CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Similar documents
Cloud Backup and Recovery for Endpoint Devices

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business.

How VDI Reduces the Risks of BYOD

How To Get Rid Of Byo

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

SANS Mobility/BYOD Security Survey


Organizing Electronic Documents and Records in Cloud-Based Systems (5-4) K.J. McCorry

Acronis BRING YOUR OWN DEVICE

User-Based Licensing for Endpoint Protection and BYOD

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

4 Steps to Better Security In The BYOD Era For Your Company.

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Backing up your digital image collection provides it with essential protection.

10 Threats to Successful. Enterprise Endpoint Backup

AIMING HIGHER: CREATE A MOBILE- FIRST BUSINESS STRATEGY

Five Best Practices for Secure Enterprise Content Mobility

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

FOR THE FUTURE OF DATA CENTERS?

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION

With the adoption of the technology of Cloud Computing (Cloud. Computing), virtual desktop solutions represent one of the most

Research Note BYOD: Organizational Impacts of Mobile Computing and Convergence

The flexible workplace: Unlocking value in the bring your own device era

Cisco mconcierge. BYOD Insights 2013: A Cisco Partner Network Study. March 2013

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

SANS Mobility/BYOD Security Survey

Is the Cloud Right for Your Business? 5 Reasons to Conquer the Cloud

Top 7. Best Practices for Business Continuity

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Are all of your employees applying all security updates to all of their devices?

Cloud Failover Appliance

Desktop Solutions SolutioWhitepaper

Bluebox: Ushering in a New Era in Mobile Data Security

File Sync And Share And The Future Of Work

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

7 Risks of Dropbox to Your Corporate Data

Why Endpoint Backup Is More Critical Than Ever

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

EasiShare Whitepaper - Empowering Your Mobile Workforce

THE BYOD SURVIVAL GUIDE 5TIPS FOR PRACTICING SAFE MOBILE FILE ACCESS AND COLLABORATION

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

When Computers really become Personal

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:

How to Turn the Promise of the Cloud into an Operational Reality

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Enterprise Cloud-to-Cloud Backup and Recovery:

How To Use Video Conferencing In Your Organization

The Truth About Enterprise Mobile Security Products

THE CLOUD DATA BRIEF. Big Data Transitions to the Cloud

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Building a Comprehensive Mobile Security Strategy

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011

Consumerization Survey Report The Consumerization of IT

Enterprise Mobility How the mobile world drives business

Your Company Data, Their Personal Device What Could Go Wrong?

How To Secure Your Mobile Devices

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

HARNESSING THE POWER OF THE CLOUD

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

archives: no longer fit for purpose?

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

The Bring Your Own Device Era:

The Small Business Cloud Outlook. An inside look at how small and mid-size businesses are turning to the cloud to solve everyday issues

Device Independence - BYOD -

CLOUD COMPUTING: WHAT YOU SHOULD KNOW

Moving your business to the Cloud Fact or Fiction?

An Agile and Scalable Mobile Workplace

EMBRACING SECURE BYOD

4 Steps to Effective Mobile Application Security

WHITEPAPER. The Death of the Traditional ECM System. SharePoint and Office365 with Gimmal can Enable the Modern Productivity Platform

BYOD & MOBILE SECURITY

Security and Compliance challenges in Mobile environment

The Smart Disaster Recovery Strategy for Your Workforce: Cloud-Hosted Desktops WHITE PAPER

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.

Cisco Mobile Collaboration Management Service

6 Things To Think About Before Implementing BYOD

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Five Best Practices for Secure Enterprise Content Mobility. Whitepaper Five Best Practices for Secure Enterprise Content Mobility

Top 5 Reasons to Deploy Desktops as a Service WHITE PAPER

BUILD A BUSINESS CASE

Endpoint protection for physical and virtual desktops

Why Cloud Computing Needs a Cloud-Intelligent Network

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

WhitePaper. Private Cloud Computing Essentials

Comparing Dropbox and Egnyte. White Paper

EMBRACING THE AGE OF MOBILITY

Cloud Failover Appliance

A Guide to MAM and Planning for BYOD Security in the Enterprise

Securing the Mobile Enterprise. How mobile devices, BYOD and other trends are driving a need for a new approach to mobile security

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

How To Protect Your Data From Harm

Debunking the Top 10 CloudHosted Virtual Desktop Myths

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

Transcription:

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades, computing has become increasingly mobile. As notebooks became both more powerful and more affordable, organizations increasingly outfitted their workforces with portable computers. Not only was the technology advancing rapidly, but mobility-based work processes also demanded the ability to work anywhere, at any time. But as first-generation mobile computing gave way to the bring-your-own-device (BYOD) phenomenon, new challenges emerged. Those challenges are highlighted in a research survey conducted with the TechTarget network of IT professionals in January 2015: While the survey results certainly support the growing trend toward mobility in general and BYOD in particular, it also highlights some potentially troubling byproducts of that movement. These include: While most companies have some form of policy in place in support of employees using personal mobile devices, those policies can vary widely from organization to organization. As a result, only a slim majority of organizations have a formal strategy for mobility solutions, even though most respondents say mobility is one of their key IT initiatives for 2015.

Even as consumer devices such as tablets and smartphones increasingly are used for business applications, IT professionals feel twice as vulnerable to endpoint security threats with those devices than they do with traditional endpoints such as desktops and notebooks. However, the research points out that respondents also feel a significant level of vulnerability in protecting their traditional PC endpoints. Data loss prevention is the feature survey respondents said was the most difficult to fully achieve, but they also noted that endpoint security is their single biggest concern for the coming year. The bottom line: Endpoint vulnerability is real and is increasing, particularly with the influx of users own tablets and smartphones. This is an important reality that is likely to become even more important in the coming years. By 2017, most employers will stop issuing corporate mobile devices to employees and instead will require their workers to supply their own mobile devices, according to Gartner Inc. 1 Combine this trend with additional data indicating that more than 80% of mobile devices face data loss vulnerabilities 2, and it s hard to overestimate the magnitude of the problem created by consumer-class mobile devices. Enterprise Mobility Strategy and BYOD Policies According to the TechTarget survey, slightly more than half of respondents organizations have a formal, enterprisewide strategy for mobility solutions. One third of the respondents said their organizations lacked a formal strategy. Organizations that lack a formal, updated and business process-aware strategy for mobility need to act fast, according to Forrester Research s Chris Sherman, who pointed out that many IT departments have revisited old strategies that no longer work for today s mobile users. 3 Does your organization have an enterprise-wide strategy for mobility solutions? Yes No 33% 9% 58% Unsure 1 Gartner Predicts by 2017, Half of Employers Will Require Employees to Supply Their Own Device for Work Purposes, Gartner Inc., May 2013 2 Press Release: More than 80% of Smartphones Remain Unprotected from Malware and Attacks, Juniper Research Finds, Aug. 10, 2013 3 Market Overview: Enterprise Endpoint Backup and Recovery Solutions, Forrester Research, July 2014 2

Of course, mobility is widely acknowledged as an increasingly important IT initiative. Sixty-six percent of survey respondents said mobility was either one of their most strategic initiatives or an important initiative for 2015, and only 22% said they had no strategic plans for mobility in the coming year. Undoubtedly, having some kind of policy for BYOD needs to be part of any enterprise-wide mobility strategy, but survey responses point to a number of different scenarios for how or if employee-owned devices are used for work tasks. For instance, while 78% of respondents said their organizations have some kind of policy on use of personal mobile devices, there is no consensus on what that policy may look like. For instance, respondents were about as likely to say their company had an informal, user-driven BYOD policy than they were to indicate that they had a more formal, ITdriven approach. Which best describes your organization s attitude toward BYOD? Formal policy endorsed and supported by IT Informal policy that is user-driven 22% 14% 30% 34% Require selection from pre-selected list of devices Don t allow use of personal devices Endpoint Vulnerabilities and Challenges The survey results point out that IT professionals acknowledge significant vulnerabilities in protecting their current endpoints and that they feel those vulnerabilities are significantly more pronounced for consumer-class devices such as tablets and smartphones than they are for traditional endpoints such as desktops and notebooks. However, it s important to note that nearly a third of the respondents acknowledge feeling either very vulnerable or vulnerable to potential security threats on their traditional PC endpoints (desktops and notebooks). This highlights the importance of having comprehensive mobility strategies that account for all types of endpoint devices desktops, notebooks, tablets, smartphones and other connected mobile devices. 3

How vulnerable does your organization believe your endpoint devices are to potential security threats? Desktops/Notebooks Tablets/Smartphones Very vulnerable 11% 25% Vulnerable 20% 20% Somewhat vulnerable 35% 33% Not very vulnerable 32% 16% Not vulnerable at all 2% 5% Not applicable 1% (non-pc endpoints are not part of our endpoint infrastructure) Respondents were more than twice as likely (25%, compared with 11%) to consider their workers tablets and smartphones to be very vulnerable to endpoint security risks than their desktops and notebooks. A related issue to keep in mind is the fact that survey respondents said their IT departments, for the most part, are not responsible for data backup and recovery from non-pc endpoints. Is IT responsible for backing up and recovering data on non-pc endpoints? Yes No 27% 9% 64% Unsure This finding reveals another vulnerability with organizations endpoint security when they have embraced BYOD: If IT isn t part of regular data backup processes for consumer devices, that puts an enormous burden on the organization to educate its users about proper backup procedures they should be taking on their own. Of course, chances are that while many technically savvy users are well aware of the need to do frequent backups, a great deal of users live with a false sense of security that their data is adequately protected through public cloud services. 4

For instance, consider the popularity of cloud-based sync-and-share storage services. IT organizations may be aware that many of their users are employing these cloud-based services for storing not only personal data, but business information as well. But that awareness by the IT department isn t always equivalent to taking responsibility for endpoint security and backup. After all, doing so requires that IT organizations understand and be willing to work with the intricacies of different cloud storage services, from Google Drive and Apple icloud to Amazon Web Services AWS Storage and Dropbox. Which of the following sync-and-share storage services does your IT organization allow/support for work applications? Google Drive 35% Dropbox 32% icloud 22% OneDrive 22% Box 17% AWS Storage 16% SugarSync 4% Other 36% 0% 10% 20% 30% 40% While consumer devices present their own unique challenges, the survey results also highlight the need for IT organizations to confront a variety of potential problem areas with their traditional PC-based endpoints. For instance, data loss prevention heads the list of capabilities that IT respondents believe still is difficult to achieve for PC endpoints, followed by backup and recovery, endpoint security and compliance/e-discovery. 5

Which features/capabilities are difficult to achieve for PC endpoints? Data loss prevention 49% Backup/recovery Endpoint security 45% 45% Compliance/e-discovery 39% Endpoint device management 35% Endpoint administration 32% Anywhere/anytime access to enterprise apps 27% Endpoint use analytics Endpoint service 20% 19% 0% 10% 20% 30% 40% 50% Conclusion In an environment increasingly marked by pervasive, anytime/anywhere mobility, IT organizations are under significant challenge to protect their endpoints against a wide range of threats. The accelerating momentum of BYOD and other technologies characterized as the consumerization of IT, however, is dramatically raising the stakes for organizations that want to provide users with flexible yet secure options for endpoint device usage. Data from research firm IDC notes that recovery-point objectives and recovery-time objectives are becoming increasingly stringent in all-sized organizations, and that edge protection must be a central element in helping to avoid downtime and the considerable financial, operational and reputational costs associated with it. 4 The challenges identified in the TechTarget survey results quoted throughout this paper require IT and security professionals to take a long, hard look at not only endpoint data protection, but also how to address endpoint-related issues as part of an overall enterprise mobility framework. Organizations should seek out, investigate, pilot and deploy endpoint data protection solutions that recognize the vastly different issues for protecting non-pc endpoints than those often seen with desktops and notebooks. However, it remains essential that IT and security professionals come up with comprehensive endpoint data protection strategies and look for relevant solutions that can address all forms of endpoint devices when defining what data can be accessed, from which device. 4 The Critical Need for Edge Data Protection, IDC, October 2014 TechTarget 2015 6