lock down mobile and cloud data leaks part i
DESCRIPTION
Lock Down Mobile and Cloud Data Leaks. Presenter: Reza Nabavi, Director, Mobile Product Marketing Accellion, Inc. Presented at SC Magazine Virtual Trade Show.TRANSCRIPT
![Page 1: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/1.jpg)
An Accellion Mobile PresentationLock Down Mobile and Cloud Data Leaks Part I
![Page 2: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/2.jpg)
2
Dual Persona Mobile User!
I’m a Business User
I’m a Consumer
![Page 3: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/3.jpg)
3
BYOD in the U.S.
Source: ChangeWave & IDC, 2012
Corp PlannedSmartphone Purchases
39%
Corp Planned
Tablet Purchases
31%Tablet DemandIn 2012
54.8M
Smartphone DemandIn 2012
110M
![Page 4: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/4.jpg)
4
Apps and Content: ConsumerApps and Content: Business User
![Page 5: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/5.jpg)
5
Consumer-grade Cloud Services
Consumer-grade Cloud Services
Enterprise Private Content
![Page 6: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/6.jpg)
6
Nexus of Three Forces
mobile
![Page 7: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/7.jpg)
7
Dual Persona Mobility Model: Risk and Challenges
Enable mobile user productivity without jeopardizing content security.
![Page 8: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/8.jpg)
8
Key Risks and ChallengesRisks
• Lost devices
• Personal use (BYOD problem)
• The “Dropbox” problem
• Jail-broken, rooted devices
• Consistency and legal risks
Challenges
• Enabling social collaboration
• Privileged access and protection of enterprise content
• Compliance
![Page 9: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/9.jpg)
9
App Insecurity
![Page 10: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/10.jpg)
10
Common Remedy
Restrict the
Device
![Page 11: Lock Down Mobile and Cloud Data Leaks Part I](https://reader036.vdocuments.us/reader036/viewer/2022070304/54b87f534a7959c9388b4567/html5/thumbnails/11.jpg)
11
EMM = MDM + MAM + MCM
Mobile Device Management
Mobile Application
Management
Mobile Content Delivery, Control &
Management