The BYOD Security Battleground
-
Upload
watchful-software -
Category
Software
-
view
163 -
download
3
Transcript of The BYOD Security Battleground
www.
watc
hful
softw
are.
comThe BYOD security Battleground
www.watchfulsoftware.com October, 21st 2015
www.
watc
hful
softw
are.
com
05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2
- INTRODUCTIONS & “HOUSE RULES”
- BYOD AND ITS IMPACT ON THE ENTERPRISE
- SWOT ANALYSIS ON DLP, MDM, MAM
- LEVERAGING RIGHTSWATCH IN A BYOD WORLD
- Q&A
Agenda
www.
watc
hful
softw
are.
com
05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
Introductions
Chris Hazelton Chris is Research Director, Enterprise Mobility at 451 Research. His research focuses on mobile management and productivity tools for business. He covers the shift in enterprise computing from desktop to mobile.
Rui Melo BiscaiaRui serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market
House Rules You are muted centrally. You don’t need to
mute/unmute yourself
This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources
The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel
www.
watc
hful
softw
are.
com
BYOD Data protection realities
70% of tablet owners use their personal device to access corporate data
70%
57% of smartphone owners use their personal device to access corporate data
57%
46% of BYOD use is unmanaged by employers or ignored, potentially exposing corporate data
46%
The BYOD Security Battleground
Chris HazeltonResearch Director, Enterprise Mobility
451 Research is an information technology research & advisory companyFounded in 2000
210+ employees, including over 100 analysts
1,000+ clients: Technology & Service providers, corporate advisory, finance, professional services, and IT decision makers
19,000+ senior IT professionals in our research community
Over 52 million data points each quarter
4,500+ reports published each year covering 2,000+ innovative technology & service providers
451 Research and its sister company Uptime Institute comprise the two divisions of The 451 Group
Headquartered in New York City with offices in London, Boston, San Francisco, Washington D.C., Mexico, Costa Rica, Brazil, Spain, U.A.E., Russia, Taiwan, Singapore, and Malaysia
Research & Data
Advisory Services
Events
A combination of research & data is delivered across fourteen channels aligned to the prevailing topics and technologies of digital infrastructure… from the datacenter core to the mobile edge.
7
BYOD and its impact on the enterprise
EU employees: Use of mobile apps
Source: 451 Research, European Employee Survey, January 2015Base: Asked everybody
Acceptance for BYOD
Source: 451 Research, US IT Decision-Maker Survey, June 2015Base: Asked everybody
Concern about data on employees’ devices
Source: 451 Research, US IT Decision-Maker Survey, June 2015Base: Asked everybody
Adoption of security tools for BYOD
Source: 451 Research, US IT Decision-Maker Survey, June 2015Base: Asked everybody
Strengths, Weaknesses, Opportunities, and Threats analysis
SWOT for MDM
StrengthMeets initial pain points of the enterprise
WeaknessIn BYOD deployments can be seen as heavy-handed
OpportunityClient software footprint for app lifecycle management
ThreatMAM only, Exchange, and wait and see approaches
Mobile Device Management
StrengthProvides control point for future IT mobile pain point
WeaknessRequires access to binary or developer support for SDK
Opportunity Focus on apps not device, acceptable to users and IT
ThreatWill become feature of MDM
Mobile App Management
SWOT for MAM
SWOT for DLP
StrengthCheck compliance box, basis for comprehensive data security program
WeaknessHard to find sensitive data or classify it, lots of false/positives. Hard on mobile and for cloud
Opportunity Simple DLP solutions for SMB and mid market
ThreatCloud security vendors offering DLP lite, blocking specific data
Data Loss Protection
www.
watc
hful
softw
are.
com
What are your primary concerns about supporting mobile users?
1. Potential loss of data or other intellectual property2. Securing corporate data on individually-owned
devices3. Providing secure access to internal network for
mobile employees4. Controlling the spread of malware from mobile
employees 5. De-provisioning internal users when they leave the
organization
Audience Poll
www.
watc
hful
softw
are.
com
The BYOD Security Battleground
Rui Melo BiscaiaDirector of Product Management
www.
watc
hful
softw
are.
com
The perimeter is fading…
05/02/2023 © Copyright www.watchfulsoftware.com. 2012 All Rights Reserved. 19
FORBID IS A POLICYnot
Mobile devices have crossed the perimeter and are “far beyond” from system defences, opening massive holes in information security
www.
watc
hful
softw
are.
com
To keep users productive while protecting information you need to
Manage users:who, when
Manage devices:which, where
Manage information:who, where, which and
when
www.
watc
hful
softw
are.
com
WEBINAR: "You Can’t Teach an Old Dog New Tricks" 21
To manage information you need … RightsWATCH
Tuesday June 23rd 2015
www.
watc
hful
softw
are.
com
05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 22
How to do it with RightsWATCH?
www.
watc
hful
softw
are.
com
05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 23
RightsWATCH support for BYOD
Email Read RMS protected email messages Create RMS protected email messages Reply/forward RMS protected emails (Online & Offline)
Protected Files Read protected Office files (Online / Offline) Read protected PDF files (Online & Offline) Read “Other” RMS protected .PFILEs (e.g. .PTXT) Create “Other” RMS protected .PFILE (e.g. Image)
Extended w/RightsWATCH
Support for
www.
watc
hful
softw
are.
com
RightsWATCH is built on…
Discovery - Policy driven discovery of sensitive data. Relieving the user from the workload and overhead of having to know, understand and apply corporate policy
Classification - Implements a Multilevel Security Model to classify data. Increases awareness, educates, and supports adherence to corporate governance and policies
Encryption - Data is strongly encrypted at rest, in motion and in-use
Access Controls - User identities are used to restrict access Policy enforcement - Granular rights control individual actions
and behaviors Logging - Usage and Access logging enabling to perform
comprehensive audit trails for information Tracking and forensic analysis
www.
watc
hful
softw
are.
com
05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 25
Q&A
Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases
E-mail [email protected] to request a demo of RightsWATCH
This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com
www.
watc
hful
softw
are.
comThe BYOD security Battleground
www.watchfulsoftware.com October, 21st 2015