13

Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

Embed Size (px)

DESCRIPTION

Demand for cloud apps and mobility in the enterprise is extremely strong. Today’s savvy employees and business unit managers enable these technologies rapidly and inexpensively. However, coupling BYOD (Bring Your Own Devices) with SaaS applications creates security problems for corporate IT, as legacy security infrastructure can’t inspect this traffic. In this webinar, we will discuss how securely enabling cloud and mobile prevents users from going rogue and transforms hostile forces into a friendly, innovative, productive, and secure collaboration.

Citation preview

Page 1: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD
Page 2: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

POLL QUESTION #1

Which two areas have the most demand from your employees and business?

1.  Cloud applications (excluding file sharing)

2.  BYOD

3.  Social Networks

4.  File Sharing and Synchronization

Page 3: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

©2014 IDC

Proactive Collaboration Driven by Cloud and Mobile Synergies

Mainframe

Client/ Server

Mobile/ Cloud

Thousands of Users

Millions of Users

Billions of Users

Page 4: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

©2014 IDC

Cloud Security Threat: Business Units & Individuals Employees Buying Their Own Solutions

53%

50%

45%

42%

40%

36%

32%

Private  Cloud  is  more  secure  than  Public  Cloud

BU  Individual  Buying  a  Security  Threat

Multitenant  too  risky  for  sensitive  information

Ceding  Patch  and  Vulnerability  Management

I  understand  Cloud  Security/Compliance  Issues

Cloud  Security  Better  than  Internal  IT  Security

Cloud  Benefits  Outweigh  Security  Risks

Q.  Rate  these  statement  about  cloud  security  

% sample rating 4 & 5

§  Issue: Security & compliance

§  Data in motion just as important as data at rest

§  Key management stays with customer

§  Issue: Metrics §  Shared risk

responsibility §  Threats/Attacks §  Breaches §  Privileged & Customer

Access §  Continuous Compliance

Page 5: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

POLL QUESTION #2

How do you typically react to rogue IT today?

1.  Reprimand the employee

2.  Find a mutually acceptable workaround

3.  Attempt to block the application

4.  Terminate the employee

Page 6: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

©2014 IDC

How Did Enterprises React to Rogue IT Implementations?

Reprimand

Terminate

Block

Workaround

Page 7: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

©2014 IDC

RISK Cloud Mobile

Low

Granular Monitoring,

Strong Encryption,

Authentication, Data Protection, & Vulnerability Assessment

Strong Encryption, Data

Protection, & Granular Access

Controls

Medium VPN, Single Sign-

On, & Strong Passwords

Mobile Device Management

High Access control Device Password

Goals

1)  Monitor mobile & SaaS activity.

2)  Detect and mitigate data loss.

3)  Deterrence of future breaches & problems.

4)  Maintain partnerships with Business Units and employees.

Customer Example: Reconciling Business Unit Priorities with IT Policies

Page 8: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

©2014 IDC

Business Units and IT Agree On Shared Risk Responsibility

Page 9: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

©2014 IDC

Success Based on Shared Responsibility & Understanding of Solutions

Page 10: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

Bitglass Secure Cloud & Mobile

Secure Cloud

•  Visibility and Alerting across all apps

•  DLP and Access Control for sensitive data

•  Track data anywhere it goes

•  Cloud-based and premises applications

•  30 minute deployment

Secure BYOD

•  Secure corporate data without MDM or agents

•  DLP and Access Control for sensitive data

•  Track data anywhere it goes

•  Cloud-based and premises applications

•  30 minute deployment

Page 11: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

Bitglass Solution

Lock only the data Unlimited mobility - any device, anywhere Low admin overhead - no software or device configuration Excellent usability - transparent, respects privacy

Local Employees Remote Employees BYOD

Corporate Office

Internal Apps SaaS Apps Personal Apps

Page 12: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

IT gets security, visibility, & control of business apps & data

...and Users get mobility, transparency & privacy

The Bitglass Advantage

Visibility & Control

During access

Security & Compliance Cloud, device, everywhere

Flexibility

Low admin overhead

Mobility

Anywhere, any device

Transparency Familiar user experience

Privacy

No capture of personal data

Page 13: Making Friends Before They Become Enemies: Reconciling Enterprise IT Policies with Business Units' Demand for SaaS & BYOD

Thank You!

Christian Christiansen [email protected]

@cchristiansen

Rich Campagna [email protected]

@bitglass