isc(2) security briefing part 3 - enabling secure byod with casbs

18
enabling secure BYOD with cloud access security brokers may 5 2016

Upload: bitglass

Post on 22-Mar-2017

69 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

enabling secure BYOD with cloud access security

brokersmay 5 2016

Page 2: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

cloud and mobile are inseparable...

saas

driving corporate data outside the firewall.

Page 3: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

legacy data security

secure the infrastructu

re

Page 4: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

security must evolve to

protect data outside the

firewall

ungoverned access to

corporate data in the cloud

sensitive data on

unmanaged devices

Page 5: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

■ Impedes user privacy

■ Complex solution deployment and management

■ Lack of data visibility or protection

manage the device

the evolution of mobile securitydata-centric protection is the future

mdm

Page 6: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

■ Impedes user privacy

■ Complex solution deployment and management

■ Lack of data visibility or protection

■ User privacy issues

■ Prevents use of native apps (mail/calendar)

■ 3rd party / cloud apps non-functional

■ Challenging deployments

manage the device

wrap the app

the evolution of mobile securitydata-centric protection is the future

mdm mam

Page 7: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

■ Impedes user privacy

■ Complex solution deployment and management

■ Lack of data visibility or protection

■ User privacy issues

■ Prevents use of native apps (mail/calendar)

■ 3rd party / cloud apps non-functional

■ Challenging deployments

manage the device

wrap the app

secure the data

the evolution of mobile securitydata-centric protection is the future

■ Protection of user privacy and experience

■ Any device, any app

■ Full data control and visibility for IT

■ Deploys in minutes, no software

mdm mam casb

Page 8: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

“By 2018, more than half of all bring your own device (BYOD) users that

currently have an MDM agent will be managed by an agentless solution”

Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.

Page 9: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

casbapproach

secure the data

Page 10: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

agentless BYOD access via activesync

■ Secure mobile devices without invasive profiles or certificates

■ Protect data in “unwrappable” native apps like mail, contacts, calendar

■ Selectively wipe corporate data■ Enforce device security policies■ Full data control and visibility for IT

Page 11: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

agentless BYOD access via reverse proxy

■ Secure access from any unmanaged device without agents

■ Users are automatically routed through the proxy via SSO

■ Full data control and visibility for IT■ Control data access with context and

content-aware DLP

Page 12: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

data leakage preventiona complete set of data controls

■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking

■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more

■ Easily modify sharing permissions and quarantine files for review

Page 13: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

client:■ 8000 employees ■ s&p 500

challenge: ■ Lack of adherence to BYOD security

measures■ Failed MobileIron and SAP Afaria

deploymentssolution:

■ Bitglass Agentless – device / OS independent

■ Fast deployment■ Logging for compliance with

internal data security policies■ Seamless integration with

ActiveDirectory

fortune 500

beverage co.

byod security

Page 14: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

secure office 365 + byod

challenge: ■ Inadequate native O365 security■ Controlled access from any device■ Limit external sharing■ Interoperable with existing

infrastructure, e.g. Bluecoat, ADFSsolution:

■ Real-time data visibility and control powered by Citadel

■ DLP policy enforcement at upload or download

■ Quarantine externally-shared sensitive files in cloud

■ Controlled unmanaged device access via Omni

fortune 50 healthcar

efirm

Page 15: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

our mission

total data

protection est. jan

2013

100+ custome

rs

tier 1 VCs

Page 16: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

resources:more info about byod

■ Whitepaper - definitive guide to CASBs■ Whitepaper - BYOD security that works■ Report: 2015 BYOD security

Page 17: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

download the full BYOD report

the bitglass research team surveyed over 2000 enterprise employees that own smartphones and tablets to uncover trends in BYOD

download the report

Page 18: ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

STORYBOARDS

bitglass.com@bitglass