1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.

Slides:



Advertisements
Similar presentations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Meraki Mobile Device Management
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
Help enable mobile productivity. For years, companies have leveraged Microsoft solutions for their productivity needs. In an evolving cloud-first and mobile-first.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Solution Briefing Business Productivity in Action Keynote.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Prepared By Ben Smyrlian Zix Encryption Network Protects Every .
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
·
Brandon McCormick Channel Account Manager (781) Zix Training 101: Our Solutions.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
The State of Computer & Data Security in Corporations Independent Survey.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Mobile device management
Patrick Opela, Director, Enterprise Business Solutions, Stewart Title Interviewed by Neil Farquharson SECURING S IN THE TITLE INDUSTRY 1 © 2015 ZixCorp.
09:45-10:30 – Windows Mobile Update 10:30-11:30 – System Center Mobile Device Manager :30-11:45 - Break 11:45-12:30 -Deploying SCMDM and Customer.
Microsoft and Symantec
User and Device Management
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Empowering people-centric IT Anthony Bartolo Technical Evangelist Microsoft Canada 05/14/2014.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
Huawei Enterprise AnyOffice BYOD Solution
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
Mobile Devices in the Corporate World
The time to address enterprise mobility is now
ZIXCORP The Criticality of Security Dena Bauckman
Mobile Data Solutions Inc
Mobile Device Management options in Office 365 and beyond
Enterprise Mobility Management (EMM)
Impact of IT Consumerisation on Enterprise Security
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
ZIXCORP The Criticality of Security Kevin Cloutier
Veeam Backup Repository
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Digital $$ Quiz Test your knowledge.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
University of Maryland Robert H. Smith School of Business
Microsoft 365 Business Technical Fundamentals Series
Microsoft Virtual Academy
Presentation transcript:

1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015

 Founded in 1998 as an encryption company  More than 11,000 active customers including :  Six divisions of the U.S. Treasury  All of the FFIEC U.S. federal financial regulators (incl. FDIC and OCC)  The U.S. Securities and Exchange Commission  24 U.S. state financial regulators  More than 2,000 U.S. financial institutions  25% of all banks in the U.S.  20% of all hospitals in the U.S.  32 Blue Cross Blue Shield organizations ABOUT ZIXCORP 2

3

BYOD REQUIRES… 4 MDM Mobile Device Management MAM Mobile Application Management MCM Mobile Content Management EMM Enterprise Mobility Management =

Advantages o Device inventory and management capabilities o Access to multiple platforms from personal or corporate devices o Secure access to corporate data o Support for a wide range of wireless vendors and operating systems o Some data protection with wiping capabilities MOBILE DEVICE MANAGEMENT (MDM) 5

PROLIFERATION OF MDM VENDORS 6

7 MDM COMPARISON Source: MOBIwm.com

HUNDREDS OF APPLICATIONS 8

MOST POPULAR MOBILE BUSINESS APPS , CALENDAR AND CONTACTS 9 Source: BYOD and Mobile Security Report, 2014, Holger Schulze, Information Security Community on LinkedIn

Survey results indicate 45% of respondents report that within the previous 12 months, one or more employees lost a mobile device containing company data  InformationWeek’s 2014 Mobile Security Report 3.1 Million smartphones were stolen in the USA during sixty per minute  Consumer Reports’ Annual State of the Net survey, % of respondents say their top mobile security concern is data loss from lost or stolen devices  InformationWeek’s 2014 Mobile Security Report 10 MARKET RESPONSE TO BYOD

MOBILE DEVICE USERS’ FRUSTRATION 11

ADDING TO BYOD CHALLENGES 12

MOBILE SECURITY Trust the Platform or Container Trust the Viewer Trust Nothing Trust the App Example: EMM Example: Streaming Example: Virtual Example: App Wrapper Security by Management Security by Abstraction Security by Isolation 13 From Gartner Spectrum of Trust for Mobile Enterprise Design, published April 4, 2014

14 TYPICAL MDM SOLUTION S ARE RETAINED IN PERMANENT MEMORY

ZIXONE SOLUTION S ARE VIEWED ONLY 15

ACCESSIBLE JAILBREAKING SOFTWARE 16

17 MDM SECURITY DISASTER OFFLINE PREVENTS WIPE

Mail Server ZixOne 18 ZIXONE A COMPLETELY NEW PHILOSOPHY

 ZixONE app that delivers a view of corporate , calendar and contacts on mobile devices  ZixONE server connects to Exchange or Office365  Efficient, secure protocols deliver information quickly 19

Advantages o Device inventory and management capabilities o Access to multiple platforms from personal or corporate devices o Some data protection with wiping capabilities Disadvantages o Leaves data on the device – exposes offline weakness o Loss of employee control and privacy o Employee acceptance issues o Corporate liability SUMMARY 20