1) Explosion of mobile devices
2) By end of 2014, number of mobile users will surpass desktop users
3) 71% of users are BYOD users
4) 92% of BYOD users access their own smartphone every week - 62% every day
Biz Challenges
1) Anytime, anywhere access to corporate data
2) Cloud sharing solutions are free and easily available
3) Personal accounts used for business
Security Concerns
1) Device platform
2) EULAs
3) Today 39 Android versions in the market
4) Mobile authentication
5) Data encryption
6) Compromise device status
7) Remote wipe of content
BYOD - Experience needs to be top priority.
1) business objectives
2) device choice
3) liability
4) privacy
5) security
6) management
Lead with Security
1) multi-factor authentication
2) enforce consistent security policies
3) encrypt sensitive corp data
4) support internal PKI and 3rd party certs
5) manage user access to corp resources
6) network access controls
7) enforce compliance rules and escalating actions
8) remotely wipe enterprise data from device and apps
Mobile Content Mgmt
Management - Access - Sharing
Sharing - collaboration, file sharing over encrypted connections
Benefits = secure access to docs, DLP, wipe, tracking, management
Mobile Email Mgmt - needs to go hand in hand with Mobile Content Mgmt
- most common way that users share content is email
- container for email attachments; open email attachments in Secure Content Locker; block email attachments based on doc file type; precent copy/paste of data; encrypt attachments using AES 256-bit encryption; wipe attachment content from compromised devices
- separate container for email; enforce
- native mail experience but secure attachments
Scalability is key. Vendor must be able to prove they can handle 50k+ devices per customer.
2) By end of 2014, number of mobile users will surpass desktop users
3) 71% of users are BYOD users
4) 92% of BYOD users access their own smartphone every week - 62% every day
Biz Challenges
1) Anytime, anywhere access to corporate data
2) Cloud sharing solutions are free and easily available
3) Personal accounts used for business
Security Concerns
1) Device platform
2) EULAs
3) Today 39 Android versions in the market
4) Mobile authentication
5) Data encryption
6) Compromise device status
7) Remote wipe of content
BYOD - Experience needs to be top priority.
1) business objectives
2) device choice
3) liability
4) privacy
5) security
6) management
Lead with Security
1) multi-factor authentication
2) enforce consistent security policies
3) encrypt sensitive corp data
4) support internal PKI and 3rd party certs
5) manage user access to corp resources
6) network access controls
7) enforce compliance rules and escalating actions
8) remotely wipe enterprise data from device and apps
Mobile Content Mgmt
Management - Access - Sharing
Sharing - collaboration, file sharing over encrypted connections
Benefits = secure access to docs, DLP, wipe, tracking, management
Mobile Email Mgmt - needs to go hand in hand with Mobile Content Mgmt
- most common way that users share content is email
- container for email attachments; open email attachments in Secure Content Locker; block email attachments based on doc file type; precent copy/paste of data; encrypt attachments using AES 256-bit encryption; wipe attachment content from compromised devices
- separate container for email; enforce
- native mail experience but secure attachments
Scalability is key. Vendor must be able to prove they can handle 50k+ devices per customer.
This website is security related, if u interested to know about data and device security please visit...
ReplyDeletehttp://byodsecurity.org/what-is-byod/