Hi, I'm Stuart Lisk, Senior Product Manager for the Secure Mobile Access product from Dell. Today, I want to talk to you about being able to leverage the use of your employee's personal devices in order to get access to the corporate resource in a secure manner.
Utilizing personal devices opens up all kinds of security risk, as you well know. And today, one of the best ways to do that is through the use of a per app VPN solution, which is exactly what Secure Mobile Access is all about.
Unfortunately however, many of the solutions that are out there today require you to utilize an SDK-- so that means doing development and changing the app itself-- wrapping that application-- which means it require scripting in order to identify the app that can access the VPN, so the employees can get access to the corporate resource. And that only delays the deployment, as well as costs a lot of resources, including money. Well, with Secure Mobile Access from Dell, it's very simple. All you have to do is register that app. That gives you almost a zero day deployment.
Let me show you how easy it is to register the app. We're moving to the management console to take a look at how easy it is, frankly, to actually identify the applications that are going to access the VPN for the corporate resources. But I'm going to use Chrome as the application. I'm identifying the actual platform-- you see Chrome is serving as a browser.
And what's important here, is the fact that not only are you able to identify the application, but you're also able to identify the versions of each of the applications. And this is important because as new versions come out-- you know how frequently versions of applications come out, whether they're those that you do internally as a custom app, or those that you might be utilizing such as a browser-- applications change on an ongoing basis. So you want to have the ability to actually vet those new versions to make sure they're actually working the way you want them to before you make them readily available to your employee base.
So you'll notice I've got the versions themselves. We've identified the application ID that comes from the actual store. So whether it's a Play Store or the Apple Store-- they come right from those stores because these are mobile apps. And then you also have the signature ID that is specific to that particular version. So once you've identified, of course, the application and the platforms they're going to run on, it's really important-- I want you to take a look at identifying what devices that these applications can run on.
So for this host, called Indigo, I've been able to identify two zones. One is a device on which is the manage zone. These are the actual devices that the company is supplying the employee. In this case, we're seeing the company is providing Window devices, Window phones as an example to the employees to use. And so you'll have a set of policies, security policies, that will pertain just to those Windows corporate-owned devices.
But really where BYOD comes in, a real value, of course, is that you can also allow employees to utilize their own personal device. And in this case, the company is saying, I'm going to allow Android and Apple devices. Which is great, because a lot of people love using their iPads, as an example. Or they like using some sort of an Android tablet, perhaps. And they can do that on any of these applications.
So in this example, I got Firefox, Chrome, our new container technology called Dell Mobile Workspace. And so, on these device, using any of these applications, that employee can get access to the Indigo corporate resource.
And, as I mentioned about the BYOD policies being jurisdictional in nature. So that if you're an enterprise and you've got offices throughout the world, Germany's consumer right policies are going to differ than France, or the US. And what's even more pertinent, is that within the United States alone, every state within the Union can have its own set of laws and regulations that's related to actual consumer rights. And so you'll need to have the ability to set up BYOD policies for each and every one of those jurisdictions, perhaps, so that when the employees take a look at those policies, they are specific to them.
So in this example, I'm just showing you the fact that you have a BYOD policy that you've entered-- and of course, this usually comes from your legal department-- and you can see here that this is the US one in the example for the finance group and the United States. And this is the policy that's going to appear for anyone within the US within the finance department that belongs to that particular community.
And now that you see how easy it is actually register the app, as well as create that BYOD policy, let's take a look at the employee experience on their tablet.
Now, as you're [INAUDIBLE], we'll go ahead and use the Dell Venue 8 tablet. It's an Android device by Dell. I'm going to go ahead and initiate the client called Mobile Connect. That's standard on all our network security products. Basically what I'm doing there is I'm going to go ahead and initiate the VPN.
I'll go ahead and login.
The first thing you're going to see of course, is the actual BYOD policy that is specific to me. So you happen to see-- of course, I showed it to you a moment ago in the management console. It's identified for US. I get to read this policy. I can decline it or accept it. I'm going to go ahead and accept it.
And then what you'll notice, of course, is the list the applications that are authorized for me to access. That any time, if I want to use, for example, Chrome for personal use, I just uncheck this box. I can go ahead and use Chrome for my own personal use. Recheck it, and I'm back to using it for business use.
So I'm now able to just go ahead and utilize applications just like I do for any kind of personal use. I'm using Chrome to access the host resource called Indigo. There it is. That's Indigo host resource. I have access. But if I try to access a host resource that I'm not authorized to access, it's not allowing me access to the work because I'm not authorized to get access to that corporate resource.
Now that you've seen the experience that the employees has using their own personal device to access corporate information, let's take a look at the IT manager's ability to audit the BYOD policy and the acceptance.
So you'll notice here, user2-- that's what I had used for the employee. You'll see, of course, that user number 2 has accepted the fifth version, so version 5 of the policy terms. Policies are going to change throughout the life of your BYOD experience. And of course, it's important to keep track of which version of that policy was accepted. And you also know the date that it was accepted on.
The other thing that's really important, you want to know exactly what resources that this user has access to. So you notice everything here with the green check means I've got access, that employee had access, to this particular service. Everything's fine. But when he tried to go ahead and get access to this service, they were denied.
So it's really important you get to see that not only am I able to separate personal and business applications, but I'm also actually able to identify what applications that employee has access to. So as a salesperson, they might have access to three applications. As a finance person, maybe I have access to 7 applications. And you want to be able to be sure that those folks who have a specific need do not get into any application that they shouldn't have access to.
I've just shown you how straightforward it is to register your mobile apps by simply identifying them in a management system, without the need of any software development kit or app wrapping with scripts. And combined with the streamlined user experience that integrated to BYOD policy acceptance workflow, prior to accessing the VPN with the ease of reporting on the employee's acceptance of that BYOD policy, provides the most efficient and secure way to implement your BYOD strategy.
To learn more about how Dell Secure Mobile Access can security the use of personal and company owned devices, just visit DellSoftware.com/SMA-Demo.
Thank you for watching.