2. • ‘Enterprise Level’ USB solutions
• All very good but all very similar solutions
• Most are encrypted
• Some have central management capability
• BUT…What Happens When the Device is Lost or Stolen?
• All these solutions rely on being plugged into a 3rd party
internet connect PC/Laptop to be managed
• If the device is not plugged in it…
• Can not be traced
• Can not be managed
• No verifiable audit trail
INTRODUCTION - USB Technology in use Today
3
3. • 561 Million USB Flash Drives will be sold between 2014 and 2018
• Forrsights Survey 2014
• More than 30% have lost a USB drive containing confidential
information
• 77% have lost a laptop, tablet or mobile with sensitive data
• 63% of IT managers lack visibility of mobile data within their
organisation
• 84% use personal emails to send sensitive information
• 50% use public cloud services to send sensitive files
• Wall Street Journal Aug 2014 5000 interviews
INTRODUCTION - Don’t Forget the Insider Threat!
4
4. People Lose Stuff!
More than 30% have lost a USB drive containing confidential information
77% have lost a laptop, tablet or mobile with sensitive data
* Wall Street Journal Aug 2014 5000 interviews
5
8. • Encryption
• Many end users turn off encryption on their device due to it
slowing down operation
• Data Stored in Cloud
• Many users will download a piece of sensitive information from
the Cloud but then store it locally to save time when it is
needed again
• Responsibility for security management should to be
taken away from the End User
THE DETAILS - People Just Want to Get On With Life!
9
14. • Cloud based or On-Premise
Management & user interface
• Location via GPS, GSM & RFID
• Geofencing
• Time controlled access
• Over The Air configuration
• Remote turn On and Off
• Remote data destruct
• Verifiable audit trail and
reporting
SOLUTIONS - Management console
16
15. Thank you
Simon Cuthbert, Director – ExactTrak Ltd
Simon.cuthbert@exactTrak.com
LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak
Notes de l'éditeur
The proposed EU Data Protection revisions for 2016 state that ‘Encryption alone is not enough’. Meaning that there needs to be greater control of mobile data in transit and a means of greater management should data be potentially lost or stolen with a full verifiable audit trail.
Figures come from a global financial services company and cover two years.
These figures only relate to product that were subsequently found / recovered.
In essence there is only a 50% chance that remote data is detected with current technology. It has to get better.