Top Banner
www.evault.com www.evault.com Six Secrets of Surviving and Thriving with a Mobile Workforce Inka Traktman, World Wide Product Marketing Manager EVault Endpoint Solutions 2/18/2013 1 www.evault.com www.evault.com Mobile Device Paralysis 2 EVault/Poneman Institute $5.5 M 27% BYOD Leadership
18

Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

Jul 19, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Six Secrets of Surviving and Thriving with a Mobile

Workforce

Inka Traktman, World Wide Product Marketing Manager

EVault Endpoint Solutions

2/18/2013 1

www.evault.com www.evault.com

Mobile Device Paralysis

2

EVault/Poneman Institute

$5.5 M27%

BYOD Leadership

Page 2: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Mobility = Productivity = Competitive

Advantage

2/18/2013 3

Endpoints = Desktops, Laptops, Laplets, Tablets, Smart phones

www.evault.com www.evault.com

It’s critical for IT to take control of mobile endpoint data and include personal/mobile devices in the corporate policy management portfolio

2/18/2013 4

Page 3: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Survive and thrive with a mobile workforce:

Mitigate Organizational Risk

2/18/2013 5

www.evault.com www.evault.com

Surviving and Thriving with a Mobile Workforce

2/18/2013 6

1. BYOD Policy Development2. Data Protection Strategies3. Endpoint Lockdown4. Cloud & Mobility5. Central Administration6. Mobile Device and

Application Management

Mobility =

IT le

aders

hip

Page 4: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

800,000 records compromised

2/18/2013 7

10,000 records compromised

35,000 patient records compromised

< 30% laptops are encrypted

> 90% have no anti-theft measures

No ability to centrally manage data on endpoints

No central control of retention and

security policies

www.evault.com www.evault.com

Source: ESET/Harris Interactive

Mobile devices at work 81%

Page 5: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Enterprises should focus on mobile data protection, network access control, and mobile device management tools to support their BYOD in endpoint enterprise mobile platform efforts.

www.evault.com www.evault.com2/18/2013 10

1. Analytics and Business Intelligence

2. Mobile Technologies

3. Cloud Computing (SaaS, IaaS, PaaS)

4. Collaboration Technologies

5. Legacy Modernization

6. IT Management

7. CRM

8. ERP Applications

9. Security

10. Virtualization

Gartner: Top 10 Technology Priorities

Page 6: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Endpoint data loss prevention

Anti-malware Anti-spyware

Personal firewallsHost-based intrusion

prevention

Port and device control

Full-disk and file encryptionEndpoint data loss

prevention

Application vulnerability management and application control

Port and device control

File encryption

Mobility:

• Device Management• Mobile Application

Management• BYOD, BTRD • Remote data control• Increased focus on

retention of data

Traditional Endpoint Solutions

2/18/2013 | © 2013 EVault, Inc. All Rights Reserved | 11

www.evault.com www.evault.com

Gartner Critical Capabilities for Enterprise Endpoints

1. Design a comprehensive corporate plan for endpoint protection, including backup.

2. Choose endpoint backup products based on employees' risk profiles.

3. Choose a product with more built-in security features, more data capture and better self-service capabilities.

4. Enterprises should focus on mobile data protection, network access control, and mobile device management tools to support their BYOD in endpoint enterprise mobile platform efforts.

Mobile Workforce

October 2012

2/18/2013 | © 2013 EVault, Inc. All Rights Reserved | 12

Page 7: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

BYOD Policy Development

2/18/2013 13

Define Roles & Rules

Address Support Expectations

Identify Security Levels

Create Policy Team

Best practice 1

Take Inventory

www.evault.com www.evault.com2/18/2013 14

Legal Protections and Training

Don’t go Solo

Policy Development

Ongoing Educational Training

Page 8: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Avoid Tactical IT Set-Backs

2/18/2013 15

40%Support for employees in the field

40%Support for travelling employees

31%Mobile connection with customers

35%Support for employees working from home

29%Building customized mobile apps

Mobile commerce

25%

21%

21%

18%

11%

14%

Moderate focus Heavy focus

Source: CompTIA’s Trends in Enterprise Mobility study

Move towards BTRD

www.evault.com www.evault.com2/18/2013 16

� Policy Devices & Support

� Rights & Obligations

� Central Deployment, Management

� Self-service Solution without Impacting Performance

� Scalability

� Security

Stay in Charge

Page 9: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Data Protection

2/18/2013 17

1. Maintaining corporate data policies

• Employees leave

• Employees loose

2. Remote workforce data retention

3. Central, fast deployment

4. Centralized oversight

5. Providing 24/7 access

6. Meeting critical RTO for IT/users

Remote workforce data retention, central control and increased productivity

Best practice 2

www.evault.com www.evault.com

Technologies to Aid in Data Management

2/18/2013 18

Data compression

Block-level incremental backups and global de-duplication

Replication of data to dual data centers

Local device and local server caching

Page 10: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Locking Down your Endpoints

2/18/2013 19

Has BYOD affected the measures you take for network security?

Yes very

Yes somewhat

Not at all

Best practice 3

Source: Airtight Survey 2012

Mitigate risk

www.evault.com www.evault.com

Data Leakage Points

2/18/2013 20

Removable Devices

(USB)

Unauthorized Sharing

(email)

Multiple Unauthorized

Devices

(home)

Unauthorized Applications

(dropbox)

Disgruntled Employees

Theft, Loss, Breakage Device

Retirement

Page 11: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Forrester Data Security Priorities

2/18/2013 21

Source: Forrester Security Survey

1. Encryption

2. Central Endpoint

Data Control

3. Device Kill

www.evault.com www.evault.com2/18/2013 22

Physical

Network

Ports

File Type

Devices

Access Control

Page 12: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

• On /Off

• Decrypts opening

• At rest and in-flight

• Different types of technologies

• Generate random keys

• Destroy key on stolen/lost laptop

• Secure key management

• No decryption or risk

• Flexibility in hosting

• Client and server side

• Different OS considerations

• Device support

Encryption

2/18/2013 23

File and folder-basedEncryption and global

data deduplicationIntegrated encryption

Encrypting during backup and recovery

www.evault.com www.evault.com2/18/2013 24

Page 13: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Device Wipe

2/18/2013 25

68%

of managers keep

valuable data on

endpoint devices

“A mobile device was inadvertently misplaced and then taken and used by unauthorized individuals who accessed patient medical and financial records. It even provided access to the hospital network itself, healthcare electronic databases, and the caregiver's contact lists… just to name a few key sources of very private data.” - Hospital Administrator

www.evault.com www.evault.com

Automated Backup to the Cloud

2/18/2013 26

Best practice 4

Can cloud connectivity solve your data challenges?

• Cloud provides accessibility• Rapid deployment • Reduce total cost of ownership (TCO)• Budgeting• Capacity and timely scalability• Ubiquitous access• Flexible service levels and budgets • OS/device diversity • Automated policy deployments• Robust redundancies

• Strategic, not tactical leadership

Page 14: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com2/18/2013 27

Define your cloud readiness

Cloud Readiness Assessment

www.evault.com www.evault.com

IT Administrator Visibility and Control

2/18/201328

“Companies are beginning to invest in

technologies that will enable them to more

centrally manage PC backup and recovery.

This shift indicates that IT is beginning to

recognize how mobile devices are changing the

requirements for endpoint backup and

recovery.”

Best practice 5

Page 15: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

IT Administrator Visibility and Control

2/18/201329

• Data

• Security

• Reporting and Audit

• Multi-layered, Granular Policies

• Various OS

• Integration

• Self Service Enablement

• Notifications, Alerts

• Support SLA’s

• Scalability

Centralized Administration

Best practice

Cost Effective Solution

www.evault.com www.evault.com2/18/2013 30

Vendor StabilityVendor Stability

Service Level Service Level

Geo Availability Geo Availability

Language SupportLanguage Support

Matching organizational need and vendor capabilities is vital to ensure long term success.

IT Administrator Visibility and Control

Page 16: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Understanding MDM, MAM

2/18/2013 31

Best practice 6

New Applications for Mobile Devices =

Productivity

Industry LeadersUnderstand the New Mobility Environment

• Security• Protection • Access• Partitioning

59%

of companies believe

lost or stolen smart

phones contain sensitive

business information

www.evault.com www.evault.com2/18/2013 32

New IT Mindset

Access Sharing 24/7Policy Management P l a t f o r m OS Support

Collaboration Globalization

Audit Trails Reporting Application

Management Secure Data Transmiss ion

Location Tracking

Data Deletion Data Separation

Application Differentiated User Led

Cross Functional Consumer Speed

Page 17: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Summary

2/18/2013 33

Data Protection & Retention Security

Central Management & Deployment Access & Sharing

Policy & Internal Alignment

Devices, Application

www.evault.com www.evault.com

It’s critical for IT to take control of mobile endpoint

data and include personal and mobile devices in their policy management portfolio

2/18/2013 34

Page 18: Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart

www.evault.com www.evault.com

Survive and thrive with a mobile workforce:

Mitigate Organizational Risk

2/18/2013 35

Contact us for BYOD Policy Creation Checklist and Requirements Document to develop your strategic corporate plan to stay in charge.

www.evault.com www.evault.com

EVault HQ | 201 3rd Street | Suite 400 | San Francisco, CA 94103 |

877.901.DATA (3282) |

Contact:Contact:[email protected]: 415-432-2232 C: 415-328-2866www.evault.com

Cloud-Connected backup and recovery services since 1997

Market leader with 38,000+ customers worldwide and 15,000 recoveries a month

A Seagate Company