SlideShare une entreprise Scribd logo
1  sur  11
Lock Down Mobile and Cloud Data Leaks Part I
An Accellion Mobile Presentation
Dual Persona Mobile User!

    I’m a                I’m a
Business User          Consumer




                                  2
BYOD in the U.S.




            Corp                 Corp Planned
         Planned              Smartphone Purchases
           Tablet
       Purchases
                                   39%
       31%
       Tablet Demand               Smartphone
                                    Demand
               In 2012               In 2012

        54.8M                     110M
                         Source: ChangeWave & IDC, 2012   3
Apps and Content: Consumer User
Apps and Content: Business




                                  4
Consumer-grade Cloud Services

    Enterprise
  Private Content




                    Consumer-grade Cloud Services


                                                    5
Nexus of Three Forces




mobile
                         6
Dual Persona Mobility Model:
Risk and Challenges




     Enable mobile user productivity without
         jeopardizing content security.
                                               7
Key Risks and Challenges
Risks
• Lost devices
• Personal use (BYOD problem)
• The “Dropbox” problem
• Jail-broken, rooted devices
• Consistency and legal risks
Challenges
• Enabling social collaboration
• Privileged access and protection of enterprise content
• Compliance
                                                           8
App Insecurity




                 9
Common Remedy


                Restrict
                  the
                Device

                       10
EMM = MDM + MAM + MCM


                   Mobile
                 Application
                 Management



                                Mobile Content
                               Delivery, Control &
 Mobile Device
                                 Management
 Management
                                                     11

Contenu connexe

Tendances

Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012Robert Sutor
 
WITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendWITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendBess Ho
 
Embracing Social Media Part 1
Embracing Social Media Part 1Embracing Social Media Part 1
Embracing Social Media Part 1ACHIEVA
 
IBM Worklight Slides
IBM Worklight SlidesIBM Worklight Slides
IBM Worklight SlidesJim Porter
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
CAAEN Presentation 1-31-12
CAAEN Presentation 1-31-12CAAEN Presentation 1-31-12
CAAEN Presentation 1-31-12Edward Niu
 
App To The Future - What Next November 2010
App To The Future - What Next November 2010App To The Future - What Next November 2010
App To The Future - What Next November 2010BCM Group
 
Enterprise Application Distribution Technical White Paper[1]
Enterprise Application Distribution   Technical White Paper[1]Enterprise Application Distribution   Technical White Paper[1]
Enterprise Application Distribution Technical White Paper[1]genasun
 
How Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationHow Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationDigitalDesignsInc
 
Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012GENBANDcorporate
 
Eddystone FAQ's
Eddystone  FAQ'sEddystone  FAQ's
Eddystone FAQ'sbfonics
 
Mobile Apps for Business Productivity The Circuit
Mobile Apps for Business Productivity The CircuitMobile Apps for Business Productivity The Circuit
Mobile Apps for Business Productivity The CircuitThe Circuit
 
Mobile application developments
Mobile application developmentsMobile application developments
Mobile application developmentsFusion Informatics
 

Tendances (20)

Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012
 
WITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendWITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile Trend
 
Embracing Social Media Part 1
Embracing Social Media Part 1Embracing Social Media Part 1
Embracing Social Media Part 1
 
Asian Mobile Market
Asian Mobile MarketAsian Mobile Market
Asian Mobile Market
 
IBM Worklight Slides
IBM Worklight SlidesIBM Worklight Slides
IBM Worklight Slides
 
Intro to mobile technology
Intro to mobile technologyIntro to mobile technology
Intro to mobile technology
 
Lotusphere 2012 - Updates for mobile devices
Lotusphere 2012 - Updates for mobile devicesLotusphere 2012 - Updates for mobile devices
Lotusphere 2012 - Updates for mobile devices
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
CAAEN Presentation 1-31-12
CAAEN Presentation 1-31-12CAAEN Presentation 1-31-12
CAAEN Presentation 1-31-12
 
App To The Future - What Next November 2010
App To The Future - What Next November 2010App To The Future - What Next November 2010
App To The Future - What Next November 2010
 
Enterprise Application Distribution Technical White Paper[1]
Enterprise Application Distribution   Technical White Paper[1]Enterprise Application Distribution   Technical White Paper[1]
Enterprise Application Distribution Technical White Paper[1]
 
Privacy lecture 6 revenue model
Privacy lecture 6 revenue modelPrivacy lecture 6 revenue model
Privacy lecture 6 revenue model
 
How Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationHow Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive Presentation
 
Trends to watch 2015
Trends to watch 2015Trends to watch 2015
Trends to watch 2015
 
B-Smart | Mobile Solutions
B-Smart | Mobile SolutionsB-Smart | Mobile Solutions
B-Smart | Mobile Solutions
 
Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012
 
Eddystone FAQ's
Eddystone  FAQ'sEddystone  FAQ's
Eddystone FAQ's
 
Mobile Apps for Business Productivity The Circuit
Mobile Apps for Business Productivity The CircuitMobile Apps for Business Productivity The Circuit
Mobile Apps for Business Productivity The Circuit
 
Mobile application developments
Mobile application developmentsMobile application developments
Mobile application developments
 

En vedette

Juan ramón jiménez Alejandro A 5ºa
Juan ramón jiménez Alejandro A 5ºa Juan ramón jiménez Alejandro A 5ºa
Juan ramón jiménez Alejandro A 5ºa school
 
Music recognition
Music recognition Music recognition
Music recognition aaronloklok
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IIProofpoint
 
G12.2012 magic quadrant for enterprise information archiving
G12.2012 magic quadrant for enterprise information archivingG12.2012 magic quadrant for enterprise information archiving
G12.2012 magic quadrant for enterprise information archivingSatya Harish
 

En vedette (6)

496411219
496411219496411219
496411219
 
12213802 pss7
12213802 pss712213802 pss7
12213802 pss7
 
Juan ramón jiménez Alejandro A 5ºa
Juan ramón jiménez Alejandro A 5ºa Juan ramón jiménez Alejandro A 5ºa
Juan ramón jiménez Alejandro A 5ºa
 
Music recognition
Music recognition Music recognition
Music recognition
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
G12.2012 magic quadrant for enterprise information archiving
G12.2012 magic quadrant for enterprise information archivingG12.2012 magic quadrant for enterprise information archiving
G12.2012 magic quadrant for enterprise information archiving
 

Similaire à Lock Down Mobile and Cloud Data Leaks Part I

Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedNuno Alves
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Ed Brill
 
E2 lennertdewaal
E2 lennertdewaalE2 lennertdewaal
E2 lennertdewaalStrategy
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
IBM Mobile Enterprise Overview
IBM Mobile Enterprise OverviewIBM Mobile Enterprise Overview
IBM Mobile Enterprise Overviewaakhan0830
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the OfficeHeath McCarthy
 
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...Wayne Chen
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Shafaq Abdullah
 

Similaire à Lock Down Mobile and Cloud Data Leaks Part I (20)

Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Enterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scriptedEnterprise mobility management customer presentation december scripted
Enterprise mobility management customer presentation december scripted
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...
 
E2 lennertdewaal
E2 lennertdewaalE2 lennertdewaal
E2 lennertdewaal
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
IBM Mobile Enterprise Overview
IBM Mobile Enterprise OverviewIBM Mobile Enterprise Overview
IBM Mobile Enterprise Overview
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the Office
 
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 

Plus de Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 

Plus de Proofpoint (20)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Lock Down Mobile and Cloud Data Leaks Part I

  • 1. Lock Down Mobile and Cloud Data Leaks Part I An Accellion Mobile Presentation
  • 2. Dual Persona Mobile User! I’m a I’m a Business User Consumer 2
  • 3. BYOD in the U.S. Corp Corp Planned Planned Smartphone Purchases Tablet Purchases 39% 31% Tablet Demand Smartphone Demand In 2012 In 2012 54.8M 110M Source: ChangeWave & IDC, 2012 3
  • 4. Apps and Content: Consumer User Apps and Content: Business 4
  • 5. Consumer-grade Cloud Services Enterprise Private Content Consumer-grade Cloud Services 5
  • 6. Nexus of Three Forces mobile 6
  • 7. Dual Persona Mobility Model: Risk and Challenges Enable mobile user productivity without jeopardizing content security. 7
  • 8. Key Risks and Challenges Risks • Lost devices • Personal use (BYOD problem) • The “Dropbox” problem • Jail-broken, rooted devices • Consistency and legal risks Challenges • Enabling social collaboration • Privileged access and protection of enterprise content • Compliance 8
  • 10. Common Remedy Restrict the Device 10
  • 11. EMM = MDM + MAM + MCM Mobile Application Management Mobile Content Delivery, Control & Mobile Device Management Management 11

Notes de l'éditeur

  1. At work, we are both a consumer and a business user, all in the same body.We take the same device that we use to Text, to check-in where we eat dinner, The same device we use to post our kid’s soccer tournament pics to FB;and bring it to the office and use it on corporate network, and access corporate content.
  2. That desire to bring our own devices to work was morphed by 1stthe rapid ascension of Smartphones and then the introduction of tablets let by iPad, and it was driven by Efficiency and higher productivity and perceived costs savings: including DEVICE COSTS, DATA COSTS, IT MANGEMENT COSTS, INEFFICIENCIESMOBILECorporate demand for smartphones Q212 – planned purchases: 39%Corporate demand for Tablets Q212 – planned purchases – 18% o 31%"Today, 27% of companies support the iPad, and another 31% report plans to support or interest in supporting the iPad, not to mention the additional 23% that report employee interest despite a lack of IT interest. A recent Gartner press release forecasts 118.1 million tablets will be sold this yea worldwide. iPad =61.4%. 54.8M will be in the US.Not sure if it’s Apple that is causing the continued growth of the overall BYOD trend, or the overall BYOD trend by business users that is causing the proactive enterprise deployment of iPad/tablets.We’ll leave that debate for another time. What is clear is the BYOD trend is growing significantly with a spectrum of devices used in the enterprise that have never been broader.Gartner’s Stats on TabletsRead more here: http://www.kansascity.com/2012/08/15/3763368/worldwide-market-share-for-tablet.html#storylink=copy2012 Forecast = 73+37.9+4.9+1.3+0.510 = 118.9M Tablets sold
  3. As consumers we use hundreds of apps (some of which you are familiar with) to connect with friends, listen to music, and check our balances, play games, and etc. And guess what, as business users, we also use the same set of apps, plus a few more that are content manipulation purposes.
  4. CLOUDThere is another phenomenon that is happening in the Enterprises is the introduction of consumer grade, cloud storage and file sharing services.Today, 450M people have Dropbox accounts, several Mil have Box or YouSendIt accounts, and it’s a market that Big Brand names have also entered with their Cloud file sharing offering: Google with GoogleDrive, MSFT with SkyDrive, Apple with iCloud, not including the smaller players. No one disputes the legitimate need for consumer cloud file sharing and storage services. It’s just that consumer clouds have no place being mingled with private enterprise content. They are a source for corporate data leak. The BYOD business user, who has access to these services puts corporate content on there for later access, which could then be subject to leak. Once that happens, the files are out of control. Corporate content can begin to leak outside this way.As you may have heard, Dropbox admitted yesterday that it was breached. With this development, many data security conversations are going to focus on the cloud and external threats; however, when it comes to file storage and sharing,  the story is broader than that and it’s important for enterprises to consider the multiple facets needed for secure file sharing.   When evaluating  vendors, buyers need to consider multiple factors for security including deployment options (private -, public-, hybrid cloud), AV capabilities, file transfer tracking and reporting tools (especially important in regulated industries)  as well as a vendor’s ability to integrate with data loss prevention (DLP) platforms.  This last piece gives organizations the ability to inspect all data before it leaves an organization – scanning for confidential data (social security numbers, credit card numbers, product information, etc.) and blocking and/or quarantining file transfers that violate established policies.   Accellion, provider of enterprise-class secure file sharing solutions, would happy to speak with you in more detail around what  organizations need to do to make sure they are getting the security they need with their file sharing service. Top Articles Dropbox: Yes, we were hackedGigaOm, Barb Darrow, August 1, 2012http://gigaom.com/cloud/dropbox-yes-we-were-hacked/ Dropbox Admits To User Data Theft, Bolsters SecurityFast Company, Kit Eaton, August 1, 2012http://www.fastcompany.com/1844342/dropbox-admits-to-user-data-theft-bolsters-security?partner=rss Dropbox spam explained – new security features addedInfo security Magazine, August 1, 2012http://www.infosecurity-magazine.com/view/27337/dropbox-spam-explained-new-security-features-added/ Dropbox gets hacked ... againZDNet, Ed But, August 1, 2012http://www.zdnet.com/dropbox-gets-hacked-again-7000001928/ Dropbox Reports User Accounts Were Hijacked, Adds New Security FeaturesTechCrunch, Rip Empson, July 31, 2012http://techcrunch.com/2012/07/31/dropbox-admits-user-accounts-were-hijacked-adds-new-security-features/ Dropbox hack confirmed while company assures renewed securitySlashGear, Chris Burns, July 31, 2012http://www.slashgear.com/dropbox-hack-confirmed-while-company-assures-renewed-security-31241139/ Dropbox confirms user info was stolen, adds new security measureshttp://www.engadget.com/2012/08/01/dropbox-confirms-security-breach-new-measures/ 
  5. Why Social:At the center of all businesses are people. Social collaboration has shown that wisdom can be gained from crowds, from Virtual teams that can lead to ideation for new products and strategiesSo, there is no question that Businesses are trending toward social, mobile and the cloud with a tremendous velocity that can not be stopped, because of its promises of higher agility, efficiency and productivityand that the nexus of these 3 forces of social mobile and cloud are having game changing impacts on IT, and how they implemented security, making them out of sync with the trends! http://www.zdnet.com/blog/hinchcliffe/cloud-computing-a-new-era-of-it-opportunity-and-challenges/261
  6. The challenge is how to embrace this new dual persona Mobile Enterprise model,without the risk of Jeopardizing Security?The challenge is how to regain control and provide management and delivery of content, for everybody in the enterprise while ensuring security.
  7. What’s top of mind of many CISO/CIO and IT decision makers Is how to:Manage BYOD Users rights and Privileges for Access of Corporate Data using their own devicesavoid the creation of a Shadow IT and losing control of corporate content through business users use of consumer cloud servicesEnable social and mobile content delivery and collaboration Ensure Compliance with regulatory requirements of SOX, HiPPA and othersAvoid the dreaded Xmas eve call from the IT personnel that there’s been a leak, and that all YouSendIt accounts are now compromised, Protect confidential content by locking down mobile users an Cloud data leaks?Let’s look at how these goals can be well attained.
  8. The report studied 230 top apps -- including the Top 100 Paid apps on Android and iOS -- and found that 92% of iOS apps have been hacked, with this rising to an incredible 100% on the Android platform.Free apps weren’t immune from attacks either, as Arxan found that 40% of popular free iOS apps had been hacked, with this rising to 80% for apps running Google's operating system.Researchers found hacking to be prevalent across all mobile apps irrespective of category (including business and productivity), and indicated that hacking presides in a number of forms, from disabling security to unlocking and modifying app features. Hackers also resort to code/IP theft and pushing illegal malware-infested versions.To counter this, Arxan Technologies says that developers should harden the code against reverse engineering (reproducing the app based on how it is built) and make their apps tamper-proof and self-defending."We envision a thriving App Economy with freedom and confidence to innovate and distribute new apps”, said Jukka Alanen, vice president at Arxan and the lead author of the new study.“However, this potential is being threatened by hackers, and most enterprises, security teams, and app developers are not prepared for these attacks.”
  9. The most common remedy IT departments employ is to: Restrict the device, i.e. Prohibit BYODIE, No personal devices allowed in corporate environment, and you know how that turned out when he was asked to stop using WWF on his phone.Limiting BYOD (limited employees, limited data, connectivity and devices)And if allowed, and a malware or jail-broken app is detected, wipe the whole deviceAnd, make everyone go through a secure transport layer like VPNApplication data not protectedWiping personal dataExpose corporate network
  10. Embracing the Dual Persona enterprise mobility model and addressing all of the challenges we enumerated in previous slides is accomplished by deploying an Enterprise Mobility Management solution.An EMM has three components to it: Mobile Device Management, that is concerned with restricting, controlling devices, Mobile Application Management which focuses on Application Data protection, and Mobile Content Management that is concerned solely on control and delivery of content. Hence the formula that I am showing here: EMM = MDM + MAM + MCM.Many of the MDM vendors today offer some level of app security, in addition to their fundamental MDM offering.It is through a walled Garden of ISV Apps that they have wrapped with a secure layer, or creating an enterprise app store . So, an MDM vendor today is likely able to address application management for you as well. Content delivery and control solution, however, has to be a solution of its own, which almost none of the MDM and MAM players in the market today offer. And that is exactly what Accellion offers with its Cloud-based mobile file sharing solution. We are kind of a best kept secret, that is why I have a couple of slides to tell you who we are toward the end.For now, what I’d like to do to share with you what are the best practices, or some of the key criteria that you ought to employ, whether you’re looking at Accellion or another provider, as you look for a Content Mobility Solution to lock down mobile and cloud data leaks.