webinar july 12 2016 data-centric protection: the future of BYOD security
webinarjuly 12
2016
data-centric protection:
the future of BYOD
security
cloud and mobile are inseparable...
saas
driving corporate data outside the firewall.
STORYBOARDS
legacy data security
secure the infrastructu
re
STORYBOARDS
security must evolve to
protect data outside the
firewall
ungoverned access to
corporate data in the cloud
sensitive data on
unmanaged devices
how well has byod adoption
gone in your org?
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
manage the device
the evolution of mobile securitydata-centric protection is the future
mdm
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
■ User privacy issues■ Prevents use of
native apps (mail/calendar)
■ 3rd party / cloud apps non-functional
■ Challenging deployments
manage the device
wrap the app
the evolution of mobile securitydata-centric protection is the future
mdm mam
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
■ User privacy issues■ Prevents use of
native apps (mail/calendar)
■ 3rd party / cloud apps non-functional
■ Challenging deployments
manage the device
wrap the app
secure the data
the evolution of mobile securitydata-centric protection is the future
■ Protection of user privacy and experience
■ Any device, any app
■ Full data control and visibility for IT
■ Deploys in minutes, no software
mdm mam casb
STORYBOARDS
employees are rejecting MDM and MAM
■ Employees are resisting IT “big brother”
■ 38% of IT professionals don’t participate in their own BYOD programs
■ 57% of employees refuse MDM/MAM for BYOD Bitglass BYOD Security Survey
2015
“By 2018, more than half of all bring your own device (BYOD) users that
currently have an MDM agent will be managed by an agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
what are your biggest mobile
security concerns?
STORYBOARDS
a betterapproach:
secure the data
STORYBOARDS
agentless BYOD access via activesync
■ Secure mobile devices without invasive profiles or certificates
■ Protect data in “unwrappable” native apps like mail, contacts, calendar
■ Selectively wipe corporate data■ Enforce device security policies■ Full data control and visibility for IT
STORYBOARDS
agentless BYOD access via reverse proxy
■ Secure access from any unmanaged device without agents
■ Users are automatically routed through the proxy via SSO
■ Full data control and visibility for IT■ Control data access with context and
content-aware DLP
STORYBOARDS
data leakage preventiona complete set of data controls
■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking
■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more
■ Easily modify sharing permissions and quarantine files for review
STORYBOARDS
client:
■ 8000 employees
■ s&p 500
challenge: ■ Lack of adherence to BYOD security
measures■ Failed MobileIron and SAP Afaria
deploymentssolution:
■ Bitglass Agentless – device / OS independent
■ Fast deployment■ Logging for compliance with
internal data security policies■ Seamless integration with
ActiveDirectory
fortune 500
beverage co.
byod security
STORYBOARDS
HIPAA compliant
mobility
challenge:
■ Existing solution, AT&T Toggle, was obsolete
■ HIPAA-compliant BYOD■ Migration path to Office 365
solution: ■ Agentless deployment ■ Usability, transparency & privacy■ DLP of PII, PCI & PHI
■ Selective wipe; device PIN & encryption
■ Improved mobility for care providers
majorUS hospital system
STORYBOARDS
our mission
total data
protection est. jan
2013
100+ custome
rs
tier 1 VCs
resources:more info about byod
■ Report: BYOD Trends in Forward-Looking Industries
■ Report: MDMayhem - How MDM Software Exposes Personal Data
■ Case Study: Global Arms Giant Secures BYOD
STORYBOARDS
bitglass.com@bitglass