next-generation mobile security

Post on 10-Feb-2017

195 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

STORYBOARDS

Next-GenerationMobile Security

Rich CampagnaVP, ProductsBitglass

Mike SchurichtDirector, ProductsBitglass

STORYBOARDS

Brief History of BYOD

Source: http://www.google.com/trends/explore#q=byod

STORYBOARDS

Brief History of BYOD Security

STORYBOARDS

Where Are We Now?

28%% of organization doing nothing to

secure BYOD

57%% of employees that refuse MDM/MAM for

BYOD

9%% of companies

using MAM

STORYBOARDS

Where Are We Now?

STORYBOARDS

Where Are We Now?

What Went

Wrong?

STORYBOARDS

It’s an adoption, NOT a rollout

STORYBOARDS

67% Would participate in BYOD if employer had no ability to view, alter, delete personal data & apps

64% IT pros who believe agentless mobile security would make BYOD program more successful

STORYBOARDS

Evolution of Mobile Security

● User privacy issues

● Difficult to deploy and manage

● No data protection or visibility

Manage the Device

STORYBOARDS

Evolution of Mobile Security

● User privacy issues

● Difficult to deploy and manage

● No data protection or visibility

● User privacy issues

● Can’t use native apps (mail, browser)

● Can’t use 3rd party (cloud) apps

● Difficult to deploy

Manage the Device Wrap the App

STORYBOARDS

Evolution of Mobile Security

● User privacy issues

● Difficult to deploy and manage

● No data protection or visibility

● User privacy issues

● Can’t use native apps (mail, browser)

● Can’t use 3rd party (cloud) apps

● Difficult to deploy

● Privacy & Usability

● Any device, any app,

● Full control and visibility

● Deploys in minutes, no software

Manage the Device Wrap the App Secure the Data

STORYBOARDS

“By 2018, more than half of all bring your own device (BYOD) users that

currently have an MDM agent will be managed by an agentless solution”

Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.

STORYBOARDS

Next-Gen Approach to Mobile Security

● Data-centric security● No user privacy concerns● No agents or MDM hassles

STORYBOARDS

Bitglass Mobile Security

VisibilityAlerts, Reporting

Audit Logs

DLPPre-defined,

Keywords, Regex

Track/Watermark

Encrypt

Redact

Block

DRM

Access Control

Device, Role, Geo, etcManaged vs unmanaged

Selective Wipe

Full Wipe

Any Device, Anywhere

No Software AgentsTransparent to

EmployeesRespect User Privacy

STORYBOARDS

How It Works

Premise Apps

STORYBOARDS

Mobile Security - Traditional vs Next-GenMDM/MAM

1. Device Security● Device PIN lock● Encrypted Storage● Full Device Wipe

2. App Security● Custom Apps/containers● Restrict other apps● Selective wipe custom apps

3. Poor Usability & Privacy

4. High Admin Overhead

Bitglass1. Device Security

● Device PIN lock● Encrypted Storage● Full Device Wipe

2. Data Security● Native Apps, no agents ● Block/mask sensitive data (DLP)● Containerize sensitive data

(DRM)● Selective wipe* native apps● Visibility & Audit

3. Excellent Usability & Privacy

4. Low Admin Overhead*patents pending

STORYBOARDS

Rich Campagnarich@bitglass.com@richcampagna

Mike Schurichtmschuricht@bitglass.com@MikeSchuricht

top related