SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Bring Your Own Device:
The Great Debate
Brandon Swain
Client computing is evolving - giving IT
and end users the power to do more
2
Users Devices
Mainframe computing
era
Personal
computing era
Mobile
era
Less than 2000 systems sold in
1960
Over 900,000 systems sold in 1980 1 billion processors connected by
2015
Users
n 1 1 1
Users
1 n
DevicesDevices
The mobile device market is thriving
3
$100 million $1.7 billionMarket for mobile devices in healthcare
2011 2014
$4.7 billion U.S. hospital spending on IT $6.8 billion
2 out of 5 physicians go online during patient
consultations; mostly on handheld devices
63% of physicians are using personal devices for mobile
health solutions not connected to their practice
86% of physicians are interested in accessing Electronic
Medical Records from mobile devices
2% Mobile device usage compared to overall IT 25%
Source: TechTarget news
Enterprise Mobility Adoption Curve
Mobile Workflow
Mobile Intranet
Corporate
File& Directory Search
Sales & CRM
Enablement
Field Service
Enablement
Mobile Business
Intelligence
Enablement
UnifiedCommunications
Mobile KPI Dashboards B2CApps
Personal Information
Management
Email
Internet
InstantMessenger
ProductivityApplications
• Many organizations follow a similar
mobility adoption curve.
• The right strategy and roadmap must
be established to help you on your
journey, and design and implement
the right solution to support your
business needs.
• Empower the workforce in a flexible
and secure way maximizing ROI.
• Reach out to your customers, enable
them to interact with you in
convenient ways, expand business
value and maximise customer
satisfaction
4
Handling the Smartphone & Tablet explosion presents
new enterprise management challenges
5
Corporate Owned
BlackBerry Devices
Secure
Proliferationof Smartphone/TabletPlatformsin theEnterprise
o How doI providesecure access and protect
corporatedata?
o How doI deliverLOB mobileapps toimprove
productivity?
o How doI ensure my mobileapps workonsuch a wide variety
of devices?
o How doI keep costsfrom getting out ofcontrol?
o How doI let myemployees select the mobiledevices they
want while deliveringthe security and management IT
requires?
Enterprise Systems / Data
Why allow employee-owned devices into your
environment
• They are fun, and your executives
and employees want them
• Improved employee morale and
productivity
• Improved compliance and security by
recognizing that employees will use
device of choice and planning for
these devices in corporate
environment.
• Ability to create customized mobile
applications to solve business
problems
• Reduce device and plan costs
• Reduced employee costs for devices
and plans based on corporate
agreements with carriers
6
Considerations for employee-owned devices in your
environment
• Control over devices to implement
governance and policy requirements
• Timely deletion of data in the event
of loss or theft of device
• Ability to restrict content on the
devices, including third party
applications
• Control over the device platforms,
operating systems, and other factors
to manage vulnerabilities associated
with each consumer device platform
• Better support from carriers than
maybe available for individual
employees utilizing their own,
consumer-grade device
• Additional security controls may be
required to meet security,
compliance, and regulatory
requirements.
7
Special Concerns for Some Industries
• Consumer mobile devices present special
challenges:
– New operating environment is like the wild west
– Unhardened Operating Systems are vulnerable to
exploitation, with few protections compared to hardened
or purpose-built devices
– Devices may represent unmanaged entrance/exit points to
secured, segregated ICS networks
– Clear definition of allowable devices and activities is
required
– Security flaws in devices may not be resolved in a timely
manner, if ever
8
9 Confidential
Establishing an Enterprise Mobility Strategy
Enterprise
Mobility
Strategy
Infrastructure
Management
Applications
Security &
Compliance
Strong governance required
10
What is your risk level / appetite?
11
Government Intelligence
DOD – TS/TS SCI
Federal Civilian and Global 500
Financial, Engineering, Pharmaceutical
PCI Data on the phone
PHI data is on the phone
PII data is on the phone
Email is on the phone
Data on the phone
Recover phone
Mobility security affects/is affected by…
12
End Users
Security
Governance Business Strategy
Architecture
Applications Infrastructure Risk Posture
Service Desk
Data Classification
WiFi VPN Policies
Compliance
DLP NAC
Encryption
A mobility strategy leads to a solution that is secure,
manageable, scalable, and open to all mobile OSs
13
Key Features:
•Provide Security
– SecureDeliveryof EnterpriseData
– DataIsolationonDevice
– Encryption
– PolicyCompliance
•Manage Complexity
– MobileDevice Management
– Multi-OSSupport
– Multi-ApplicationSupport
•ImproveProductivity
– LOB MobileApplications
– CustomMobileApplications
– WirelessEmail& PIM
•Manage Costs
– MobileExpenseManagement
– Carrierplanmanagement
– Alerting
– UsageTracking
Customer
Secure
End User
Secure
MDM – Making the Smartphone Enterprise Ready
 Multi-Platform Support
– ActiveSync, BES, Good
 Security & policymanagement
– Enforcement &notification
 Dynamic cost management
– Roaming &plan management
 Application management
– Enterprise application store
 Device monitoring
– Health &usage
 Analysis and reporting
– Predictive & cost avoidance
Deliveringmulti-platformsecurity,visibility, controlandcostsavings
“Managing how users
Interactwith devices”
“Managing devices, data and applications”
“Managing costs of devices”
“MDM should be an agnostic OS, device and carrier
independent solution”
Device
Management
Policy
Management
Application
Management
E-Mail
Deployment
Functions
• Userprovisioning
• Migrations
• Device re-provision
Benefits
• Reduce helpdesk calls
• Reduce supportcalls
• Increaseuptime
• Centralizetracking
ROI
• Lower TCO
Functions
• Hardwaremgmt
• Softwaremgmt
• Real-time updates
Benefits
• Increasedvisibility
• Efficientdiagnostics
• Upgradeplanning&
deployment
• Centralizetracking
• History reporting
ROI
• Cross platform status
reporting
Functions
• Securitymgmt
• Usagegovernance
• Compliance
Benefits
• Reduce security risks
• Increasedcompliance
• Manageuserbehaviors
ROI
• Decreaseadminandhelp
desk costs
Functions
• Control footprint
• App. deployment
• Update/upgrademgt
Benefits
• OTA installs
• Close-loop deployments
• Simple, consistent app
management
• ImprovedBESmgmt
ROI
• Decreasein admin/helpdesk
support time
Performance
Monitoring
Functions
• Servermonitoring
• Device monitoring
• Load balancing
Benefits
• Quicker resolution to
problems
• Reduce downtimeandcosts
• Analysis andtrending
ROI
• Decreasehelp desk costs
• Enableproactivemonitoring
MDM Capabilities
15
Types of Mobile Applications
16
Native
Web
Hybrid
Value of a Mobile Enterprise Application Platform
17
Strategies for BYOPC
18
• Establish catalog of supported operating systems:
– Windows 7 & 8
– Mac OS X?
– Linux Variants?
• Catalog of supported AV solutions
• Use Inspect to Connect technology to interrogate
employee-owned PC to verify compliance
• Utilize virtualized applications or virtual desktops to
secure enterprise apps and data on untrusted devices.
• Virtual desktop clients can be configured to control
writing to local or removable media, printing, cut &
paste, etc.
Questions to ask when considering BYOD
19
• Are there any specific concerns that would
preclude the use of employee-owned devices?
– Information may be subject to FOIA requests or
other regulatory or compliance requirements.
• Is there a catalog of devices that would be
allowed to access enterprise applications?
– With each new platform supported in the
environment, complexity is added. Costs may
increase as additional versions of enterprise apps
are developed and maintained.
Questions to ask when considering BYOD
20
• Is the organization willing to accept a short-term
increase in risk to allow newer platforms access
to data while the device’s management and
security tools mature?
– For corporate-owned devices, it may be an easy
decision to delay upgrades; however, for personally-
owned devices, employees may be unwilling to forego
the latest devices or updates.
• Have we considered all of the risks?
– Inappropriate content on personally-owned devices.
ECPA considerations? Compensation considerations,
especially for CA-based employees?
Questions / Comments
Confidential21
Thank You.
Michael_Swain@dell.com
Confidential22

Weitere ähnliche Inhalte

Was ist angesagt?

NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNorth Texas Chapter of the ISSA
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013Wolfgang Kandek
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 

Was ist angesagt? (20)

NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 

Ähnlich wie NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain

IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsTAKE Supply Chain
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureITOutcomes
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...SolarWinds
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your DataInnoTech
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT hSo
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless MobilityControlEng
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 

Ähnlich wie NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain (20)

IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop Architecture
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless Mobility
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 

Mehr von North Texas Chapter of the ISSA

Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediationNorth Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNorth Texas Chapter of the ISSA
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill whiteNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNorth Texas Chapter of the ISSA
 

Mehr von North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Kürzlich hochgeladen

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 

Kürzlich hochgeladen (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 

NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain

  • 1. Bring Your Own Device: The Great Debate Brandon Swain
  • 2. Client computing is evolving - giving IT and end users the power to do more 2 Users Devices Mainframe computing era Personal computing era Mobile era Less than 2000 systems sold in 1960 Over 900,000 systems sold in 1980 1 billion processors connected by 2015 Users n 1 1 1 Users 1 n DevicesDevices
  • 3. The mobile device market is thriving 3 $100 million $1.7 billionMarket for mobile devices in healthcare 2011 2014 $4.7 billion U.S. hospital spending on IT $6.8 billion 2 out of 5 physicians go online during patient consultations; mostly on handheld devices 63% of physicians are using personal devices for mobile health solutions not connected to their practice 86% of physicians are interested in accessing Electronic Medical Records from mobile devices 2% Mobile device usage compared to overall IT 25% Source: TechTarget news
  • 4. Enterprise Mobility Adoption Curve Mobile Workflow Mobile Intranet Corporate File& Directory Search Sales & CRM Enablement Field Service Enablement Mobile Business Intelligence Enablement UnifiedCommunications Mobile KPI Dashboards B2CApps Personal Information Management Email Internet InstantMessenger ProductivityApplications • Many organizations follow a similar mobility adoption curve. • The right strategy and roadmap must be established to help you on your journey, and design and implement the right solution to support your business needs. • Empower the workforce in a flexible and secure way maximizing ROI. • Reach out to your customers, enable them to interact with you in convenient ways, expand business value and maximise customer satisfaction 4
  • 5. Handling the Smartphone & Tablet explosion presents new enterprise management challenges 5 Corporate Owned BlackBerry Devices Secure Proliferationof Smartphone/TabletPlatformsin theEnterprise o How doI providesecure access and protect corporatedata? o How doI deliverLOB mobileapps toimprove productivity? o How doI ensure my mobileapps workonsuch a wide variety of devices? o How doI keep costsfrom getting out ofcontrol? o How doI let myemployees select the mobiledevices they want while deliveringthe security and management IT requires? Enterprise Systems / Data
  • 6. Why allow employee-owned devices into your environment • They are fun, and your executives and employees want them • Improved employee morale and productivity • Improved compliance and security by recognizing that employees will use device of choice and planning for these devices in corporate environment. • Ability to create customized mobile applications to solve business problems • Reduce device and plan costs • Reduced employee costs for devices and plans based on corporate agreements with carriers 6
  • 7. Considerations for employee-owned devices in your environment • Control over devices to implement governance and policy requirements • Timely deletion of data in the event of loss or theft of device • Ability to restrict content on the devices, including third party applications • Control over the device platforms, operating systems, and other factors to manage vulnerabilities associated with each consumer device platform • Better support from carriers than maybe available for individual employees utilizing their own, consumer-grade device • Additional security controls may be required to meet security, compliance, and regulatory requirements. 7
  • 8. Special Concerns for Some Industries • Consumer mobile devices present special challenges: – New operating environment is like the wild west – Unhardened Operating Systems are vulnerable to exploitation, with few protections compared to hardened or purpose-built devices – Devices may represent unmanaged entrance/exit points to secured, segregated ICS networks – Clear definition of allowable devices and activities is required – Security flaws in devices may not be resolved in a timely manner, if ever 8
  • 9. 9 Confidential Establishing an Enterprise Mobility Strategy Enterprise Mobility Strategy Infrastructure Management Applications Security & Compliance
  • 11. What is your risk level / appetite? 11 Government Intelligence DOD – TS/TS SCI Federal Civilian and Global 500 Financial, Engineering, Pharmaceutical PCI Data on the phone PHI data is on the phone PII data is on the phone Email is on the phone Data on the phone Recover phone
  • 12. Mobility security affects/is affected by… 12 End Users Security Governance Business Strategy Architecture Applications Infrastructure Risk Posture Service Desk Data Classification WiFi VPN Policies Compliance DLP NAC Encryption
  • 13. A mobility strategy leads to a solution that is secure, manageable, scalable, and open to all mobile OSs 13 Key Features: •Provide Security – SecureDeliveryof EnterpriseData – DataIsolationonDevice – Encryption – PolicyCompliance •Manage Complexity – MobileDevice Management – Multi-OSSupport – Multi-ApplicationSupport •ImproveProductivity – LOB MobileApplications – CustomMobileApplications – WirelessEmail& PIM •Manage Costs – MobileExpenseManagement – Carrierplanmanagement – Alerting – UsageTracking Customer Secure End User Secure
  • 14. MDM – Making the Smartphone Enterprise Ready  Multi-Platform Support – ActiveSync, BES, Good  Security & policymanagement – Enforcement &notification  Dynamic cost management – Roaming &plan management  Application management – Enterprise application store  Device monitoring – Health &usage  Analysis and reporting – Predictive & cost avoidance Deliveringmulti-platformsecurity,visibility, controlandcostsavings “Managing how users Interactwith devices” “Managing devices, data and applications” “Managing costs of devices” “MDM should be an agnostic OS, device and carrier independent solution”
  • 15. Device Management Policy Management Application Management E-Mail Deployment Functions • Userprovisioning • Migrations • Device re-provision Benefits • Reduce helpdesk calls • Reduce supportcalls • Increaseuptime • Centralizetracking ROI • Lower TCO Functions • Hardwaremgmt • Softwaremgmt • Real-time updates Benefits • Increasedvisibility • Efficientdiagnostics • Upgradeplanning& deployment • Centralizetracking • History reporting ROI • Cross platform status reporting Functions • Securitymgmt • Usagegovernance • Compliance Benefits • Reduce security risks • Increasedcompliance • Manageuserbehaviors ROI • Decreaseadminandhelp desk costs Functions • Control footprint • App. deployment • Update/upgrademgt Benefits • OTA installs • Close-loop deployments • Simple, consistent app management • ImprovedBESmgmt ROI • Decreasein admin/helpdesk support time Performance Monitoring Functions • Servermonitoring • Device monitoring • Load balancing Benefits • Quicker resolution to problems • Reduce downtimeandcosts • Analysis andtrending ROI • Decreasehelp desk costs • Enableproactivemonitoring MDM Capabilities 15
  • 16. Types of Mobile Applications 16 Native Web Hybrid
  • 17. Value of a Mobile Enterprise Application Platform 17
  • 18. Strategies for BYOPC 18 • Establish catalog of supported operating systems: – Windows 7 & 8 – Mac OS X? – Linux Variants? • Catalog of supported AV solutions • Use Inspect to Connect technology to interrogate employee-owned PC to verify compliance • Utilize virtualized applications or virtual desktops to secure enterprise apps and data on untrusted devices. • Virtual desktop clients can be configured to control writing to local or removable media, printing, cut & paste, etc.
  • 19. Questions to ask when considering BYOD 19 • Are there any specific concerns that would preclude the use of employee-owned devices? – Information may be subject to FOIA requests or other regulatory or compliance requirements. • Is there a catalog of devices that would be allowed to access enterprise applications? – With each new platform supported in the environment, complexity is added. Costs may increase as additional versions of enterprise apps are developed and maintained.
  • 20. Questions to ask when considering BYOD 20 • Is the organization willing to accept a short-term increase in risk to allow newer platforms access to data while the device’s management and security tools mature? – For corporate-owned devices, it may be an easy decision to delay upgrades; however, for personally- owned devices, employees may be unwilling to forego the latest devices or updates. • Have we considered all of the risks? – Inappropriate content on personally-owned devices. ECPA considerations? Compensation considerations, especially for CA-based employees?

Hinweis der Redaktion

  1. *** Should we copy into non-Dell presentation template?
  2. *** KEEP or DROP – maybe change third column to “Mobile Era?”
  3. *** I Think this is a good slide showing the adoption curve, will need to revise title and remove dell consulting references in text
  4. In a recent study – 75% of surveyed companies indicated that they currently allowed, or were considering allowing personally-owned devices to access company information Smartphone device sales are forecasted to exceed Notebooks + Desktops (combined) by 2012 [Morgan Stanley] End user preference is driving enterprises to offer more device choices Security is #1 concern; must protect enterprise data on growing population of mobile devices Wireless Email & PIM (contacts, calendar, tasks) is core application that most solutions are build around today LOB apps and collaboration are next logical opportunities
  5. Good Strategy Overview Slide – may need to revise some text in boxes to more accurately meet audience’s needs
  6. ***Change title to reflect benefits of using consumer devices Personal information management (PIM) refers to both the practice and the study of the activities people perform in order to acquire, organize, maintain, retrieve and use information items such as documents (paper-based and digital), web pages and email messages for everyday use to complete tasks (work-related or not) and fulfill a person’s various roles (as parent, employee, friend, member of community, etc.). E*Trade’s mobile trading app on BlackBerry  Coca-Cola Enterprises (CCE) mobilized its merchandisers to make the jobs they do on a daily basis as easy and intuitive as possible Heineken - refreshed its mobility platform to empower field and merchandising representatives Xerox – front line employee mobile app for enterprise data access
  7. Good overview of MDM
  8. More in-depth review of MDM capabilities