SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
5 Essential Tips for Creating an
Effective BYOD Policy
Nov 5, 2013
Speaker Introductions
Steve Brasen,
Managing Research Director
Enterprise Management Associates (EMA)

Jonathan Foulkes
VP Mobile Product Management
Kaseya

Alex Brandt
Vice President, Americas
Kaseya
Agenda
• Empowering a Mobile Workforce

• Key Concepts in BYOD
• 5 Essential BYOD Tips
• #1 Securing Business Data
• #2 Isolating Business Resources
from users’ Personal Resources
• #3 Establishing User-Focused
Policies
• #4 Reducing the Costs of
Enterprise Mobility

• #5 Achieving Business Value
• Conclusions
Slide 3

© 2013 Enterprise Management Associates, Inc.
Empowering a Mobile Workforce

• The Value of Workforce Mobility

• Increased Productivity

• Enhanced Business Agility

• Improved Employee Satisfaction

Slide 4

© 2013 Enterprise Management Associates, Inc.
Empowering a Mobile Workforce

• Enterprise IT requirements are expanding to support workforce
mobility
• End users are demanding unprecedented access to business
resources:
• Applications

• Data

• Services

Slide 5

© 2013 Enterprise Management Associates, Inc.
Empowering a Mobile Workforce

• The Two Faces of Mobility
• Provide access to business resources

from any location


Office, home, remote



Supports device portability

• Provide access to business resources

from any device or OS



Slide 6

iOS, Android, BlackBerry, Windows

Supports app and data portability

© 2013 Enterprise Management Associates, Inc.
Key Concepts is BYOD

• The majority of devices used for business purposes
are employee owned…

Slide 7

© 2013 Enterprise Management Associates, Inc.
Key Concepts is BYOD

• Regardless of the owner, the majority of mobile devices
are employed for both business and personal tasks

9.28%

Used only for
business tasks

90.72%

Slide 8

Used for both
business and
personal tasks

© 2013 Enterprise Management Associates, Inc.
Key Concepts is BYOD

• Bring Your Own Device (BYOD) practices enable the secure
delivery of business applications, data, and services to mobile
endpoints without restricting users’ personal use of the devices

• Business IT resources must be
 easily accessible
 always available
 high performing
 cost-effective
 able to meet business and regulatory
compliance requirements

Slide 9

© 2013 Enterprise Management Associates, Inc.
#1 Securing Business Data

© 2013 Enterprise Management Associates, Inc.
#1 Securing Business Data

• Workforce mobility Increases
business risks
• Increased opportunities for data loss


Physical device loss



Terminated users



Unsecured data sharing practices



Open access to business IT resources

• Other security concerns


Viruses / malware



Rooting / jailbreaking

• All business data needs to be secured

at the source, in transit, and on the
endpoint

Slide 11

© 2013 Enterprise Management Associates, Inc.
#1 Securing Business Data

• High-risk data-sharing practices by industry…

Slide 12

© 2013 Enterprise Management Associates, Inc.
#1 Securing Business Data
• Enhanced Security
• Data Loss Protection


Lock & wipe
 Should affect only business apps
and data



Enable secure data sharing



Restrict access to unsecure data sharing
 Email, messaging, Dropbox, USB
drives, etc.



Data encryption

• Application Protection


White / Black listing

• Authentication


Password management



VPN access



Other communication methods

• Rooting & Jailbreaking Detection
Slide 13

© 2013 Enterprise Management Associates, Inc.
#2 Isolating Business Resources from
Users’ Personal Resources

© 2013 Enterprise Management Associates, Inc.
#2 Isolating Business Resources from Users’
Personal Resources
• Business IT resources must be managed separate from users’
personal resources
• These include:
• Apps
• Data
• Web access
• Email

• Database access
• Remote business

access

Slide 15

© 2013 Enterprise Management Associates, Inc.
#2 Isolating Business Resources from Users’
Personal Resources
• Containerization isolates and secures business resources while
enabling centralized management

Music

Isolated
Business IT
Resources
•
•
•

Data
Apps
Services

Secure Access & Delivery

Enterprise AppStore
Static Apps
Virtual Apps
Web Apps

Enterprise IT Resources

Centralized Data
Repository

Remote User Devices

Business Services
Android
BlackBerry
iOS
Windows Phone/RT/Pro

Slide 16

Email
Messaging
Databases
Remote Access

© 2013 Enterprise Management Associates, Inc.
#3 Establishing User-Focused
Processes

© 2013 Enterprise Management Associates, Inc.
#3 Establishing User-Focused Processes
• User access to business resources must be:
•
•
•
•
•

Consistent
Intuitive
Fast
Easy
Non-impactful to other device
uses

• Frustrated users are unhappy
users
• Likely to complain about the

service
• Experience significant
performance impacts
• Reflects badly on IT operations
and the business

• Users should not have to “jump through hoops” to do their job
Slide 18

© 2013 Enterprise Management Associates, Inc.
#3 Establishing User-Focused Processes

• Flexibility
• Each organization has a

unique set of requirements for:


Security & compliance



Supported devices



IT resources to be made
available



User roles and tasks

• There is no “one size fits all” management process




Slide 19

Endpoint management solutions must be flexible enough to support any set
of enterprise requirements

All endpoint support services must by eminently customizable to meet
individual user needs

© 2013 Enterprise Management Associates, Inc.
#3 Establishing User-Focused Processes

• Enable user self-service
• Provide user portals for accessing data, apps

and services




Include integrated authorization process
Enable user-initiated service requests

• Enterprise application store


Single point for accessing all business
applications
 Application downloads
 Commercial application
 Proprietary application

 Application virtualization
 Approved web applications

Slide 20

© 2013 Enterprise Management Associates, Inc.
#4 Reducing the Costs of Enterprise
Mobility

© 2013 Enterprise Management Associates, Inc.
#4 Reducing the Costs of Enterprise Mobility

• Direct costs associated with
supporting workforce mobility:
• Infrastructure costs
• Implementation costs
• Software licenses

• Indirect costs associated with
supporting workforce mobility
• Administrator time and effort


Increased environment complexity

• Compliance attainment

Slide 22

© 2013 Enterprise Management Associates, Inc.
#4 Reducing the Costs of Enterprise Mobility
• Centralized management simplifies administrative efforts
• “Single pane of glass” for monitoring and managing all mobile endpoints
• Allows processes to be standardized


Enables role-based grouping

• Consolidated asset tracking –

single data repository


Physical devices



Applications



Licenses

• Unified reporting


Enabling holistic views across all
endpoints

 Simplifies event correlation and
root cause analysis


Slide 23

Supports compliance auditing and
on-going status identification
© 2013 Enterprise Management Associates, Inc.
#5 Achieving Business Value

© 2013 Enterprise Management Associates, Inc.
#5 Achieving Business Value
• Supporting BYOD empowers end users with the freedom to
perform business tasks on any device they choose and in any
way they wish to perform them without compromising enterprise
requirements

• This allows the workforce to focus
principally on the performance of
their job requirement rather than
on the manipulation of the
technology, resulting in:
• Increased productivity

• Enhanced business agility
• Improved employee satisfaction

Slide 25

© 2013 Enterprise Management Associates, Inc.
#5 Achieving Business Value
• Reducing mundane management efforts frees-up administrators
to perform business-focused tasks, such as:
• Introduce new IT services
• Proactively prevent service

disruptions
• Improve IT service delivery
• Enhance user experiences
• Achieve business goals
• Reduce costs
• Increase the profitability of the

business
Slide 26

© 2013 Enterprise Management Associates, Inc.
Conclusions
• Rather than focusing on physical devices
or individual operating systems, a
centralized management solution should
be implemented to “serve-up” application
and data resources consistently to all
endpoints

• Containerization offers a secure and
reliable method for isolating business
resources to ensure they meet business
requirements without impacting user
productivity or satisfaction
• With a user-centric approach to
workforce mobility, users are liberated to
securely access essential IT resources
on any device they choose so they can
focus on the more critical tasks of
achieving enterprise goals
Slide 27

© 2013 Enterprise Management Associates, Inc.
Poll Question
Please indicate your BYOD interest:
1. Support BYOD, but looking for better alternatives
2. Do not support BYOD yet, interested in learning
how to
3. No mobile solution yet, interested in a unified
solution
Kaseya and BYOD
•Embracing containers
•Delivering security
•BYOD friendly model
•Providing easy deployments
•Reduced mobility costs
Kaseya BYOD Suite

Browser

30

Docs

Mail
31
Sneak Peek
An ideal solution for BYOD
• Access vital business information located behind the
corporate firewall
- With or without VPN
- With or without MDM

• Secure containers for browsing , email and doc
editing
- Tunnel to intranet apps, internet or network files and folders
- Email / PIM
- Create, view, edit, store documents

• On-premise gateway for integration and security
• Private communications channel
33
Who Are We?
Industry standard for IT
automation solutions & services
Our solutions empower people to
proactively manage and control IT
assets remotely, easily and efficiently
from one integrated Web-based

platform
Key Facts
• Founded in 2000

• Over 10,000 customers with presence in over 20 countries
• Offered as SaaS or on-premise
• Enterprises and Service Providers
• Serving customers across many industries: government, military, healthcare,
finance, education, retail and others.

The Netherlands
Washington
British Isles
Germany
UK France
Virginia
California
Florida

China
India
Singapore

.

South Africa
Australia
It Has Been an Exciting Year!
• Gartner Magic Quadrant 2013 –
Visionary

• New management and backing from
Insight Venture Partners
Why Kaseya?
A single Kaseya user can proactively
manage

1,000s

of

automated

IT

systems tasks in the same amount of
time required by a team of technicians

using other techniques.
www.kaseya.com
Unified Management
Discover the
State of IT
•
•
•
•

Manage the
State of IT

Systems
Assets
Mobile Devices
Network Devices

• Scheduling
• Procedures
• API/Messaging

IT Configuration Management
•
•
•

Remote Management
Software Deployment
Power Management

•
•
•

Image Deployment
Desktop Migration
Mobile Device
Management

Asset Management
•

Network Discover & AD

• Hardware/Software

AntiVirus
AntiMalware

• Reporting
• Dashboards
• Interactive Data Views

Business Continuity
•
•

Image Backup
Image Virtualization

•

File & Folder Backup

•
•

Policy Compliance
Time Tracking

•
•

Agent-less Monitoring
Log Monitoring

Service Delivery
•
•

Asset Management
Virtual Machine
Management

Security
•
•

Automate the
State of IT

•
•
•

Service Desk/Ticketing
Policy Management
Service Billing

Systems Monitoring
•
•

Patch Management
Software Updates

•
•
•

Systems Checks & Alerts
Agent Monitoring
Enterprise Monitoring

www.kaseya.com
Q&A & Final Thoughts

Contact us:
1 (877) 926-0001
alexbrandt@kaseya.com

Learn more:
www.kaseya.com

* Complete the poll in the right window *

Contenu connexe

Tendances

BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...John Newton
 

Tendances (20)

BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
BYOD
BYODBYOD
BYOD
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 

Similaire à 5 Essential Tips for Creating An Effective BYOD Policy

Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksKaseya
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Enterprise Management Associates
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingDenodo
 
Federal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service ManagementFederal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service ManagementSolarWinds
 
4 Reasons Why Automation Is a Crucial Aspect of Data-Centric Security
4 Reasons Why Automation Is a Crucial Aspect of Data-Centric Security4 Reasons Why Automation Is a Crucial Aspect of Data-Centric Security
4 Reasons Why Automation Is a Crucial Aspect of Data-Centric SecuritySeclore
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview GuideDavid J Rosenthal
 
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCloudIDSummit
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
How Mobile BI can Impact Your Organization
How Mobile BI can Impact Your OrganizationHow Mobile BI can Impact Your Organization
How Mobile BI can Impact Your OrganizationEmtec Inc.
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...SolarWinds
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike Jackson"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike JacksonPresentacionesVantaz
 
The Benefits of Embedded Business Intelligence.pptx
The Benefits of Embedded Business Intelligence.pptxThe Benefits of Embedded Business Intelligence.pptx
The Benefits of Embedded Business Intelligence.pptxQuaeris
 

Similaire à 5 Essential Tips for Creating An Effective BYOD Policy (20)

Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
 
Federal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service ManagementFederal Webinar: Using Integrated Tools to Improve IT Service Management
Federal Webinar: Using Integrated Tools to Improve IT Service Management
 
4 Reasons Why Automation Is a Crucial Aspect of Data-Centric Security
4 Reasons Why Automation Is a Crucial Aspect of Data-Centric Security4 Reasons Why Automation Is a Crucial Aspect of Data-Centric Security
4 Reasons Why Automation Is a Crucial Aspect of Data-Centric Security
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview Guide
 
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
How Mobile BI can Impact Your Organization
How Mobile BI can Impact Your OrganizationHow Mobile BI can Impact Your Organization
How Mobile BI can Impact Your Organization
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike Jackson"Medgate: Entreprise EHS Software Solutions", Mike Jackson
"Medgate: Entreprise EHS Software Solutions", Mike Jackson
 
The Benefits of Embedded Business Intelligence.pptx
The Benefits of Embedded Business Intelligence.pptxThe Benefits of Embedded Business Intelligence.pptx
The Benefits of Embedded Business Intelligence.pptx
 

Plus de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

Plus de Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Dernier

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

5 Essential Tips for Creating An Effective BYOD Policy

  • 1. 5 Essential Tips for Creating an Effective BYOD Policy Nov 5, 2013
  • 2. Speaker Introductions Steve Brasen, Managing Research Director Enterprise Management Associates (EMA) Jonathan Foulkes VP Mobile Product Management Kaseya Alex Brandt Vice President, Americas Kaseya
  • 3. Agenda • Empowering a Mobile Workforce • Key Concepts in BYOD • 5 Essential BYOD Tips • #1 Securing Business Data • #2 Isolating Business Resources from users’ Personal Resources • #3 Establishing User-Focused Policies • #4 Reducing the Costs of Enterprise Mobility • #5 Achieving Business Value • Conclusions Slide 3 © 2013 Enterprise Management Associates, Inc.
  • 4. Empowering a Mobile Workforce • The Value of Workforce Mobility • Increased Productivity • Enhanced Business Agility • Improved Employee Satisfaction Slide 4 © 2013 Enterprise Management Associates, Inc.
  • 5. Empowering a Mobile Workforce • Enterprise IT requirements are expanding to support workforce mobility • End users are demanding unprecedented access to business resources: • Applications • Data • Services Slide 5 © 2013 Enterprise Management Associates, Inc.
  • 6. Empowering a Mobile Workforce • The Two Faces of Mobility • Provide access to business resources from any location  Office, home, remote  Supports device portability • Provide access to business resources from any device or OS   Slide 6 iOS, Android, BlackBerry, Windows Supports app and data portability © 2013 Enterprise Management Associates, Inc.
  • 7. Key Concepts is BYOD • The majority of devices used for business purposes are employee owned… Slide 7 © 2013 Enterprise Management Associates, Inc.
  • 8. Key Concepts is BYOD • Regardless of the owner, the majority of mobile devices are employed for both business and personal tasks 9.28% Used only for business tasks 90.72% Slide 8 Used for both business and personal tasks © 2013 Enterprise Management Associates, Inc.
  • 9. Key Concepts is BYOD • Bring Your Own Device (BYOD) practices enable the secure delivery of business applications, data, and services to mobile endpoints without restricting users’ personal use of the devices • Business IT resources must be  easily accessible  always available  high performing  cost-effective  able to meet business and regulatory compliance requirements Slide 9 © 2013 Enterprise Management Associates, Inc.
  • 10. #1 Securing Business Data © 2013 Enterprise Management Associates, Inc.
  • 11. #1 Securing Business Data • Workforce mobility Increases business risks • Increased opportunities for data loss  Physical device loss  Terminated users  Unsecured data sharing practices  Open access to business IT resources • Other security concerns  Viruses / malware  Rooting / jailbreaking • All business data needs to be secured at the source, in transit, and on the endpoint Slide 11 © 2013 Enterprise Management Associates, Inc.
  • 12. #1 Securing Business Data • High-risk data-sharing practices by industry… Slide 12 © 2013 Enterprise Management Associates, Inc.
  • 13. #1 Securing Business Data • Enhanced Security • Data Loss Protection  Lock & wipe  Should affect only business apps and data  Enable secure data sharing  Restrict access to unsecure data sharing  Email, messaging, Dropbox, USB drives, etc.  Data encryption • Application Protection  White / Black listing • Authentication  Password management  VPN access  Other communication methods • Rooting & Jailbreaking Detection Slide 13 © 2013 Enterprise Management Associates, Inc.
  • 14. #2 Isolating Business Resources from Users’ Personal Resources © 2013 Enterprise Management Associates, Inc.
  • 15. #2 Isolating Business Resources from Users’ Personal Resources • Business IT resources must be managed separate from users’ personal resources • These include: • Apps • Data • Web access • Email • Database access • Remote business access Slide 15 © 2013 Enterprise Management Associates, Inc.
  • 16. #2 Isolating Business Resources from Users’ Personal Resources • Containerization isolates and secures business resources while enabling centralized management Music Isolated Business IT Resources • • • Data Apps Services Secure Access & Delivery Enterprise AppStore Static Apps Virtual Apps Web Apps Enterprise IT Resources Centralized Data Repository Remote User Devices Business Services Android BlackBerry iOS Windows Phone/RT/Pro Slide 16 Email Messaging Databases Remote Access © 2013 Enterprise Management Associates, Inc.
  • 17. #3 Establishing User-Focused Processes © 2013 Enterprise Management Associates, Inc.
  • 18. #3 Establishing User-Focused Processes • User access to business resources must be: • • • • • Consistent Intuitive Fast Easy Non-impactful to other device uses • Frustrated users are unhappy users • Likely to complain about the service • Experience significant performance impacts • Reflects badly on IT operations and the business • Users should not have to “jump through hoops” to do their job Slide 18 © 2013 Enterprise Management Associates, Inc.
  • 19. #3 Establishing User-Focused Processes • Flexibility • Each organization has a unique set of requirements for:  Security & compliance  Supported devices  IT resources to be made available  User roles and tasks • There is no “one size fits all” management process   Slide 19 Endpoint management solutions must be flexible enough to support any set of enterprise requirements All endpoint support services must by eminently customizable to meet individual user needs © 2013 Enterprise Management Associates, Inc.
  • 20. #3 Establishing User-Focused Processes • Enable user self-service • Provide user portals for accessing data, apps and services   Include integrated authorization process Enable user-initiated service requests • Enterprise application store  Single point for accessing all business applications  Application downloads  Commercial application  Proprietary application  Application virtualization  Approved web applications Slide 20 © 2013 Enterprise Management Associates, Inc.
  • 21. #4 Reducing the Costs of Enterprise Mobility © 2013 Enterprise Management Associates, Inc.
  • 22. #4 Reducing the Costs of Enterprise Mobility • Direct costs associated with supporting workforce mobility: • Infrastructure costs • Implementation costs • Software licenses • Indirect costs associated with supporting workforce mobility • Administrator time and effort  Increased environment complexity • Compliance attainment Slide 22 © 2013 Enterprise Management Associates, Inc.
  • 23. #4 Reducing the Costs of Enterprise Mobility • Centralized management simplifies administrative efforts • “Single pane of glass” for monitoring and managing all mobile endpoints • Allows processes to be standardized  Enables role-based grouping • Consolidated asset tracking – single data repository  Physical devices  Applications  Licenses • Unified reporting  Enabling holistic views across all endpoints  Simplifies event correlation and root cause analysis  Slide 23 Supports compliance auditing and on-going status identification © 2013 Enterprise Management Associates, Inc.
  • 24. #5 Achieving Business Value © 2013 Enterprise Management Associates, Inc.
  • 25. #5 Achieving Business Value • Supporting BYOD empowers end users with the freedom to perform business tasks on any device they choose and in any way they wish to perform them without compromising enterprise requirements • This allows the workforce to focus principally on the performance of their job requirement rather than on the manipulation of the technology, resulting in: • Increased productivity • Enhanced business agility • Improved employee satisfaction Slide 25 © 2013 Enterprise Management Associates, Inc.
  • 26. #5 Achieving Business Value • Reducing mundane management efforts frees-up administrators to perform business-focused tasks, such as: • Introduce new IT services • Proactively prevent service disruptions • Improve IT service delivery • Enhance user experiences • Achieve business goals • Reduce costs • Increase the profitability of the business Slide 26 © 2013 Enterprise Management Associates, Inc.
  • 27. Conclusions • Rather than focusing on physical devices or individual operating systems, a centralized management solution should be implemented to “serve-up” application and data resources consistently to all endpoints • Containerization offers a secure and reliable method for isolating business resources to ensure they meet business requirements without impacting user productivity or satisfaction • With a user-centric approach to workforce mobility, users are liberated to securely access essential IT resources on any device they choose so they can focus on the more critical tasks of achieving enterprise goals Slide 27 © 2013 Enterprise Management Associates, Inc.
  • 28. Poll Question Please indicate your BYOD interest: 1. Support BYOD, but looking for better alternatives 2. Do not support BYOD yet, interested in learning how to 3. No mobile solution yet, interested in a unified solution
  • 29. Kaseya and BYOD •Embracing containers •Delivering security •BYOD friendly model •Providing easy deployments •Reduced mobility costs
  • 31. 31
  • 33. An ideal solution for BYOD • Access vital business information located behind the corporate firewall - With or without VPN - With or without MDM • Secure containers for browsing , email and doc editing - Tunnel to intranet apps, internet or network files and folders - Email / PIM - Create, view, edit, store documents • On-premise gateway for integration and security • Private communications channel 33
  • 34. Who Are We? Industry standard for IT automation solutions & services Our solutions empower people to proactively manage and control IT assets remotely, easily and efficiently from one integrated Web-based platform
  • 35. Key Facts • Founded in 2000 • Over 10,000 customers with presence in over 20 countries • Offered as SaaS or on-premise • Enterprises and Service Providers • Serving customers across many industries: government, military, healthcare, finance, education, retail and others. The Netherlands Washington British Isles Germany UK France Virginia California Florida China India Singapore . South Africa Australia
  • 36. It Has Been an Exciting Year! • Gartner Magic Quadrant 2013 – Visionary • New management and backing from Insight Venture Partners
  • 37. Why Kaseya? A single Kaseya user can proactively manage 1,000s of automated IT systems tasks in the same amount of time required by a team of technicians using other techniques.
  • 39. Unified Management Discover the State of IT • • • • Manage the State of IT Systems Assets Mobile Devices Network Devices • Scheduling • Procedures • API/Messaging IT Configuration Management • • • Remote Management Software Deployment Power Management • • • Image Deployment Desktop Migration Mobile Device Management Asset Management • Network Discover & AD • Hardware/Software AntiVirus AntiMalware • Reporting • Dashboards • Interactive Data Views Business Continuity • • Image Backup Image Virtualization • File & Folder Backup • • Policy Compliance Time Tracking • • Agent-less Monitoring Log Monitoring Service Delivery • • Asset Management Virtual Machine Management Security • • Automate the State of IT • • • Service Desk/Ticketing Policy Management Service Billing Systems Monitoring • • Patch Management Software Updates • • • Systems Checks & Alerts Agent Monitoring Enterprise Monitoring www.kaseya.com
  • 40. Q&A & Final Thoughts Contact us: 1 (877) 926-0001 alexbrandt@kaseya.com Learn more: www.kaseya.com * Complete the poll in the right window *