Mobility has become part of the way we work. The proliferation of laptops and PDAs and the emergence of tablets and smartphones, many of them employee-owned devices(as part of the trend known as “bring your own device” or “BYOD”) have allowed our workforce to break free from the 9-to-5 desk jockey mold.
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Differential Sharing in Mobile Environments
1.
Mobility
Solution Brief
2.
WindTalker™: set your data free www.windtalkersecurity.com
Introduction _____________________________________________________________________________________
Mobility has become part of the way we work. The proliferation of laptops and PDAs and the
emergence of tablets and smartphones, many of them employee-owned devices (as part of the trend
known as “bring your own device” or “BYOD”) have allowed our workforce to break free from the 9-to-
5 desk jockey mold.
But this accessibility has brought numerous security
challenges. The data these workers need to access is either
constrained within network security protocols, or vulnerable
as it roams the cloud, crosses cellular networks, or resides on
unsecured devices. To realize the full efficiencies and
freedoms of mobility, workers often circumvent encryption
practices or other cumbersome IT-security practices.
Enterprises wishing to fully empower their mobile workers or
allow collaboration among disparate users have been
forced to make a choice between accessibility and security.
High Level Solution _____________________________________________________________________________
To fully protect sensitive information while removing the barriers that hamper mobility, the data itself –
not the infrastructure that contains it – must be protected. When protection is applied at the data
level, the protection is inherent, not dependent. Data is free to roam along with your users, regardless
of network, application, device or user.
WindTalker™-enabled Mobility________________________________________________________________
WindTalker™ is an enabling technology that creates self-protecting data™. The protection resides
within the data level, and is created in the native file format, rather than through an additional
encryption process. Protection of the data can be tailored to multiple audiences within a single
document, allowing full collaboration across varying roles and security clearances.
• Data level protection independent of network security – Self-protecting data can roam freely,
because the protection comes from within the data itself.
• Protection and access customized for multiple users and roles -- Multiple Role-based Access
Keys can be used within a single document or file to provide protection down to a single
character.
• Persistent protection - Unauthorized data modification can be flagged, identified, and
corrected. Stolen information is self-protecting, and therefore cannot be used.
• Reduced bandwidth requirements and increased efficiency – The need to store multiple
versions of a single file is eliminated, as is the
need to encrypt entire devices or drives.
• Centralized management of access – The
ability to view data can be granted or
revoked to remote users instantly from a
central management point, to stay up to
date with changing roles, needs or personnel.
• Accessible from any enabled device – Data
can be accessed using any authenticated
device, including smartphones, tablets, and
sensors.
A
recent
survey
of
IT
professionals
revealed
that
95%
of
mobile
workers
have
smartphones
and
44%
own
tablets;
while
42%
have
individually-‐liable
smartphones.
The
iPass
2011
Mobile
Enterprise
Report