Download presentation
Presentation is loading. Please wait.
Published byHelena Morris Modified over 9 years ago
5
GREATER THAN EVER. TODAY, RISK OF DATA FALLING IN THE WRONG HANDS IS QUITE OFTEN THIS RISK IS NOT FROM EXTERNAL ATTACKERS. IT COMES FROM WITHIN. MAJORITY OF DATA LEAKS HAPPEN ACCIDENTALLY.
6
“An employee of the department had inadvertently disclosed the passport numbers, visa details and other personal identifiers of the world leaders attending the G20 summit in Brisbane after an email was mistakenly sent to an organizer of the Asian Cup football tournament because of an autocomplete function” Personal details of world leaders accidentally revealed by G20 organizers Guardian March 30, 2015 AUSTRALIAN IMMIGRATION DEPT. DATA LEAK
7
2 HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012 Have accidentally sent sensitive information to the wrong person 1 58% …of senior managers admit to regularly uploading work files to a personal email or cloud account 1 87% Average per record cost of a data breach across all industries 2 $240 PER RECORD 1 Stroz Friedberg, “On The Pulse: Information Security In American Business,” 2013
8
??? % ? …focus on data leak prevention for personal devices, but ignore the issue on corporate owned devices where the risks are the same or worse. ? ? ? ? ?
9
DEVICE PROTECTION BitLocker enhancements in Windows 8.1 InstantGo 3 rd party adoption Protect data when device is lost or stolen DATA PROTECTION Rights Management Services (RMS) Office Information Rights Management (IRM) Azure AD, Azure Rights Management in 2013 Protect data when ….. THE GAP Accidental data leakage3 rd party solutions
10
HOW OTHERS ARE FILLING THE GAP: PAIN POINTS
11
FINDING THE BALANCE OR
12
OUR VISION
13
DATA PROTECTON IN A CLOUD & MOBILE WORLD Protection everywhere (at rest, in transit, across devices, storage location...everywhere) Enable wipe and other management fundamentals Supported by all the apps you use, fully integrated experience REQUIRES
14
Corp data identifiable from personal Protects data at rest, and when roaming Platform integrated, no mode switching Only IT-Allowed apps see business data IT controls keys, can remote wipe Common experience, x-plat support
15
Blocks read when screen is locked Optional screen lock security policy System tosses decryption key on lock Can encrypt new files and data Logon, unlock restores keys and access Helps mitigates system level attacks
17
1 User 2 PROVISIONING: KEYS AND POLICIES
18
LynceMailFacebook OneDrive for BusinessContactsWhatsApp PowerPointCalendarOneDrive PDF ReaderPhotosWeather Business Apps & Data (Managed) Personal Apps & Data (Unmanaged) Data exchange is blocked or audited
19
User DATA INGRESS
20
User DATA EGRESS
21
User DATA EGRESS
22
User CROSS PLATFORM DATA SHARING Common MDM support across Windows, iOS & Android with Microsoft Intune Common developer experience across platforms iOS & Android enabled via Intune App Wrapping Tool for IT Pros iOS & Android apps enabled via Intune App SDK Microsoft Intune SDK for iOS & Android
23
User REVOKE
25
Protect data is shared SHARING PROTECTION DEVICE PROTECTION Protect data when device is lost or stolen DATA PROTECTION Accidental data leakage
32
Protect data is shared SHARING PROTECTION DEVICE PROTECTION Protect data when device is lost or stolen DATA PROTECTION Accidental data leakage
33
Next Steps Talk to your MDM server vendor about Windows 10 support Check out related sessions to learn more – See resources on the next slide Evaluate Data Protection enhancements in Windows 10 – talk to your TAP buddy! Give us feedback!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.