SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Thou Shalt Allow BYOD 
The rapid proliferation of mobile devices entering the workplace feels like divine intervention 
to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device (BYOD) was born and employees followed with fervor. 
There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into your network with or without your permission. A Gartner CIO survey determined that 80% of employees will be eligible to use their own equipment with employee data on board by 2016.1 
This raises the inevitable question: how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? The Ten Commandments of BYOD show you how to create a peaceful, secure, and productive mobile environment. 
1 Ken Dulaney and Paul DeBeasi, “Managing Employee-Owned Technology in the Enterprise,” Gartner Group, October 2011.
The Ten Commandments o www.maas360.com f Bring Your Own Device 1 
The Ten Commandments of BYOD 
1. Create Thy Policy Before Procuring Technology 
2. Seek The Flocks’ Devices 
3. Enrollment Shall Be Simple 
4. Thou Shalt Configure Devices Over the Air 
5. Thy Users Demand Self-Service 
6. Hold Sacred Personal Information 
7. Part the Seas of Corporate and Personal Data 
8. Manage Thy Data Usage 
9. Monitor Thy Flock—Herd Automatically 
10. Drink from the Fountain of ROI
The Ten Commandments of Bring Your Own D 2 evice www.maas360.com 
POL ICY 
CREATION 
1. Create Thy Policy Before Procuring Technology 
Like any other IT project, policy must precede technology—yes, even in the cloud. To effectively 
leverage mobile device management (MDM) technology for employee owned devices, you still 
need to decide on policies. These policies affect more than just IT; they have implications 
for HR, legal, and security—any part of the business that uses mobile devices in the name of 
productivity. 
Since all lines of business are affected by BYOD policy, it can’t be created in an IT vacuum. 
With the diverse needs of users, IT must ensure they are all part of policy creation. 
There’s no one right BYOD policy, but here are some questions to consider:
www.maas360.com The Ten Commandments of Bring Your Own Device 3 
• Devices: What mobile devices will be supported? Only certain devices or whatever 
the employee wants? 
According to Forrester, 70% of smartphones belong to users, 12% are chosen from an approved 
list, and 16% are corporate-issued. Some 65% of tablets belong to users, 15% are chosen from a 
list, and 16% are corporate issued. In other words, users in most cases bring their own devices. 
• Data Plans: Will the organization pay for the data plan at all? Will you issue a stipend, or will 
the employee submit expense reports? 
Who pays for these devices? For smartphones, 70% paid the full price, 12% got a discount, 3% 
paid a partial amount, and in 15% of cases, the company covered the full price. With tablets, 
58% bought their own, 17% got a corporate discount, 7% shared the cost, and 18% were issued 
and paid for by their companies. (Source: Forrester, 2011) 
• Compliance: What regulations govern the data your organization needs to protect? For 
instance, the Health Insurance Portability and Accountability Act (HIPAA) requires native / 
encryption on any device that holds data subject to the act. 
• Security: What security measures are needed (passcode protection, jailbroken/rooted 
devices, anti-malware apps, encryption, device restrictions, iCloud backup)? 
• Applications: What apps are forbidden? IP scanning, data sharing, Dropbox? 
• Agreements: Is there an Acceptable Usage Agreement (AUA) for employee devices with 
corporate data? 
• Services: What kinds of resources can employees access—email? Certain wireless networks or 
VPNs? CRM? 
• Privacy: What data is collected from employees’ devices? What personal data is never collected? 
No questions are off limits when it comes to BYOD. There must be frank and honest dialog about 
how devices will be used and how IT can realistically meet those needs.
4 The Ten Commandments of Bring Your Own Device www.maas360.com 
2. Seek the Flock’s Devices 
Imagine this. You start using an MDM solution under the assumption your company is supporting 
100 or so devices. You’ve kept a meticulous spreadsheet of device types and users—there 
shouldn’t be any surprises. But when you first go to view reporting, over 200 devices appear. 
This scenario is fact, not fiction. It occurs far more often than you would think. 
Don’t live in denial. What you don’t know can hurt you. Understand the current landscape of 
your mobile device population before engraving your strategy on stone tablets. To do this, you’ll 
need a tool that can communicate in real time with your email environment and detect all the 
devices connected to your corporate network. Remember that once ActiveSync is turned on for 
a mailbox, there are usually no barriers to syncing multiple devices without IT’s knowledge. 
All mobile devices need to be incorporated into your mobile initiative, and their owners need 
to be notified that new security policies are swinging into action.
www.maas360.com The Ten Commandments of Bring Your Own Device 5 
3. Enrollment Shall Be Simple 
Nothing breeds noncompliance faster than complexity. Once you identify devices to enroll, your 
BYOD program should leverage technology that allows for a simple, low touch way for users to 
enroll. The process should be simple, secure, and configure the device at the same time. 
In a perfect scenario, users should be able to follow an email link or text that leads to an 
MDM profile being created on their device—including accepting the ever-important AUA. 
Think of BYOD as a marriage with the AUA as a prenuptial agreement that ensures a 
harmonious union. 
Instructions should help existing users enroll in the BYOD program. We do recommend existing 
users clear their ActiveSync accounts so that you can isolate and manage corporate data on the 
device. New devices should start with a fresh profile. 
From an IT perspective, you want the ability to 
enroll existing devices in bulk or for users to self-enroll 
their devices. You also need to authenticate 
employees with a basic authentication process such 
as a one-time passcode or use existing corporate 
directories such as Active Directory/LDAP. Any new 
devices trying to access corporate resources should 
be quarantined and IT notified. This provides IT with 
flexibility to block or initiate a proper enrollment 
workflow if approved, ensuring compliance with 
corporate policies.
6 The Ten Commandments of Bring Your Own Device www.maas360.com 
0 
0 
0 
0 
0 
0 
0 
0 
0 
0 
1 
1 
1 
1 
1 
1 
1 
1 
1 
1 
11 
4. Thou Shalt Configure Devices Over-the-Air 
If there’s one thing your BYOD policy and MDM solution shouldn’t do, it’s bring more users to the 
help desk. All devices should be configured over-the air to maximize efficiency for both IT and 
business users alike. 
Once users have accepted the AUA, your platform should deliver all the profiles, credentials, and 
settings the employee needs access to including: 
• Email, contacts, and calendar 
• VPN and WiFi 
• Corporate documents and content 
• Internal and public apps 
At this point, you’ll also create policies to restrict 
access to certain applications and generate 
warnings when a user goes over their data 
usage or stipend limit for the month.
www.maas360.com The Ten Commandments of Bring Your Own Device 7 
5. Give Thy Users Self-Service 
And you will be thankful you did. Users want a functioning device, and you want to optimize help 
desk time. A robust self-service platform lets users directly perform: 
• PIN and password resets in the event that the employee forgets the current one 
• Geo-locate a lost device from a web portal, using mapping integration 
• Wipe a device remotely, removing all sensitive corporate data 
Security, corporate data protection, and compliance are shared responsibilities. It may be a hard 
pill for employees to swallow, but there is no chance of mitigating risk without their cooperation. 
A self-service portal can help employees understand why they may be out of compliance.
8 The Ten Commandments of Bring Your Own Device www.maas360.com 
FLEE C E 
BOO K 
6. Hold Sacred Personal Information 
Of course, BYOD policy isn’t just about protecting corporate data; a well-crafted BYOD program 
holds employee data sacred and secure. Personally Identifiable Information (PII) can be used to 
identify, contact, or locate a person. Some privacy laws prevent corporations from even viewing 
this data. Communicate the privacy policy to employees and make it clear what data you cannot 
collect from their mobile devices. For instance, an MDM solution should be able to parse what 
information it can access and what it cannot, such as: 
• Personal emails, contacts, and calendars 
• Application data and text messages 
• Call history and voicemails 
On the other hand, let users know what you collect, how 
it will be used, and why it benefits them. 
An advanced MDM solution can turn privacy policy into a 
privacy setting to hide the location and software information 
on a device. This helps companies meet PII regulations and 
provides added comfort for employees by preventing the 
viewing of personal information on smartphones and tablets. 
For example: 
• Disabling app inventory reporting to restrict 
administrators from seeing personal applications 
• Deactivating location services to prevent access 
to location indicators such as physical address, 
geographical coordinates, IP address, and WiFi SSID 
• Transparency and clarity are important watchwords. 
There’s much less resistance to BYOD policies when 
everyone knows the rules.
www.maas360.com The Ten Commandments of Bring Your Own Device 9 
7. Part the Seas of Corporate and Personal Data 
For BYOD to be an agreement both IT and end users can live with, personal information like 
birthday party photos or that great American novel should be isolated from productivity apps. 
Simply stated, corporate apps, documents, and other materials must be protected by IT if the 
employee decides to leave the organization, but personal email, apps, and photos should be 
untouched by corporate IT. 
Not only will users appreciate the freedom of this approach, but so will IT, whose life will be 
infinitely easier as a result. With this approach, IT can selectively wipe corporate data when 
an employee leaves the company. Depending on the circumstances, if an employee loses the 
device, the entire device can be wiped. But only a true MDM solution can give you the choice. 
Some 86% of device wipes are selective; only corporate data is wiped.
10 The Ten Commandments of Bring Your Own Device www.maas360.com 
8. Manage Thy Data Usage 
A BYOD policy largely takes IT out of the communications business, but most companies still 
need to help employees manage their data use in order to avoid excessive charges. 
If you pay for the data plan, you may want a way to track this data. If you are not paying, you 
may want to help users track their current data usage. You should be able to track in-network and 
roaming data usage on devices and generate alerts if a user crosses a threshold of data usage. 
You can set roaming and in-network megabit limits and customize the billing day to create 
notifications based on percentage used. We also recommend educating users on the benefits 
of using WiFi when available. Automatic WiFi configuration helps ensure devices automatically 
connect to WiFi while in corporate locations. 
If the stipend plan only covers $50 or 200 MB of data usage a month, employees appreciate 
a warning that they’re about to be responsible for overages.
www.maas360.com The Ten Commandments of Bring Your Own Device 11 
DENIED! DENIED! DE NI E D! DEN IED ! 
9. Monitor Thy Flock—Herd Automatically 
Once a device is enrolled, it’s all about context. Devices should be continuously monitored 
for certain scenarios, and automated policies should be in place. Is the user trying to disable 
management? Does the device comply with security policy? Do you need to make adjustments 
based on the data you are seeing? From here, you can start understanding any additional policies 
or rules to create. Here are a few common issues: 
• Getting to the “Root” of Jailbreaking: To get paid apps for free, employees sometimes 
“jailbreak” or “root” a phone, opening the door to malware that can steal information. If a 
device is jailbroken, the MDM solution should be able to take action such as selectively wiping 
corporate data from the device immediately. 
• Spare the Wipe; Send an SMS: If time wasters like Angry Birds rub against corporate policies 
but are not offenses, an immediate wipe is heavy handed. An MDM solution can enforce 
policies based on the offense. MDM can message the user, offering time to remove the 
application before IT hits the wipe button. 
• New Operating System Available. For BYOD to remain effective, users 
need a simple way to be alerted when a new OS is ready 
for installation. With the right MDM solution, OS 
upgrades become a self-service function. 
Restricting out-of-date OS versions 
ensures compliance 
and maximizes device 
operability.
12 The Ten Commandments of Bring Your Own Device www.maas360.com 
Fountain 
of 
ROI 
10. Drink from the Fountain of ROI 
While BYOD shifts responsibility for purchasing devices to employees, it’s worth considering the 
big picture and long-term costs for your organization. 
As you’re writing policy, consider how that policy will impact ROI. That includes comparing 
approaches, as shown below: 
Corporate-owned model 
• How much you’d spend on each device 
• The cost of a fully subsidized data plan 
• The cost of recycling devices every few years 
• Warranty plans 
• IT time and labor in managing the program 
BYOD 
• The cost of a partially subsidized data plan 
• The eliminated cost of the device purchase 
• The cost of a mobile management platform 
One size never fits all, but a carefully crafted BYOD policy 
arms you with the direction you need to manage mobile 
devices effectively and efficiently. 
Of course, productivity increases are often seen when employees 
are mobile and connected at all times. BYOD is a great way to 
bring this advance in productivity to new users who may not 
have been eligible for corporate devices previously.
www.maas360.com The Ten Commandments of Bring Your Own Device 13 
BYOD: The Security of Freedom 
BYOD is an emerging best practice for giving employees the freedom to work on their own 
devices while relieving IT’s significant financial and management burdens. However, BYOD will 
never deliver on these promises of streamlined management and cost savings without a well-written 
policy and a robust management platform. 
All brands and their products, featured or referred to within this document, are trademarks or registered trademarks of their 
respective holders and should be noted as such. 
If you’re still in the early stages of 
your mobile strategy, MaaS360 offers 
a wealth of educational resources on 
our MaaSters Center 
If you’ve decided BYOD is right for your 
business, click here to start using MaaS360 
for thirty days free. Since MaaS360 is cloud-based, 
your test environment immediately 
becomes production with no loss of data. 
www.maas360.com/maasters trials.maas360.com
14 The Ten Commandments of Bring Your Own Device www.maas360.com
Maa s360 10command_ebook-bangalore

Contenu connexe

Tendances

The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
mkeane
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
IBM Software India
 

Tendances (18)

Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 

En vedette

Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
IBM Software India
 

En vedette (12)

Stepping up to the challenge - CMO insights from the global C-suite study
Stepping up to the challenge - CMO insights from the global C-suite studyStepping up to the challenge - CMO insights from the global C-suite study
Stepping up to the challenge - CMO insights from the global C-suite study
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
The natural fit of cloud with telecommunications
The natural fit of cloud with telecommunicationsThe natural fit of cloud with telecommunications
The natural fit of cloud with telecommunications
 
IBM MessageSight
IBM MessageSightIBM MessageSight
IBM MessageSight
 
IBM X-Force Threat Intelligence Quarterly 3Q 2014
IBM X-Force Threat Intelligence Quarterly 3Q 2014IBM X-Force Threat Intelligence Quarterly 3Q 2014
IBM X-Force Threat Intelligence Quarterly 3Q 2014
 
Smarter graphics - Enterprises on the move
Smarter graphics - Enterprises on the moveSmarter graphics - Enterprises on the move
Smarter graphics - Enterprises on the move
 
Reinventing the rules of engagement
Reinventing the rules of engagementReinventing the rules of engagement
Reinventing the rules of engagement
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
The Forrester Wave - Big Data Hadoop
The Forrester Wave - Big Data HadoopThe Forrester Wave - Big Data Hadoop
The Forrester Wave - Big Data Hadoop
 
Standing apart in the cloud
Standing apart in the cloudStanding apart in the cloud
Standing apart in the cloud
 
Agile for dummies
Agile for dummiesAgile for dummies
Agile for dummies
 
Retail 2020: Reinventing Retailing - Once Again
Retail 2020: Reinventing Retailing - Once AgainRetail 2020: Reinventing Retailing - Once Again
Retail 2020: Reinventing Retailing - Once Again
 

Similaire à Maa s360 10command_ebook-bangalore

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
Транслируем.бел
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
IBM Software India
 

Similaire à Maa s360 10command_ebook-bangalore (20)

Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Byod
ByodByod
Byod
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Plus de IBM Software India

Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 
White paper native, web or hybrid mobile app development
White paper  native, web or hybrid mobile app developmentWhite paper  native, web or hybrid mobile app development
White paper native, web or hybrid mobile app development
IBM Software India
 
Buyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platformsBuyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platforms
IBM Software India
 

Plus de IBM Software India (20)

Analytics and Cricket World Cup 2015
Analytics and Cricket World Cup 2015Analytics and Cricket World Cup 2015
Analytics and Cricket World Cup 2015
 
Why analytics?
Why analytics?Why analytics?
Why analytics?
 
The Rise of Private Modular Cloud
The Rise of Private Modular CloudThe Rise of Private Modular Cloud
The Rise of Private Modular Cloud
 
Achieving Scalability and Speed with Softlayer
Achieving Scalability and Speed with SoftlayerAchieving Scalability and Speed with Softlayer
Achieving Scalability and Speed with Softlayer
 
Build your own Cloud & Infrastructure
Build your own Cloud & InfrastructureBuild your own Cloud & Infrastructure
Build your own Cloud & Infrastructure
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
White paper native, web or hybrid mobile app development
White paper  native, web or hybrid mobile app developmentWhite paper  native, web or hybrid mobile app development
White paper native, web or hybrid mobile app development
 
Buyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platformsBuyer’s checklist for mobile application platforms
Buyer’s checklist for mobile application platforms
 
SoftLayer Overview
SoftLayer OverviewSoftLayer Overview
SoftLayer Overview
 
Social business for innovation
Social business for innovationSocial business for innovation
Social business for innovation
 
Liking to leading
Liking to leadingLiking to leading
Liking to leading
 
Focus on work. Not on inbox
Focus on work. Not on inboxFocus on work. Not on inbox
Focus on work. Not on inbox
 
Forrester Wave - Big data streaming analytics platforms
Forrester Wave - Big data streaming analytics platformsForrester Wave - Big data streaming analytics platforms
Forrester Wave - Big data streaming analytics platforms
 
Analytics - The speed advantage
Analytics - The speed advantageAnalytics - The speed advantage
Analytics - The speed advantage
 
The Future Data Center
The Future Data CenterThe Future Data Center
The Future Data Center
 
The next generation data center
The next generation data centerThe next generation data center
The next generation data center
 
The road to hybrid computing
The road to hybrid computingThe road to hybrid computing
The road to hybrid computing
 
The Individual Enterprise
The Individual EnterpriseThe Individual Enterprise
The Individual Enterprise
 
The business value of social content
The business value of social contentThe business value of social content
The business value of social content
 
Cloud as a growth engine for business
Cloud as a growth engine for businessCloud as a growth engine for business
Cloud as a growth engine for business
 

Dernier

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Dernier (20)

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 

Maa s360 10command_ebook-bangalore

  • 1.
  • 2. Thou Shalt Allow BYOD The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device (BYOD) was born and employees followed with fervor. There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into your network with or without your permission. A Gartner CIO survey determined that 80% of employees will be eligible to use their own equipment with employee data on board by 2016.1 This raises the inevitable question: how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? The Ten Commandments of BYOD show you how to create a peaceful, secure, and productive mobile environment. 1 Ken Dulaney and Paul DeBeasi, “Managing Employee-Owned Technology in the Enterprise,” Gartner Group, October 2011.
  • 3. The Ten Commandments o www.maas360.com f Bring Your Own Device 1 The Ten Commandments of BYOD 1. Create Thy Policy Before Procuring Technology 2. Seek The Flocks’ Devices 3. Enrollment Shall Be Simple 4. Thou Shalt Configure Devices Over the Air 5. Thy Users Demand Self-Service 6. Hold Sacred Personal Information 7. Part the Seas of Corporate and Personal Data 8. Manage Thy Data Usage 9. Monitor Thy Flock—Herd Automatically 10. Drink from the Fountain of ROI
  • 4. The Ten Commandments of Bring Your Own D 2 evice www.maas360.com POL ICY CREATION 1. Create Thy Policy Before Procuring Technology Like any other IT project, policy must precede technology—yes, even in the cloud. To effectively leverage mobile device management (MDM) technology for employee owned devices, you still need to decide on policies. These policies affect more than just IT; they have implications for HR, legal, and security—any part of the business that uses mobile devices in the name of productivity. Since all lines of business are affected by BYOD policy, it can’t be created in an IT vacuum. With the diverse needs of users, IT must ensure they are all part of policy creation. There’s no one right BYOD policy, but here are some questions to consider:
  • 5. www.maas360.com The Ten Commandments of Bring Your Own Device 3 • Devices: What mobile devices will be supported? Only certain devices or whatever the employee wants? According to Forrester, 70% of smartphones belong to users, 12% are chosen from an approved list, and 16% are corporate-issued. Some 65% of tablets belong to users, 15% are chosen from a list, and 16% are corporate issued. In other words, users in most cases bring their own devices. • Data Plans: Will the organization pay for the data plan at all? Will you issue a stipend, or will the employee submit expense reports? Who pays for these devices? For smartphones, 70% paid the full price, 12% got a discount, 3% paid a partial amount, and in 15% of cases, the company covered the full price. With tablets, 58% bought their own, 17% got a corporate discount, 7% shared the cost, and 18% were issued and paid for by their companies. (Source: Forrester, 2011) • Compliance: What regulations govern the data your organization needs to protect? For instance, the Health Insurance Portability and Accountability Act (HIPAA) requires native / encryption on any device that holds data subject to the act. • Security: What security measures are needed (passcode protection, jailbroken/rooted devices, anti-malware apps, encryption, device restrictions, iCloud backup)? • Applications: What apps are forbidden? IP scanning, data sharing, Dropbox? • Agreements: Is there an Acceptable Usage Agreement (AUA) for employee devices with corporate data? • Services: What kinds of resources can employees access—email? Certain wireless networks or VPNs? CRM? • Privacy: What data is collected from employees’ devices? What personal data is never collected? No questions are off limits when it comes to BYOD. There must be frank and honest dialog about how devices will be used and how IT can realistically meet those needs.
  • 6. 4 The Ten Commandments of Bring Your Own Device www.maas360.com 2. Seek the Flock’s Devices Imagine this. You start using an MDM solution under the assumption your company is supporting 100 or so devices. You’ve kept a meticulous spreadsheet of device types and users—there shouldn’t be any surprises. But when you first go to view reporting, over 200 devices appear. This scenario is fact, not fiction. It occurs far more often than you would think. Don’t live in denial. What you don’t know can hurt you. Understand the current landscape of your mobile device population before engraving your strategy on stone tablets. To do this, you’ll need a tool that can communicate in real time with your email environment and detect all the devices connected to your corporate network. Remember that once ActiveSync is turned on for a mailbox, there are usually no barriers to syncing multiple devices without IT’s knowledge. All mobile devices need to be incorporated into your mobile initiative, and their owners need to be notified that new security policies are swinging into action.
  • 7. www.maas360.com The Ten Commandments of Bring Your Own Device 5 3. Enrollment Shall Be Simple Nothing breeds noncompliance faster than complexity. Once you identify devices to enroll, your BYOD program should leverage technology that allows for a simple, low touch way for users to enroll. The process should be simple, secure, and configure the device at the same time. In a perfect scenario, users should be able to follow an email link or text that leads to an MDM profile being created on their device—including accepting the ever-important AUA. Think of BYOD as a marriage with the AUA as a prenuptial agreement that ensures a harmonious union. Instructions should help existing users enroll in the BYOD program. We do recommend existing users clear their ActiveSync accounts so that you can isolate and manage corporate data on the device. New devices should start with a fresh profile. From an IT perspective, you want the ability to enroll existing devices in bulk or for users to self-enroll their devices. You also need to authenticate employees with a basic authentication process such as a one-time passcode or use existing corporate directories such as Active Directory/LDAP. Any new devices trying to access corporate resources should be quarantined and IT notified. This provides IT with flexibility to block or initiate a proper enrollment workflow if approved, ensuring compliance with corporate policies.
  • 8. 6 The Ten Commandments of Bring Your Own Device www.maas360.com 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 11 4. Thou Shalt Configure Devices Over-the-Air If there’s one thing your BYOD policy and MDM solution shouldn’t do, it’s bring more users to the help desk. All devices should be configured over-the air to maximize efficiency for both IT and business users alike. Once users have accepted the AUA, your platform should deliver all the profiles, credentials, and settings the employee needs access to including: • Email, contacts, and calendar • VPN and WiFi • Corporate documents and content • Internal and public apps At this point, you’ll also create policies to restrict access to certain applications and generate warnings when a user goes over their data usage or stipend limit for the month.
  • 9. www.maas360.com The Ten Commandments of Bring Your Own Device 7 5. Give Thy Users Self-Service And you will be thankful you did. Users want a functioning device, and you want to optimize help desk time. A robust self-service platform lets users directly perform: • PIN and password resets in the event that the employee forgets the current one • Geo-locate a lost device from a web portal, using mapping integration • Wipe a device remotely, removing all sensitive corporate data Security, corporate data protection, and compliance are shared responsibilities. It may be a hard pill for employees to swallow, but there is no chance of mitigating risk without their cooperation. A self-service portal can help employees understand why they may be out of compliance.
  • 10. 8 The Ten Commandments of Bring Your Own Device www.maas360.com FLEE C E BOO K 6. Hold Sacred Personal Information Of course, BYOD policy isn’t just about protecting corporate data; a well-crafted BYOD program holds employee data sacred and secure. Personally Identifiable Information (PII) can be used to identify, contact, or locate a person. Some privacy laws prevent corporations from even viewing this data. Communicate the privacy policy to employees and make it clear what data you cannot collect from their mobile devices. For instance, an MDM solution should be able to parse what information it can access and what it cannot, such as: • Personal emails, contacts, and calendars • Application data and text messages • Call history and voicemails On the other hand, let users know what you collect, how it will be used, and why it benefits them. An advanced MDM solution can turn privacy policy into a privacy setting to hide the location and software information on a device. This helps companies meet PII regulations and provides added comfort for employees by preventing the viewing of personal information on smartphones and tablets. For example: • Disabling app inventory reporting to restrict administrators from seeing personal applications • Deactivating location services to prevent access to location indicators such as physical address, geographical coordinates, IP address, and WiFi SSID • Transparency and clarity are important watchwords. There’s much less resistance to BYOD policies when everyone knows the rules.
  • 11. www.maas360.com The Ten Commandments of Bring Your Own Device 9 7. Part the Seas of Corporate and Personal Data For BYOD to be an agreement both IT and end users can live with, personal information like birthday party photos or that great American novel should be isolated from productivity apps. Simply stated, corporate apps, documents, and other materials must be protected by IT if the employee decides to leave the organization, but personal email, apps, and photos should be untouched by corporate IT. Not only will users appreciate the freedom of this approach, but so will IT, whose life will be infinitely easier as a result. With this approach, IT can selectively wipe corporate data when an employee leaves the company. Depending on the circumstances, if an employee loses the device, the entire device can be wiped. But only a true MDM solution can give you the choice. Some 86% of device wipes are selective; only corporate data is wiped.
  • 12. 10 The Ten Commandments of Bring Your Own Device www.maas360.com 8. Manage Thy Data Usage A BYOD policy largely takes IT out of the communications business, but most companies still need to help employees manage their data use in order to avoid excessive charges. If you pay for the data plan, you may want a way to track this data. If you are not paying, you may want to help users track their current data usage. You should be able to track in-network and roaming data usage on devices and generate alerts if a user crosses a threshold of data usage. You can set roaming and in-network megabit limits and customize the billing day to create notifications based on percentage used. We also recommend educating users on the benefits of using WiFi when available. Automatic WiFi configuration helps ensure devices automatically connect to WiFi while in corporate locations. If the stipend plan only covers $50 or 200 MB of data usage a month, employees appreciate a warning that they’re about to be responsible for overages.
  • 13. www.maas360.com The Ten Commandments of Bring Your Own Device 11 DENIED! DENIED! DE NI E D! DEN IED ! 9. Monitor Thy Flock—Herd Automatically Once a device is enrolled, it’s all about context. Devices should be continuously monitored for certain scenarios, and automated policies should be in place. Is the user trying to disable management? Does the device comply with security policy? Do you need to make adjustments based on the data you are seeing? From here, you can start understanding any additional policies or rules to create. Here are a few common issues: • Getting to the “Root” of Jailbreaking: To get paid apps for free, employees sometimes “jailbreak” or “root” a phone, opening the door to malware that can steal information. If a device is jailbroken, the MDM solution should be able to take action such as selectively wiping corporate data from the device immediately. • Spare the Wipe; Send an SMS: If time wasters like Angry Birds rub against corporate policies but are not offenses, an immediate wipe is heavy handed. An MDM solution can enforce policies based on the offense. MDM can message the user, offering time to remove the application before IT hits the wipe button. • New Operating System Available. For BYOD to remain effective, users need a simple way to be alerted when a new OS is ready for installation. With the right MDM solution, OS upgrades become a self-service function. Restricting out-of-date OS versions ensures compliance and maximizes device operability.
  • 14. 12 The Ten Commandments of Bring Your Own Device www.maas360.com Fountain of ROI 10. Drink from the Fountain of ROI While BYOD shifts responsibility for purchasing devices to employees, it’s worth considering the big picture and long-term costs for your organization. As you’re writing policy, consider how that policy will impact ROI. That includes comparing approaches, as shown below: Corporate-owned model • How much you’d spend on each device • The cost of a fully subsidized data plan • The cost of recycling devices every few years • Warranty plans • IT time and labor in managing the program BYOD • The cost of a partially subsidized data plan • The eliminated cost of the device purchase • The cost of a mobile management platform One size never fits all, but a carefully crafted BYOD policy arms you with the direction you need to manage mobile devices effectively and efficiently. Of course, productivity increases are often seen when employees are mobile and connected at all times. BYOD is a great way to bring this advance in productivity to new users who may not have been eligible for corporate devices previously.
  • 15. www.maas360.com The Ten Commandments of Bring Your Own Device 13 BYOD: The Security of Freedom BYOD is an emerging best practice for giving employees the freedom to work on their own devices while relieving IT’s significant financial and management burdens. However, BYOD will never deliver on these promises of streamlined management and cost savings without a well-written policy and a robust management platform. All brands and their products, featured or referred to within this document, are trademarks or registered trademarks of their respective holders and should be noted as such. If you’re still in the early stages of your mobile strategy, MaaS360 offers a wealth of educational resources on our MaaSters Center If you’ve decided BYOD is right for your business, click here to start using MaaS360 for thirty days free. Since MaaS360 is cloud-based, your test environment immediately becomes production with no loss of data. www.maas360.com/maasters trials.maas360.com
  • 16. 14 The Ten Commandments of Bring Your Own Device www.maas360.com