page 43: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

4. Communication plan. Be transparent with employees.

5. Manage data and not devices: • Mobile Application Management policies• Data and User classification• Isolate network• Detect and Contain• Unsecure networks and multi-auth

67% do not have policies in place that address sharing of corporate files in third-party cloud storage services.

Acronis, July 2013

My Top 11 for a Successful BYOD Program

Page 44: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

6. Separate personal data from corporate data

7. Don’t forget the basics: password protection & encryption!

8. Lost/stolen device? Wipe corp data and block

My Top 11 for a Successful BYOD Program

Page 45: Aisha visram presentacion bmobilew 2015 rev 2

Are we supposed to go BYOD?

6. Reduce corporate liability with private data

7. Involve stakeholders

8. Run a BYOD pilot!

My Top 11 for a Successful BYOD Program

Page 46: Aisha visram presentacion bmobilew 2015 rev 2

Mobile Corp Data Leakage

• Identify which mobile apps put corporate data at risk vs. which apps are benign

• Risky app behaviours• Transferring Contacts• Cloud-based file storage • Uses microphone• Accesses IMEI/UDID• Single Sign on (social networking)• Location tracking

• Mobile malware and spyware

Saves password on device in clear text

Links to credit card for auto-load

App Reputation – Identifying the Bad Guys