Upload
duongkhuong
View
215
Download
1
Embed Size (px)
Citation preview
Is My Company Spying On Me? Myths and Misconceptions with EMM and BYOD
© 2014 Citrix. Confidential. 2
NO
Is my company spying on me?
© 2014 Citrix. Confidential. 3
IT has a dilemma
Q: How do I allow employees to be productive from their mobile device without sacrificing corporate data security?
A: Enterprise Mobility Management (EMM) minimizes data leakage while allowing users to be productive on personally owned and corporate owned mobile devices by adding a layer of security to the devices and/or the applications?
© 2014 Citrix. Confidential. 4
Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation and financial stability
“Gartner predicts that the focus of endpoint breaches will shift to tablets and smartphones (by 2017).” “75 percent of mobile security breaches will be the result of mobile application misconfiguration.” Gartner Research, 2014
Mobile security breaches have affected more than two-thirds (68 percent) of global organizations in the last 12 months, according to a study from British Telecom.
© 2014 Citrix. Confidential. 5
Data Leakage – Hackers aren’t the only concern Examples of data leakage
Disgruntled employee has been using DropBox on their personal device to store and access corporate files and documents. Employee leaves the company for a competitor. The company can’t recover the data.
An Employee fails to password protect his/her mobile device and loses it on a plane or at an industry event where competitors are present.
Hacker gains access to sensitive corporate information by hacking an unsecure mobile device rather than the data center.
© 2014 Citrix. Confidential. 6
EMM Enterprise Mobility Management
Productivity and Collaboration
Data Management
App Management
Device Management
© 2014 Citrix. Confidential. 7 7
What takes place on my device? Mobile Device Management
Passcode policy
AD changes to user
Jailbroken device
Unmanaged device
Data Roaming
Geo-fencing
App Blacklist
App Whitelist
Compliance Engine
Initiate compliance actions based on a variety of triggers
Lock device
Modify policy set
Block network access
Selective wipe
Full wipe
Revoke
Send notification
Set out of compliance
© 2014 Citrix. Confidential. 8
What takes place on my device? Mobile App Management
© 2014 Citrix. Confidential.
• Encrypted
• Inter-app controls
• Encrypted tunnel (Micro-VPN)
• App lock and wipe
What takes place on my device? Mobile App Management
Containerized Applications
© 2014 Citrix. Confidential.
How does a containerized app differ from native?
• Encrypted email and attachments • Micro-VPN to corporate network • Password/Authentication
Required • Looks and feels like native email • Business-class features • Integration with other XenMobile
Apps for best-in-class mobile workflows
• Familiar experience • No security policies • Lacks business class features/
built for consumer • Can share information with other
apps (i.e. contacts)
Native Email
Secure email means you wont inadvertently leak confidential information. Plus...you get more business features like one-touch joining of meetings, set/edit Out of Office messages, attach multiple files and much more.
© 2014 Citrix. Confidential. 11
What can my company see on my mobile device?
• Make/Model/OS version • Phone Number • All apps on device • Location of device • Battery Level • Storage Capacity • Corporate Email and
attachments • Corporate Contacts
• Personal Email • Browsing History • Text Messages • Photos/Albums/Camera Roll • Voice Mails • Personal Application Data
Your personal stuff stays personal
© 2014 Citrix. Confidential. 12
Success depends on Trust and Communication
Trust
Communication
• IT must earn and retain employee trust. • Employees must trust IT will not cross personal
boundaries.
• IT must communicate product features and functionality to employees.
• Employees must communicate likes/dislikes to IT so they can improve the end-user experience.
© 2014 Citrix. Confidential. 13
© 2014 Citrix. Confidential.
App 1 App2
Open-In
Mobile OS
Containerized Applications
• Encrypted communication and data • Can only “talk” to other containerized apps if
permitted by IT • Cut and Paste restrictions (optional) • Turn off app access to camera (optional)
© 2014 Citrix. Confidential.
EMM Enterprise Mobility Management
Productivity and Collaboration
Data Management
App Management
Device Management
Productivity and Collaboration
Data Management
App Management
Device Management