Download - Secure BYOD without MDM Hassles
STORYBOARDS
Secure BYOD without MDM Hassles
Neal MhaskarMarketing [email protected]
Salim HafidMarketing [email protected]
STORYBOARDS
Brief History of BYOD
Source: http://www.google.com/trends/explore#q=byod
STORYBOARDS
Brief History of BYOD Security
STORYBOARDS
Vote #1
STORYBOARDS
Is BYOD Working?
28%% of organization doing
nothing to secure BYOD
57%% of employees that refuse MDM/MAM for
BYOD
9%% of companies using
MAM
STORYBOARDS
Is BYOD Working?
STORYBOARDS
Evolution of Mobile Security
● User privacy issues
● Difficult to deploy and manage
● No data protection or visibility
● User privacy issues
● Can’t use native apps (mail, browser)
● Can’t use 3rd party (cloud) apps
● Difficult to deploy
● Privacy & Usability
● Any device, any app,
● Full control and visibility
● Deploys in minutes, no software
Manage the Device Wrap the App Secure the Data
STORYBOARDS
67% Would participate in BYOD if employer had no ability to view, alter, delete personal data & apps
64% IT pros who believe agentless mobile security would make BYOD program more successful
STORYBOARDS
“By 2018, more than half of all bring your own device (BYOD) users that currently have an
MDM agent will be managed by an agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOARDS
Vote #2
STORYBOARDS
How It Works
Control data as it flows to the device
Control data on-device
No agentsNo certs
STORYBOARDS
Bay Cove Human Services
2500 Employees
HIPAA Compliance with Google Apps and BYOD
● Google cost effective for non-profits, enhances productivity
● Challenges: Protect PHI, remain HIPAA compliant, keep costs low
● Key features: Data leakage prevention, visibility, integrated identity management, mobile data protection
STORYBOARDS
Fortune 500 Beverage Co
7000 Employees
BYOD Without MDM Hassles
● Failed MobileIron and SAP Afaria deployments
● Needs: BYOD adoption, fast/easy deployment
● Key features: Agentless solution, honors employee privacy, no device/OS dependencies
STORYBOARDS
Resources
1. BYOD Security Whitepaper - http://pages.bitglass.com/byod-security-that-works.html
2. Bitglass Case Studies - http://www.bitglass.com/resources#case_studies=1
3. BYOD Security Report - http://pages.bitglass.com/Bitglass_BYOD_Security_report_2015.html