Empowering and Securing BYOD Email

Preview:

DESCRIPTION

How to Empower and Secure Employees’ Mobile Email in a BYOD WorldHow do you empower employees yet retain control? With an estimated 80% of corporate IP stored in email, it is the single most powerful collaboration tool, yet the most important repository to protect. The consumerisation of IT is upon us. Employees are demanding mobile email on corporate devices and with the rise of smartphones, on personal devices too.What is the best way to approach mobile email?

Citation preview

Empower yetSecure BYOD email .

Justin Pirie@justinpirieblog.mimecast.comjpirie@mimecast.comECCV 2012

March 8th 2012

mutsmuts

Analyst Blogger

Community Manager

Where I Work

tipiro

Cloud Services that Augment Microsoft Exchange

dolescum

Email Archiving

neilalderney123

Email Continuity

matthewbradley

Email Security

How the ProblemUsed to be Solved…

minifig

What do Users Get?

mescon

Unlimited Storage

szeke

100% Uptime

Ronan_C

Fast Search: Productivity

mutsmuts

Empower yetSecure BYOD email .

Paradox

Stuart Barr

Tommy Ironic

76%: Mobile devices Essential-Ponemon

Tommy Ironic

Same 76%: Mobile devices: “Security Risk”

78% Already Allow BYOD- Decisive Analytics

Gerard Stolk (vers le Midi Carême)

Yet only 39% have SecurityControls- Ponemon

Eva the Weaver

And only 45% have EnforceablePolicies- Ponemon

origamidon

Deletion Control

M i x y

63% of Data Loss was from aMobile Device- Ponemon

chrisinplymouth

Houston, We have a problem

Lst1984

3 Questions to Answer today

Leo Reynolds

Why Should we Consider BYOD?

How do I enableWorkers to be productive?

wovox

How should we secureEmail and reduce Risk?

Leo Reynolds

Glass Half Full or Half Empty?

Wootang01

Q4 2010- Smartphones outsell PCs

Growth Rocketing

Platforms- Watch for WP

Android Rocketship:Already 850k/day

Platform Proliferation-Android complex

Employee Device Usage

gamp

“I want to be as productive at work as I am at home”

“On the device I want to. I am more productive”

Mobile workers work anadditional 240 hours per year

Leo Reynolds

91% of Mobile workers check their email during downtime

mag3737

87% of Tablet owners use itfor work

chrisinplymouth

Only 41% of tabletssupplied by Companies

Leo Reynolds

“There is, perhaps, a call to action here… otherwise smart workers will use the initiative you presumably pay them for to work around the limitations.” Dale Vile

shindohd

Enable your HERO’s

Don’t put them in a wheel…Likely most innovative workers

spaceyjessie

Power users: 3 devices, Earn 44% more money, Commute

rheauchyr

shindohd

They want Tech that makesthem more efficient

Not held back

flatearththeatre

Tech that represents theirPersonal Brand

Victor1558

Benefitsmicheleart

Staffing: Happiness,Retention, Hiring

Craft Australia

More Efficient, Responsive, Productive; Agile

Rsms

How do we enable that?

wovox

Glass Half Full or Half Empty?

Wootang01

Email is a top 5 phone app

17% of Tablet time is email

stevecadman

The only “Universal”Collaboration tool

Estimated 80 % CorporateIP contained in Email

Makes email the gateway tothe majority of corporate IP…

Give email to employeesin a Safe and Secure way

Mysterious Photographer

How should we secureEmail and reduce Risk?

Leo Reynolds

Glass Half Full or Half Empty?

Wootang01

What would we wantif we were in your shoes?

wonderferret

Enable productivity,Reduce risk

wovox

We need to Support MultipleDevices- Enable Choice

Securely Access Information,View, Collaborate

63% of Data Loss was from aMobile Device- Ponemon

chrisinplymouth

Travel Light:Little or No Data on Device

chantal forster

matthewbradley

Evolve to the Cloud SecurityParadigm: Data not Device

IT Holds the KeysAs the Data Custodian

Bohman

shindohd

Protect and Empower

Move from Device Controlto Data Liberation

Jonathan_W

Start Making your DataWork for you

Helico

Don’t let your data go to die.API’s coming

Geoffrey Gilson

UK Parliament

Two Opposed Approaches?

Glass Half Full or Half Empty?

Wootang01

Lock Everything Down?

kurafire

fczuardi

Or Trust Everyone?

JMC Photos

Or Another Way?

B Tal

Good GRC Essential:Evaluate the Risks

Exchange 2010- Pin LockEnforceable

Exchange 2010- Remote Wipe

M i x y

Need to get data off the deviceEnable access, yet control

Mimecast iPhone App

Search

All your email accessible

Collaborate

Online Authentication

BB and iPhone here.Android and WP7 in Beta

Laptops still represent Risk25Gb Mailboxes increase data

liquidx

Archiving with great search

More MDM Needs?

Cultural Shift in IT HappeningCloud Driving- BYOD visible

Break free from our Shackles

mskogly

Move from Managing Infra.To Managing Data and Glue

Can’t keep doing the same:Data growing 50% + YoYCosts -25%.

Permabit

Gueorgui Tcherednitchenko

Leave the fear behind.Focus on Adding Value

Increasing Productivity

Rsms

B Tal

But it’s not an easy decisionTrusting all this to a vendor

We don’t want it to bea leap of Faith

Nicolas●B

Our job to help you decidee.g. CSA STAR, ISO 27001

Mine’s full.What’s yours?

Simon Cocks

Start your Journey todayCraft Australia

mutsmuts

Justin Pirie@justinpirieblog.mimecast.comjpirie@mimecast.com

Thank YouFeel free to connect .

ECCV 2012March 8th 2012Images CC Flickr

Recommended