Rethinking MDM in a BYOD World

Similar documents
MDM and beyond: Rethinking mobile security in a BYOD world

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Streamline IT with Secure Remote Connection and Password Management

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

Enterprise Mobility Management

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

SECURE, CENTRALIZED, SIMPLE

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Securing Today s Mobile Workforce

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

3-Part Guide to Developing a BYOD Strategy

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

MaaS360 Secure Productivity Suite

RHM Presentation. Maas 360 Mobile device management

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Using the Network to Optimize a Virtualized Data Center

BYOD Business year of decision!

Taming the Mobile File Sharing Beast

BlackBerry 2FA. Datasheet. BlackBerry 2FA

Mobility, Security Concerns, and Avoidance

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Design and deliver cloud-based apps and data for flexible, on-demand IT

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Google Identity Services for work

The Device Has Left the Building

XenApp, XenDesktop and XenMobile Integration

Cracking the Access Management Code for Your Business

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

SEPARATING WORK AND PERSONAL

SIEM: Five Requirements that Solve the Bigger Business Issues

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Five Tips to Mastering Enterprise Mobility

Enterprise Mobility Management: completing the EMM story

10 Hidden IT Risks That Might Threaten Your Business

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Total Threat Protection. Whitepaper

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007

As Enterprise Mobility Usage Escalates, So Does Security Risk

WHITEPAPER. How to secure your Post-perimeter world

ENTERPRISE MOBILITY TRENDS

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Maximize your move to Microsoft in the cloud

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Enterprise Mobility. BEYOND MDM: A MULTIDIMENSIONAL MOBILITY STRATEGY Why device-centric strategies no longer meet today s mobility needs

EBOOK. Mobile Experience Virtualization: Extend Virtualized Windows Apps to Mobile

Bring Your Own Device. Peter Silva Technical Marketing Manager

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

A Guide to Closing All Potential VDI Security Gaps

Next Generation Privilege Identity Management

white paper SMS Authentication: 10 Things to Know Before You Buy

Managing Windows 8.1 Devices with XenMobile

Next Generation Authentication

Security Challenges: Integrating Apple Computers into Windows Environments

Changing face of endpoint security

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

Mobilize with Enterprise Security and a Productive User Experience

8 Must Have. Features for Risk-Based Vulnerability Management and More

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

The Future of Mobile Device Management

2016 BITGLASS, INC. mobile. solution brief

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

White Paper BYOD 2.0 ENTERPRISE MOBILITY MANAGEMENT. SOTI.net. Copyright 2015 SOTI Inc. All rights reserved.

Microsoft IT deploys Work Folders as an enterprise client data management solution

2016 Survey: A Pulse on Mobility in Healthcare

ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users

Best Practices in Securing a Multicloud World

Welcome to the era of the anywhere worker

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Accelerate Your Enterprise Private Cloud Initiative

The Etihad Journey to a Secure Cloud

Quick Heal Mobile Device Management. Available on

Storage Made Easy. Enterprise File Fabric for Unified Data Indexing, Auditing, e-compliance, and secure file sharing.

Mobility best practice. Tiered Access at Google

90 % of WAN decision makers cite their

MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT

70% of professionals will conduct their work on personal smart devices by 2018 (Source: Gartner)

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Evolved Backup and Recovery for the Enterprise

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

How a Global Insurance Provider in Japan uses BlackBerry UEM to Secure, Protect and Connect its Mobile Workforce

A comprehensive security solution for enhanced mobility and productivity

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

VMworld 2015 Track Names and Descriptions

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

The. C s. of Mobile Device. Management

Mobile Security Trends in the Workplace

Transcription:

Rethinking MDM in a BYOD World 2012 Citrix and TechTarget

Table of Contents Summary....................................................... 3 Introduction.................................................... 3 Current Business Challenges with BYOD............................ 4 Embracing BYOD Through Enterprise Mobility Management......... 5 The Solution: Citrix Unified Storefront............................. 7 Moving Forward................................................. 10 2 2012 Citrix and TechTarget

Summary is white paper discusses today s challenges with bring your own device (BYOD) and how current mobile device management solutions are leaving gaps in mobile and information security strategies. Read on to learn how you can embrace BYOD and secure mobile apps and data, as well as provide a simple and streamlined user experience. Introduction Everyone is on the go especially in business. With today s mobile-centric computing, user demands have increased and new mobile systems have emerged with deeper functionality and much more diverse usage than ever thought possible. e ways we re doing business are changing rapidly, yet we re still holding on to traditional means for managing and securing mobile systems at the device level. One thing is clear: IT is out of the loop when it comes to BYOD. And when IT is out of the loop and mobile devices are not properly managed and secured, immeasurable business risks emerge. Regardless of who purchased the mobile device, if it s being used for business purposes, it needs to fall under IT s umbrella of protection. Some say that traditional mobile device management (MDM) is the answer. However, for organizations that have implemented MDM, the real world has shown that it s not a complete solution. In fact, users do not accept the notion that IT must manage and control their mobile devices in order for them to use those devices to conduct business. As a result, mobile control is slipping away quickly. A new approach is needed. All organizations from large enterprises to smaller nonprofits must rethink where they re headed with mobility. 3 2012 Citrix and TechTarget

Current Business Challenges with BYOD Information security lessons have taught us that it s all in the implementation. Many organizations already have BYOD programs for smartphones, yet there s still chaos. is is due, in large part, to the fact that many businesses are not capable of moving quickly. Prompt and agile response to mobile computing is needed through risk assessment, policies and the appropriate technologies. Given the bureaucracy, politics and complex cultures in organizations today, these things o en take time a long time to adequately address. With countless devices, apps and islands of information scattered about, managing mobile computing is nothing short of overwhelming. It s this literal disarray that h as created formidable challenges for even the most well-run IT shops. IT managers and administrators see these changes happening before their eyes. e pressure to support any and all devices and all applications from any location is real. Unfortunately, the IT and security resources needed to effectively support such mobile environments are not growing proportionately. Forrester Research predicts that there will be 760 million tablets in use by 2016. Without question, the tablet is becoming the business device of choice. When the multitude of mobile operating system platforms including Apple ios, Google Android, RIM BlackBerry and Microso Windows are combined with the immeasurable number of mobile apps for business and personal use, it s easy to understand IT s desire to lock down tablets along with other devices. But today s unstoppable demand for full productivity on personal devices makes locking them down an unsustainable approach. Users expect to be able to take full advantage of mobility benefits. ey want to do their jobs better. ey know how mobile devices can improve productivity and 1 1 Tablets Will Rule the Future Personal Computing Landscape, Forrester Research, April 23, 2012. 4 2012 Citrix and TechTarget

enhance collaboration with colleagues and clients, and they want to be able to do all of this on a device that s chock-full of personal pictures, files and other private information. erein lie some of the greatest challenges with BYOD. How does IT realistically manage and control such an environment? How do you balance securing business content and honoring user privacy? e obvious solution is for IT to control to the greatest extent possible personally owned devices. But employees o en reject such mandates, and today s extended workforce of trusted partners, contractors and others cannot agree to a lockdown solution. is makes it impossible for all parties to agree on a solution, and BYOD risks go unaddressed because of delayed decisions. An important factor in BYOD is that many businesses refuse to acknowledge the extent of the data security problem they face. Given what's at stake, at this very moment IT departments can show their organizations what they're made of by taking back control, supporting business needs and giving users what they want. Further exacerbating the problem is the increasing diversity of work locations employees work at the office, at home, at client sites and while traveling. Any place is fair game for work and for business content exposures. In order to properly manage the complexity associated with mobile devices and the infinite possibilities for work locations, IT professionals and other decision-makers must come up with a systematic means for managing business content rather than incorporating piecemeal solutions that merely manage the physical devices themselves. Embracing BYOD Through Enterprise Mobility Management Consumerization of IT and BYOD are no longer exceptions to the rule. Instead, they re top IT considerations that must be built into your system architecture up front. Focusing mobile control where it counts on the apps and data requires you 5 2012 Citrix and TechTarget

to move beyond simply managing the devices themselves. is means implementing reasonable policies and backing them up with proper technologies that can manage and secure what s truly at risk. Interestingly, this is exactly where traditional MDM solutions fall short. Traditional MDM solutions have deficiencies in areas such as focused content management and user experience. It s time to consider enterprise mobility management to get your mobile environment under control once and for all. Never assume that your entire mobile environment is under your control. Even with existing MDM technologies, odds are good that gaps in security are creating mobile risks you've yet to uncover. Enterprise mobility management technologies help you transition from managing devices to managing the business assets that matter. is includes apps and their associated data, documents and other files, as well as email. Embracing this new approach to BYOD will allow you to minimize costs and maximize network scalability while maintaining efficient system management and security. At the core of the BYOD challenge is the complexity of today s mobile apps. Mobile devices used to have standard web browsers with limited functionality. Now, any given enterprise has countless mobile apps running on countless mobile platforms. To strike a balance between security and usability in the mobile context, you now have to consider: Balancing the protection of sensitive business content while maintaining privacy for personal content Providing users with a seamless, high-performance experience Maintaining flexible access control based on job roles, devices, locations and connectivity 6 2012 Citrix and TechTarget

Mobile technology is moving extremely fast, and demands are increasing quickly. is means IT leaders must speed up their processes, including the deployment of the proper technologies and the implementation of reasonable mobile security controls. Ultimately, IT has to reach new levels of agility to support new mobile devices, apps and services moving forward. Complete enterprise mobility management solutions can help. The Solution: Citrix Unified Storefront When managing BYOD, you need one point of control. e ability to capture, administer and secure all platforms, users and applications from one location can eliminate a tremendous amount of pain from your BYOD experience. An enterprise mobility management solution from a proven vendor is the only reasonable choice. Enter Citrix Unified Storefront, an integrated solution comprised of Citrix CloudGateway, Citrix ShareFile and Citrix Receiver. Unified Storefront provides one control point for mobile, web and Windows applications as well as data. Providing an integrated solution for heterogeneous environments, Unified Storefront goes beyond MDM by: 1. Isolating and controlling business apps and data without affecting personal data 2. Implementing context-aware security policies based on the user s identity, device and location 3. Unifying access to users intranet resources, external SaaS apps, mobile apps, Windows apps and business documents with single sign-on 4. Providing a high-performance user experience with seamless, secure access to all apps and data 7 2012 Citrix and TechTarget

Solution Options Since the proliferation of BYOD and mobile computing in the enterprise, numerous built-in and mobile device management technologies have attempted to secure the device, such as: Password enforcement Device encryption Data backup Audit logging Remote wipe However, true mobile security requires more than these basic security controls. Just ask any organization that has experienced a data breach or endured a privacy-related lawsuit. Today s regulatory and risk-related demands are forcing businesses to rethink how they approach mobile security. It comes down to one thing: Should you manage devices or the apps and data on the devices? According to the Citrix Enterprise Mobility Report, evidence is strong that IT managers and administrators find it more effective to focus on the latter. Every situation is unique, but the reality is that the true business risk involves your apps and data, not the physical device. Focus on the area with the highest payoff the business content that counts. Unified Storefront packages all of these services into an integrated solution for managing and securing diverse mobile environments. At the heart of this solution are the following Citrix MDX Technologies : MDX App Vault A secure application and data container that gives IT control over applications and business data while providing users with seamless access to their applications 8 2012 Citrix and TechTarget

MDX Web Connect A secure browser technology for all intranet or externally hosted web sites and applications MDX Micro VPN e industry s first app-specific SSL VPN technology, providing isolated, secure access into the business intranet at the application level rather than opening a full tunnel at the device level, which could open up significant security risk MDX Policy Orchestration A policy-based system that controls the conditions under which people can use their native mobile apps, including authentication rules, network connectivity, location, automated lock/wipe in case of jail-broken devices, and access controls to ensure that IT can manage and control all mobile systems Unified Storefront allows IT to manage business content and lets users take full advantage of all their devices' functions. Everyone wins. e Citrix enterprise mobility management solution also delivers follow-me data anywhere document access. e ShareFile component of Unified Storefront provides highly secure file edit, sync and share capabilities from any mobile device. ShareFile, CloudGateway and Receiver work together to provide role-based access controls and remote wipe and lock capabilities, creating a seamless, secure mobile experience for all apps and docs. Again, it s a win-win for users and IT. Citrix differentiates itself from traditional MDM technologies and other enterprise mobility management solutions in three ways: 1. A smarter approach to managing and controlling business content -- not the devices and maintaining privacy for users personal content 2. An enhanced mobile user experience that allows users to easily get work done with seamless, consistent access with single sign-on and high performance from any device, anywhere 9 2012 Citrix and TechTarget

3. Solution breadth that provides end-to-end, integrated endpoint services, networking, security and an enterprise app store, as well as the ability to control and deliver data services and any type of app mobile, web and Windows Moving Forward e new mobile enterprise is here. Business network and application use is shi ing from traditional computers to mobile devices. It s necessary to go beyond stand-alone MDM solutions for proper oversight and control, while giving users the freedom and flexibility to choose their devices. IT managers must be able and prepared to shi their infrastructure to accommodate new ways of working that will continuously evolve. Mobile security used to be out of sight and out of mind. It s now impossible to ignore, yet businesses still haven t reached the level of mobile control that s needed. Whether or not IT departments have the proper mobile security controls, they re still responsible for keeping business information and assets in check. e complexities of mobile computing are creating exponential business risks. Regardless of business size or industry, no organization is immune. With mobile computing, a single misstep is all it takes to create serious business problems. You have to look at the big picture. Once you realize that mobile computing as we now know it is not going away, you can start developing a strategy to ensure you do it right and in ways that can be leveraged into the future. With today s diversity of devices and apps, mobile has become virtually unmanageable. is is especially true if you re focusing on the wrong areas and using inadequate technologies. Set your business and your users up for success. 10 2012 Citrix and TechTarget

Don t let your users be the ones who tell you about mobile security mishaps. e proper technologies, well managed, can be the key to gaining control over your mobile environment today and moving into the future. An enterprise mobility management solution will provide you with the visibility, control and automation needed to ensure your smartphones and tablets are kept in check, while allowing users to be as productive on the go as they are in the office. You cannot afford to ignore the risks inherent to mobile computing; it s arguably the most exposed area of your business right now. e important thing to remember is that you're in control here. Rather than struggling to manage each and every physical device, why not implement technologies and processes that allow users to securely access corporate applications, email and documents from all their devices? Focus on where it counts managing business content. Once you have the proper systems in place, you can easily deploy the right policies and controls based on your specific business needs. In the end, business risks will be minimized, users will be productive and happy, and IT will have done its job. 11 2012 Citrix and TechTarget