balancing byod and security · mobility is a challenge for companies for many reasons. while 77...

11
Balancing BYOD and Security A Guide for Secure Mobility in Todays Digital Era

Upload: others

Post on 09-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Balancing BYOD and Security

A Guide for Secure Mobility in Today’s Digital Era

Page 2: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Executive Summary

In today’s era of the mobile workforce, working

remotely and on-the-go has become a universal

norm. Some companies have put in place

procedures for BYOD while most have not.

Without these safety measures in place

businesses can lose track of their valuable data

and can jeopardize their whole company. The

risks of BYOD far outweigh the advantages of

using a secure BYOD solution. In order to

mitigate those risks, businesses need an

enterprise file sync and share solution that

meets your every security and operational

requirement.

If you are a CIO, an IT Director or an IT manager

looking for a way to balance security and BYOD,

this paper can help you identify the capabilities

and features you should expect from an

enterprise-grade solution. This paper will guide

you in determining the necessary requirements

to look for in an EFSS solution that best suits

your organization. A secure BYOD policy can

untether the workforce and improve

productivity across business units.

Contents

Executive Summary ………………………………………………………………………………

Typical BYOD Users ………………………………………………………….……………………

Introduction: Why Secure BYOD?.................................................……………………

Risks and Advantages of BYOD ……………………………...…..…………………………

Thru - File Sync and Share for the Enterprise ………………….………………….…

The Thru Platform Meets All BYOD Requirements ….………………….…………

Thru: An EFSS Industry Leader …….………....………………………..……………………

Solution Overview …………………………………………………………….……………………

Secure BYOD with Thru ……………...…………………………………….……………………

About Thru………………………………………………………………………...……………………

2

3

4

5

6

7

8

9

10

11

Page 3: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Typical BYOD Users

There are many different types of BYOD users—all of which need secure access to their content at any time.

Everyone in the organization has become a BYOD user in today’s digital age.

Executives, CxOs and Senior Leadership

Top-level executives need to be constantly

connected with anywhere, anytime access

to important reports, data and more.

Partner, External or Third-Party

Consultants

Sharing files and data with external parties

must be secured, especially when being

done on-the-go.

Sales, Marketing and Road Warriors

On-the-go employees need anywhere,

anytime access to content, presentations,

graphics and etc.

Support Staff

Internal/external technical support

employees providing support offsite or

with off-hours need necessary content

readily available.

Additional Employees and Many Others

Everyone in the organization has become a

BYOD user in today’s digital age.

Page 4: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Why Secure BYOD?

Businesses are exchanging information around the globe at a faster pace than ever before. In order to secure their

valuable data, they must secure BYOD.

The First Step Is Acknowledging the Problem

Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and

employee data, according to research by Gartner, less than 50 percent of organizations are ready to implement BYOD.¹ Employees have

turned to the use of unsecure, unsanctioned file sharing tools such as free tools like Dropbox Inc and Google Drive which pose many

serious security risks. Further information on the risks posed by unsecure file sharing solutions can be found in Enterprise File Sync and

Share in the Present Day, a comprehensive white paper by Thru.

Losing Track of Critical Business Data

Companies can lose track of their data as soon as an employee downloads a file onto their mobile device or home computer outside

dedicated applications. Changes made to the document may not be recorded back into the central repository and the latest version is not

accessible by IT administrators. Thirty-nine percent of respondents reported central management of mobile devices and applications as the

biggest challenge (Gartner).¹

¹Source 1: According to independent research conducted by Infosec on BYOD & Mobile Security Policies, Gartner Research

Source 2: Secure Sharing of Intellectual Property, a study conducted by Forrester on behalf of Thru

50% Less than 50% are ready

to implement BYOD 80%

Of tech companies have

concerns about content

security on lost or

stolen devices

77% Are concerned about

protecting business and

employee data

39% Say central management

of mobile devices and

applications are the

biggest challenge

Page 5: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Risks and Advantages

Decision makers will find themselves in a much stronger position to combat security risks and ensure data control

with the advantages of secure BYOD on their side.

The Advantages of Secure BYOD

Increased productivity (JIT) for on-the-go employees

Employee satisfaction

Improved mobility

Full IT control and visibility

Transaction audits

Current with latest technology trends

Accelerated business processes

The Risks of Unmanaged BYOD

Data leaks

Fraudulent transactions

Freeware-based auto storage by employees (i.e.

Dropbox, Inc., iCloud and Google Drive)

Lost / stolen / jail-broken devices

Inability to track or have control of sensitive

company data

Page 6: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Thru - File Sync and Share for the Enterprise

Built exclusively for the business user and enterprises, Thru is an end to end file sharing and collaboration solution, that not only

offers enterprise level security and reliability at the core, but also ensures end user ease of usage and integration into a variety

of business applications.

With access via Web, mobile apps for iOS and Android, Thru Desktop Sync and Thru add-ins and apps for Microsoft Outlook, IBM Notes,

Microsoft SharePoint and Salesforce, Thru gives your organization 360-degree access and ability to sync and share files from anywhere,

anytime and from any device. You can collaborate in real time by connecting all departments and giving your employees a virtual office

experience via a secure platform that government and financial organizations trust.

The Only Provider To Offer a True 3600 Access - From Anywhere, Anytime, Any Device.

Page 7: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Enterprise Grade Security

AES 256-bit SSL / TLS data encryption in flight

Stored with AES 256 FIPS-compliant encryption

Password protection

Remote wipe of devices lost or stolen

Temporarily block access to devices—control which

devices a user may log into based on MAC address

Device lock

Device pinning

Jailbreak / root detection

Geo-fencing

Corporate container (isolating from personal content)

The Thru Platform Meets All BYOD Requirements

Native Mobile Applications & Tools

Apps for iOS and Android

Mobile Web access

Sync mobile camera photos

Integration with Business Applications

Microsoft Office for iOS and Android

CRM and ERP systems

IT Administrative Control

Policy enforcement for document access and

manipulation

Restrict downloads to WiFi only (not via 3G or 4G)

Corporate Policy Enforcement

Digital rights management (DRM) through policies

Policy enforcement for document access and

manipulation

Page 8: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Thru - An EFSS Industry Leader

“Thru was able to meet our needs by giving us a platform that we could automate at a reasonable price and

offered the highest level of security.”

Sam Davidson, The Motley Fool

100% Business Users & Built Exclusively for the Enterprise

Recognized Thru as a ‘Niche Player’ in both 2015 & 2016 Magic Quadrant

for Enterprise File Sync and Share

Deep Frontend & Backend Integrations

Recommends Thru for Its Breadth of APIs

Rated as Top Mobile Application

Enterprise Security at its Best: 99.99% SLA

Global Data Centers - 170+ Countries and Billions of Annual Transactions

* Data centers are ISO certified. Thru products are ISO compliant.

Page 9: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Thru Solution Overview

Page 10: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

Secure BYOD with Thru

Learn how Thru can empower your mobile

workforce and secure your organization with an

enterprise-grade solution for sharing information

and increasing productivity. Putting a secure

BYOD policy in place can alleviate the pressures

of controlling data flow outside the organization

and increase mobility for improved productivity.

As a CIO, an IT Director or the IT department

manager, you are responsible for how

information is distributed in an organization and

securing its data, no matter what device your

users are using. In order to have secure mobility

in place, choose the right file sharing solution

with necessary features including full IT control

and visibility, auditing, remote wipe, device

encryption, policy enforcement and more. Thru

provides all these features and more to equip

businesses with the best enterprise-grade file

sharing solution.

Thru can help your organization secure BYOD

across all business segments. For businesses

looking to take back control of their sensitive

information and processes, Thru is the right

solution.

Let’s connect today! Contact us to set up a free

trial.

Page 11: Balancing BYOD and Security · Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according

www.thruinc.com | © 2017 Thru, Inc. All rights reserved.

Do Business The Way You Want

Anywhere. Anytime. Any device.

About Thru

Thru, Inc. offers industry-leading solutions for secure enterprise

file sharing and collaboration around the globe. Handling billions

of unlimited file size transactions, Thru serves a variety of

industries including software, financial services, marketing,

architecture and manufacturing. With installations in over 170

countries, Thru's unified platform and products offer both out-of-

the-box and custom solutions for every file sharing need of an

enterprise.

For more information about Thru, visit www.thruinc.com or

contact [email protected].

Trusted by companies worldwide

Security is core to our service

* Data centers are ISO certified. Thru products are ISO compliant.