Some of the biggest challenges facing IT organizations today are managing BYOD and establishing effective BYOD policy.
As BYOD becomes a reality for more organizations, IT professionals find themselves in an ongoing tug of war between managing corporate risk and ensuring employee privacy and satisfaction.
How do you strike a balance between protecting corporate data on an employee's personal device without instituting invasive levels of control and oversight over their personal data and activities?
View this webinar on the three critical steps for BYOD management to learn how. You'll discover how to:
· Keep corporate data secure in a BYOD environment
· Effectively manage and protect corporate data without the need to manage the entire device
· Establish a BYOD policy that increases employee productivity and satisfaction
3. Key Technology Trends
Major changes in how
we deliver reliable,
available and secure IT
services
www.kaseya.com
3
4. Three steps
1. Keep corporate data secure in a BYOD
environment
2. Effectively manage BYOD
3. Establish a BYOD policy that increases
employee productivity and satisfaction
4
5. Keeping data secure - Risks
• Increased risk of information loss to:
– Terminated users
– Physical device loss
– Open access to IT business resources
– Data sharing practices
– Malware & viruses
5
6. Keeping data secure
• Information should be secured at all
points
– Source
– In-transit
– At the endpoint
6
7. Keeping data secure
• Risks of productivity apps
– No policy management
– Exposure via synch to other end-points
– Oversharing
– Compliance gaps
– No local encryption
– Many others
7
8. Keeping data secure
• Scope of access
– What can users access?
– From where?
– Using what tools?
• Audit
– Compliance
– Who saw what, when?
• Protection from
– Malware theft
– Extraction
8
9. Options for Managing and Protecting
Data on Mobiles
• Traditional:
– Manage the Device
– Control the apps
– Put it on the network (via VPN)
9
10. MDM - Not a great fit for BYOD
• Users react negatively to intrusive policies
• Impacts the user experience of personal use
• Visibility of personal Apps, location and
other info not welcome
– In some industries, a liability
•
•
•
•
10
Complex
High administrative overhead
Still leaves many security gaps
Reactive in many ways
11. So, what’s the answer?
• An approach that focuses control,
security and communications at the
Application layer
– Leave device in users control
– Requires only basic internet connectivity
– Policies only affect corporate-supplied
apps
11
17. Kaseya Secure Browser
- Intranet and Internet access
- Single sign-on for NTLM
- Administrator defined list
of resources
- Proxy white list
- Encrypted caches
17
Secure Browser
18. Kaseya Secure Docs
• Secure document access
- Create, view, edit, store
• Manage documents
- Copy, move, delete
Secure Docs
• Built-in ‘Office’ editors
• Word, Excel, PowerPoint, PDF annotation
• Secure local storage
• Multiple WebDAV sources
- Including SharePoint, GroupWise, NetApp and NAS
- Real-time latest versions, no synch required
18
19. Kaseya Secure Mail
• Secure email using ActiveSync
• Mobile ‘Outlook’-like
functionality
• Includes PIM
- Calendar, tasks, contacts
• Fully integrated with BYOD Suite
- Open Intranet URLs in Browser
- Open attachments in Docs
- Start new emails w/attachments selected
in Docs
19
Secure Mail
20. BYOD Policies
• Good policies are
– Easy to deploy
– Easy for users to adopt and follow
– Low overhead
– Low impact on users and IT
– High security and control
– Deliver compliance
– High business value
20
21. BYOD Education
• Segregating business vs. personal
– Use the secure browser to access work
– Use native browser for personal
• Information is what’s critical
– Data loss prevention starts with users
– The right tools make it easier
21
22. Three steps
1. Keep corporate data secure in a BYOD
environment
2. Effectively manage BYOD without
managing the device
3. Establish a BYOD policy that increases
employee productivity and satisfaction
22
23. Since 2000: The IT Management
Solution for MSPs and Mid-Market
Enterprises
•Over 10,000 customers with presence in
over 20 countries
–Serving many industries: finance,
healthcare, retail, manufacturing,
education, government, technology, military
and others
•Gartner Magic Quadrant 2013
–Visionary: Client Management Tools
23
24. Since 2000: The IT Management
Solution for MSPs and Mid-Market
Enterprises
•New management team and backing
from Insight Venture Partners in 2013
•New acquisitions:
–Rover Apps for BYOD
–Zyrion Traverse for Cloud & Network
Monitoring
–365 Command for Office 365
administration
24
25. Kaseya: The IT Management Solution
for MSPs and Mid-Market Enterprises
25
26. Q&A & Final Thoughts
Q&A and Final Thoughts
Contact us:
1 (877) 926-0001
alexbrandt@kaseya.com
Learn more:
www.kaseya.com
* Complete the poll in the right window *