The BYOD security Battleground www.watchfulsoftware.com October, 21 st 2015
Agenda - INTRODUCTIONS & HOUSE RULES - BYOD AND ITS IMPACT ON THE ENTERPRISE - SWOT ANALYSIS ON DLP, MDM, MAM - LEVERAGING RIGHTSWATCH IN A BYOD WORLD - Q&A 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2
Introductions Chris Hazelton Chris is Research Director, Enterprise Mobility at 451 Research. His research focuses on mobile management and productivity tools for business. He covers the shift in enterprise computing from desktop to mobile. Rui Melo Biscaia Rui serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market House Rules You are muted centrally. You don t need to mute/unmute yourself This webinar is being recorded. You ll have access to it On-demand at www.watchfulsoftware.com/en/resources The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
BYOD Data protection realities 70% 57% 46% 70% of tablet owners use their personal device to access corporate data 57% of smartphone owners use their personal device to access corporate data 46% of BYOD use is unmanaged by employers or ignored, potentially exposing corporate data
The BYOD Security Battleground Chris Hazelton Research Director, Enterprise Mobility
451 Research is an information technology research & advisory company Founded in 2000 Research & Data Advisory Services Events 210+ employees, including over 100 analysts 1,000+ clients: Technology & Service providers, corporate advisory, finance, professional services, and IT decision makers 19,000+ senior IT professionals in our research community Over 52 million data points each quarter 4,500+ reports published each year covering 2,000+ innovative technology & service providers 451 Research and its sister company Uptime Institute comprise the two divisions of The 451 Group Headquartered in New York City with offices in London, Boston, San Francisco, Washington D.C., Mexico, Costa Rica, Brazil, Spain, U.A.E., Russia, Taiwan, Singapore, and Malaysia
A combination of research & data is delivered across fourteen channels aligned to the prevailing topics and technologies of digital infrastructure from the datacenter core to the mobile edge. 7
BYOD and its impact on the enterprise
EU employees: Use of mobile apps Source: 451 Research, European Employee Survey, January 2015 Base: Asked everybody
Acceptance for BYOD Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody
Concern about data on employees devices Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody
Adoption of security tools for BYOD Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody
Strengths, Weaknesses, Opportunities, and Threats analysis
SWOT for MDM Strength Meets initial pain points of the enterprise Weakness In BYOD deployments can be seen as heavy-handed Mobile Device Management Opportunity Client software footprint for app lifecycle management Threat MAM only, Exchange, and wait and see approaches
SWOT for MAM Strength Provides control point for future IT mobile pain point Weakness Requires access to binary or developer support for SDK Mobile App Management Opportunity Focus on apps not device, acceptable to users and IT Threat Will become feature of MDM
SWOT for DLP Strength Check compliance box, basis for comprehensive data security program Weakness Hard to find sensitive data or classify it, lots of false/positives. Hard on mobile and for cloud Data Loss Protection Opportunity Simple DLP solutions for SMB and mid market Threat Cloud security vendors offering DLP lite, blocking specific data
Audience Poll What are your primary concerns about supporting mobile users? 1. Potential loss of data or other intellectual property 2. Securing corporate data on individually-owned devices 3. Providing secure access to internal network for mobile employees 4. Controlling the spread of malware from mobile employees 5. De-provisioning internal users when they leave the organization
The BYOD Security Battleground Rui Melo Biscaia Director of Product Management
The perimeter is fading FORBID IS A POLICY Mobile devices have crossed the perimeter and are far beyond from system defences, opening massive holes in information security 10/21/2015 Copyright www.watchfulsoftware.com. 2012 All Rights Reserved. 19
To keep users productive while protecting information you need to Manage users: who, when Manage devices: which, where Manage information: who, where, which and when
To manage information you need RightsWATCH Tuesday June 23rd 2015 WEBINAR: "You Can t Teach an Old Dog New Tricks" 21
How to do it with RightsWATCH? 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 22
RightsWATCH support for BYOD Email Support for Read RMS protected email messages Create RMS protected email messages Reply/forward RMS protected emails (Online & Offline) Protected Files Read protected Office files (Online / Offline) Read protected PDF files (Online & Offline) Read Other RMS protected.pfiles (e.g..ptxt) Create Other RMS protected.pfile (e.g. Image) Extended w/rightswatch 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 23
RightsWATCH is built on Discovery - Policy driven discovery of sensitive data. Relieving the user from the workload and overhead of having to know, understand and apply corporate policy Classification - Implements a Multilevel Security Model to classify data. Increases awareness, educates, and supports adherence to corporate governance and policies Encryption - Data is strongly encrypted at rest, in motion and in-use Access Controls - User identities are used to restrict access Policy enforcement - Granular rights control individual actions and behaviors Logging - Usage and Access logging enabling to perform comprehensive audit trails for information Tracking and forensic analysis
Q&A Check out the Resources area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases E-mail info@watchfulsoftware.com to request a demo of RightsWATCH This webinar is being recorded. You ll have access to it On-demand at www.watchfulsoftware.com 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 25
The BYOD security Battleground www.watchfulsoftware.com October, 21 st 2015