The BYOD security Battleground



Similar documents
The X-Factor in Data-Centric Security. Webinar, Tuesday July 14 th 2015

RightsWATCH. Data-centric Security.

Best Practices for a BYOD World

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure

The Internet of Things: Trends Westcon Comstor CONNECT. November 2015

Hands on, field experiences with BYOD. BYOD Seminar

How To Manage A Mobile Device Management (Mdm) Solution

Copyright 11/19/2015 Aternity, Inc

Websense Data Security Solutions

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

CA Technologies Data Protection

10 Building Blocks for Securing File Data

WHITE PAPER Thru for Enterprise File Sync and Sharing

CA Enterprise Mobility Management MSO

White Paper. Data Security. The Top Threat Facing Enterprises Today

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

Enterprise Mobility Best Practices 2017 Analysts Predictions

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

If you can't beat them - secure them

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

WINNING THE BYOD GAME

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Microsoft Enterprise Mobility Suite

Kony Mobile Application Management (MAM)

Five Best Practices for Secure Enterprise Content Mobility

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

The Future of Enterprise Storage. Simon Robinson Research VP, Storage

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

AirWatch by VMware lays the groundwork for enterprise mobility in Latin America

#ITtrends #ITTRENDS SYMANTEC VISION

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Cyber Security. John Leek Chief Strategist

Agenda. Company Platform Customers Partners Competitive Analysis

Comprehensive Security with Splunk and Cisco

How To Protect Your Mobile Devices From Security Threats

How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

EMPOWERING THE DYNAMIC WORKPLACE

Symantec Endpoint Security Management Solutions Presentation and Demo for:

The Cloud App Visibility Blindspot

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Mobile App Management:

Oracle RightNow Cloud Service Mobile Agent Solution. Prepared for MUG, Dec Jason Davis, Sr. Principal, Product Mgmt

Cloud Security: Is It Safe To Go In Yet?

Healthcare Buyers Guide: Mobile Device Management

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

trends and audit considerations

Practical Enterprise Mobility

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Productive and Secure Enterprise Mobility with Cisco and Citrix

DOBUS And SBL Cloud Services Brochure

TRG Clients in the Cloud Today

The top five enterprise mobility management vendors: product focus and financials

Secure mobility with Citrix & Cisco

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA

Classify, Protect, Audit: New Approach to SAP Data Security. Aparna Jue, SECUDE

White Paper. Data Security. journeyapps.com

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EasiShare Whitepaper - Empowering Your Mobile Workforce

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Bruce Allison. Steve Moran

NextLabs Rights Management Platform

IT Self Service and BYOD Markku A Suistola

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

IT Resource Management vs. User Empowerment

Transcription:

The BYOD security Battleground www.watchfulsoftware.com October, 21 st 2015

Agenda - INTRODUCTIONS & HOUSE RULES - BYOD AND ITS IMPACT ON THE ENTERPRISE - SWOT ANALYSIS ON DLP, MDM, MAM - LEVERAGING RIGHTSWATCH IN A BYOD WORLD - Q&A 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2

Introductions Chris Hazelton Chris is Research Director, Enterprise Mobility at 451 Research. His research focuses on mobile management and productivity tools for business. He covers the shift in enterprise computing from desktop to mobile. Rui Melo Biscaia Rui serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market House Rules You are muted centrally. You don t need to mute/unmute yourself This webinar is being recorded. You ll have access to it On-demand at www.watchfulsoftware.com/en/resources The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3

BYOD Data protection realities 70% 57% 46% 70% of tablet owners use their personal device to access corporate data 57% of smartphone owners use their personal device to access corporate data 46% of BYOD use is unmanaged by employers or ignored, potentially exposing corporate data

The BYOD Security Battleground Chris Hazelton Research Director, Enterprise Mobility

451 Research is an information technology research & advisory company Founded in 2000 Research & Data Advisory Services Events 210+ employees, including over 100 analysts 1,000+ clients: Technology & Service providers, corporate advisory, finance, professional services, and IT decision makers 19,000+ senior IT professionals in our research community Over 52 million data points each quarter 4,500+ reports published each year covering 2,000+ innovative technology & service providers 451 Research and its sister company Uptime Institute comprise the two divisions of The 451 Group Headquartered in New York City with offices in London, Boston, San Francisco, Washington D.C., Mexico, Costa Rica, Brazil, Spain, U.A.E., Russia, Taiwan, Singapore, and Malaysia

A combination of research & data is delivered across fourteen channels aligned to the prevailing topics and technologies of digital infrastructure from the datacenter core to the mobile edge. 7

BYOD and its impact on the enterprise

EU employees: Use of mobile apps Source: 451 Research, European Employee Survey, January 2015 Base: Asked everybody

Acceptance for BYOD Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody

Concern about data on employees devices Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody

Adoption of security tools for BYOD Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody

Strengths, Weaknesses, Opportunities, and Threats analysis

SWOT for MDM Strength Meets initial pain points of the enterprise Weakness In BYOD deployments can be seen as heavy-handed Mobile Device Management Opportunity Client software footprint for app lifecycle management Threat MAM only, Exchange, and wait and see approaches

SWOT for MAM Strength Provides control point for future IT mobile pain point Weakness Requires access to binary or developer support for SDK Mobile App Management Opportunity Focus on apps not device, acceptable to users and IT Threat Will become feature of MDM

SWOT for DLP Strength Check compliance box, basis for comprehensive data security program Weakness Hard to find sensitive data or classify it, lots of false/positives. Hard on mobile and for cloud Data Loss Protection Opportunity Simple DLP solutions for SMB and mid market Threat Cloud security vendors offering DLP lite, blocking specific data

Audience Poll What are your primary concerns about supporting mobile users? 1. Potential loss of data or other intellectual property 2. Securing corporate data on individually-owned devices 3. Providing secure access to internal network for mobile employees 4. Controlling the spread of malware from mobile employees 5. De-provisioning internal users when they leave the organization

The BYOD Security Battleground Rui Melo Biscaia Director of Product Management

The perimeter is fading FORBID IS A POLICY Mobile devices have crossed the perimeter and are far beyond from system defences, opening massive holes in information security 10/21/2015 Copyright www.watchfulsoftware.com. 2012 All Rights Reserved. 19

To keep users productive while protecting information you need to Manage users: who, when Manage devices: which, where Manage information: who, where, which and when

To manage information you need RightsWATCH Tuesday June 23rd 2015 WEBINAR: "You Can t Teach an Old Dog New Tricks" 21

How to do it with RightsWATCH? 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 22

RightsWATCH support for BYOD Email Support for Read RMS protected email messages Create RMS protected email messages Reply/forward RMS protected emails (Online & Offline) Protected Files Read protected Office files (Online / Offline) Read protected PDF files (Online & Offline) Read Other RMS protected.pfiles (e.g..ptxt) Create Other RMS protected.pfile (e.g. Image) Extended w/rightswatch 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 23

RightsWATCH is built on Discovery - Policy driven discovery of sensitive data. Relieving the user from the workload and overhead of having to know, understand and apply corporate policy Classification - Implements a Multilevel Security Model to classify data. Increases awareness, educates, and supports adherence to corporate governance and policies Encryption - Data is strongly encrypted at rest, in motion and in-use Access Controls - User identities are used to restrict access Policy enforcement - Granular rights control individual actions and behaviors Logging - Usage and Access logging enabling to perform comprehensive audit trails for information Tracking and forensic analysis

Q&A Check out the Resources area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases E-mail info@watchfulsoftware.com to request a demo of RightsWATCH This webinar is being recorded. You ll have access to it On-demand at www.watchfulsoftware.com 10/21/2015 Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 25

The BYOD security Battleground www.watchfulsoftware.com October, 21 st 2015