Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.
In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.
4. STORYBOAR
security must
evolve to protect
data outside the
firewall
ungoverned
access to
corporate data in
the cloud
sensitive data on
unmanaged
devices
6. STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
manage
the
device
the evolution of mobile security
data-centric protection is the future
mdm
7. STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
deployments
manage
the
device
wrap the
app
the evolution of mobile security
data-centric protection is the future
mdm mam
8. STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
deployments
manage
the
device
wrap the
app
secure
the data
the evolution of mobile security
data-centric protection is the future
■ Protection of user
privacy and
experience
■ Any device, any app
■ Full data control and
visibility for IT
■ Deploys in minutes, no
mdm mam casb
9. STORYBOAR
employees are rejecting MDM and MAM
■ Employees are resisting IT “big brother”
■ 38% of IT professionals don’t participate in
their own BYOD programs
■ 57% of employees refuse MDM/MAM for
BYOD
Bitglass BYOD Security Survey 2015
10. “By 2018, more than half of all bring your
own device (BYOD) users that currently
have an MDM agent will be managed by an
agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
13. STORYBOAR
agentless BYOD access via activesync
■ Secure mobile devices without invasive
profiles or certificates
■ Protect data in “unwrappable” native apps
like mail, contacts, calendar
■ Selectively wipe corporate data
■ Enforce device security policies
■ Full data control and visibility for IT
14. STORYBOAR
agentless BYOD access via reverse proxy
■ Secure access from any unmanaged
device without agents
■ Users are automatically routed through the
proxy via SSO
■ Full data control and visibility for IT
■ Control data access with context and
content-aware DLP
15. STORYBOAR
data leakage prevention
a complete set of data controls
■ Apply granular DLP to sensitive data with
spectrum of actions from watermarking to outright
blocking
■ Context-aware engine can distinguish between
users, managed and unmanaged devices, and
more
■ Easily modify sharing permissions and quarantine
files for review
16. STORYBOAR
client:
■ 8000 employees
■ s&p 500
challenge:
■ Lack of adherence to BYOD security
measures
■ Failed MobileIron and SAP Afaria
deployments
solution:
■ Bitglass Agentless – device / OS
independent
■ Fast deployment
■ Logging for compliance with internal data
security policies
■ Seamless integration with
ActiveDirectory
fortune
500
beverage
co.
byod
security
17. STORYBOAR
HIPAA
compliant
mobility
challenge:
■ Existing solution, AT&T Toggle, was obsolete
■ HIPAA-compliant BYOD
■ Migration path to Office 365
solution:
■ Agentless deployment
■ Usability, transparency & privacy
■ DLP of PII, PCI & PHI
■ Selective wipe; device PIN & encryption
■ Improved mobility for care providers
major
US hospital
system
19. resources:
more info about byod
■ Report: BYOD Trends in Forward-Looking Industries
■ Report: MDMayhem - How MDM Software Exposes Personal Data
■ Case Study: Global Arms Giant Secures BYOD
but in building out our product, we realized that mobile security is also cloud security.
How well has BYOD adoption gone in your organization?
Much better than expected
Slightly better than expected
As expected
Lower than expected
We don’t allow BYOD
What are your biggest mobile security concerns?
Loss of control after download
No control over access
Theft or lost devices
Something else