Upload
chris-hines
View
111
Download
2
Embed Size (px)
DESCRIPTION
Demand for cloud apps and mobility in the enterprise is extremely strong. Today’s savvy employees and business unit managers enable these technologies rapidly and inexpensively. However, coupling BYOD (Bring Your Own Devices) with SaaS applications creates security problems for corporate IT, as legacy security infrastructure can’t inspect this traffic. In this webinar, we will discuss how securely enabling cloud and mobile prevents users from going rogue and transforms hostile forces into a friendly, innovative, productive, and secure collaboration.
Citation preview
POLL QUESTION #1
Which two areas have the most demand from your employees and business?
1. Cloud applications (excluding file sharing)
2. BYOD
3. Social Networks
4. File Sharing and Synchronization
©2014 IDC
Proactive Collaboration Driven by Cloud and Mobile Synergies
Mainframe
Client/ Server
Mobile/ Cloud
Thousands of Users
Millions of Users
Billions of Users
©2014 IDC
Cloud Security Threat: Business Units & Individuals Employees Buying Their Own Solutions
53%
50%
45%
42%
40%
36%
32%
Private Cloud is more secure than Public Cloud
BU Individual Buying a Security Threat
Multitenant too risky for sensitive information
Ceding Patch and Vulnerability Management
I understand Cloud Security/Compliance Issues
Cloud Security Better than Internal IT Security
Cloud Benefits Outweigh Security Risks
Q. Rate these statement about cloud security
% sample rating 4 & 5
§ Issue: Security & compliance
§ Data in motion just as important as data at rest
§ Key management stays with customer
§ Issue: Metrics § Shared risk
responsibility § Threats/Attacks § Breaches § Privileged & Customer
Access § Continuous Compliance
POLL QUESTION #2
How do you typically react to rogue IT today?
1. Reprimand the employee
2. Find a mutually acceptable workaround
3. Attempt to block the application
4. Terminate the employee
©2014 IDC
How Did Enterprises React to Rogue IT Implementations?
Reprimand
Terminate
Block
Workaround
©2014 IDC
RISK Cloud Mobile
Low
Granular Monitoring,
Strong Encryption,
Authentication, Data Protection, & Vulnerability Assessment
Strong Encryption, Data
Protection, & Granular Access
Controls
Medium VPN, Single Sign-
On, & Strong Passwords
Mobile Device Management
High Access control Device Password
Goals
1) Monitor mobile & SaaS activity.
2) Detect and mitigate data loss.
3) Deterrence of future breaches & problems.
4) Maintain partnerships with Business Units and employees.
Customer Example: Reconciling Business Unit Priorities with IT Policies
©2014 IDC
Business Units and IT Agree On Shared Risk Responsibility
©2014 IDC
Success Based on Shared Responsibility & Understanding of Solutions
Bitglass Secure Cloud & Mobile
Secure Cloud
• Visibility and Alerting across all apps
• DLP and Access Control for sensitive data
• Track data anywhere it goes
• Cloud-based and premises applications
• 30 minute deployment
Secure BYOD
• Secure corporate data without MDM or agents
• DLP and Access Control for sensitive data
• Track data anywhere it goes
• Cloud-based and premises applications
• 30 minute deployment
Bitglass Solution
Lock only the data Unlimited mobility - any device, anywhere Low admin overhead - no software or device configuration Excellent usability - transparent, respects privacy
Local Employees Remote Employees BYOD
Corporate Office
Internal Apps SaaS Apps Personal Apps
IT gets security, visibility, & control of business apps & data
...and Users get mobility, transparency & privacy
The Bitglass Advantage
Visibility & Control
During access
Security & Compliance Cloud, device, everywhere
Flexibility
Low admin overhead
Mobility
Anywhere, any device
Transparency Familiar user experience
Privacy
No capture of personal data
Thank You!
Christian Christiansen [email protected]
@cchristiansen
Rich Campagna [email protected]
@bitglass