Top Banner
webinar july 12 2016 data-centric protection: the future of BYOD security
20

Data-Centric Protection: The Future of BYOD Security

Apr 12, 2017

Download

Technology

Bitglass
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data-Centric Protection: The Future of BYOD Security

webinarjuly 12

2016

data-centric protection:

the future of BYOD

security

Page 2: Data-Centric Protection: The Future of BYOD Security

cloud and mobile are inseparable...

saas

driving corporate data outside the firewall.

Page 3: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

legacy data security

secure the infrastructu

re

Page 4: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

security must evolve to

protect data outside the

firewall

ungoverned access to

corporate data in the cloud

sensitive data on

unmanaged devices

Page 5: Data-Centric Protection: The Future of BYOD Security

how well has byod adoption

gone in your org?

Page 6: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

■ Impedes user privacy

■ Complex solution deployment and management

■ Lack of data visibility or protection

manage the device

the evolution of mobile securitydata-centric protection is the future

mdm

Page 7: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

■ Impedes user privacy

■ Complex solution deployment and management

■ Lack of data visibility or protection

■ User privacy issues■ Prevents use of

native apps (mail/calendar)

■ 3rd party / cloud apps non-functional

■ Challenging deployments

manage the device

wrap the app

the evolution of mobile securitydata-centric protection is the future

mdm mam

Page 8: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

■ Impedes user privacy

■ Complex solution deployment and management

■ Lack of data visibility or protection

■ User privacy issues■ Prevents use of

native apps (mail/calendar)

■ 3rd party / cloud apps non-functional

■ Challenging deployments

manage the device

wrap the app

secure the data

the evolution of mobile securitydata-centric protection is the future

■ Protection of user privacy and experience

■ Any device, any app

■ Full data control and visibility for IT

■ Deploys in minutes, no software

mdm mam casb

Page 9: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

employees are rejecting MDM and MAM

■ Employees are resisting IT “big brother”

■ 38% of IT professionals don’t participate in their own BYOD programs

■ 57% of employees refuse MDM/MAM for BYOD Bitglass BYOD Security Survey

2015

Page 10: Data-Centric Protection: The Future of BYOD Security

“By 2018, more than half of all bring your own device (BYOD) users that

currently have an MDM agent will be managed by an agentless solution”

Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.

Page 11: Data-Centric Protection: The Future of BYOD Security

what are your biggest mobile

security concerns?

Page 12: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

a betterapproach:

secure the data

Page 13: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

agentless BYOD access via activesync

■ Secure mobile devices without invasive profiles or certificates

■ Protect data in “unwrappable” native apps like mail, contacts, calendar

■ Selectively wipe corporate data■ Enforce device security policies■ Full data control and visibility for IT

Page 14: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

agentless BYOD access via reverse proxy

■ Secure access from any unmanaged device without agents

■ Users are automatically routed through the proxy via SSO

■ Full data control and visibility for IT■ Control data access with context and

content-aware DLP

Page 15: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

data leakage preventiona complete set of data controls

■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking

■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more

■ Easily modify sharing permissions and quarantine files for review

Page 16: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

client:

■ 8000 employees

■ s&p 500

challenge: ■ Lack of adherence to BYOD security

measures■ Failed MobileIron and SAP Afaria

deploymentssolution:

■ Bitglass Agentless – device / OS independent

■ Fast deployment■ Logging for compliance with

internal data security policies■ Seamless integration with

ActiveDirectory

fortune 500

beverage co.

byod security

Page 17: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

HIPAA compliant

mobility

challenge:

■ Existing solution, AT&T Toggle, was obsolete

■ HIPAA-compliant BYOD■ Migration path to Office 365

solution: ■ Agentless deployment ■ Usability, transparency & privacy■ DLP of PII, PCI & PHI

■ Selective wipe; device PIN & encryption

■ Improved mobility for care providers

majorUS hospital system

Page 18: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

our mission

total data

protection est. jan

2013

100+ custome

rs

tier 1 VCs

Page 20: Data-Centric Protection: The Future of BYOD Security

STORYBOARDS

bitglass.com@bitglass