Say Goodbye to Enterprise IT: Welcome to the Mobile First World Sean Ginevan, Senior Director, Strategy Infosecurity Europe - 2015
Sean Ginevan Sr. Director, Strategy, MobileIron Linkedin.com/in/sginevan @SGinevan Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy
Mobile is the new Industrial Revolution.
2015 MobileIron Gen M Survey: How is mobile changing our work style? More than 3,500 professionals Across six countries: France, Germany, Japan, Spain, UK, USA Conducted by Harris Poll from Dec. 2014 to Jan. 2015
64% (at least once a day outside of work hours) does 26% of its work on smartphones and tablets. 82% (at least once a day during work hours) relies on mobile for business activity outside of work and personal activity at work.
30% 29% 28% 26% 25% 19% % of work done on smartphones and tablets Professionals around the world blend their work and personal lives Spain France Germany UK USA Japan Spanish the most likely to do mobile work while using public transportation French the most likely to do mobile work while driving Germans the most likely to feel guilty receiving personal communications at work British the most likely to use mobile to monitor their home during the work day Americans the most likely to do mobile work while using the bathroom Japanese the least likely to do mobile work while watching TV
The more the CIO says no the less secure the organization becomes. Vivek Kundra CIO, US Federal Government, February 2011
Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy
Mobile is a shift in central focus Centered on device Centered on individual
I think my employer is tracking my personal information but I don t REALLY know what. * Represents visibility on ios, but will vary by mobile operating system and employer policy.
Traditional model of enterprise security
Old security model (IT led) System image Anti-malware agents Software/patch distribution VPN VDI Perimeter controls Firewall
New security model (user led) User experience: CONTROLLED CONSUMERIZED Information architecture: DATA CENTER INFORMATION FABRIC Personal cloud System image Anti-malware agents Software/patch distribution VPN VDI Perimeter controls Firewall Business cloud
New security model (user led) User experience: CONTROLLED CONSUMERIZED Information architecture: DATA CENTER INFORMATION FABRIC Personal cloud Trusted per-app gateway Business cloud Trusted relationship Trusted integration & authorization Secure enterprise information wherever it lives In the app In the network In the cloud
Next generation laptops and desktops All require EMM for enterprise security
Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy
Operating System Launches Windows XP Windows Vista Windows 7 Windows 8 Windows 10 2000-2004 2005-2009 2010-2014 2015+ iphon e OS 1 ios 4 ios 8 ios 9+ iphon e OS 2 iphon e OS 3 ios 5 ios 6 ios 7 Plus Android!
Agility is the new security What factors would most contribute to your organization s ability to maintain an effective mobile strategy over time? Source: Ponemon Institute, March 2014 Most important factors for mobile success (7 = most important to 1 = least important) Agility and preparedness for change Ample resources Enabling technologies Knowledgeable or expert staff Collaboration among business units Effective leadership A strong mobile security posture 6.58 6.01 5.60 5.13 4.24 3.97 2.61
Building a mobile strategy
Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy
Mobility will happen by you, with you, or to you.
What Do Your Employees Want? Get Their Jobs Done Use The Best Tools Do The Right Thing
People Make Mobile Happen Team Policies Comms Support
Stakeholder Map InfoSe c Security Policy Certificate Mgmt. Incident Response Personas Existing Tools Biz Processes Competitive Needs Lines of Busine ss IT HR Benefits Recruiting Works Councils SP Plans Spend Mgmt. Vendor Mgmt. Financ e Legal EUA Privacy Contracts Discovery
Entitlement Policy Role-Based Entitlement Device Ownership Corporate Only COPE BYOD Cellular Service Corporate Paid Stipend Expense
Trust-Based Security Endpoint Enrollment PIN / Passcode Automatic Lock Remote Wipe of Corporate Data Encryption Minimum OS Version Jailbreak/Root Prevention
Defining Rules of Use Rules of Use 1) We reserve the right to remote wipe your device. 2) We will enforce a PIN and auto timeout. 3) Please call the helpdesk if you lose your device. Click here for more details.
Typical Comms-Worthy Mobile Events Wearables OS Upgrade Smartphone s Tablets Wearables OS Upgrade Beta Operating Systems Smartphone s New OS Tablets New OS Holidays Jan-Mar Apr-Jun Jul-Sep Oct-Dec
Business Transformation New user & business experiences App & Content Enablement 1 st gen of mobile apps Mobile documents Cloud protections Device Security BYOD (user choice) Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement)
An example of agility: MI Case Study Over 1,700 Downloads 3,406 Changes in 14 Months 25% HR Case Load Reduction
Conclusions Define your mobile projects now What business processes will benefit most from mobilization? Understand the data your users will interact with And the risk and compliance issues that go with it Align your key stakeholders Build your mobile architecture
MobileIron secures enterprise information wherever it lives. We are building the security foundation for the modern enterprise.