15
Is My Company Spying On Me? Myths and Misconceptions with EMM and BYOD

Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

Embed Size (px)

Citation preview

Page 1: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

Is My Company Spying On Me? Myths and Misconceptions with EMM and BYOD

Page 2: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 2

NO

 Is my company spying on me?

Page 3: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 3

 IT has a dilemma

 Q: How do I allow employees to be productive from their mobile device without sacrificing corporate data security?

 A: Enterprise Mobility Management (EMM) minimizes data leakage while allowing users to be productive on personally owned and corporate owned mobile devices by adding a layer of security to the devices and/or the applications?

Page 4: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 4

Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation and financial stability

“Gartner predicts that the focus of endpoint breaches will shift to tablets and smartphones (by 2017).” “75 percent of mobile security breaches will be the result of mobile application misconfiguration.” Gartner Research, 2014

Mobile security breaches have affected more than two-thirds (68 percent) of global organizations in the last 12 months, according to a study from British Telecom.

Page 5: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 5

Data Leakage – Hackers aren’t the only concern Examples of data leakage

Disgruntled employee has been using DropBox on their personal device to store and access corporate files and documents. Employee leaves the company for a competitor. The company can’t recover the data.

An Employee fails to password protect his/her mobile device and loses it on a plane or at an industry event where competitors are present.

Hacker gains access to sensitive corporate information by hacking an unsecure mobile device rather than the data center.

Page 6: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 6

EMM Enterprise Mobility Management

Productivity and Collaboration

Data Management

App Management

Device Management

Page 7: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 7 7

What takes place on my device? Mobile Device Management

Passcode policy

AD changes to user

Jailbroken device

Unmanaged device

Data Roaming

Geo-fencing

App Blacklist

App Whitelist

Compliance Engine

Initiate compliance actions based on a variety of triggers

Lock device

Modify policy set

Block network access

Selective wipe

Full wipe

Revoke

Send notification

Set out of compliance

Page 8: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 8

What takes place on my device? Mobile App Management

Page 9: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential.

•  Encrypted

•  Inter-app controls

•  Encrypted tunnel (Micro-VPN)

•  App lock and wipe

What takes place on my device? Mobile App Management

Containerized Applications

Page 10: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential.

How does a containerized app differ from native?

•  Encrypted email and attachments •  Micro-VPN to corporate network •  Password/Authentication

Required •  Looks and feels like native email •  Business-class features •  Integration with other XenMobile

Apps for best-in-class mobile workflows

•  Familiar experience •  No security policies •  Lacks business class features/

built for consumer •  Can share information with other

apps (i.e. contacts)

Native Email

Secure email means you wont inadvertently leak confidential information. Plus...you get more business features like one-touch joining of meetings, set/edit Out of Office messages, attach multiple files and much more.

Page 11: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 11

What can my company see on my mobile device?

•  Make/Model/OS version •  Phone Number •  All apps on device •  Location of device •  Battery Level •  Storage Capacity •  Corporate Email and

attachments •  Corporate Contacts

•  Personal Email •  Browsing History •  Text Messages •  Photos/Albums/Camera Roll •  Voice Mails •  Personal Application Data

 Your personal stuff stays personal

Page 12: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 12

Success depends on Trust and Communication

Trust

Communication

•  IT must earn and retain employee trust. •  Employees must trust IT will not cross personal

boundaries.

•  IT must communicate product features and functionality to employees.

•  Employees must communicate likes/dislikes to IT so they can improve the end-user experience.

Page 13: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential. 13

Page 14: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential.

App 1 App2

Open-In

Mobile OS

Containerized Applications

•  Encrypted communication and data •  Can only “talk” to other containerized apps if

permitted by IT •  Cut and Paste restrictions (optional) •  Turn off app access to camera (optional)

Page 15: Is my company spying on me? EMM and BYOD ... - · PDF file4 © 2014 Citrix. Confidential. Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation

© 2014 Citrix. Confidential.

EMM Enterprise Mobility Management

Productivity and Collaboration

Data Management

App Management

Device Management

Productivity and Collaboration

Data Management

App Management

Device Management