isc(2) security briefing part 3 - enabling secure byod with casbs
TRANSCRIPT
enabling secure BYOD with cloud access security
brokersmay 5 2016
cloud and mobile are inseparable...
saas
driving corporate data outside the firewall.
STORYBOARDS
legacy data security
secure the infrastructu
re
STORYBOARDS
security must evolve to
protect data outside the
firewall
ungoverned access to
corporate data in the cloud
sensitive data on
unmanaged devices
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
manage the device
the evolution of mobile securitydata-centric protection is the future
mdm
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
■ User privacy issues
■ Prevents use of native apps (mail/calendar)
■ 3rd party / cloud apps non-functional
■ Challenging deployments
manage the device
wrap the app
the evolution of mobile securitydata-centric protection is the future
mdm mam
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
■ User privacy issues
■ Prevents use of native apps (mail/calendar)
■ 3rd party / cloud apps non-functional
■ Challenging deployments
manage the device
wrap the app
secure the data
the evolution of mobile securitydata-centric protection is the future
■ Protection of user privacy and experience
■ Any device, any app
■ Full data control and visibility for IT
■ Deploys in minutes, no software
mdm mam casb
“By 2018, more than half of all bring your own device (BYOD) users that
currently have an MDM agent will be managed by an agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOARDS
casbapproach
secure the data
STORYBOARDS
agentless BYOD access via activesync
■ Secure mobile devices without invasive profiles or certificates
■ Protect data in “unwrappable” native apps like mail, contacts, calendar
■ Selectively wipe corporate data■ Enforce device security policies■ Full data control and visibility for IT
STORYBOARDS
agentless BYOD access via reverse proxy
■ Secure access from any unmanaged device without agents
■ Users are automatically routed through the proxy via SSO
■ Full data control and visibility for IT■ Control data access with context and
content-aware DLP
STORYBOARDS
data leakage preventiona complete set of data controls
■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking
■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more
■ Easily modify sharing permissions and quarantine files for review
STORYBOARDS
client:■ 8000 employees ■ s&p 500
challenge: ■ Lack of adherence to BYOD security
measures■ Failed MobileIron and SAP Afaria
deploymentssolution:
■ Bitglass Agentless – device / OS independent
■ Fast deployment■ Logging for compliance with
internal data security policies■ Seamless integration with
ActiveDirectory
fortune 500
beverage co.
byod security
STORYBOARDS
secure office 365 + byod
challenge: ■ Inadequate native O365 security■ Controlled access from any device■ Limit external sharing■ Interoperable with existing
infrastructure, e.g. Bluecoat, ADFSsolution:
■ Real-time data visibility and control powered by Citadel
■ DLP policy enforcement at upload or download
■ Quarantine externally-shared sensitive files in cloud
■ Controlled unmanaged device access via Omni
fortune 50 healthcar
efirm
STORYBOARDS
our mission
total data
protection est. jan
2013
100+ custome
rs
tier 1 VCs
resources:more info about byod
■ Whitepaper - definitive guide to CASBs■ Whitepaper - BYOD security that works■ Report: 2015 BYOD security
download the full BYOD report
the bitglass research team surveyed over 2000 enterprise employees that own smartphones and tablets to uncover trends in BYOD
download the report
STORYBOARDS
bitglass.com@bitglass