addressing byodaddressing byod security...
TRANSCRIPT
Addressing BYODAddressing BYOD Security Challenges
September 15, 2011
Agenda
■ BYOD Trend■ BYOD Security Challenges■ Addressing Security Challenges
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 2
BYOD Trend
From secure, Agency managed Blackberry devicey
to less secure non Blackberry…to less secure non-Blackberry personal mobile business device
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 3
BYOD Security Challenges
■ No separation of personal and work
■ Higher likelihood of data loss
V i d f t ti■ Varying degrees of protection
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 4
No Separation of Personal and Work
Employee loses phone
2
Employee loses phone
3
1IT has to remote wipe personal & work dataEmployee uses personalEmployee uses personal
phone for work
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 5
Data Loss Example
Open & view workOpen & view work document
2
3
1
3Data exposed!
Receive work document via Outlook
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 6
Varying Degrees of Protection
■ Encryption not available on all platforms
■ Password protection at device level only
D t ti f j il b k d i i■ Detection of jail broken devices varies based on O.S. version
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 7
Addressing BYOD Security Challenges
S t l f t d t /Separate personal from government data/apps
Secure and prevent data loss at the application levelSecure and prevent data loss at the application level
Manage data and policies consistently across multipleManage data and policies consistently across multiple device platforms
This is what Good calls “Containerizing” government data.
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 8
Separate Personal and Government Data
Personal Data Government DataEnterprise data lockdown
Data encryptionPassword policies
Devices remain personal, untouched by enterprise
Justifies shared Password policiesRemote wipeSecure data at rest
Access corporate apps
employee expense
Freely access your applications
Access corporate appsEmail, attachments & PIMIntranets
MusicPicturesVideos
Collaboration tools (e.g. Sharepoint)Web-enabled applications
Employees are more likely to accept an “enterprise-grade” mobile security policy when enterprise control is
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 9
policy when enterprise control is “contained” and does not impact personal experience, apps, or data
Result: Employee’s data retained
2 Employee loses phone
3
1IT l h t t iIT only has to remote wipe work data; personal data & apps not touchedEmployee uses personal
phone for work
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 10
Secure “Containerize” Application Level
Each application is “containerized”
Personal Applications
Containerized applications
and data
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 11
Security and management policies can be restricted to selected applications. .
Result: Data loss prevented!
Open & view document
2
in Good container
13 Data secure!
Receive work document - Good
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 12
Manage consistently across devices
Unified approach to manage:Security, device configuration and compliance Manage enterprise wide, group or user based policies and configurations
IT administrators get a dashboard view of the entire fleet of mobile devices accessing enterprise data
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 13
fleet of mobile devices accessing enterprise data.
Summary
"Consumerization is a parade You canEmbrace BYOD
Consumerization is a parade. You can either get out in front of it to stop it and get
trampled, or you can grab the baton and l d th d "lead the parade."
Implement strongp gSecurity Controls
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 14
Th k YThank You.