BYOD: RISKS, MATURITY, AND SOLUTIONS ADAM ELY

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Security for Mobile Devices
Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
The IT Manager’s Nightmare... “Good morning, the board decided last night that we need to have iPads in order to do our work properly. Can you please.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Adam Ely CISO, Heroku at salesforce.com Founder & COO, Bluebox Managing Security in The Cloud.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
How to break into enterprise mobile B2B (without selling your soul!) Jenny Blumberg August 2015.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Best-in-Class Productivity for the Modern SMB Office solutions when and where you need them with Microsoft Office 365. Belston Technologies is a Certified.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Moving to BYOD Gary Audin 1.
Redmond Protocols Plugfest 2016 Steve May Windows Telemetry & Privacy WDG Enterprise & Security.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Mobile Devices in the Corporate World
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
The time to address enterprise mobility is now
Enterprise Mobility Suite Technical and Business Briefing
How to Define a Successful Mobility Strategy
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Impact of IT Consumerisation on Enterprise Security
BYOD Enterprise Mobile Security for IOS Devices
Office 365 Enterprise Value
Strong Security for Your Weak Link:
David J. Carter, CISO Commonwealth Office of Technology
In the attack index…what number is your Company?
Plan and design the solution
Comodo Dome Data Protection
Presentation transcript:

BYOD: RISKS, MATURITY, AND SOLUTIONS ADAM ELY

About Me + Shameless Plug Co-founder & COO Bluebox Security CISO Heroku at salesforce Tivo, Walt Disney…. We’re hiring: Product Manager Front end/Rails

BYOD EMPOWERS EMPLOYEES Consumer software > enterprise software Easy access, Easy workflow Increased productivity benefits include enhanced collaboration - PWC “

BYOD EMPOWERS EMPLOYEES BUT SCARES SECURITY TEAMS How much of a security threat Does I.T. think mobile poses?

WHY IS BYOD RISKY?

55% of Employees send work or documents to their personal accounts on their phones Nearly 1/2 of all people log into Unsecured wireless networks An internal survey of IBM workers discovered they were "blissfully unaware" about the security risks from popular apps. Average user has 41 Apps Installed

BYOD RISKS Lost devices Malicious apps Malware Employment termination Cloud storage Regulatory Requirements Lack of enterprise control We fear our loss of control It’s really data risk – not byod Jail Broken Devices App Permissions Insecure Device configuration Device patching

NEW SECURITY IT SECURITY IS STRUGGLING TO KEEP UP WITH CHANGES OLD SECURITY

WHAT DO WE NEED TO TRUST BYOD? Fortune 500 CISOs corporate data Control: –Insight into where data is transmitted and stored –Who is accessing what data –Ability to control and remove access to data –User acceptance

WHAT DO USERS NEED TO TRUST THE ENTERPRISE? Privacy Near zero impact to productivity Single user experience Users drive it change It change drives security change

WHICH APPS DO ENTERPRISES TRUST & BUY? Enterprises currently buy… But, Employees want … IT Supports BYOD, But Isn’t aligned with Employee needs

IS BYOD WORTH IT? Risk, security, cost, impact, management Why?

ENABLE PRODUCTIVITY AND SECURITY Transparent to the user Empower productivity Focus on the real risks Give the user something Enable users and they will behave User impact decreases security

BYOD + SECURITY = SECURELY ENABLING BUSINESS No more kinkos No more printers No more delays Information everywhere, anytime Happy users Pair new and existing controls Invest in the future or pay more later

ProsCons Set it and forget itDisrupt workflow Separate work/personal App install Limited Features MDM App Reputation MAM Container ProsCons On boarding processRestricted to API Pincode RestrictionsNo data control Wiping the deviceNot granular ProsCons Rates bad appsMisses OS Malware Always updated AV for apps Detects Insecure code ProsCons Control of AppDisrupts workflow Container per AppLacks off device data protection Custom Encryption MOBILE SECURITY LANDSCAPE

SECURITY ACROSS THE WORKFLOW On-device controls Off-device controls Logging & reporting User empowerment Pair new and existing controls Invest in the future or pay more later

STRATEGY Byod + security = everyone happy a comprehensive device-agnostic approach can simplify and strengthen security of networks, data and applications. -PWC “

BYOD IS CHANGING THE GAME ADAM ELY