Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity =...
Transcript of Six Secrets of Surviving and Thriving with a Mobile Workforce · Mobility = Productivity =...
www.evault.com www.evault.com
Six Secrets of Surviving and Thriving with a Mobile
Workforce
Inka Traktman, World Wide Product Marketing Manager
EVault Endpoint Solutions
2/18/2013 1
www.evault.com www.evault.com
Mobile Device Paralysis
2
EVault/Poneman Institute
$5.5 M27%
BYOD Leadership
www.evault.com www.evault.com
Mobility = Productivity = Competitive
Advantage
2/18/2013 3
Endpoints = Desktops, Laptops, Laplets, Tablets, Smart phones
www.evault.com www.evault.com
It’s critical for IT to take control of mobile endpoint data and include personal/mobile devices in the corporate policy management portfolio
2/18/2013 4
www.evault.com www.evault.com
Survive and thrive with a mobile workforce:
Mitigate Organizational Risk
2/18/2013 5
www.evault.com www.evault.com
Surviving and Thriving with a Mobile Workforce
2/18/2013 6
1. BYOD Policy Development2. Data Protection Strategies3. Endpoint Lockdown4. Cloud & Mobility5. Central Administration6. Mobile Device and
Application Management
Mobility =
IT le
aders
hip
www.evault.com www.evault.com
800,000 records compromised
2/18/2013 7
10,000 records compromised
35,000 patient records compromised
< 30% laptops are encrypted
> 90% have no anti-theft measures
No ability to centrally manage data on endpoints
No central control of retention and
security policies
www.evault.com www.evault.com
Source: ESET/Harris Interactive
Mobile devices at work 81%
www.evault.com www.evault.com
Enterprises should focus on mobile data protection, network access control, and mobile device management tools to support their BYOD in endpoint enterprise mobile platform efforts.
www.evault.com www.evault.com2/18/2013 10
1. Analytics and Business Intelligence
2. Mobile Technologies
3. Cloud Computing (SaaS, IaaS, PaaS)
4. Collaboration Technologies
5. Legacy Modernization
6. IT Management
7. CRM
8. ERP Applications
9. Security
10. Virtualization
Gartner: Top 10 Technology Priorities
www.evault.com www.evault.com
Endpoint data loss prevention
Anti-malware Anti-spyware
Personal firewallsHost-based intrusion
prevention
Port and device control
Full-disk and file encryptionEndpoint data loss
prevention
Application vulnerability management and application control
Port and device control
File encryption
Mobility:
• Device Management• Mobile Application
Management• BYOD, BTRD • Remote data control• Increased focus on
retention of data
Traditional Endpoint Solutions
2/18/2013 | © 2013 EVault, Inc. All Rights Reserved | 11
www.evault.com www.evault.com
Gartner Critical Capabilities for Enterprise Endpoints
1. Design a comprehensive corporate plan for endpoint protection, including backup.
2. Choose endpoint backup products based on employees' risk profiles.
3. Choose a product with more built-in security features, more data capture and better self-service capabilities.
4. Enterprises should focus on mobile data protection, network access control, and mobile device management tools to support their BYOD in endpoint enterprise mobile platform efforts.
Mobile Workforce
October 2012
2/18/2013 | © 2013 EVault, Inc. All Rights Reserved | 12
www.evault.com www.evault.com
BYOD Policy Development
2/18/2013 13
Define Roles & Rules
Address Support Expectations
Identify Security Levels
Create Policy Team
Best practice 1
Take Inventory
www.evault.com www.evault.com2/18/2013 14
Legal Protections and Training
Don’t go Solo
Policy Development
Ongoing Educational Training
www.evault.com www.evault.com
Avoid Tactical IT Set-Backs
2/18/2013 15
40%Support for employees in the field
40%Support for travelling employees
31%Mobile connection with customers
35%Support for employees working from home
29%Building customized mobile apps
Mobile commerce
25%
21%
21%
18%
11%
14%
Moderate focus Heavy focus
Source: CompTIA’s Trends in Enterprise Mobility study
Move towards BTRD
www.evault.com www.evault.com2/18/2013 16
� Policy Devices & Support
� Rights & Obligations
� Central Deployment, Management
� Self-service Solution without Impacting Performance
� Scalability
� Security
Stay in Charge
www.evault.com www.evault.com
Data Protection
2/18/2013 17
1. Maintaining corporate data policies
• Employees leave
• Employees loose
2. Remote workforce data retention
3. Central, fast deployment
4. Centralized oversight
5. Providing 24/7 access
6. Meeting critical RTO for IT/users
Remote workforce data retention, central control and increased productivity
Best practice 2
www.evault.com www.evault.com
Technologies to Aid in Data Management
2/18/2013 18
Data compression
Block-level incremental backups and global de-duplication
Replication of data to dual data centers
Local device and local server caching
www.evault.com www.evault.com
Locking Down your Endpoints
2/18/2013 19
Has BYOD affected the measures you take for network security?
Yes very
Yes somewhat
Not at all
Best practice 3
Source: Airtight Survey 2012
Mitigate risk
www.evault.com www.evault.com
Data Leakage Points
2/18/2013 20
Removable Devices
(USB)
Unauthorized Sharing
(email)
Multiple Unauthorized
Devices
(home)
Unauthorized Applications
(dropbox)
Disgruntled Employees
Theft, Loss, Breakage Device
Retirement
www.evault.com www.evault.com
Forrester Data Security Priorities
2/18/2013 21
Source: Forrester Security Survey
1. Encryption
2. Central Endpoint
Data Control
3. Device Kill
www.evault.com www.evault.com2/18/2013 22
Physical
Network
Ports
File Type
Devices
Access Control
www.evault.com www.evault.com
• On /Off
• Decrypts opening
• At rest and in-flight
• Different types of technologies
• Generate random keys
• Destroy key on stolen/lost laptop
• Secure key management
• No decryption or risk
• Flexibility in hosting
• Client and server side
• Different OS considerations
• Device support
Encryption
2/18/2013 23
File and folder-basedEncryption and global
data deduplicationIntegrated encryption
Encrypting during backup and recovery
www.evault.com www.evault.com2/18/2013 24
www.evault.com www.evault.com
Device Wipe
2/18/2013 25
68%
of managers keep
valuable data on
endpoint devices
“A mobile device was inadvertently misplaced and then taken and used by unauthorized individuals who accessed patient medical and financial records. It even provided access to the hospital network itself, healthcare electronic databases, and the caregiver's contact lists… just to name a few key sources of very private data.” - Hospital Administrator
www.evault.com www.evault.com
Automated Backup to the Cloud
2/18/2013 26
Best practice 4
Can cloud connectivity solve your data challenges?
• Cloud provides accessibility• Rapid deployment • Reduce total cost of ownership (TCO)• Budgeting• Capacity and timely scalability• Ubiquitous access• Flexible service levels and budgets • OS/device diversity • Automated policy deployments• Robust redundancies
• Strategic, not tactical leadership
www.evault.com www.evault.com2/18/2013 27
Define your cloud readiness
Cloud Readiness Assessment
www.evault.com www.evault.com
IT Administrator Visibility and Control
2/18/201328
“Companies are beginning to invest in
technologies that will enable them to more
centrally manage PC backup and recovery.
This shift indicates that IT is beginning to
recognize how mobile devices are changing the
requirements for endpoint backup and
recovery.”
Best practice 5
www.evault.com www.evault.com
IT Administrator Visibility and Control
2/18/201329
• Data
• Security
• Reporting and Audit
• Multi-layered, Granular Policies
• Various OS
• Integration
• Self Service Enablement
• Notifications, Alerts
• Support SLA’s
• Scalability
Centralized Administration
Best practice
Cost Effective Solution
www.evault.com www.evault.com2/18/2013 30
Vendor StabilityVendor Stability
Service Level Service Level
Geo Availability Geo Availability
Language SupportLanguage Support
Matching organizational need and vendor capabilities is vital to ensure long term success.
IT Administrator Visibility and Control
www.evault.com www.evault.com
Understanding MDM, MAM
2/18/2013 31
Best practice 6
New Applications for Mobile Devices =
Productivity
Industry LeadersUnderstand the New Mobility Environment
• Security• Protection • Access• Partitioning
59%
of companies believe
lost or stolen smart
phones contain sensitive
business information
www.evault.com www.evault.com2/18/2013 32
New IT Mindset
Access Sharing 24/7Policy Management P l a t f o r m OS Support
Collaboration Globalization
Audit Trails Reporting Application
Management Secure Data Transmiss ion
Location Tracking
Data Deletion Data Separation
Application Differentiated User Led
Cross Functional Consumer Speed
www.evault.com www.evault.com
Summary
2/18/2013 33
Data Protection & Retention Security
Central Management & Deployment Access & Sharing
Policy & Internal Alignment
Devices, Application
www.evault.com www.evault.com
It’s critical for IT to take control of mobile endpoint
data and include personal and mobile devices in their policy management portfolio
2/18/2013 34
www.evault.com www.evault.com
Survive and thrive with a mobile workforce:
Mitigate Organizational Risk
2/18/2013 35
Contact us for BYOD Policy Creation Checklist and Requirements Document to develop your strategic corporate plan to stay in charge.
www.evault.com www.evault.com
EVault HQ | 201 3rd Street | Suite 400 | San Francisco, CA 94103 |
877.901.DATA (3282) |
Contact:Contact:[email protected]: 415-432-2232 C: 415-328-2866www.evault.com
Cloud-Connected backup and recovery services since 1997
Market leader with 38,000+ customers worldwide and 15,000 recoveries a month
A Seagate Company