www.evault.com www.evault.com Six Secrets of Surviving and Thriving with a Mobile Workforce Inka Traktman, World Wide Product Marketing Manager EVault Endpoint Solutions 2/18/2013 1 www.evault.com www.evault.com Mobile Device Paralysis 2 EVault/Poneman Institute $5.5 M 27% BYOD Leadership
18
Embed
Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity = Competitive Advantage 2/18/2013 3 Endpoints = Desktops, Laptops, Laplets, Tablets, Smart
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
www.evault.com www.evault.com
Six Secrets of Surviving and Thriving with a Mobile
Workforce
Inka Traktman, World Wide Product Marketing Manager
It’s critical for IT to take control of mobile endpoint data and include personal/mobile devices in the corporate policy management portfolio
2/18/2013 4
www.evault.com www.evault.com
Survive and thrive with a mobile workforce:
Mitigate Organizational Risk
2/18/2013 5
www.evault.com www.evault.com
Surviving and Thriving with a Mobile Workforce
2/18/2013 6
1. BYOD Policy Development2. Data Protection Strategies3. Endpoint Lockdown4. Cloud & Mobility5. Central Administration6. Mobile Device and
Application Management
Mobility =
IT le
aders
hip
www.evault.com www.evault.com
800,000 records compromised
2/18/2013 7
10,000 records compromised
35,000 patient records compromised
< 30% laptops are encrypted
> 90% have no anti-theft measures
No ability to centrally manage data on endpoints
No central control of retention and
security policies
www.evault.com www.evault.com
Source: ESET/Harris Interactive
Mobile devices at work 81%
www.evault.com www.evault.com
Enterprises should focus on mobile data protection, network access control, and mobile device management tools to support their BYOD in endpoint enterprise mobile platform efforts.
www.evault.com www.evault.com2/18/2013 10
1. Analytics and Business Intelligence
2. Mobile Technologies
3. Cloud Computing (SaaS, IaaS, PaaS)
4. Collaboration Technologies
5. Legacy Modernization
6. IT Management
7. CRM
8. ERP Applications
9. Security
10. Virtualization
Gartner: Top 10 Technology Priorities
www.evault.com www.evault.com
Endpoint data loss prevention
Anti-malware Anti-spyware
Personal firewallsHost-based intrusion
prevention
Port and device control
Full-disk and file encryptionEndpoint data loss
prevention
Application vulnerability management and application control
Port and device control
File encryption
Mobility:
• Device Management• Mobile Application
Management• BYOD, BTRD • Remote data control• Increased focus on
Gartner Critical Capabilities for Enterprise Endpoints
1. Design a comprehensive corporate plan for endpoint protection, including backup.
2. Choose endpoint backup products based on employees' risk profiles.
3. Choose a product with more built-in security features, more data capture and better self-service capabilities.
4. Enterprises should focus on mobile data protection, network access control, and mobile device management tools to support their BYOD in endpoint enterprise mobile platform efforts.
Source: CompTIA’s Trends in Enterprise Mobility study
Move towards BTRD
www.evault.com www.evault.com2/18/2013 16
� Policy Devices & Support
� Rights & Obligations
� Central Deployment, Management
� Self-service Solution without Impacting Performance
� Scalability
� Security
Stay in Charge
www.evault.com www.evault.com
Data Protection
2/18/2013 17
1. Maintaining corporate data policies
• Employees leave
• Employees loose
2. Remote workforce data retention
3. Central, fast deployment
4. Centralized oversight
5. Providing 24/7 access
6. Meeting critical RTO for IT/users
Remote workforce data retention, central control and increased productivity
Best practice 2
www.evault.com www.evault.com
Technologies to Aid in Data Management
2/18/2013 18
Data compression
Block-level incremental backups and global de-duplication
Replication of data to dual data centers
Local device and local server caching
www.evault.com www.evault.com
Locking Down your Endpoints
2/18/2013 19
Has BYOD affected the measures you take for network security?
Yes very
Yes somewhat
Not at all
Best practice 3
Source: Airtight Survey 2012
Mitigate risk
www.evault.com www.evault.com
Data Leakage Points
2/18/2013 20
Removable Devices
(USB)
Unauthorized Sharing
(email)
Multiple Unauthorized
Devices
(home)
Unauthorized Applications
(dropbox)
Disgruntled Employees
Theft, Loss, Breakage Device
Retirement
www.evault.com www.evault.com
Forrester Data Security Priorities
2/18/2013 21
Source: Forrester Security Survey
1. Encryption
2. Central Endpoint
Data Control
3. Device Kill
www.evault.com www.evault.com2/18/2013 22
Physical
Network
Ports
File Type
Devices
Access Control
www.evault.com www.evault.com
• On /Off
• Decrypts opening
• At rest and in-flight
• Different types of technologies
• Generate random keys
• Destroy key on stolen/lost laptop
• Secure key management
• No decryption or risk
• Flexibility in hosting
• Client and server side
• Different OS considerations
• Device support
Encryption
2/18/2013 23
File and folder-basedEncryption and global
data deduplicationIntegrated encryption
Encrypting during backup and recovery
www.evault.com www.evault.com2/18/2013 24
www.evault.com www.evault.com
Device Wipe
2/18/2013 25
68%
of managers keep
valuable data on
endpoint devices
“A mobile device was inadvertently misplaced and then taken and used by unauthorized individuals who accessed patient medical and financial records. It even provided access to the hospital network itself, healthcare electronic databases, and the caregiver's contact lists… just to name a few key sources of very private data.” - Hospital Administrator
www.evault.com www.evault.com
Automated Backup to the Cloud
2/18/2013 26
Best practice 4
Can cloud connectivity solve your data challenges?
• Cloud provides accessibility• Rapid deployment • Reduce total cost of ownership (TCO)• Budgeting• Capacity and timely scalability• Ubiquitous access• Flexible service levels and budgets • OS/device diversity • Automated policy deployments• Robust redundancies
• Strategic, not tactical leadership
www.evault.com www.evault.com2/18/2013 27
Define your cloud readiness
Cloud Readiness Assessment
www.evault.com www.evault.com
IT Administrator Visibility and Control
2/18/201328
“Companies are beginning to invest in
technologies that will enable them to more
centrally manage PC backup and recovery.
This shift indicates that IT is beginning to
recognize how mobile devices are changing the
requirements for endpoint backup and
recovery.”
Best practice 5
www.evault.com www.evault.com
IT Administrator Visibility and Control
2/18/201329
• Data
• Security
• Reporting and Audit
• Multi-layered, Granular Policies
• Various OS
• Integration
• Self Service Enablement
• Notifications, Alerts
• Support SLA’s
• Scalability
Centralized Administration
Best practice
Cost Effective Solution
www.evault.com www.evault.com2/18/2013 30
Vendor StabilityVendor Stability
Service Level Service Level
Geo Availability Geo Availability
Language SupportLanguage Support
Matching organizational need and vendor capabilities is vital to ensure long term success.
IT Administrator Visibility and Control
www.evault.com www.evault.com
Understanding MDM, MAM
2/18/2013 31
Best practice 6
New Applications for Mobile Devices =
Productivity
Industry LeadersUnderstand the New Mobility Environment
• Security• Protection • Access• Partitioning
59%
of companies believe
lost or stolen smart
phones contain sensitive
business information
www.evault.com www.evault.com2/18/2013 32
New IT Mindset
Access Sharing 24/7Policy Management P l a t f o r m OS Support
Collaboration Globalization
Audit Trails Reporting Application
Management Secure Data Transmiss ion
Location Tracking
Data Deletion Data Separation
Application Differentiated User Led
Cross Functional Consumer Speed
www.evault.com www.evault.com
Summary
2/18/2013 33
Data Protection & Retention Security
Central Management & Deployment Access & Sharing
Policy & Internal Alignment
Devices, Application
www.evault.com www.evault.com
It’s critical for IT to take control of mobile endpoint
data and include personal and mobile devices in their policy management portfolio
2/18/2013 34
www.evault.com www.evault.com
Survive and thrive with a mobile workforce:
Mitigate Organizational Risk
2/18/2013 35
Contact us for BYOD Policy Creation Checklist and Requirements Document to develop your strategic corporate plan to stay in charge.
www.evault.com www.evault.com
EVault HQ | 201 3rd Street | Suite 400 | San Francisco, CA 94103 |