major trends transforming byod security

Post on 12-Apr-2017

102 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

STORYBOARDS

how well has byod adoption

gone in your org?

STORYBOARDS

trend 1: productivity + mobility are driving BYOD adoption

STORYBOARDS

trend 2: traditional tools are no longer effective

■ Legacy tools were built to secure the infrastructure

■ Traditional tools can’t secure access from unmanaged devices

■ Data blind spot: cloud apps are responsible for infra, IT is responsible for data

STORYBOARDS

trend 3: employees are rejecting MDM and MAM

■ Employees are resisting IT “big brother”

■ 38% of IT professionals don’t participate in their own BYOD programs

■ 57% of employees refuse MDM/MAM for BYOD Bitglass BYOD Security Survey

2015

STORYBOARDS

■ Impedes user privacy

■ Complex solution deployment and management

■ Lack of data visibility or protection

■ User privacy issues

■ Prevents use of native apps (mail/calendar)

■ 3rd party / cloud apps non-functional

■ Challenging deployments

manage the device

wrap the app

secure the data

trend 4: mobile security tools are evolving rapidly

■ Protection of user privacy and experience

■ Any device, any app

■ Full data control and visibility for IT

■ Deploys in minutes, no software

mdm mam casb

“By 2018, more than half of all bring your own device (BYOD) users that

currently have an MDM agent will be managed by an agentless solution”

Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.

what are your biggest mobile

security concerns?

STORYBOARDS

a betterapproach:

secure the data

STORYBOARDS

agentless BYOD access via activesync

■ Secure mobile devices without invasive profiles or certificates

■ Protect data in “unwrappable” native apps like mail, contacts, calendar

■ Selectively wipe corporate data■ Enforce device security policies■ Full data control and visibility for IT

STORYBOARDS

agentless BYOD access via reverse proxy

■ Secure access from any unmanaged device without agents

■ Users are automatically routed through the proxy via SSO

■ Full data control and visibility for IT■ Control data access with context and

content-aware DLP

STORYBOARDS

data leakage preventiona complete set of data controls

■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking

■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more

■ Easily modify sharing permissions and quarantine files for review

STORYBOARDS

client:■ 8000 employees ■ s&p 500

challenge: ■ Lack of adherence to BYOD security

measures■ Failed MobileIron and SAP Afaria

deploymentssolution:

■ Bitglass Agentless – device / OS independent

■ Fast deployment■ Logging for compliance with

internal data security policies■ Seamless integration with

ActiveDirectory

fortune 500

beverage co.

byod security

STORYBOARDS

secure office 365 + byod

challenge: ■ Inadequate native O365 security■ Controlled access from any device■ Limit external sharing■ Interoperable with existing

infrastructure, e.g. Bluecoat, ADFS

solution: ■ Real-time data visibility and control

powered by Citadel■ DLP policy enforcement at upload

or download■ Quarantine externally-shared

sensitive files in cloud ■ Controlled unmanaged device

access via Omni

fortune 50 healthcar

efirm

STORYBOARDS

our mission

total data

protection est. jan

2013

100+ custome

rs

tier 1 VCs

resources:more info about byod

■ Report: BYOD Trends in Forward-Looking Industries

■ Case Study: Global Arms Giant Secures BYOD■ Video: Mobile Use Case - Bay Cove Human

Services

STORYBOARDS

bitglass.com@bitglass

top related