In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.
4. STORYBOAR
trend 2: traditional tools are no longer effective
■ Legacy tools were built to secure the
infrastructure
■ Traditional tools can’t secure access
from unmanaged devices
■ Data blind spot: cloud apps are
responsible for infra, IT is responsible for
data
5. STORYBOAR
trend 3: employees are rejecting MDM and MAM
■ Employees are resisting IT “big brother”
■ 38% of IT professionals don’t participate in
their own BYOD programs
■ 57% of employees refuse MDM/MAM for
BYOD
Bitglass BYOD Security Survey 2015
6. STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
manage
the
device
wrap the
app
secure
the data
trend 4: mobile security tools are evolving rapidly
■ Protection of user
privacy and
experience
■ Any device, any app
■ Full data control and
visibility for IT
mdm mam casb
7. “By 2018, more than half of all bring your
own device (BYOD) users that currently
have an MDM agent will be managed by an
agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
10. STORYBOAR
agentless BYOD access via activesync
■ Secure mobile devices without invasive
profiles or certificates
■ Protect data in “unwrappable” native apps
like mail, contacts, calendar
■ Selectively wipe corporate data
■ Enforce device security policies
■ Full data control and visibility for IT
11. STORYBOAR
agentless BYOD access via reverse proxy
■ Secure access from any unmanaged
device without agents
■ Users are automatically routed through the
proxy via SSO
■ Full data control and visibility for IT
■ Control data access with context and
content-aware DLP
12. STORYBOAR
data leakage prevention
a complete set of data controls
■ Apply granular DLP to sensitive data with
spectrum of actions from watermarking to outright
blocking
■ Context-aware engine can distinguish between
users, managed and unmanaged devices, and
more
13. STORYBOAR
client:
■ 8000 employees
■ s&p 500
challenge:
■ Lack of adherence to BYOD security
measures
■ Failed MobileIron and SAP Afaria
deployments
solution:
■ Bitglass Agentless – device / OS
independent
■ Fast deployment
■ Logging for compliance with internal data
security policies
■ Seamless integration with
ActiveDirectory
fortune
500
beverage
co.
byod
security
14. STORYBOAR
secure
office 365
+ byod
challenge:
■ Inadequate native O365 security
■ Controlled access from any device
■ Limit external sharing
■ Interoperable with existing infrastructure,
e.g. Bluecoat, ADFS
solution:
■ Real-time data visibility and control
powered by Citadel
■ DLP policy enforcement at upload or
download
■ Quarantine externally-shared sensitive
files in cloud
■ Controlled unmanaged device access
via Omni
fortune 50
healthcare
firm
16. resources:
more info about byod
■ Report: BYOD Trends in Forward-Looking Industries
■ Case Study: Global Arms Giant Secures BYOD
■ Video: Mobile Use Case - Bay Cove Human Services
How well has BYOD adoption gone in your organization?
Much better than expected
Slightly better than expected
As expected
Lower than expected
We don’t allow BYOD
What are your biggest mobile security concerns?
Loss of control after download
No control over access
Theft or lost devices
Something else