BYOD Security: The DLP and MDM Handshake | Features | ChannelWorld.in
Close
%%CLICK_URL_UNESC%%

BYOD Security: The DLP and MDM Handshake

Added on Oct 29, 2012 by Yogesh Gupta

Solution providers need to engage coherently with security vendors to execute a successful, profitable and sustainable ‘BYOD’ journey across their enterprise customers.

BYOD—And the increasing use of mobile devices among enterprises—is a bandwagon that every technology vendor and channel partner worth their salt are keen to ride over the next few years.

However, one thing stands in their way: CIOs.

BYOD (bring your own device) is a long-term strategy for CIOs, who for the most part, are treading cautiously because of multiple issues including security, compliance, ROI, and TCO. In response, security vendors (security is an important part of the BYOD story) are empowering and hand-holding the partner community, to bring more clarity to CIOs and win partner enterprise mobility deals.

“Compliance is not much of an issue with BYOD compared to securing device and data access, assigning rights to people, and managing the entire piece at an enterprise end,” says Amitabh Jacob, channel director, India and SAARC, Symantec. “That’s why DLP plus MDM has become critical.”

“If companies want to manage and secure mobile devices effectively in today’s complex IT environment, they need to treat them like any other endpoint, and manage them from a single console,” says Sajan Paul, director, systems engineering, Juniper Networks India.

The Security Link

Joel Camissar, practice head, data protection, McAfee APAC, says that, “people recognize that DLP plus MDM creates an ideal protection.

MDM gives them visibility and control over devices. Ultimately, if you can protect data and allow access to it based on the needs of the user, you will have stronger protection.”

The ideal mobile security and management strategy follows devices through their lifecycle—from provisioning and management, to security, and eventually, device retirement—and is designed to prevent data from leaving the organization regardless of where it resides. That’s why DLP becomes a component of an overall mobile strategy, says Jacob.

“Our BYOD pitch is more end-to-end, and not limited to a specific anti-virus or MDM solution or inventory management software. Our solutions have features like finger printing the device and designing heat maps according to the usage of the device by employees. Security depends on the level of risk attributed to the  data,” says Paul. “BYOD usually begins with VPN access which extends into MDM, DLP and other pieces of mobility,” he adds.

“MDM is important from an integration point of view as well as an overall device management perspective,” says Ramandeep Singh, head of system engineering, pre-sales consulting team (India & SAARC), Check Point Software Technologies.  “Traditional DLP is not the answer. In fact document management is the most practical solution for BYOD,” he says.

But, Fortinet is pursuing a different approach. “BYOD is part network and part application access, and we tackle it from a wireless access perspective by addressing security from the perimeter to access point,” says Vishak Raman, senior regional director-India & SAARC, Fortinet. Fortinet UTM has a strong DLP function at the perimeter level to control data leaks and Forti Gate client at the desktop level. At least, at the access point level, data needs to be secure for BYOD, he adds.

Overcoming Roadblocks

Technologically, the biggest roadblock for DLP plus MDM is the fact that the mobile world has many operating systems (iOS vs Android vs Win8) which are fragmented (Android 2.2-4.1 implemented across devices) and are closed (agents aren’t an option like they are on PCs) according Camissar at McAfee.

“The biggest challenge is the possibility of an executive’s mobile device being infected with malware outside the corporate network and them bringing that device onto the corporate network” says Raman.

ALSO READ: Will BYOD go Mainstream in India by 2013-14?

“MDM is not always important under BYOD as the corporate is not worried about the private information of employees. The concern is around the threat to corporate IP which means that MDM becomes critical,” says Paul at Juniper. Junos pulse—a single client by Juniper—works across five major mobile OSes.  Junos helps secure the connection, protect the device, and control MDM, says Paul.

Culturally and psychologically, DLP in a mobile environment is difficult to implement and maintain from an administrator’s perspective. At the same time, protecting data is much less of a concern for the mobile user, says Camissar.

Connecting with Partners

McAfee is taking a long-term view where technology is only a part of the solution. For them the creation of best practices and business processes is important. “From a channel perspective, there is a lot of opportunity  to sell the methodology around technology, including best practices and business process, or even sell ongoing management and consulting services using the same tools,” says Camissar.

“Partners have the advantage of working with products that address such specific customer requirements, like DLP for tablets. The Symantec DLP and Mobile Management solutions allow DLP customers to leverage their existing investments by utilizing the same policies and management infrastructure,” says Jacob.

There is no silver bullet for BYOD. Enterprise partners need to spin an integrated story around MDM, DLP, and security says Raman at Fortinet. Systems integrators can stitch together solutions and enjoy decent margins rather than rely on product sales alone, he adds.

Check Point has bundled few units of their USB drive GO (earlier Abra) with their UTM. “This baby step towards BYOD ensures partners cross-sell and facilitate BYOD in the future,” says Singh. With the launch of document management in the next couple of months, we envisage a different strategy of gross margin and reducing sales cycles for partners, and an overall demystification of BYOD,” he says.

The Consultant Approach

DLP is one of the solution specializations that Symantec offers channel partners through which they can attain Silver, Gold or Platinum levels within the Symantec Partner Program. Partners play a critical role in encouraging customers to take the right approach in securing and managing their information and infrastructure.

A partner should proposition a VPN customer and help them migrate to BYOD, and then we can add mobile security and an MDM suite, says Paul. Networking and security partners of Juniper work across datacenters, security, campus and BYOD, and hence become an extension to the overall portfolio.

“The biggest avenues are in highly-regulated industries, or in businesses holding customer sensitive data, where employers are likely to have greater authority in asking employees to overlook their privacy concerns if employees want to use a personal device to access company systems. On the other hand, non-regulated industries or businesses holding less sensitive data may want to apply security programs to help manage risk where MDM might come into picture,” says Camissar at McAfee.

“The numbers for standalone device/solution sales like a single firewall is expected to slow down as organizations demand security and connectivity as a single piece around BYOD. Partners can go up the value-chain and act as consultants rather than suppliers,” says Paul.

So, is CYOD (choose your own device) a better option for channel partners? “Protection of data is critical. It’s easy to make a quick decision to try and address it on mobile devices, but you could end up regretting it later. While implementing a smart combination MDM and security (McAfee’s EMM bundled with Secure Container and Virus Scan Mobile) in the short-term, you also need to be thinking about the long-term which should include best practices and new business processes,” says Camissar at McAfee.

“Employees should be allowed to operate their devices whether it’s a laptop, tablet, or smartphone in the office with secure access to business applications, similar to their desktop experience. That is the essence of BYOD or CYOD,” says Singh at Check Point.

“Be it BYOD or CYOD, organizations need to define IT policies after identifying what is critical information to them and how it is to be used. A specialized partner can play a critical role in advising customers and helping them choose a holistic approach that suits their business requirements,” says Jacob.


Latest Features

Editor's Pick
Customer service: The proof is in the numbers

Customer service: The proof is in the numbers

Customer satisfaction increases when you find your greatest weaknesses and then hone in with a laser focus to address them.

5 principles for great vendor relationships

5 principles for great vendor relationships

Unhappy with your vendor? Challenge them to commit to a strategic relationship. And don’t hesitate to move on if they don’t.

Services is a Multi-Pronged Strategy: Jayanth Gojer, Vitage Systems

Services is a Multi-Pronged Strategy: Jayanth Gojer, Vitage Systems

Services is the goldmine for us, asserts Jayanth Gojer, COO of Bangalore’s Vitage Systems.

We Help Customers Effectively Integrate the SMAC Stack: Pankaj Ratra, Path Infotech

We Help Customers Effectively Integrate the SMAC Stack: Pankaj Ratra, Path Infotech

Customers need applications to effectively adopt and integrate the SMAC stack and we help them achieve the objective, says Pankaj Ratra, Director-Sales & Marketing, Path Infotech

How Ujjivan is Using a Mobile App to Uplift the Underprivileged

How Ujjivan is Using a Mobile App to Uplift the Underprivileged

Enough is said about Digital India. But it’s actually happening here and now. Ujjivan Financial Services, a microfinance company, is leveraging a mobile app to make sure that its underprivileged customers get loans real quick in order to grow their businesses.

Latest Videos
Cloud Computing is Not Hype, But Real: Channel Partners

Cloud Computing is Not Hype, But Real: Channel Partners

Cloud Computing has come out of the hype cycle and is now the defining point for enterprise IT, channel partners observe, about the potential for cloud, cloud services and the financing models around cloud computing. 

Services is a Multi-Pronged Strategy: Jayanth Gojer, Vitage Systems

Services is a Multi-Pronged Strategy: Jayanth Gojer, Vitage Systems

Services is the goldmine for us, asserts Jayanth Gojer, COO of Bangalore’s Vitage Systems.

We Help Customers Effectively Integrate the SMAC Stack: Pankaj Ratra, Path Infotech

We Help Customers Effectively Integrate the SMAC Stack: Pankaj Ratra, Path Infotech

Customers need applications to effectively adopt and integrate the SMAC stack and we help them achieve the objective, says Pankaj Ratra, Director-Sales & Marketing, Path Infotech

How Ujjivan is Using a Mobile App to Uplift the Underprivileged

How Ujjivan is Using a Mobile App to Uplift the Underprivileged

Enough is said about Digital India. But it’s actually happening here and now. Ujjivan Financial Services, a microfinance company, is leveraging a mobile app to make sure that its underprivileged customers get loans real quick in order to grow their businesses.

How Mobility Has Helped Our Business Grow: Channel Partners

How Mobility Has Helped Our Business Grow: Channel Partners

Indian channel partners share how mobility has been instrumental in growing the business of their customers and how that, in turn, has taken partners' business to another level.

ChannelWorld Research
Why Channels Have Changed Their Go-to-Market Strategy in Six Months

Why Channels Have Changed Their Go-to-Market Strategy in Six Months

According to our SOTM Mid-Year Survey, a majority of Indian channels said their top go-to-market strategy was to offer services in a recurring revenue model—not introducing new technologies, like SMAC, which was their top GTM strategy six months ago.

SOTM Mid-Year Survey 2015: Your Roadmap for the Next 6 Months

SOTM Mid-Year Survey 2015: Your Roadmap for the Next 6 Months

According to the survey, the next six months of the year are going to be eventful. Here are the challenges, emerging technologies and trends that will shape the rest of the year for you.

Big Data, Mobility Top Partners’ Wish List: SOTM Mid-Year Survey 2015

Big Data, Mobility Top Partners’ Wish List: SOTM Mid-Year Survey 2015

According to the ChannelWorld's State of the Mart Mid-Year Survey (SOTM) 2015, big data is the way to go for the enterprise channels for the second half of this year, with 34 percent partners planning to invest in it.

Private Cloud Still Remains a ‘Safe Bet’ for Partners: SOTM Survey 2015

Private Cloud Still Remains a ‘Safe Bet’ for Partners: SOTM Survey 2015

According to the STOM 2015 survey, channel partners who are into cloud computing feel that 42 percent of their business will be generated by private cloud.

Partners Pin Hope on Government, Expects IT Spend to Grow: SOTM Mid-Year Survey 2015

Partners Pin Hope on Government, Expects IT Spend to Grow: SOTM Mid-Year Survey 2015

According to the ChannelWorld's State of the Mart Mid-Year survey (SOTM) 2015, 30 percent of the channel partners believe that IT spend in the government sector is likely to increase in next six months.

No More Baby Steps, Partners Ready to ‘Risk’ Gambling with Disruptive Tech: SOTM Survey 2015

No More Baby Steps, Partners Ready to ‘Risk’ Gambling with Disruptive Tech: SOTM Survey 2015

According to ChannelWorld’s State of the Mart Survey (SOTM) 2015, 43 percent of channel partners say their business will have a ‘high risk appetite’ in the second half of this year.

Channels’ 3 Great Expectations from Tech OEMs

Channels’ 3 Great Expectations from Tech OEMs

Introduced as an individual category under ‘Expectations from tech OEMs’ list in SOTM Mid –Year Survey, ‘transparent deal registration’ emerged as the biggest concern for channel companies in India.

SLIDESHOWS
What Quarterly Earnings Reveal About Top IT Companies

What Quarterly Earnings Reveal About Top IT Companies

As top companies reported their quarterly earnings, we find out what strategy worked best for them and the causes of concern in the future.

10 Things You Need to Know About Bi-Modal IT

10 Things You Need to Know About Bi-Modal IT

No longer just another buzzword, bi-modal IT is soon becoming a necessary organizational setup in most companies, especially the ones which find it difficult to go completely digital. Read on to know what CIO.com (http://bit.ly/1Rz1Jti) wants you to know about this system.

Five Hybrid Cloud Benefits Your Customers Can’t Ignore

Five Hybrid Cloud Benefits Your Customers Can’t Ignore

According to IDC, the global cloud market, including private, public and hybrid clouds, will hit $118 billion in 2015 and crest at $200 billion by 2018. If that isn’t enough for you to convince customers to take the hybrid cloud route, here are five more from across the web.

Horrible Bosses: Five Bosses You’d Love to Kill

Horrible Bosses: Five Bosses You’d Love to Kill

It takes all kinds to make the world go round. But it takes only one to bring yours to a standstill: Your boss. Here are five types of bosses you wouldn’t miss—when they’re gone (under mysterious circumstances).

India's Leading VADs
Why Channels Want to Partner With Inflow Technologies

Why Channels Want to Partner With Inflow Technologies

Inflow Technologies’ tie up with 39 vendor companies, an extensive tech portfolio, and a services play, are great value propositions for enterprise channels, says its President and CEO, Byju Pillai.

iValue Creates Real Value for Channels in India

iValue Creates Real Value for Channels in India

Focused on niche vendor alliances around data, network and app management backed by a robust channel ecosystem marked iValue's success in 2014. What clicked for the seven-year-old VAD?

RAH Infotech Shows Channels the Way Ahead

RAH Infotech Shows Channels the Way Ahead

Mutual trust and long lasting bond with vendor companies and channel partners helps VADs to evolve and succeed in today’s aggressively competitive market. Leveraging competent channel partners and forge niche vendor alliances marks RAH Infotech’s success in 2014.

How Satcom Infotech is Adapting to New Security Landscape

How Satcom Infotech is Adapting to New Security Landscape

As a leading value added distributor, Satcom Infotech is emerging as an end-to-end security player, helping both customers and partners grow.

How ComGuard Shields Channel Partners

How ComGuard Shields Channel Partners

As emerging technologies introduce new threats to the enterprise landscape, they are making channel partners anxious. But VADs like ComGuard are putting their worries to rest. Here's how.

Tech Chat
Collaborating To Outcome Based World: Priyadarshi Mohapatra, Avaya

Collaborating To Outcome Based World: Priyadarshi Mohapatra, Avaya

Priyadarshi Mohapatra, Managing Director, India and SAARC, Avaya, on how IT is transitioning from a keep-the-lights-on role to one that enables customers to deliver results.

The Dawn of the Digital Age: Akhilesh Tuteja, KPMG

The Dawn of the Digital Age: Akhilesh Tuteja, KPMG

The development of digital infrastructure will be a key growth driver for technology and solution providers. 

Paradigm Shift from End-Users to User-First : Parag Arora,Citrix

Paradigm Shift from End-Users to User-First : Parag Arora,Citrix

Parag Arora, Area Vice President and India Head, India Sub-continent, Citrix, says new technologies will force organizations to take a user-first approach in 2015.

Mobile and Cloud Are Gamechangers of the Future: Karan Bajwa, Microsoft

Mobile and Cloud Are Gamechangers of the Future: Karan Bajwa, Microsoft

Karan Bajwa, Managing Director, Microsoft India, says, in  2015, organizations will adopt a mobile-first and cloud-first strategy to get ahead of competition.

A Network for the Internet of Everything : Dinesh Malkani,Cisco

A Network for the Internet of Everything : Dinesh Malkani,Cisco

Dinesh Malkani, President, India and SAARC, Cisco, talks about IoT and the significant technology transitions in the networking world.

Moving to the Third Platform: Jaideep Mehta, IDC

Moving to the Third Platform: Jaideep Mehta, IDC

Cloud and mobility are the two technologies that will fuel the rapid adoption of the third platform in India.

Envisaging a Holistic Security Strategy For 2015: Sanjay Rohatgi,Symantec

Envisaging a Holistic Security Strategy For 2015: Sanjay Rohatgi,Symantec

Sanjay Rohatgi, President–Sales, Symantec India, says the company has a set of holistic solutions in place to secure organizations from security threats. 

Beating the Bad Guys: Sivarama Krishnan, PwC

Beating the Bad Guys: Sivarama Krishnan, PwC

Organizations will need to turn inwards to establish robust information security strategies.

Building Capabilities for a Digital Tomorrow: Alok Ohrie,Dell

Building Capabilities for a Digital Tomorrow: Alok Ohrie,Dell

Alok Ohrie, President and Managing Director, Dell India, on the company’s investments to build end-to-end solutions and delivery capabilities for a digital world.

FAST TRACK
Kamtron Systems

Kamtron Systems

Transitioning towards a service-oriented company will boost our growth, believes Kavita Singhal, director, Kamtron Systems.

TIM Infratech

TIM Infratech

Delivering ‘best of breed’ technologies to enterprises is key to success, says Monish Chhabria, MD, TIM Infratech

Mudra Electronics

Mudra Electronics

A vendor-agnostic strategy helped us sustain business, says Bharat Shetty, CMD, Mudra Electronics.

Systematix Technologies

Systematix Technologies

Our USP is a customer-friendly approach backed by services, says Akhilesh Khandelwal, Director, Systematix Technologies.

CorporateServe Solutions

CorporateServe Solutions

Our ability to turnaround complex ERP projects in record time is what gets us customer referral, says Vinay Vohra, Founder & CEO, CorporateServe Solutions.

KernelSphere Technologies

KernelSphere Technologies

We are emerging as an end-to-end systems integrator, says Vinod Kumar, MD, KernelSphere Technologies.

Uniware Systems

Uniware Systems

We constantly validate emerging technologies for first-mover advantage, says Vergis K.R., CEO, Uniware Systems.

Astek Networking & Solutions

Astek Networking & Solutions

An innovative approach helps us stay successful, says Ashish Agarwal, CEO, Astek Networking & Solutions.

CSM Technologies

CSM Technologies

Our approach is backed by innovation and simplicity, says Priyadarshi Nanu Pany, CEO, CSM Technologies.

SOCIAL MEDIA @ CW India
SIGNUP FOR OUR NEWSLETTER

Signup for our newsletter and get regular updates.