The BYOD Security Battleground

26
www.watchfulsoftware.com The BYOD security Battleground www.watchfulsoftware.com October, 21 st 2015

Transcript of The BYOD Security Battleground

Page 1: The BYOD Security Battleground

www.

watc

hful

softw

are.

comThe BYOD security Battleground

www.watchfulsoftware.com October, 21st 2015

Page 2: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2

- INTRODUCTIONS & “HOUSE RULES”

- BYOD AND ITS IMPACT ON THE ENTERPRISE

- SWOT ANALYSIS ON DLP, MDM, MAM

- LEVERAGING RIGHTSWATCH IN A BYOD WORLD

- Q&A

Agenda

Page 3: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3

Introductions

Chris Hazelton Chris is Research Director, Enterprise Mobility at 451 Research. His research focuses on mobile management and productivity tools for business. He covers the shift in enterprise computing from desktop to mobile.

Rui Melo BiscaiaRui serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market

House Rules You are muted centrally. You don’t need to

mute/unmute yourself

This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources

The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel

Page 4: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

BYOD Data protection realities

70% of tablet owners use their personal device to access corporate data

70%

57% of smartphone owners use their personal device to access corporate data

57%

46% of BYOD use is unmanaged by employers or ignored, potentially exposing corporate data

46%

Page 5: The BYOD Security Battleground

The BYOD Security Battleground

Chris HazeltonResearch Director, Enterprise Mobility

Page 6: The BYOD Security Battleground

451 Research is an information technology research & advisory companyFounded in 2000

210+ employees, including over 100 analysts

1,000+ clients: Technology & Service providers, corporate advisory, finance, professional services, and IT decision makers

19,000+ senior IT professionals in our research community

Over 52 million data points each quarter

4,500+ reports published each year covering 2,000+ innovative technology & service providers

451 Research and its sister company Uptime Institute comprise the two divisions of The 451 Group

Headquartered in New York City with offices in London, Boston, San Francisco, Washington D.C., Mexico, Costa Rica, Brazil, Spain, U.A.E., Russia, Taiwan, Singapore, and Malaysia

Research & Data

Advisory Services

Events

Page 7: The BYOD Security Battleground

A combination of research & data is delivered across fourteen channels aligned to the prevailing topics and technologies of digital infrastructure… from the datacenter core to the mobile edge.

7

Page 8: The BYOD Security Battleground

BYOD and its impact on the enterprise

Page 9: The BYOD Security Battleground

EU employees: Use of mobile apps

Source: 451 Research, European Employee Survey, January 2015Base: Asked everybody

Page 10: The BYOD Security Battleground

Acceptance for BYOD

Source: 451 Research, US IT Decision-Maker Survey, June 2015Base: Asked everybody

Page 11: The BYOD Security Battleground

Concern about data on employees’ devices

Source: 451 Research, US IT Decision-Maker Survey, June 2015Base: Asked everybody

Page 12: The BYOD Security Battleground

Adoption of security tools for BYOD

Source: 451 Research, US IT Decision-Maker Survey, June 2015Base: Asked everybody

Page 13: The BYOD Security Battleground

Strengths, Weaknesses, Opportunities, and Threats analysis

Page 14: The BYOD Security Battleground

SWOT for MDM

StrengthMeets initial pain points of the enterprise

WeaknessIn BYOD deployments can be seen as heavy-handed

OpportunityClient software footprint for app lifecycle management

ThreatMAM only, Exchange, and wait and see approaches

Mobile Device Management

Page 15: The BYOD Security Battleground

StrengthProvides control point for future IT mobile pain point

WeaknessRequires access to binary or developer support for SDK

Opportunity Focus on apps not device, acceptable to users and IT

ThreatWill become feature of MDM

Mobile App Management

SWOT for MAM

Page 16: The BYOD Security Battleground

SWOT for DLP

StrengthCheck compliance box, basis for comprehensive data security program

WeaknessHard to find sensitive data or classify it, lots of false/positives. Hard on mobile and for cloud

Opportunity Simple DLP solutions for SMB and mid market

ThreatCloud security vendors offering DLP lite, blocking specific data

Data Loss Protection

Page 17: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

What are your primary concerns about supporting mobile users?

1. Potential loss of data or other intellectual property2. Securing corporate data on individually-owned

devices3. Providing secure access to internal network for

mobile employees4. Controlling the spread of malware from mobile

employees 5. De-provisioning internal users when they leave the

organization

Audience Poll

Page 18: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

The BYOD Security Battleground

Rui Melo BiscaiaDirector of Product Management

Page 19: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

The perimeter is fading…

05/02/2023 © Copyright www.watchfulsoftware.com. 2012 All Rights Reserved. 19

FORBID IS A POLICYnot

Mobile devices have crossed the perimeter and are “far beyond” from system defences, opening massive holes in information security

Page 20: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

To keep users productive while protecting information you need to

Manage users:who, when

Manage devices:which, where

Manage information:who, where, which and

when

Page 21: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

WEBINAR: "You Can’t Teach an Old Dog New Tricks" 21

To manage information you need … RightsWATCH

Tuesday June 23rd 2015

Page 22: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 22

How to do it with RightsWATCH?

Page 23: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 23

RightsWATCH support for BYOD

Email Read RMS protected email messages Create RMS protected email messages Reply/forward RMS protected emails (Online & Offline)

Protected Files Read protected Office files (Online / Offline) Read protected PDF files (Online & Offline) Read “Other” RMS protected .PFILEs (e.g. .PTXT) Create “Other” RMS protected .PFILE (e.g. Image)

Extended w/RightsWATCH

Support for

Page 24: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

RightsWATCH is built on…

Discovery - Policy driven discovery of sensitive data. Relieving the user from the workload and overhead of having to know, understand and apply corporate policy

Classification - Implements a Multilevel Security Model to classify data. Increases awareness, educates, and supports adherence to corporate governance and policies

Encryption - Data is strongly encrypted at rest, in motion and in-use

Access Controls - User identities are used to restrict access Policy enforcement - Granular rights control individual actions

and behaviors Logging - Usage and Access logging enabling to perform

comprehensive audit trails for information Tracking and forensic analysis

Page 25: The BYOD Security Battleground

www.

watc

hful

softw

are.

com

05/02/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 25

Q&A

Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases

E-mail [email protected] to request a demo of RightsWATCH

This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com

Page 26: The BYOD Security Battleground

www.

watc

hful

softw

are.

comThe BYOD security Battleground

www.watchfulsoftware.com October, 21st 2015