Protecting Endpoint Devices in a Hostile World

13
in a Hostile World Protecting Endpoint Devices Protecting Endpoint Devices

Transcript of Protecting Endpoint Devices in a Hostile World

Page 1: Protecting Endpoint Devices in a Hostile World

in aHostile World

ProtectingEndpointDevices

ProtectingEndpointDevices

Page 2: Protecting Endpoint Devices in a Hostile World

Mobile devices are inherently at risk for loss and theft. Managing that risk is the heart of mobile security, but without the right tools it’s a losing game.

SECURING DEVICES AND THEIR DATA

SECURING DEVICES AND THEIR DATA

Page 3: Protecting Endpoint Devices in a Hostile World

A REAL PROBLEMA REAL

PROBLEM

In the U.S., businesses average 3 mobile devices per employee. That’s a lot of devices and a lot of insecurity. Laptops are the worst offenders: users usually keep work files on the hard drive, and losing a laptop is an invitation to anyone who cares to take a look at the data.

Page 4: Protecting Endpoint Devices in a Hostile World

NO ONE IS IMMUNENO ONE IS IMMUNESerious data breaches can happen to anyone, anywhere. In 2014, a thief stole laptops from Coca-Cola’s Atlanta headquarters and a bottling plant. The laptops contained unencrypted HR records on over 70,000 people including social security numbers, names and addresses.

Page 5: Protecting Endpoint Devices in a Hostile World

5 Security Features You Absolutely, Positively Must Have:1. Encryption to render stolen files unreadable.

2. Granular file encryption to frustrate a would-be thief.

3. Geo-location to find a lost or stolen laptop before the bad guys get to it.

4. Remote wipe to delete files when you just can’t find the device in time.

5. Policies to automate security actions whenever and wherever needed.

5 CRITICALSECURITY FEATURES

5 CRITICALSECURITY FEATURES

Page 6: Protecting Endpoint Devices in a Hostile World

ENCRYPTIONKeep Them From Reading Stolen Data

ENCRYPTIONKeep Them From Reading Stolen Data

In 2014, the healthcare industry experienced a record number of HIPAA breaches. Over 75% of them occurred on lost or stolen computers and USB thumb drives – all storing unencrypted data. Get solutions with granular encryption for file and folder levels and that use strong standards like FIPS 140-2.

Page 7: Protecting Endpoint Devices in a Hostile World

ACCESS CONTROLMAKE SURE THEY ARE WHO THEY SAY THEY ARE

ACCESS CONTROLMAKE SURE THEY ARE WHO THEY SAY THEY ARE

Many employees set weak passwords, rarely change their passwords, and use the same password for different applications and sites. These passwords are easy to crack, even by an aspiring password cracker. With two-factor access (2FA), or a layered login system like single sign-on (SSO), even less than ideal mobile passwords will be a tough nut to crack.

Page 8: Protecting Endpoint Devices in a Hostile World

Use IP address monitoring and geo-location to identify an at-risk laptop. IP addresses will report last known server access and geo-location will narrow down a location, preferably to the street level.

GEO-LOCATIONFIND THE LAPTOP BEFORE THEY DO

Page 9: Protecting Endpoint Devices in a Hostile World

Encryption should protect exposed data files, but if you can’t find the laptop then consider wiping it. Pick a solution that enables selective wiping and self-service, so IT or the end-user can initiate a remote wipe of a protected set of data or an entire drive. The remote wipe should zero out blocks so a thief cannot use a data recovery tool to view deleted content.

REMOTE WIPESDelete the Data

Before They See It

REMOTE WIPESDelete the Data

Before They See It

Page 10: Protecting Endpoint Devices in a Hostile World

POLICY-BASED AUTOMATIONSecure Data in Your Sleep

POLICY-BASED AUTOMATIONSecure Data in Your SleepAutomate security for lightning-fast management and response. Look for features like setting baseline responses based on server access times, selective or full remote wipes, and encryption based on users, roles and data priority. Auto-discovery is also important. Choose a solution that includes automatic device discovery and assignment by integrating with Active Directory.

Page 11: Protecting Endpoint Devices in a Hostile World

THE FACTS OF LIFETHE FACTS OF LIFE

Bring Your Own Device (BYOD) is a fact of life. Even on company-owned devices, employees meld their work and personal data. This is why companies must secure mobile devices against loss and harm. The right mobile security tools will allow you to do this. The best mobile protection tools will do even more.

Page 12: Protecting Endpoint Devices in a Hostile World

The right mobile security tools are the ones that offer a suite of endpoint

services, not only device security but also a centralized

data store for backup, eDiscovery and compliance, and secure file sharing. Of those, the best ones don’t stop at the network edge but seamlessly integrate with enterprise data protection services.

THE RIGHTSTUFF

Page 13: Protecting Endpoint Devices in a Hostile World

Why Laptop Security Cannot Wait

Laptop theft can strike at the heart of a company’s reputation and revenue. If devices contain unprotected and sensitive information, then the consequences can get very ugly, very fast.

Read about the six critical functions that work together to efficiently secure endpoint data.

PROTECT. ACCESS. COMPLY. SHARE.

COMMVAULT.COM | 888.746.3849 | [email protected] © 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED.