1 / 22

March 20, 2014

A SIMPLE APPROACH TO BYOD. March 20, 2014. 1. THE STATE OF BYOD. USERS WANT EASE OF USE. WHAT THEY DON’T WANT IS: Company monitoring of their personal activities or restriction of the apps they rely on Interruption of their calendar, contacts, phone and texting functions

nelson
Télécharger la présentation

March 20, 2014

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A SIMPLE APPROACH TO BYOD March 20, 2014 1

  2. THE STATE OF BYOD USERS WANT EASE OF USE WHAT THEY DON’T WANT IS: • Company monitoring of their personal activities or restriction of the apps they rely on • Interruption of their calendar, contacts, phone and texting functions • Invasion or deletion of their personal data COMPANIES WANT SAFE DATA WHAT THEY DON’T WANT IS: • Corporate data distributed on thousands of devices • Users resorting to personal email or other insecure means of maintaining productivity Brooklyn gives IT the security they need and Employees the freedom they demand.

  3. BYOD LANDSCAPE FIRST GENERATION SOLUTIONS DEVICE MANAGEMENT, CONTAINERIZATION: • Data is synchronized to the device • Tools to mitigate risk if the device is lost or stolen • Device tracking, app control, monitoring • Remote wiping of device ISSUES: • User acceptance of BYOD policy • Legal ramifications of having access to personal data • Questionable security • User’s won’t tell you that they lost a device • Remote wipe – airplane mode, shielded bags • Cracking tools can hack a container quickly • “HEAVY” model not applicable for all users

  4. ZIXONE NEXT GENERATION LIGHT SOLUTION • Email data never resides on the device • No need to manage the device • No concerns if the device is lost/stolen • No issues when an employee leaves the organization • Easier to work with contractors • Avoid legal issues • Computer Fraud and Abuse Act • Litigation/Legal Holds

  5. ZIXONE NEXT GENERATION LIGHT SOLUTION • Users retain complete control • No monitoring, restrictions or risk of data loss • Users continue to use the device as it was intended • Firewalling of personal data • Limits company liability • Avoid wrongful dismissal and discrimination claims • Native functionality and UI of the device is maintained • Notifications, Alerts • Contact lookup • Phoning • Texting

  6. ZIXONE NEXT GENERATION LIGHT SOLUTION • Compliance reporting • Simplifies the procedures to deal with a lost device • No data to worry about – a big plus! • Immediately disable the account • Check the server to see what, if any, messages were accessed • Allows you to quickly and succinctly ascertain the exposure

  7. ZIXONE COMPONENTS • ZixONEapp that delivers a view of corporate email, calendar and contacts on mobile devices • ZixONEserver connects to Exchange or Office365 • Efficient, secure protocols deliver information quickly

  8. ZIXONE ARCHITECTURE ZixONE Service Low bandwidth, high performance link using patent-pending fetching and caching techniques optimized for wireless data communications.

  9. ZIXONE

  10. ZIXONE

  11. ZIXONE ADMINISTRATION

  12. ZIXONE ADMINISTRATION

  13. ZIXONE ADMINISTRATION

  14. ZIXONE ADMINISTRATION

  15. ZIXONE ADMINISTRATION

  16. ZixOne Admin – Audit Trail

  17. HEAVY SOLUTIONS VS ZIXONE

  18. ZIXONE STRATEGY COMPARISON

  19. ZIXONE NEXT GENERATION LIGHT SOLUTION • Analysts recommend a two-pronged approach to BYOD • A Heavy solution where it is actually needed • A LIGHT solution where only email, calendar and contacts are required • Easy Cloud Deployment • Exchange 2007 and up • Office365 • iOS 6.0 and up • Android 2.3 and up

  20. ZIXONE NEXT GENERATION LIGHT SOLUTION • Final Thoughts • #1 source of data breach is via lost/stolen devices • 133 devices lost per minute • “Heavy” solutions serve a purpose but are not scalable • 42% of companies have tried a first generation solution • 60% not happy (admin complexity, inadequate security) • 60% of companies that support BYOD limit deployment due to privacy and personal data concerns • Most employees only require email, calendar and contacts • …and we’re just getting started!

  21. ZIXONE NEXT GENERATION LIGHT SOLUTION #nodataonthedevice

More Related