Airwatch - Maximize Data Loss Prevention through a Secure Corporate Container (Gartner Conference)

1) Explosion of mobile devices
2) By end of 2014, number of mobile users will surpass desktop users
3) 71% of users are BYOD users
4) 92% of BYOD users access their own smartphone every week - 62% every day

Biz Challenges
1) Anytime, anywhere access to corporate data
2) Cloud sharing solutions are free and easily available
3) Personal accounts used for business

Security Concerns
1) Device platform
2) EULAs
3) Today 39 Android versions in the market
4) Mobile authentication
5) Data encryption
6) Compromise device status
7) Remote wipe of content

BYOD - Experience needs to be top priority.
1) business objectives
2) device choice
3) liability
4) privacy
5) security
6) management

Lead with Security
1) multi-factor authentication
2) enforce consistent security policies
3) encrypt sensitive corp data
4) support internal PKI and 3rd party certs
5) manage user access to corp resources
6) network access controls
7) enforce compliance rules and escalating actions
8) remotely wipe enterprise data from device and apps

Mobile Content Mgmt
Management - Access - Sharing
Sharing - collaboration, file sharing over encrypted connections
Benefits = secure access to docs, DLP, wipe, tracking, management

Mobile Email Mgmt - needs to go hand in hand with Mobile Content Mgmt
- most common way that users share content is email
- container for email attachments; open email attachments in Secure Content Locker; block email attachments based on doc file type; precent copy/paste of data; encrypt attachments using AES 256-bit encryption; wipe attachment content from compromised devices
- separate container for email; enforce
- native mail experience but secure attachments

Scalability is key. Vendor must be able to prove they can handle 50k+ devices per customer.

Comments

  1. This website is security related, if u interested to know about data and device security please visit...
    http://byodsecurity.org/what-is-byod/

    ReplyDelete

Post a Comment

Popular posts from this blog

Enterprise Architecture Inside Salesforce

Illuminate - Business Model Exploration

5 Key Components of a Successful Enterprise Architecture Function