22
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD

1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

Embed Size (px)

Citation preview

Page 1: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

11

March 20, 2014

A SIMPLE APPROACH TO BYOD

Page 2: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

WHAT THEY DON’T WANT IS:

Company monitoring of their personal activities or restriction of the apps they rely on

Interruption of their calendar, contacts, phone and texting functions

Invasion or deletion of their personal data

USERS WANT EASE OF USE

Brooklyn gives IT the security they need andEmployees the freedom they demand.

COMPANIES WANT SAFE DATAWHAT THEY DON’T WANT IS:

Corporate data distributed on thousands of devicesUsers resorting to personal email or other insecure

means of maintaining productivity

THE STATE OF BYOD

Page 3: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they
Page 4: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

DEVICE MANAGEMENT, CONTAINERIZATION:

Data is synchronized to the device Tools to mitigate risk if the device is lost or stolen

Device tracking, app control, monitoring Remote wiping of device

FIRST GENERATION SOLUTIONS

BYOD LANDSCAPE

ISSUES:

User acceptance of BYOD policy Legal ramifications of having access to personal data Questionable security

User’s won’t tell you that they lost a device Remote wipe – airplane mode, shielded bags Cracking tools can hack a container quickly

“HEAVY” model not applicable for all users

Page 5: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

NEXT GENERATION LIGHT SOLUTION

ZIXONE

o Email data never resides on the device

o No need to manage the device

o No concerns if the device is lost/stolen

o No issues when an employee leaves the organization

o Easier to work with contractors

o Avoid legal issues

o Computer Fraud and Abuse Act

o Litigation/Legal Holds

Page 6: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

NEXT GENERATION LIGHT SOLUTION

ZIXONE

o Users retain complete control

o No monitoring, restrictions or risk of data loss

o Users continue to use the device as it was intended

o Firewalling of personal data

o Limits company liability

o Avoid wrongful dismissal and discrimination claims

o Native functionality and UI of the device is maintained

o Notifications, Alerts

o Contact lookup

o Phoning

o Texting

Page 7: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

NEXT GENERATION LIGHT SOLUTION

ZIXONE

o Compliance reporting

o Simplifies the procedures to deal with a lost device

o No data to worry about – a big plus!

o Immediately disable the account

o Check the server to see what, if any, messages were accessed

o Allows you to quickly and succinctly ascertain the exposure

Page 8: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

8

ZixONE app that delivers a view of corporate email, calendar and contacts on mobile devices

ZixONE server connects to Exchange or Office365

Efficient, secure protocols deliver information quickly

ZIXONECOMPONENTS

Page 9: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZixONEService

ZIXONEARCHITECTURE

Low bandwidth, high performance link usingpatent-pending fetching and caching techniquesoptimized for wireless data communications.

Page 10: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZIXONE

Page 11: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZIXONE

Page 12: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZIXONE ADMINISTRATION

Page 13: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZIXONE ADMINISTRATION

Page 14: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZIXONE ADMINISTRATION

Page 15: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZIXONE ADMINISTRATION

Page 16: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZIXONE ADMINISTRATION

Page 17: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

ZixOne Admin – Audit Trail

Page 18: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

HEAVY SOLUTIONS VS ZIXONEHEAVY SOLUTION ZIXONE

Data on the device Yes No

Ability to monitor, restrict functionality

Yes No

Wipe the device YesUser must tell. Must be Online. Risky.

No

Seamless integration with native functions and UI

No Yes

Legal ramifications of access to personal data

Yes No

Easy compliance reporting No Yes

Data bandwidth usage Normal 2/3 less

Full iOS and Android support Maybe?Some restrictions on iOS upgrading. Not all Android versions and devices.

Yes

Page 19: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

19

ZIXONE STRATEGY COMPARISON

   

MDM

Containeri-zation

Native Controls

Virtualization

Browser-Based Services

ZixOne

Corporate

Needs

Corporate Data Protection: Corporate data does not reside on mobile devices and is not in jeopardy when off-line.         Employee Work Enablement: Employees have simple, full access to the most used mobile application – email.       Prevent Legal Claims: Liability is removed, because businesses cannot access personal data.    

Employee

Demands

Employee Convenience: Easy connection to life and work on the devices they choose without any impairments.           Employee Control: Employees control their devices, their apps and their personal data.     Employee Privacy Personal activities and data cannot be monitored by their company.    

Page 20: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

NEXT GENERATION LIGHT SOLUTION

ZIXONE

o Analysts recommend a two-pronged approach to BYOD

o A Heavy solution where it is actually needed

o A LIGHT solution where only email, calendar and contacts are required

o Easy Cloud Deployment

o Exchange 2007 and up

o Office365

o iOS 6.0 and up

o Android 2.3 and up

Page 21: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

NEXT GENERATION LIGHT SOLUTION

ZIXONE

o Final Thoughts

o #1 source of data breach is via lost/stolen devices

o 133 devices lost per minute

o “Heavy” solutions serve a purpose but are not scalable

o 42% of companies have tried a first generation solution

o 60% not happy (admin complexity, inadequate security)

o 60% of companies that support BYOD limit deployment due to privacy and personal data concerns

o Most employees only require email, calendar and contacts

o …and we’re just getting started!

Page 22: 1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they

NEXT GENERATION LIGHT SOLUTION

ZIXONE

#nodataonthedevice