SlideShare une entreprise Scribd logo
1  sur  17
webinar
mar 28
2016
hipaa
compliant
byod:
after the
honeymoon
STORYBOAR
managed
blackberry
era
iPhone
launch
a brief history of byod + byod security:
a landscape littered with failed tech
exchange
on iOS
iPad
launch
the rise of
mdm
unmitigated
data
leakage
pre-2007 2007 2008 2010 2011-13 2016
STORYBOAR
100%
compliance!
20%
of devices deployed
with EMM
the
honeymoon
(based on a
true story)
STORYBOAR
other issues:
● incompatible app
upgrades
● emails dropped
● missed calendar
invitations
20%
refused to install EMM
profiles/agents
after the
honeymoon
(based on the
same true story)
byod security isn’t working:
end users are unhappy
STORYBOAR
57%
of employees refuse
MDM/MAM for BYOD
38%
of IT professionals
don’t participate in
their own BYOD
programs
employees are
resisting
“big brother”
Bitglass BYOD Security Survey 2015
STORYBOAR
approach:
■ Airwatch MDM
results:
■ Devices enrolled: <1k
■ Device not enrolled: >3k
■ No direct Activesync
■ Most have no mobile access
EMM
case study
100%
compliant
(no access)
10k employee
health system
STORYBOAR
36%
of companies
use MDM
9%
of companies
use MAM
existing
security
tech is
inadequate
28%
of orgs are doing
nothing to
secure byod
Bitglass BYOD Security Survey 2015
“By 2018, more than half of all bring your
own device (BYOD) users that currently
have an MDM agent will be managed by an
agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOAR
67%
of employees
the state of
byod
security can
improve
would participate in
BYOD if employers had
no access to personal
data
64%
of IT pros
believe agentless
mobile security would
make BYOD programs
more successful
Bitglass BYOD Security Survey 2015
STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
deployments
manage
the
device
wrap the
app
secure
the data
the evolution of mobile security:
data-centric protection is the future
■ Protection of user
privacy and
experience
■ Any device, any app
■ Full data control and
visibility for IT
■ Deploys in minutes, no
mdm mam bitglass
STORYBOAR
needs:
■ HIPAA compliant BYOD
■ Solve multiple affiliations
■ Employee privacy after MI,
Toggle failed deployments
key features:
■ HIPAA compliant on every
device
■ Migration path to Office 365
■ Easy, agentless deployment
US
hospital
system ■ 2500+ employees
■ 160 locations
■ northeastern US
■ 7000
employees
■ southeastern
US
STORYBOAR
needs:
■ ensure security of PHI in
Google Apps and on BYOD
■ maintain HIPAA compliance
key features:
■ DLP
■ visibility / audit
■ identity management
■ mobile data protection
bay cove
human
services ■ 2500+ employees
■ 160 locations
■ northeastern US
STORYBOAR
bitglass
agentless
byod
security
■ control data at access and
on the device
■ no certs / agents
■ securely enable native
apps & cloud apps
■ easy deployment
■ set and enforce device
security policies
resources:
more info about byod
■ healthcare breach report
■ case study: bay cove human services
■ case study: fortune 100 healthcare firm secure
o365
download the full BYOD report
the bitglass
research team
surveyed over 2000
enterprise
employees that own
smartphones and
tablets to uncover
trends in BYOD
download
the report
STORYBOAR
bitglass.com
@bitglass

Contenu connexe

En vedette

T. Davison - ESS Honours Thesis
T. Davison - ESS Honours ThesisT. Davison - ESS Honours Thesis
T. Davison - ESS Honours Thesis
Tom Davison
 
الدوال الخطية
الدوال الخطيةالدوال الخطية
الدوال الخطية
ealjelani
 
Q1 in what ways does your media product use
Q1 in what ways does your media product useQ1 in what ways does your media product use
Q1 in what ways does your media product use
Ed Dean
 
Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente
barsanofio
 

En vedette (19)

презентация клуб бизнес встреч-V.1
презентация клуб бизнес встреч-V.1презентация клуб бизнес встреч-V.1
презентация клуб бизнес встреч-V.1
 
T. Davison - ESS Honours Thesis
T. Davison - ESS Honours ThesisT. Davison - ESS Honours Thesis
T. Davison - ESS Honours Thesis
 
Impact of banning Rs. 500 and Rs.1000 notes in india
Impact of banning Rs. 500 and Rs.1000 notes in indiaImpact of banning Rs. 500 and Rs.1000 notes in india
Impact of banning Rs. 500 and Rs.1000 notes in india
 
Il Ddl su #LaBuonaScuola
Il Ddl su #LaBuonaScuolaIl Ddl su #LaBuonaScuola
Il Ddl su #LaBuonaScuola
 
La riforma della Pubblica Amministrazione (4 agosto 2015)
La riforma della Pubblica Amministrazione (4 agosto 2015)La riforma della Pubblica Amministrazione (4 agosto 2015)
La riforma della Pubblica Amministrazione (4 agosto 2015)
 
6 ii zh_ru_2014
6 ii zh_ru_20146 ii zh_ru_2014
6 ii zh_ru_2014
 
PNSD Formazione docenti
PNSD Formazione docentiPNSD Formazione docenti
PNSD Formazione docenti
 
8 t s
8 t s8 t s
8 t s
 
5 ort b i
5 ort b i5 ort b i
5 ort b i
 
Hacking with ARM devices on Linux
Hacking with ARM devices on Linux Hacking with ARM devices on Linux
Hacking with ARM devices on Linux
 
The Perils of Perception in 2016: Ipsos MORI
The Perils of Perception in 2016: Ipsos MORIThe Perils of Perception in 2016: Ipsos MORI
The Perils of Perception in 2016: Ipsos MORI
 
'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk'Self-Publish to Success' - notes from a talk
'Self-Publish to Success' - notes from a talk
 
الدوال الخطية
الدوال الخطيةالدوال الخطية
الدوال الخطية
 
MaThHs Proportion
MaThHs ProportionMaThHs Proportion
MaThHs Proportion
 
Career with Keppel Land
Career with Keppel Land Career with Keppel Land
Career with Keppel Land
 
Ethical Use of Social Media
Ethical Use of Social MediaEthical Use of Social Media
Ethical Use of Social Media
 
Plain2013 Writing for Web and Mobiles N James G Redish
Plain2013 Writing for Web and Mobiles N James G Redish Plain2013 Writing for Web and Mobiles N James G Redish
Plain2013 Writing for Web and Mobiles N James G Redish
 
Q1 in what ways does your media product use
Q1 in what ways does your media product useQ1 in what ways does your media product use
Q1 in what ways does your media product use
 
Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente Il sito del comune di oria inizia ad essere trasparente
Il sito del comune di oria inizia ad essere trasparente
 

Similaire à HIPAA Compliant BYOD: After the MDM Honeymoon

Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
Security that works
Security that worksSecurity that works
Security that works
James1280
 

Similaire à HIPAA Compliant BYOD: After the MDM Honeymoon (20)

Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare Data
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
Security that works
Security that worksSecurity that works
Security that works
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
 

Plus de Bitglass

Plus de Bitglass (20)

Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 

Dernier

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

HIPAA Compliant BYOD: After the MDM Honeymoon

  • 2. STORYBOAR managed blackberry era iPhone launch a brief history of byod + byod security: a landscape littered with failed tech exchange on iOS iPad launch the rise of mdm unmitigated data leakage pre-2007 2007 2008 2010 2011-13 2016
  • 3. STORYBOAR 100% compliance! 20% of devices deployed with EMM the honeymoon (based on a true story)
  • 4. STORYBOAR other issues: ● incompatible app upgrades ● emails dropped ● missed calendar invitations 20% refused to install EMM profiles/agents after the honeymoon (based on the same true story)
  • 5. byod security isn’t working: end users are unhappy
  • 6. STORYBOAR 57% of employees refuse MDM/MAM for BYOD 38% of IT professionals don’t participate in their own BYOD programs employees are resisting “big brother” Bitglass BYOD Security Survey 2015
  • 7. STORYBOAR approach: ■ Airwatch MDM results: ■ Devices enrolled: <1k ■ Device not enrolled: >3k ■ No direct Activesync ■ Most have no mobile access EMM case study 100% compliant (no access) 10k employee health system
  • 8. STORYBOAR 36% of companies use MDM 9% of companies use MAM existing security tech is inadequate 28% of orgs are doing nothing to secure byod Bitglass BYOD Security Survey 2015
  • 9. “By 2018, more than half of all bring your own device (BYOD) users that currently have an MDM agent will be managed by an agentless solution” Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
  • 10. STORYBOAR 67% of employees the state of byod security can improve would participate in BYOD if employers had no access to personal data 64% of IT pros believe agentless mobile security would make BYOD programs more successful Bitglass BYOD Security Survey 2015
  • 11. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection ■ User privacy issues ■ Prevents use of native apps (mail/calendar) ■ 3rd party / cloud apps non-functional ■ Challenging deployments manage the device wrap the app secure the data the evolution of mobile security: data-centric protection is the future ■ Protection of user privacy and experience ■ Any device, any app ■ Full data control and visibility for IT ■ Deploys in minutes, no mdm mam bitglass
  • 12. STORYBOAR needs: ■ HIPAA compliant BYOD ■ Solve multiple affiliations ■ Employee privacy after MI, Toggle failed deployments key features: ■ HIPAA compliant on every device ■ Migration path to Office 365 ■ Easy, agentless deployment US hospital system ■ 2500+ employees ■ 160 locations ■ northeastern US ■ 7000 employees ■ southeastern US
  • 13. STORYBOAR needs: ■ ensure security of PHI in Google Apps and on BYOD ■ maintain HIPAA compliance key features: ■ DLP ■ visibility / audit ■ identity management ■ mobile data protection bay cove human services ■ 2500+ employees ■ 160 locations ■ northeastern US
  • 14. STORYBOAR bitglass agentless byod security ■ control data at access and on the device ■ no certs / agents ■ securely enable native apps & cloud apps ■ easy deployment ■ set and enforce device security policies
  • 15. resources: more info about byod ■ healthcare breach report ■ case study: bay cove human services ■ case study: fortune 100 healthcare firm secure o365
  • 16. download the full BYOD report the bitglass research team surveyed over 2000 enterprise employees that own smartphones and tablets to uncover trends in BYOD download the report

Notes de l'éditeur

  1. BYOD has changed a great deal in the last decade. Before the launch of the iPhone and other modern smartphones in 2007, managed Blackberry devices were the norm. Employees would receive both a managed Windows PC and a managed mobile phone. With the launch of iPhone in 2007, executives quickly came to want their personal mobile devices as their primary work devices. There was a gradual shift toward BYOD as demand for corporate mail, calendar, and contacts on these smartphones grew and IT administrators came under pressure to support iOS and Android. In 2008, iPhone came to support Exchange. This made it possible to access corporate data on iOS, not possible before. Unfortunately, this brought with it the challenge of securing data on these devices. Many organizations refused to allow BYOD in their organizations because they couldn’t ensure that data would remain secure or within the company firewall if they enabled mail, contacts, corporate calendar, and corporate file access on these devices. The release of iPad in 2010 spurred demand for BYOD as many employees pushed to have their personal tablets replace antiquated Windows machines in their organization. MDM became the go-to solution for organizations looking to secure BYOD. Unfortunately, there were a number of drawbacks to this solution, namely issues with privacy, user experience, adoption within organizations, and more. Today, organizations that have MDM or MAM deployed still have issues with data leakage, particularly where employees refuse MDM or MAM on their personal devices but still look to access corporate data on those unmanaged devices.
  2. Users are actively pushing against invasive tools that give employers control of their personal data on personal devices. In fact, these stats show that many employees simply refuse to adopt MDM and MAM. Even IT professionals, those who purchase these solutions with the knowledge they will be deployed in the organization and have a deep familiarity with the functions and capabilities of these tools, refuse to participate.
  3. Users are actively pushing against invasive tools that give employers control of their personal data on personal devices. In fact, these stats show that many employees simply refuse to adopt MDM and MAM. Even IT professionals, those who purchase these solutions with the knowledge they will be deployed in the organization and have a deep familiarity with the functions and capabilities of these tools, refuse to participate.
  4. Google Play store reviews indicate users aren’t happy with MDM solutions like Airwatch and MobileIron. The user experience issues here are a hindrance to adoption and we see employees either choose not to install these apps on their devices and not access corporate data at all, or more frequently, employees that refuse MDM but still access corporate data in an unsecured manner. Why aren’t these MDM and MAM tools adopted by employees in most organizations? The concern is generally user experience. Not only do these tools require that invasive agents be installed, but also, the apps that enable access to corp mail, calendar, and contacts are poorly built, often cause a hit to battery life, and the app makers themselves have little reason to fix these issues because the end-users have to use their tools regardless.
  5. Users are actively pushing against invasive tools that give employers control of their personal data on personal devices. In fact, these stats show that many employees simply refuse to adopt MDM and MAM. Even IT professionals, those who purchase these solutions with the knowledge they will be deployed in the organization and have a deep familiarity with the functions and capabilities of these tools, refuse to participate.
  6. 2500 employees
  7. Looking at adoption rates of byod security solutions across enterprises, we get the sense that existing tech is inadequate...
  8. But...
  9. 2500 employees
  10. 2500 employees
  11. Only the Bitglass protects data in the cloud, at access, and on any device. Reverse proxy mode protects traffic from any device, anywhere, without browser configuration, device profiles or VPN. cloud data-at-rest is scanned via API connectors, uncovering compliance violations and external sharing.