webinar express: securing byod without mdm
TRANSCRIPT
cloud and mobile are inseparable...
SaaS
driving corporate data outside the firewall.3
CONFIDENTIAL - ISG
STORYBOAR
DS4
Data protection in the cloud
● Spectrum of data by value to enterprise
● Control flow of data to cloud: allow/encrypt/block
● Continued protection in cloud: unshare/quarantine/encrypt
Data protection on devices
● Spectrum of devices from trusted to untrusted
● Control access by user, device, location…
● Continued protection on device: DRM/encrypt/selective wipe
enterprises
need
data
protection
STORYBOAR
DS5
mobility
● ubiquitous access to enterprise data
● any device
● anywhere
privacy
● no enterprise access to personal data
● agent legality?**
users need
mobility and
privacy
**Federal Appeals Court of Sixth Circuit: installation of agents on BYOD that monitor the private communication of users may
violate US federal laws restricting wire tapping http://www.bitglass.com/blog/federal-court-rules-casb-agents-mdm-agents-
other-spyware-is-wiretapping
STORYBOAR
DS
3top MDM vendors
do not use their
own product
Bitglass BYOD Security Survey 2015
MDM is
obsolete
~2Bdevices, but only
~25mMDM sold
38%of IT professionals
don’t participate
in their own BYOD
programs
legacy byod security
57% of users refuse MDM/MAM
Bitglass BYOD Security Survey 2015
STORYBOAR
DS
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
manage
the
device
the evolution of mobile security
data-centric protection is the future
mdm
STORYBOAR
DS
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
deployments
manage
the
device
wrap the
app
the evolution of mobile security
data-centric protection is the future
mdm mam
STORYBOAR
DS
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
deployments
manage
the
device
wrap the
app
secure
the data
the evolution of mobile security:
data-centric protection is the future
■ Protection of user
privacy and
experience
■ Any device, any app
■ Full data control and
visibility for IT
■ Deploys in minutes, no
mdm mam bitglass
STORYBOAR
DS
agentless BYOD security
■ Secure mobile devices without invasive
agents, profiles or certificates
■ Protect data in “unwrappable” apps like
mail, contacts, calendar and cloud apps
■ Selectively wipe corporate data
■ Enforce device security policies
■ Full data control and visibility for IT
■ Control data access with context and
content aware DLP
STORYBOAR
DS
data leakage prevention
a complete set of data controls
■ Apply granular DLP to sensitive data with
spectrum of actions from watermarking to outright
blocking
■ Context-aware engine can distinguish between
users, managed and unmanaged devices, and
more
■ Easily modify sharing permissions and quarantine
files for review
“By 2018, more than half of all bring your
own device (BYOD) users that currently
have an MDM agent will be managed by an
agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOAR
DS
client:
■ 8000 employees
■ s&p 500
challenge:
■ Lack of adherence to BYOD security
measures
■ Failed MobileIron and SAP Afaria
deployments
solution:
■ Bitglass Agentless – device / OS
independent
■ Fast deployment
■ Logging for compliance with internal data
security policies
■ Seamless integration with
ActiveDirectory
fortune
500
beverage
co.
byod
security
STORYBOAR
DS
HIPAA
compliant
mobility
challenge:
■ Existing solution, AT&T Toggle, was obsolete
■ HIPAA-compliant BYOD
■ Migration path to Office 365
solution:
■ Agentless deployment
■ Usability, transparency & privacy
■ DLP of PII, PCI & PHI
■ Selective wipe; device PIN & encryption
■ Improved mobility for care providers
major
US hospital
system
resources:
more info about byod
■ Report: BYOD Trends in Forward-Looking Industries
■ Case Study: Global Arms Giant Secures BYOD
■ Whitepaper: The Art of Compliance & BYOD Security