mobile security · protect your at risk data mobile devices at risk: in 2014 there were a record...
TRANSCRIPT
MOBILE SECURITY:
COMMVAULT.COM | 888.746.3849 | [email protected]© 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED.
PROTECT. ACCESS. COMPLY. SHARE.
Suggested Reading 7 Reasons To Worry About Your Current Email Archiving Strategyhttp://commvau.lt/1MrS7eg
1 FORBES, “THE AVERAGE MOBILE WORKER CARRIES 3.5 DEVICES. HERE’S THE DOWNSIDE,” 2012 2 PONEMON INSTITUTE, “PONEMON INSTITUTE RELEASES 2014 COST OF DATA BREACH: GLOBAL ANALYSIS,” 2014 3 ANALYST PONEMON INSTITUTE, “PONEMON INSTITUTE RELEASES 2015 COST OF DATA BREACH: GLOBAL ANALYSIS,” 2015 4 PRECYSESOURCE, “THE CAUSE OF A DATA BREACH – LOST/STOLEN LAPTOPS OR A SECURITY DESIGN FLAW” 2014
5 TWO-FACTOR AUTHENTICATION AND SINGLE SIGN-ON.
PROTECT YOUR AT RISK DATA
MOBILE DEVICES AT RISK:
IN 2014 THERE WERE A RECORD NUMBER OF HIPAA BREACHES. ALMOST 79% OF
THESE BREACHES WERE ON UNENCRYPTED LAPTOPS AND THUMB DRIVES.4
EMPLOYEES AVERAGE 3 MOBILE DEVICES PER USER1
$3.5 MillionIN 2014, U.S. COMPANIES
AVERAGED $3.5 MILLION FOR A DATA BREACH2
$217IN 2015, EACH STOLEN
CONFIDENTIAL RECORD AVERAGED $217, TOTALING $6.5 MILLION PER BREACH3
79%
6 WAYS TO FIGHT THE BAD GUYS
WIN WITH COMMVAULT• REPEL data breaches and exposure across the enterprise • ENCRYPT data-at-rest and data-in-flight without impacting performance• REDUCE security costs with policies• SECURE user access with Single Sign-on and Active Directory • AND MORE. Get strong security plus backup and recovery, file sharing, eDiscovery and compliance, and data analysis
ENCRYPT STORED FILES Encrypt files and folders against would-be data thieves
ENCRYPT DATA-IN-FLIGHT Secure data transfer protects
moving data without a VPN
CONTROL USER ACCESS Keep data safe from fake user credentials with 2Fa and SSO5 TRACK THAT LAPTOP DOWN
Geo-tracking lets you narrow down a missing laptop’s location
by country, state, city, zip code and street
REMOTE WIPE A LAPTOPFull or selective data wipes zero out blocks for complete data security AUTOMATE SECURITY
IT e�ciently manages security for an entire mobile network