Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units'...
-
Upload
chris-hines -
Category
Technology
-
view
111 -
download
2
description
Transcript of Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units'...
POLL QUESTION #1
Which two areas have the most demand from your employees and business?
1. Cloud applications (excluding file sharing)
2. BYOD
3. Social Networks
4. File Sharing and Synchronization
©2014 IDC
Proactive Collaboration Driven by Cloud and Mobile Synergies
Mainframe
Client/ Server
Mobile/ Cloud
Thousands of Users
Millions of Users
Billions of Users
©2014 IDC
Cloud Security Threat: Business Units & Individuals Employees Buying Their Own Solutions
53%
50%
45%
42%
40%
36%
32%
Private Cloud is more secure than Public Cloud
BU Individual Buying a Security Threat
Multitenant too risky for sensitive information
Ceding Patch and Vulnerability Management
I understand Cloud Security/Compliance Issues
Cloud Security Better than Internal IT Security
Cloud Benefits Outweigh Security Risks
Q. Rate these statement about cloud security
% sample rating 4 & 5
§ Issue: Security & compliance
§ Data in motion just as important as data at rest
§ Key management stays with customer
§ Issue: Metrics § Shared risk
responsibility § Threats/Attacks § Breaches § Privileged & Customer
Access § Continuous Compliance
POLL QUESTION #2
How do you typically react to rogue IT today?
1. Reprimand the employee
2. Find a mutually acceptable workaround
3. Attempt to block the application
4. Terminate the employee
©2014 IDC
How Did Enterprises React to Rogue IT Implementations?
Reprimand
Terminate
Block
Workaround
©2014 IDC
RISK Cloud Mobile
Low
Granular Monitoring,
Strong Encryption,
Authentication, Data Protection, & Vulnerability Assessment
Strong Encryption, Data
Protection, & Granular Access
Controls
Medium VPN, Single Sign-
On, & Strong Passwords
Mobile Device Management
High Access control Device Password
Goals
1) Monitor mobile & SaaS activity.
2) Detect and mitigate data loss.
3) Deterrence of future breaches & problems.
4) Maintain partnerships with Business Units and employees.
Customer Example: Reconciling Business Unit Priorities with IT Policies
©2014 IDC
Business Units and IT Agree On Shared Risk Responsibility
©2014 IDC
Success Based on Shared Responsibility & Understanding of Solutions
Bitglass Secure Cloud & Mobile
Secure Cloud
• Visibility and Alerting across all apps
• DLP and Access Control for sensitive data
• Track data anywhere it goes
• Cloud-based and premises applications
• 30 minute deployment
Secure BYOD
• Secure corporate data without MDM or agents
• DLP and Access Control for sensitive data
• Track data anywhere it goes
• Cloud-based and premises applications
• 30 minute deployment
Bitglass Solution
Lock only the data Unlimited mobility - any device, anywhere Low admin overhead - no software or device configuration Excellent usability - transparent, respects privacy
Local Employees Remote Employees BYOD
Corporate Office
Internal Apps SaaS Apps Personal Apps
IT gets security, visibility, & control of business apps & data
...and Users get mobility, transparency & privacy
The Bitglass Advantage
Visibility & Control
During access
Security & Compliance Cloud, device, everywhere
Flexibility
Low admin overhead
Mobility
Anywhere, any device
Transparency Familiar user experience
Privacy
No capture of personal data
Thank You!
Christian Christiansen [email protected]
@cchristiansen
Rich Campagna [email protected]
@bitglass