SlideShare une entreprise Scribd logo
1  sur  16
Mobility in the Workplace
Manage • Optimize • Secure™ – Since 1987
Today
1. Mobility is the most disruptive technology
since PC introduced in 1981.
2. Mobility growth:
• Mobile devices (2b) > desktops (1.3b)
• Mobile traffic exceeded desktop in 2015
• Online time via mobility at 51% in USA
• Mobile commerce 30% at $104.5B in ‘15
3. Traditional mobile device=SwissArmyknife:
• Assistant, tour guide, gamer, entertainer
• Camera, compass, flashlight, scanner
• Alert, monitor, and sense
Slide 2 Copyright 2016Bryley Systems Inc.
Trends
1. Integration:
• Lifestyle – Fitness or gaming; image
• Social integration – Search, messaging,
video: Facebook video exceeds YouTube
2. Emerging technologies:
• AI – Siri/Cortana; hands-free in vehicles
• Wearables – Wrist-ware, fitness trainers,
eye-ware, ear-ware, etc. – 39.5 million
3. Other changes:
• Cell-service price wars
• Cell-bandwidth freed by emerging Wi-Fi
Slide 3 Copyright 2016Bryley Systems Inc.
Players
1. Software (operating system and apps):
• Apple (iOS)
• Google (Android)
• Microsoft (Windows Phone)
2. Cellular service:
• AT&T
• Sprint
• Verizon
3. Social: Facebook, Twitter, LinkedIn
• Facebook
• Twitter
Slide 4 Copyright 2016Bryley Systems Inc.
Workplace
1. Blurring social-media lines*:
• Social-advocacy programs in the office
• Social messaging apps have 4B users
• Social-media advertising – Look like posts
and tweets targeted with precision – $24B
• Social video – Facebook > YouTube
2. Bring your own device (BYOD):
• Organization does not own the device
• Outside of control and protection
• Mixes organization data with personal data
*Ryan Holmes, HootSuite CEO: 2016 Biggest Social Media Trends for Business
Slide 5 Copyright 2016Bryley Systems Inc.
Workplace (continued)
3. Compliance:
• Massachusetts 201 CMR 17 (2010)
• HIPPA (1996)
• Sarbanes Oxley (2002)
4. Employee state-of-mind:
• Access from anywhere; anytime
• Extends reach of corporate applications
• Happier, productive employees or over-
loaded and burnt out?
Slide 6 Copyright 2016Bryley Systems Inc.
Threats
1. Most-common issues:
• Poor user habits: Password, 2-factor, loss
• Lack of encrypted transmission: BT+Wi-Fi
• Out-of-date, unpatched OS and apps
• Lack of malware protection
• Unencrypted sensitive data
2. Example: Android Bankosy (2014)*:
• Locks device and steals 2nd-factor
passcode via call-forwarding
• Matches passcode to user credentials
* Android malware steals one-time passcodes Jeremy Kirk at CIO on 1/12/16
Slide 7 Copyright 2016Bryley Systems Inc.
Other risks
1. Applications:
• Email – Confidential data not encrypted
• File-sharing service – Unrestricted access
2. Accessories:
• Credit-card readers – SSL encrypt while
processing, no local storage, password
• Remote control – Password & encrypted
• Storage (SD cards) – Encrypted
• Door locks – Password
• Anti-theft keychains
• Scanners
Slide 8 Copyright 2016Bryley Systems Inc.
Security
1. Policies
2. Training
3. Enforcement
See the Bryley Systems’ whitepaper: Protect
your mobile device.
Slide 9 Copyright 2016Bryley Systems Inc.
Security – Policies
1. Device:
• Anti-malware and updates/patches
• Encrypt data
• Backups
2. User:
• Complex passwords with auto-lock
• Browser high-security mode
3. Remote access:
• Encrypted transmission
• Provide virtualized access
• Do not store data locally
Slide 10 Copyright 2016Bryley Systems Inc.
Security – Training
1. Authentication and encryption:
• Password and biometrics
• Require two-factor
• Encrypt data
2. Reduce risk of loss or theft:
• Vigilance
• Phone-tracking apps
• Physical-locking device
3. Safely deploy new applications:
• Specific guidelines
• Enforcement mechanism
Slide 11 Copyright 2016Bryley Systems Inc.
Security – Training (continued)
4. Securely backup data
• Scheduled and verified
• Restrict online
• Tethering
5. Wi-Fi connection:
• Encrypt wireless transmission
• Man-in-the-Middle Attacks (MITM)
• Use Bluetooth cautiously in public
6. Dispose of properly:
• Remove all data
• Wipe internal storage
Slide 12 Copyright 2016Bryley Systems Inc.
Security – Enforcement
1. Mobile Device Management (MDM):
• Central administration aided by software
• Deploy, secure, integrate, monitor, and
manage all mobile devices
• Enforce user-security policy
• Recover lost/stolen devices
• Control mobile-device applications
• Airwatch, MobileIron, Kaseya, Exchange
2. Virtual Private Network (VPN):
• Point-to-point encrypted tunnel
• VPN appliance validates device
Slide 13 Copyright 2016Bryley Systems Inc.
3. Encryption:
• Requires authentication to unencrypt
• Add to device, folders, transmissions
4. Anti-malware:
• Avast – 9/10; $15/year
• AVG – 7/10; $15/year
• BitDefender – 8/10; $15/year
• Malwarebytes – Free
5. Backup:
• Content creation: Tablets and notebooks
• Access files via VPN or Cloud
Slide 14 Copyright 2016Bryley Systems Inc.
Security – Enforcement (continued)
Security – Enforcement (continued)
6. First steps:
• Backup where needed
• Deploy anti-malware app
• Enable on-board encryption
• Require password with auto-lock
• Enforce two-factor authentication
• Update through managed patching
• Require VPN access to organization data
Slide 15 Copyright 2016Bryley Systems Inc.
Mobility in Business
Gavin Livingstone
Bryley Systems Inc.
GLivingstone@Bryley.com
Manage • Optimize • Secure™ – Since 1987

Contenu connexe

Tendances

Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
rashmi1234
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 

Tendances (20)

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Computer security
Computer securityComputer security
Computer security
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Computer security and
Computer security andComputer security and
Computer security and
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 

Similaire à Bryley - mobility in the work place

Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 

Similaire à Bryley - mobility in the work place (20)

Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Mobile Data Security Software Market Is Fast Approaching, Says Research
Mobile Data Security Software  Market Is Fast Approaching, Says ResearchMobile Data Security Software  Market Is Fast Approaching, Says Research
Mobile Data Security Software Market Is Fast Approaching, Says Research
 
Mobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfMobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdf
 
Mobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdfMobile Data Security Software Market.pdf
Mobile Data Security Software Market.pdf
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Bryley - mobility in the work place

  • 1. Mobility in the Workplace Manage • Optimize • Secure™ – Since 1987
  • 2. Today 1. Mobility is the most disruptive technology since PC introduced in 1981. 2. Mobility growth: • Mobile devices (2b) > desktops (1.3b) • Mobile traffic exceeded desktop in 2015 • Online time via mobility at 51% in USA • Mobile commerce 30% at $104.5B in ‘15 3. Traditional mobile device=SwissArmyknife: • Assistant, tour guide, gamer, entertainer • Camera, compass, flashlight, scanner • Alert, monitor, and sense Slide 2 Copyright 2016Bryley Systems Inc.
  • 3. Trends 1. Integration: • Lifestyle – Fitness or gaming; image • Social integration – Search, messaging, video: Facebook video exceeds YouTube 2. Emerging technologies: • AI – Siri/Cortana; hands-free in vehicles • Wearables – Wrist-ware, fitness trainers, eye-ware, ear-ware, etc. – 39.5 million 3. Other changes: • Cell-service price wars • Cell-bandwidth freed by emerging Wi-Fi Slide 3 Copyright 2016Bryley Systems Inc.
  • 4. Players 1. Software (operating system and apps): • Apple (iOS) • Google (Android) • Microsoft (Windows Phone) 2. Cellular service: • AT&T • Sprint • Verizon 3. Social: Facebook, Twitter, LinkedIn • Facebook • Twitter Slide 4 Copyright 2016Bryley Systems Inc.
  • 5. Workplace 1. Blurring social-media lines*: • Social-advocacy programs in the office • Social messaging apps have 4B users • Social-media advertising – Look like posts and tweets targeted with precision – $24B • Social video – Facebook > YouTube 2. Bring your own device (BYOD): • Organization does not own the device • Outside of control and protection • Mixes organization data with personal data *Ryan Holmes, HootSuite CEO: 2016 Biggest Social Media Trends for Business Slide 5 Copyright 2016Bryley Systems Inc.
  • 6. Workplace (continued) 3. Compliance: • Massachusetts 201 CMR 17 (2010) • HIPPA (1996) • Sarbanes Oxley (2002) 4. Employee state-of-mind: • Access from anywhere; anytime • Extends reach of corporate applications • Happier, productive employees or over- loaded and burnt out? Slide 6 Copyright 2016Bryley Systems Inc.
  • 7. Threats 1. Most-common issues: • Poor user habits: Password, 2-factor, loss • Lack of encrypted transmission: BT+Wi-Fi • Out-of-date, unpatched OS and apps • Lack of malware protection • Unencrypted sensitive data 2. Example: Android Bankosy (2014)*: • Locks device and steals 2nd-factor passcode via call-forwarding • Matches passcode to user credentials * Android malware steals one-time passcodes Jeremy Kirk at CIO on 1/12/16 Slide 7 Copyright 2016Bryley Systems Inc.
  • 8. Other risks 1. Applications: • Email – Confidential data not encrypted • File-sharing service – Unrestricted access 2. Accessories: • Credit-card readers – SSL encrypt while processing, no local storage, password • Remote control – Password & encrypted • Storage (SD cards) – Encrypted • Door locks – Password • Anti-theft keychains • Scanners Slide 8 Copyright 2016Bryley Systems Inc.
  • 9. Security 1. Policies 2. Training 3. Enforcement See the Bryley Systems’ whitepaper: Protect your mobile device. Slide 9 Copyright 2016Bryley Systems Inc.
  • 10. Security – Policies 1. Device: • Anti-malware and updates/patches • Encrypt data • Backups 2. User: • Complex passwords with auto-lock • Browser high-security mode 3. Remote access: • Encrypted transmission • Provide virtualized access • Do not store data locally Slide 10 Copyright 2016Bryley Systems Inc.
  • 11. Security – Training 1. Authentication and encryption: • Password and biometrics • Require two-factor • Encrypt data 2. Reduce risk of loss or theft: • Vigilance • Phone-tracking apps • Physical-locking device 3. Safely deploy new applications: • Specific guidelines • Enforcement mechanism Slide 11 Copyright 2016Bryley Systems Inc.
  • 12. Security – Training (continued) 4. Securely backup data • Scheduled and verified • Restrict online • Tethering 5. Wi-Fi connection: • Encrypt wireless transmission • Man-in-the-Middle Attacks (MITM) • Use Bluetooth cautiously in public 6. Dispose of properly: • Remove all data • Wipe internal storage Slide 12 Copyright 2016Bryley Systems Inc.
  • 13. Security – Enforcement 1. Mobile Device Management (MDM): • Central administration aided by software • Deploy, secure, integrate, monitor, and manage all mobile devices • Enforce user-security policy • Recover lost/stolen devices • Control mobile-device applications • Airwatch, MobileIron, Kaseya, Exchange 2. Virtual Private Network (VPN): • Point-to-point encrypted tunnel • VPN appliance validates device Slide 13 Copyright 2016Bryley Systems Inc.
  • 14. 3. Encryption: • Requires authentication to unencrypt • Add to device, folders, transmissions 4. Anti-malware: • Avast – 9/10; $15/year • AVG – 7/10; $15/year • BitDefender – 8/10; $15/year • Malwarebytes – Free 5. Backup: • Content creation: Tablets and notebooks • Access files via VPN or Cloud Slide 14 Copyright 2016Bryley Systems Inc. Security – Enforcement (continued)
  • 15. Security – Enforcement (continued) 6. First steps: • Backup where needed • Deploy anti-malware app • Enable on-board encryption • Require password with auto-lock • Enforce two-factor authentication • Update through managed patching • Require VPN access to organization data Slide 15 Copyright 2016Bryley Systems Inc.
  • 16. Mobility in Business Gavin Livingstone Bryley Systems Inc. GLivingstone@Bryley.com Manage • Optimize • Secure™ – Since 1987