major trends transforming byod security
TRANSCRIPT
STORYBOARDS
how well has byod adoption
gone in your org?
STORYBOARDS
trend 1: productivity + mobility are driving BYOD adoption
STORYBOARDS
trend 2: traditional tools are no longer effective
■ Legacy tools were built to secure the infrastructure
■ Traditional tools can’t secure access from unmanaged devices
■ Data blind spot: cloud apps are responsible for infra, IT is responsible for data
STORYBOARDS
trend 3: employees are rejecting MDM and MAM
■ Employees are resisting IT “big brother”
■ 38% of IT professionals don’t participate in their own BYOD programs
■ 57% of employees refuse MDM/MAM for BYOD Bitglass BYOD Security Survey
2015
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
■ User privacy issues
■ Prevents use of native apps (mail/calendar)
■ 3rd party / cloud apps non-functional
■ Challenging deployments
manage the device
wrap the app
secure the data
trend 4: mobile security tools are evolving rapidly
■ Protection of user privacy and experience
■ Any device, any app
■ Full data control and visibility for IT
■ Deploys in minutes, no software
mdm mam casb
“By 2018, more than half of all bring your own device (BYOD) users that
currently have an MDM agent will be managed by an agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
what are your biggest mobile
security concerns?
STORYBOARDS
a betterapproach:
secure the data
STORYBOARDS
agentless BYOD access via activesync
■ Secure mobile devices without invasive profiles or certificates
■ Protect data in “unwrappable” native apps like mail, contacts, calendar
■ Selectively wipe corporate data■ Enforce device security policies■ Full data control and visibility for IT
STORYBOARDS
agentless BYOD access via reverse proxy
■ Secure access from any unmanaged device without agents
■ Users are automatically routed through the proxy via SSO
■ Full data control and visibility for IT■ Control data access with context and
content-aware DLP
STORYBOARDS
data leakage preventiona complete set of data controls
■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking
■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more
■ Easily modify sharing permissions and quarantine files for review
STORYBOARDS
client:■ 8000 employees ■ s&p 500
challenge: ■ Lack of adherence to BYOD security
measures■ Failed MobileIron and SAP Afaria
deploymentssolution:
■ Bitglass Agentless – device / OS independent
■ Fast deployment■ Logging for compliance with
internal data security policies■ Seamless integration with
ActiveDirectory
fortune 500
beverage co.
byod security
STORYBOARDS
secure office 365 + byod
challenge: ■ Inadequate native O365 security■ Controlled access from any device■ Limit external sharing■ Interoperable with existing
infrastructure, e.g. Bluecoat, ADFS
solution: ■ Real-time data visibility and control
powered by Citadel■ DLP policy enforcement at upload
or download■ Quarantine externally-shared
sensitive files in cloud ■ Controlled unmanaged device
access via Omni
fortune 50 healthcar
efirm
STORYBOARDS
our mission
total data
protection est. jan
2013
100+ custome
rs
tier 1 VCs
resources:more info about byod
■ Report: BYOD Trends in Forward-Looking Industries
■ Case Study: Global Arms Giant Secures BYOD■ Video: Mobile Use Case - Bay Cove Human
Services
STORYBOARDS
bitglass.com@bitglass