next-generation mobile security
TRANSCRIPT
STORYBOARDS
Next-GenerationMobile Security
Rich CampagnaVP, ProductsBitglass
Mike SchurichtDirector, ProductsBitglass
STORYBOARDS
Brief History of BYOD
Source: http://www.google.com/trends/explore#q=byod
STORYBOARDS
Brief History of BYOD Security
STORYBOARDS
Where Are We Now?
28%% of organization doing nothing to
secure BYOD
57%% of employees that refuse MDM/MAM for
BYOD
9%% of companies
using MAM
STORYBOARDS
Where Are We Now?
STORYBOARDS
Where Are We Now?
What Went
Wrong?
STORYBOARDS
It’s an adoption, NOT a rollout
STORYBOARDS
67% Would participate in BYOD if employer had no ability to view, alter, delete personal data & apps
64% IT pros who believe agentless mobile security would make BYOD program more successful
STORYBOARDS
Evolution of Mobile Security
● User privacy issues
● Difficult to deploy and manage
● No data protection or visibility
Manage the Device
STORYBOARDS
Evolution of Mobile Security
● User privacy issues
● Difficult to deploy and manage
● No data protection or visibility
● User privacy issues
● Can’t use native apps (mail, browser)
● Can’t use 3rd party (cloud) apps
● Difficult to deploy
Manage the Device Wrap the App
STORYBOARDS
Evolution of Mobile Security
● User privacy issues
● Difficult to deploy and manage
● No data protection or visibility
● User privacy issues
● Can’t use native apps (mail, browser)
● Can’t use 3rd party (cloud) apps
● Difficult to deploy
● Privacy & Usability
● Any device, any app,
● Full control and visibility
● Deploys in minutes, no software
Manage the Device Wrap the App Secure the Data
STORYBOARDS
“By 2018, more than half of all bring your own device (BYOD) users that
currently have an MDM agent will be managed by an agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOARDS
Next-Gen Approach to Mobile Security
● Data-centric security● No user privacy concerns● No agents or MDM hassles
STORYBOARDS
Bitglass Mobile Security
VisibilityAlerts, Reporting
Audit Logs
DLPPre-defined,
Keywords, Regex
Track/Watermark
Encrypt
Redact
Block
DRM
Access Control
Device, Role, Geo, etcManaged vs unmanaged
Selective Wipe
Full Wipe
Any Device, Anywhere
No Software AgentsTransparent to
EmployeesRespect User Privacy
STORYBOARDS
How It Works
Premise Apps
STORYBOARDS
Mobile Security - Traditional vs Next-GenMDM/MAM
1. Device Security● Device PIN lock● Encrypted Storage● Full Device Wipe
2. App Security● Custom Apps/containers● Restrict other apps● Selective wipe custom apps
3. Poor Usability & Privacy
4. High Admin Overhead
Bitglass1. Device Security
● Device PIN lock● Encrypted Storage● Full Device Wipe
2. Data Security● Native Apps, no agents ● Block/mask sensitive data (DLP)● Containerize sensitive data
(DRM)● Selective wipe* native apps● Visibility & Audit
3. Excellent Usability & Privacy
4. Low Admin Overhead*patents pending