addressing byodaddressing byod security...

15
Addressing BYOD Addressing BYOD Security Challenges September 15, 2011

Upload: others

Post on 09-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Addressing BYODAddressing BYOD Security Challenges

September 15, 2011

Page 2: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Agenda

■ BYOD Trend■ BYOD Security Challenges■ Addressing Security Challenges

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 2

Page 3: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

BYOD Trend

From secure, Agency managed Blackberry devicey

to less secure non Blackberry…to less secure non-Blackberry personal mobile business device

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 3

Page 4: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

BYOD Security Challenges

■ No separation of personal and work

■ Higher likelihood of data loss

V i d f t ti■ Varying degrees of protection

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 4

Page 5: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

No Separation of Personal and Work

Employee loses phone

2

Employee loses phone

3

1IT has to remote wipe personal & work dataEmployee uses personalEmployee uses personal

phone for work

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 5

Page 6: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Data Loss Example

Open & view workOpen & view work document

2

3

1

3Data exposed!

Receive work document via Outlook

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 6

Page 7: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Varying Degrees of Protection

■ Encryption not available on all platforms

■ Password protection at device level only

D t ti f j il b k d i i■ Detection of jail broken devices varies based on O.S. version

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 7

Page 8: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Addressing BYOD Security Challenges

S t l f t d t /Separate personal from government data/apps

Secure and prevent data loss at the application levelSecure and prevent data loss at the application level

Manage data and policies consistently across multipleManage data and policies consistently across multiple device platforms

This is what Good calls “Containerizing” government data.

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 8

Page 9: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Separate Personal and Government Data

Personal Data Government DataEnterprise data lockdown

Data encryptionPassword policies

Devices remain personal, untouched by enterprise

Justifies shared Password policiesRemote wipeSecure data at rest

Access corporate apps

employee expense

Freely access your applications

Access corporate appsEmail, attachments & PIMIntranets

MusicPicturesVideos

Collaboration tools (e.g. Sharepoint)Web-enabled applications

Employees are more likely to accept an “enterprise-grade” mobile security policy when enterprise control is

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 9

policy when enterprise control is “contained” and does not impact personal experience, apps, or data

Page 10: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Result: Employee’s data retained

2 Employee loses phone

3

1IT l h t t iIT only has to remote wipe work data; personal data & apps not touchedEmployee uses personal

phone for work

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 10

Page 11: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Secure “Containerize” Application Level

Each application is “containerized”

Personal Applications

Containerized applications

and data

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 11

Security and management policies can be restricted to selected applications. .

Page 12: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Result: Data loss prevented!

Open & view document

2

in Good container

13 Data secure!

Receive work document - Good

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 12

Page 13: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Manage consistently across devices

Unified approach to manage:Security, device configuration and compliance Manage enterprise wide, group or user based policies and configurations

IT administrators get a dashboard view of the entire fleet of mobile devices accessing enterprise data

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 13

fleet of mobile devices accessing enterprise data.

Page 14: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Summary

"Consumerization is a parade You canEmbrace BYOD

Consumerization is a parade. You can either get out in front of it to stop it and get

trampled, or you can grab the baton and l d th d "lead the parade."

Implement strongp gSecurity Controls

©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 14

Page 15: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf

Th k YThank You.