SlideShare a Scribd company logo
webinar
mar 28
2016
hipaa
compliant
byod:
after the
honeymoon
STORYBOAR
managed
blackberry
era
iPhone
launch
a brief history of byod + byod security:
a landscape littered with failed tech
exchange
on iOS
iPad
launch
the rise of
mdm
unmitigated
data
leakage
pre-2007 2007 2008 2010 2011-13 2016
STORYBOAR
100%
compliance!
20%
of devices deployed
with EMM
the
honeymoon
(based on a
true story)
STORYBOAR
other issues:
● incompatible app
upgrades
● emails dropped
● missed calendar
invitations
20%
refused to install EMM
profiles/agents
after the
honeymoon
(based on the
same true story)
byod security isn’t working:
end users are unhappy
STORYBOAR
57%
of employees refuse
MDM/MAM for BYOD
38%
of IT professionals
don’t participate in
their own BYOD
programs
employees are
resisting
“big brother”
Bitglass BYOD Security Survey 2015
STORYBOAR
approach:
■ Airwatch MDM
results:
■ Devices enrolled: <1k
■ Device not enrolled: >3k
■ No direct Activesync
■ Most have no mobile access
EMM
case study
100%
compliant
(no access)
10k employee
health system
STORYBOAR
36%
of companies
use MDM
9%
of companies
use MAM
existing
security
tech is
inadequate
28%
of orgs are doing
nothing to
secure byod
Bitglass BYOD Security Survey 2015
“By 2018, more than half of all bring your
own device (BYOD) users that currently
have an MDM agent will be managed by an
agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOAR
67%
of employees
the state of
byod
security can
improve
would participate in
BYOD if employers had
no access to personal
data
64%
of IT pros
believe agentless
mobile security would
make BYOD programs
more successful
Bitglass BYOD Security Survey 2015
STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
deployments
manage
the
device
wrap the
app
secure
the data
the evolution of mobile security:
data-centric protection is the future
■ Protection of user
privacy and
experience
■ Any device, any app
■ Full data control and
visibility for IT
■ Deploys in minutes, no
mdm mam bitglass
STORYBOAR
needs:
■ HIPAA compliant BYOD
■ Solve multiple affiliations
■ Employee privacy after MI,
Toggle failed deployments
key features:
■ HIPAA compliant on every
device
■ Migration path to Office 365
■ Easy, agentless deployment
US
hospital
system ■ 2500+ employees
■ 160 locations
■ northeastern US
■ 7000
employees
■ southeastern
US
STORYBOAR
needs:
■ ensure security of PHI in
Google Apps and on BYOD
■ maintain HIPAA compliance
key features:
■ DLP
■ visibility / audit
■ identity management
■ mobile data protection
bay cove
human
services ■ 2500+ employees
■ 160 locations
■ northeastern US
STORYBOAR
bitglass
agentless
byod
security
■ control data at access and
on the device
■ no certs / agents
■ securely enable native
apps & cloud apps
■ easy deployment
■ set and enforce device
security policies
resources:
more info about byod
■ healthcare breach report
■ case study: bay cove human services
■ case study: fortune 100 healthcare firm secure
o365
download the full BYOD report
the bitglass
research team
surveyed over 2000
enterprise
employees that own
smartphones and
tablets to uncover
trends in BYOD
download
the report
STORYBOAR
bitglass.com
@bitglass

More Related Content

Viewers also liked

презентация клуб бизнес встреч-V.1
презентация клуб бизнес встреч-V.1презентация клуб бизнес встреч-V.1
презентация клуб бизнес встреч-V.1
Елена Лоскутова
 
T. Davison - ESS Honours Thesis
T. Davison - ESS Honours ThesisT. Davison - ESS Honours Thesis
T. Davison - ESS Honours ThesisTom Davison
 
Impact of banning Rs. 500 and Rs.1000 notes in india
Impact of banning Rs. 500 and Rs.1000 notes in indiaImpact of banning Rs. 500 and Rs.1000 notes in india
Impact of banning Rs. 500 and Rs.1000 notes in india
Chirag Vaghela ©
 
Il Ddl su #LaBuonaScuola
Il Ddl su #LaBuonaScuolaIl Ddl su #LaBuonaScuola
La riforma della Pubblica Amministrazione (4 agosto 2015)
La riforma della Pubblica Amministrazione (4 agosto 2015)La riforma della Pubblica Amministrazione (4 agosto 2015)
La riforma della Pubblica Amministrazione (4 agosto 2015)
Passo dopo passo - Presidenza del Consiglio dei Ministri
 
6 ii zh_ru_2014
6 ii zh_ru_20146 ii zh_ru_2014
6 ii zh_ru_2014
Agent Plus UK
 
PNSD Formazione docenti
PNSD Formazione docentiPNSD Formazione docenti
PNSD Formazione docenti
Antonia Casiero
 
8 t s
8 t s8 t s
5 ort b i
5 ort b i5 ort b i
5 ort b i
YchebnikRU
 
Hacking with ARM devices on Linux
Hacking with ARM devices on Linux Hacking with ARM devices on Linux
Hacking with ARM devices on Linux
Netwalker lab kapper
 
The Perils of Perception in 2016: Ipsos MORI
The Perils of Perception in 2016: Ipsos MORIThe Perils of Perception in 2016: Ipsos MORI
The Perils of Perception in 2016: Ipsos MORI
Ipsos UK
 
'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk
RupertColley
 
الدوال الخطية
الدوال الخطيةالدوال الخطية
الدوال الخطيةealjelani
 
MaThHs Proportion
MaThHs ProportionMaThHs Proportion
MaThHs Proportion
Ritish Verma
 
Career with Keppel Land
Career with Keppel Land Career with Keppel Land
Career with Keppel Land
Fyyk
 
Ethical Use of Social Media
Ethical Use of Social MediaEthical Use of Social Media
Ethical Use of Social Media
Kathy Slaughter
 
Plain2013 Writing for Web and Mobiles N James G Redish
Plain2013 Writing for Web and Mobiles N James G Redish Plain2013 Writing for Web and Mobiles N James G Redish
Plain2013 Writing for Web and Mobiles N James G Redish
2013PLAINConference
 
Q1 in what ways does your media product use
Q1 in what ways does your media product useQ1 in what ways does your media product use
Q1 in what ways does your media product useEd Dean
 
Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente barsanofio
 

Viewers also liked (19)

презентация клуб бизнес встреч-V.1
презентация клуб бизнес встреч-V.1презентация клуб бизнес встреч-V.1
презентация клуб бизнес встреч-V.1
 
T. Davison - ESS Honours Thesis
T. Davison - ESS Honours ThesisT. Davison - ESS Honours Thesis
T. Davison - ESS Honours Thesis
 
Impact of banning Rs. 500 and Rs.1000 notes in india
Impact of banning Rs. 500 and Rs.1000 notes in indiaImpact of banning Rs. 500 and Rs.1000 notes in india
Impact of banning Rs. 500 and Rs.1000 notes in india
 
Il Ddl su #LaBuonaScuola
Il Ddl su #LaBuonaScuolaIl Ddl su #LaBuonaScuola
Il Ddl su #LaBuonaScuola
 
La riforma della Pubblica Amministrazione (4 agosto 2015)
La riforma della Pubblica Amministrazione (4 agosto 2015)La riforma della Pubblica Amministrazione (4 agosto 2015)
La riforma della Pubblica Amministrazione (4 agosto 2015)
 
6 ii zh_ru_2014
6 ii zh_ru_20146 ii zh_ru_2014
6 ii zh_ru_2014
 
PNSD Formazione docenti
PNSD Formazione docentiPNSD Formazione docenti
PNSD Formazione docenti
 
8 t s
8 t s8 t s
8 t s
 
5 ort b i
5 ort b i5 ort b i
5 ort b i
 
Hacking with ARM devices on Linux
Hacking with ARM devices on Linux Hacking with ARM devices on Linux
Hacking with ARM devices on Linux
 
The Perils of Perception in 2016: Ipsos MORI
The Perils of Perception in 2016: Ipsos MORIThe Perils of Perception in 2016: Ipsos MORI
The Perils of Perception in 2016: Ipsos MORI
 
'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk
 
الدوال الخطية
الدوال الخطيةالدوال الخطية
الدوال الخطية
 
MaThHs Proportion
MaThHs ProportionMaThHs Proportion
MaThHs Proportion
 
Career with Keppel Land
Career with Keppel Land Career with Keppel Land
Career with Keppel Land
 
Ethical Use of Social Media
Ethical Use of Social MediaEthical Use of Social Media
Ethical Use of Social Media
 
Plain2013 Writing for Web and Mobiles N James G Redish
Plain2013 Writing for Web and Mobiles N James G Redish Plain2013 Writing for Web and Mobiles N James G Redish
Plain2013 Writing for Web and Mobiles N James G Redish
 
Q1 in what ways does your media product use
Q1 in what ways does your media product useQ1 in what ways does your media product use
Q1 in what ways does your media product use
 
Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente
 

Similar to HIPAA Compliant BYOD: After the MDM Honeymoon

Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
Bitglass
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
Bitglass
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
Bitglass
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
Bitglass
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
Bitglass
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
Bitglass
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
Bitglass
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
Bitglass
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare Data
Bitglass
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
Bitglass
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
AGILLY
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
Bitglass
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
MyAppGurus
 

Similar to HIPAA Compliant BYOD: After the MDM Honeymoon (20)

Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare Data
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
Security that works
Security that worksSecurity that works
Security that works
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
 

More from Bitglass

Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
Bitglass
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
Bitglass
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
Bitglass
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
Bitglass
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
Bitglass
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
Bitglass
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
Bitglass
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
Bitglass
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
Bitglass
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
Bitglass
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
Bitglass
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
Bitglass
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
Bitglass
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
Bitglass
 

More from Bitglass (20)

Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

HIPAA Compliant BYOD: After the MDM Honeymoon

  • 2. STORYBOAR managed blackberry era iPhone launch a brief history of byod + byod security: a landscape littered with failed tech exchange on iOS iPad launch the rise of mdm unmitigated data leakage pre-2007 2007 2008 2010 2011-13 2016
  • 3. STORYBOAR 100% compliance! 20% of devices deployed with EMM the honeymoon (based on a true story)
  • 4. STORYBOAR other issues: ● incompatible app upgrades ● emails dropped ● missed calendar invitations 20% refused to install EMM profiles/agents after the honeymoon (based on the same true story)
  • 5. byod security isn’t working: end users are unhappy
  • 6. STORYBOAR 57% of employees refuse MDM/MAM for BYOD 38% of IT professionals don’t participate in their own BYOD programs employees are resisting “big brother” Bitglass BYOD Security Survey 2015
  • 7. STORYBOAR approach: ■ Airwatch MDM results: ■ Devices enrolled: <1k ■ Device not enrolled: >3k ■ No direct Activesync ■ Most have no mobile access EMM case study 100% compliant (no access) 10k employee health system
  • 8. STORYBOAR 36% of companies use MDM 9% of companies use MAM existing security tech is inadequate 28% of orgs are doing nothing to secure byod Bitglass BYOD Security Survey 2015
  • 9. “By 2018, more than half of all bring your own device (BYOD) users that currently have an MDM agent will be managed by an agentless solution” Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
  • 10. STORYBOAR 67% of employees the state of byod security can improve would participate in BYOD if employers had no access to personal data 64% of IT pros believe agentless mobile security would make BYOD programs more successful Bitglass BYOD Security Survey 2015
  • 11. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection ■ User privacy issues ■ Prevents use of native apps (mail/calendar) ■ 3rd party / cloud apps non-functional ■ Challenging deployments manage the device wrap the app secure the data the evolution of mobile security: data-centric protection is the future ■ Protection of user privacy and experience ■ Any device, any app ■ Full data control and visibility for IT ■ Deploys in minutes, no mdm mam bitglass
  • 12. STORYBOAR needs: ■ HIPAA compliant BYOD ■ Solve multiple affiliations ■ Employee privacy after MI, Toggle failed deployments key features: ■ HIPAA compliant on every device ■ Migration path to Office 365 ■ Easy, agentless deployment US hospital system ■ 2500+ employees ■ 160 locations ■ northeastern US ■ 7000 employees ■ southeastern US
  • 13. STORYBOAR needs: ■ ensure security of PHI in Google Apps and on BYOD ■ maintain HIPAA compliance key features: ■ DLP ■ visibility / audit ■ identity management ■ mobile data protection bay cove human services ■ 2500+ employees ■ 160 locations ■ northeastern US
  • 14. STORYBOAR bitglass agentless byod security ■ control data at access and on the device ■ no certs / agents ■ securely enable native apps & cloud apps ■ easy deployment ■ set and enforce device security policies
  • 15. resources: more info about byod ■ healthcare breach report ■ case study: bay cove human services ■ case study: fortune 100 healthcare firm secure o365
  • 16. download the full BYOD report the bitglass research team surveyed over 2000 enterprise employees that own smartphones and tablets to uncover trends in BYOD download the report

Editor's Notes

  1. BYOD has changed a great deal in the last decade. Before the launch of the iPhone and other modern smartphones in 2007, managed Blackberry devices were the norm. Employees would receive both a managed Windows PC and a managed mobile phone. With the launch of iPhone in 2007, executives quickly came to want their personal mobile devices as their primary work devices. There was a gradual shift toward BYOD as demand for corporate mail, calendar, and contacts on these smartphones grew and IT administrators came under pressure to support iOS and Android. In 2008, iPhone came to support Exchange. This made it possible to access corporate data on iOS, not possible before. Unfortunately, this brought with it the challenge of securing data on these devices. Many organizations refused to allow BYOD in their organizations because they couldn’t ensure that data would remain secure or within the company firewall if they enabled mail, contacts, corporate calendar, and corporate file access on these devices. The release of iPad in 2010 spurred demand for BYOD as many employees pushed to have their personal tablets replace antiquated Windows machines in their organization. MDM became the go-to solution for organizations looking to secure BYOD. Unfortunately, there were a number of drawbacks to this solution, namely issues with privacy, user experience, adoption within organizations, and more. Today, organizations that have MDM or MAM deployed still have issues with data leakage, particularly where employees refuse MDM or MAM on their personal devices but still look to access corporate data on those unmanaged devices.
  2. Users are actively pushing against invasive tools that give employers control of their personal data on personal devices. In fact, these stats show that many employees simply refuse to adopt MDM and MAM. Even IT professionals, those who purchase these solutions with the knowledge they will be deployed in the organization and have a deep familiarity with the functions and capabilities of these tools, refuse to participate.
  3. Users are actively pushing against invasive tools that give employers control of their personal data on personal devices. In fact, these stats show that many employees simply refuse to adopt MDM and MAM. Even IT professionals, those who purchase these solutions with the knowledge they will be deployed in the organization and have a deep familiarity with the functions and capabilities of these tools, refuse to participate.
  4. Google Play store reviews indicate users aren’t happy with MDM solutions like Airwatch and MobileIron. The user experience issues here are a hindrance to adoption and we see employees either choose not to install these apps on their devices and not access corporate data at all, or more frequently, employees that refuse MDM but still access corporate data in an unsecured manner. Why aren’t these MDM and MAM tools adopted by employees in most organizations? The concern is generally user experience. Not only do these tools require that invasive agents be installed, but also, the apps that enable access to corp mail, calendar, and contacts are poorly built, often cause a hit to battery life, and the app makers themselves have little reason to fix these issues because the end-users have to use their tools regardless.
  5. Users are actively pushing against invasive tools that give employers control of their personal data on personal devices. In fact, these stats show that many employees simply refuse to adopt MDM and MAM. Even IT professionals, those who purchase these solutions with the knowledge they will be deployed in the organization and have a deep familiarity with the functions and capabilities of these tools, refuse to participate.
  6. 2500 employees
  7. Looking at adoption rates of byod security solutions across enterprises, we get the sense that existing tech is inadequate...
  8. But...
  9. 2500 employees
  10. 2500 employees
  11. Only the Bitglass protects data in the cloud, at access, and on any device. Reverse proxy mode protects traffic from any device, anywhere, without browser configuration, device profiles or VPN. cloud data-at-rest is scanned via API connectors, uncovering compliance violations and external sharing.