addressing byodaddressing byod security...
TRANSCRIPT
![Page 1: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/1.jpg)
Addressing BYODAddressing BYOD Security Challenges
September 15, 2011
![Page 2: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/2.jpg)
Agenda
■ BYOD Trend■ BYOD Security Challenges■ Addressing Security Challenges
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 2
![Page 3: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/3.jpg)
BYOD Trend
From secure, Agency managed Blackberry devicey
to less secure non Blackberry…to less secure non-Blackberry personal mobile business device
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 3
![Page 4: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/4.jpg)
BYOD Security Challenges
■ No separation of personal and work
■ Higher likelihood of data loss
V i d f t ti■ Varying degrees of protection
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 4
![Page 5: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/5.jpg)
No Separation of Personal and Work
Employee loses phone
2
Employee loses phone
3
1IT has to remote wipe personal & work dataEmployee uses personalEmployee uses personal
phone for work
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 5
![Page 6: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/6.jpg)
Data Loss Example
Open & view workOpen & view work document
2
3
1
3Data exposed!
Receive work document via Outlook
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 6
![Page 7: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/7.jpg)
Varying Degrees of Protection
■ Encryption not available on all platforms
■ Password protection at device level only
D t ti f j il b k d i i■ Detection of jail broken devices varies based on O.S. version
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 7
![Page 8: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/8.jpg)
Addressing BYOD Security Challenges
S t l f t d t /Separate personal from government data/apps
Secure and prevent data loss at the application levelSecure and prevent data loss at the application level
Manage data and policies consistently across multipleManage data and policies consistently across multiple device platforms
This is what Good calls “Containerizing” government data.
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 8
![Page 9: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/9.jpg)
Separate Personal and Government Data
Personal Data Government DataEnterprise data lockdown
Data encryptionPassword policies
Devices remain personal, untouched by enterprise
Justifies shared Password policiesRemote wipeSecure data at rest
Access corporate apps
employee expense
Freely access your applications
Access corporate appsEmail, attachments & PIMIntranets
MusicPicturesVideos
Collaboration tools (e.g. Sharepoint)Web-enabled applications
Employees are more likely to accept an “enterprise-grade” mobile security policy when enterprise control is
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 9
policy when enterprise control is “contained” and does not impact personal experience, apps, or data
![Page 10: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/10.jpg)
Result: Employee’s data retained
2 Employee loses phone
3
1IT l h t t iIT only has to remote wipe work data; personal data & apps not touchedEmployee uses personal
phone for work
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 10
![Page 11: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/11.jpg)
Secure “Containerize” Application Level
Each application is “containerized”
Personal Applications
Containerized applications
and data
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 11
Security and management policies can be restricted to selected applications. .
![Page 12: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/12.jpg)
Result: Data loss prevented!
Open & view document
2
in Good container
13 Data secure!
Receive work document - Good
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 12
![Page 13: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/13.jpg)
Manage consistently across devices
Unified approach to manage:Security, device configuration and compliance Manage enterprise wide, group or user based policies and configurations
IT administrators get a dashboard view of the entire fleet of mobile devices accessing enterprise data
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 13
fleet of mobile devices accessing enterprise data.
![Page 14: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/14.jpg)
Summary
"Consumerization is a parade You canEmbrace BYOD
Consumerization is a parade. You can either get out in front of it to stop it and get
trampled, or you can grab the baton and l d th d "lead the parade."
Implement strongp gSecurity Controls
©2010 Good Technology, Inc. All Rights Reserved. Company Confidential 14
![Page 15: Addressing BYODAddressing BYOD Security Challengesmedia.govtech.net/GOVTECH_WEBSITE/EVENTS/PRESENTATION... · 2016. 10. 7. · Addressing BYOD Security Challenges StSeparate personalf](https://reader034.vdocuments.mx/reader034/viewer/2022052101/603adb923cbd5c2b33641b9a/html5/thumbnails/15.jpg)
Th k YThank You.