balancing byod and security · mobility is a challenge for companies for many reasons. while 77...
TRANSCRIPT
Balancing BYOD and Security
A Guide for Secure Mobility in Today’s Digital Era
Executive Summary
In today’s era of the mobile workforce, working
remotely and on-the-go has become a universal
norm. Some companies have put in place
procedures for BYOD while most have not.
Without these safety measures in place
businesses can lose track of their valuable data
and can jeopardize their whole company. The
risks of BYOD far outweigh the advantages of
using a secure BYOD solution. In order to
mitigate those risks, businesses need an
enterprise file sync and share solution that
meets your every security and operational
requirement.
If you are a CIO, an IT Director or an IT manager
looking for a way to balance security and BYOD,
this paper can help you identify the capabilities
and features you should expect from an
enterprise-grade solution. This paper will guide
you in determining the necessary requirements
to look for in an EFSS solution that best suits
your organization. A secure BYOD policy can
untether the workforce and improve
productivity across business units.
Contents
Executive Summary ………………………………………………………………………………
Typical BYOD Users ………………………………………………………….……………………
Introduction: Why Secure BYOD?.................................................……………………
Risks and Advantages of BYOD ……………………………...…..…………………………
Thru - File Sync and Share for the Enterprise ………………….………………….…
The Thru Platform Meets All BYOD Requirements ….………………….…………
Thru: An EFSS Industry Leader …….………....………………………..……………………
Solution Overview …………………………………………………………….……………………
Secure BYOD with Thru ……………...…………………………………….……………………
About Thru………………………………………………………………………...……………………
2
3
4
5
6
7
8
9
10
11
Typical BYOD Users
There are many different types of BYOD users—all of which need secure access to their content at any time.
Everyone in the organization has become a BYOD user in today’s digital age.
Executives, CxOs and Senior Leadership
Top-level executives need to be constantly
connected with anywhere, anytime access
to important reports, data and more.
Partner, External or Third-Party
Consultants
Sharing files and data with external parties
must be secured, especially when being
done on-the-go.
Sales, Marketing and Road Warriors
On-the-go employees need anywhere,
anytime access to content, presentations,
graphics and etc.
Support Staff
Internal/external technical support
employees providing support offsite or
with off-hours need necessary content
readily available.
Additional Employees and Many Others
Everyone in the organization has become a
BYOD user in today’s digital age.
Why Secure BYOD?
Businesses are exchanging information around the globe at a faster pace than ever before. In order to secure their
valuable data, they must secure BYOD.
The First Step Is Acknowledging the Problem
Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and
employee data, according to research by Gartner, less than 50 percent of organizations are ready to implement BYOD.¹ Employees have
turned to the use of unsecure, unsanctioned file sharing tools such as free tools like Dropbox Inc and Google Drive which pose many
serious security risks. Further information on the risks posed by unsecure file sharing solutions can be found in Enterprise File Sync and
Share in the Present Day, a comprehensive white paper by Thru.
Losing Track of Critical Business Data
Companies can lose track of their data as soon as an employee downloads a file onto their mobile device or home computer outside
dedicated applications. Changes made to the document may not be recorded back into the central repository and the latest version is not
accessible by IT administrators. Thirty-nine percent of respondents reported central management of mobile devices and applications as the
biggest challenge (Gartner).¹
¹Source 1: According to independent research conducted by Infosec on BYOD & Mobile Security Policies, Gartner Research
Source 2: Secure Sharing of Intellectual Property, a study conducted by Forrester on behalf of Thru
50% Less than 50% are ready
to implement BYOD 80%
Of tech companies have
concerns about content
security on lost or
stolen devices
77% Are concerned about
protecting business and
employee data
39% Say central management
of mobile devices and
applications are the
biggest challenge
Risks and Advantages
Decision makers will find themselves in a much stronger position to combat security risks and ensure data control
with the advantages of secure BYOD on their side.
The Advantages of Secure BYOD
Increased productivity (JIT) for on-the-go employees
Employee satisfaction
Improved mobility
Full IT control and visibility
Transaction audits
Current with latest technology trends
Accelerated business processes
The Risks of Unmanaged BYOD
Data leaks
Fraudulent transactions
Freeware-based auto storage by employees (i.e.
Dropbox, Inc., iCloud and Google Drive)
Lost / stolen / jail-broken devices
Inability to track or have control of sensitive
company data
Thru - File Sync and Share for the Enterprise
Built exclusively for the business user and enterprises, Thru is an end to end file sharing and collaboration solution, that not only
offers enterprise level security and reliability at the core, but also ensures end user ease of usage and integration into a variety
of business applications.
With access via Web, mobile apps for iOS and Android, Thru Desktop Sync and Thru add-ins and apps for Microsoft Outlook, IBM Notes,
Microsoft SharePoint and Salesforce, Thru gives your organization 360-degree access and ability to sync and share files from anywhere,
anytime and from any device. You can collaborate in real time by connecting all departments and giving your employees a virtual office
experience via a secure platform that government and financial organizations trust.
The Only Provider To Offer a True 3600 Access - From Anywhere, Anytime, Any Device.
Enterprise Grade Security
AES 256-bit SSL / TLS data encryption in flight
Stored with AES 256 FIPS-compliant encryption
Password protection
Remote wipe of devices lost or stolen
Temporarily block access to devices—control which
devices a user may log into based on MAC address
Device lock
Device pinning
Jailbreak / root detection
Geo-fencing
Corporate container (isolating from personal content)
The Thru Platform Meets All BYOD Requirements
Native Mobile Applications & Tools
Apps for iOS and Android
Mobile Web access
Sync mobile camera photos
Integration with Business Applications
Microsoft Office for iOS and Android
CRM and ERP systems
IT Administrative Control
Policy enforcement for document access and
manipulation
Restrict downloads to WiFi only (not via 3G or 4G)
Corporate Policy Enforcement
Digital rights management (DRM) through policies
Policy enforcement for document access and
manipulation
Thru - An EFSS Industry Leader
“Thru was able to meet our needs by giving us a platform that we could automate at a reasonable price and
offered the highest level of security.”
Sam Davidson, The Motley Fool
100% Business Users & Built Exclusively for the Enterprise
Recognized Thru as a ‘Niche Player’ in both 2015 & 2016 Magic Quadrant
for Enterprise File Sync and Share
Deep Frontend & Backend Integrations
Recommends Thru for Its Breadth of APIs
Rated as Top Mobile Application
Enterprise Security at its Best: 99.99% SLA
Global Data Centers - 170+ Countries and Billions of Annual Transactions
* Data centers are ISO certified. Thru products are ISO compliant.
Thru Solution Overview
Secure BYOD with Thru
Learn how Thru can empower your mobile
workforce and secure your organization with an
enterprise-grade solution for sharing information
and increasing productivity. Putting a secure
BYOD policy in place can alleviate the pressures
of controlling data flow outside the organization
and increase mobility for improved productivity.
As a CIO, an IT Director or the IT department
manager, you are responsible for how
information is distributed in an organization and
securing its data, no matter what device your
users are using. In order to have secure mobility
in place, choose the right file sharing solution
with necessary features including full IT control
and visibility, auditing, remote wipe, device
encryption, policy enforcement and more. Thru
provides all these features and more to equip
businesses with the best enterprise-grade file
sharing solution.
Thru can help your organization secure BYOD
across all business segments. For businesses
looking to take back control of their sensitive
information and processes, Thru is the right
solution.
Let’s connect today! Contact us to set up a free
trial.
www.thruinc.com | © 2017 Thru, Inc. All rights reserved.
Do Business The Way You Want
Anywhere. Anytime. Any device.
About Thru
Thru, Inc. offers industry-leading solutions for secure enterprise
file sharing and collaboration around the globe. Handling billions
of unlimited file size transactions, Thru serves a variety of
industries including software, financial services, marketing,
architecture and manufacturing. With installations in over 170
countries, Thru's unified platform and products offer both out-of-
the-box and custom solutions for every file sharing need of an
enterprise.
For more information about Thru, visit www.thruinc.com or
contact [email protected].
Trusted by companies worldwide
Security is core to our service
* Data centers are ISO certified. Thru products are ISO compliant.