109
mpower yet ecure BYOD email Justin Pirie @justinpirie blog.mimecast.com [email protected] ECCV 2012 March 8 th 2012 mutsmuts

Empowering and Securing BYOD Email

Embed Size (px)

DESCRIPTION

How to Empower and Secure Employees’ Mobile Email in a BYOD WorldHow do you empower employees yet retain control? With an estimated 80% of corporate IP stored in email, it is the single most powerful collaboration tool, yet the most important repository to protect. The consumerisation of IT is upon us. Employees are demanding mobile email on corporate devices and with the rise of smartphones, on personal devices too.What is the best way to approach mobile email?

Citation preview

Page 1: Empowering and Securing BYOD Email

Empower yetSecure BYOD email .

Justin [email protected]@mimecast.comECCV 2012

March 8th 2012

mutsmuts

Page 2: Empowering and Securing BYOD Email

Analyst Blogger

Page 3: Empowering and Securing BYOD Email

Community Manager

Page 4: Empowering and Securing BYOD Email

Where I Work

Page 5: Empowering and Securing BYOD Email

tipiro

Cloud Services that Augment Microsoft Exchange

Page 6: Empowering and Securing BYOD Email

dolescum

Email Archiving

Page 7: Empowering and Securing BYOD Email

neilalderney123

Email Continuity

Page 8: Empowering and Securing BYOD Email

matthewbradley

Email Security

Page 9: Empowering and Securing BYOD Email

How the ProblemUsed to be Solved…

Page 10: Empowering and Securing BYOD Email

minifig

What do Users Get?

Page 11: Empowering and Securing BYOD Email

mescon

Unlimited Storage

Page 12: Empowering and Securing BYOD Email

szeke

100% Uptime

Page 13: Empowering and Securing BYOD Email

Ronan_C

Fast Search: Productivity

Page 15: Empowering and Securing BYOD Email

mutsmuts

Empower yetSecure BYOD email .

Page 16: Empowering and Securing BYOD Email

Paradox

Stuart Barr

Page 17: Empowering and Securing BYOD Email

Tommy Ironic

76%: Mobile devices Essential-Ponemon

Page 18: Empowering and Securing BYOD Email

Tommy Ironic

Same 76%: Mobile devices: “Security Risk”

Page 19: Empowering and Securing BYOD Email

78% Already Allow BYOD- Decisive Analytics

Gerard Stolk (vers le Midi Carême)

Page 20: Empowering and Securing BYOD Email

Yet only 39% have SecurityControls- Ponemon

Eva the Weaver

Page 21: Empowering and Securing BYOD Email

And only 45% have EnforceablePolicies- Ponemon

origamidon

Page 22: Empowering and Securing BYOD Email

Deletion Control

M i x y

Page 23: Empowering and Securing BYOD Email

63% of Data Loss was from aMobile Device- Ponemon

chrisinplymouth

Page 24: Empowering and Securing BYOD Email

Houston, We have a problem

Lst1984

Page 25: Empowering and Securing BYOD Email

3 Questions to Answer today

Leo Reynolds

Page 26: Empowering and Securing BYOD Email

Why Should we Consider BYOD?

Page 27: Empowering and Securing BYOD Email

How do I enableWorkers to be productive?

wovox

Page 28: Empowering and Securing BYOD Email

How should we secureEmail and reduce Risk?

Leo Reynolds

Page 29: Empowering and Securing BYOD Email

Glass Half Full or Half Empty?

Wootang01

Page 30: Empowering and Securing BYOD Email

Q4 2010- Smartphones outsell PCs

Page 31: Empowering and Securing BYOD Email
Page 32: Empowering and Securing BYOD Email
Page 33: Empowering and Securing BYOD Email

Growth Rocketing

Page 34: Empowering and Securing BYOD Email

Platforms- Watch for WP

Page 35: Empowering and Securing BYOD Email

Android Rocketship:Already 850k/day

Page 36: Empowering and Securing BYOD Email

Platform Proliferation-Android complex

Page 37: Empowering and Securing BYOD Email

Employee Device Usage

Page 38: Empowering and Securing BYOD Email

gamp

“I want to be as productive at work as I am at home”

Page 39: Empowering and Securing BYOD Email

“On the device I want to. I am more productive”

Page 40: Empowering and Securing BYOD Email

Mobile workers work anadditional 240 hours per year

Leo Reynolds

Page 41: Empowering and Securing BYOD Email

91% of Mobile workers check their email during downtime

mag3737

Page 42: Empowering and Securing BYOD Email

87% of Tablet owners use itfor work

chrisinplymouth

Page 43: Empowering and Securing BYOD Email

Only 41% of tabletssupplied by Companies

Leo Reynolds

Page 44: Empowering and Securing BYOD Email

“There is, perhaps, a call to action here… otherwise smart workers will use the initiative you presumably pay them for to work around the limitations.” Dale Vile

Page 45: Empowering and Securing BYOD Email

shindohd

Enable your HERO’s

Page 46: Empowering and Securing BYOD Email

Don’t put them in a wheel…Likely most innovative workers

spaceyjessie

Page 47: Empowering and Securing BYOD Email

Power users: 3 devices, Earn 44% more money, Commute

rheauchyr

Page 48: Empowering and Securing BYOD Email

shindohd

They want Tech that makesthem more efficient

Page 49: Empowering and Securing BYOD Email

Not held back

flatearththeatre

Page 50: Empowering and Securing BYOD Email

Tech that represents theirPersonal Brand

Victor1558

Page 51: Empowering and Securing BYOD Email

Benefitsmicheleart

Page 52: Empowering and Securing BYOD Email

Staffing: Happiness,Retention, Hiring

Craft Australia

Page 53: Empowering and Securing BYOD Email

More Efficient, Responsive, Productive; Agile

Rsms

Page 54: Empowering and Securing BYOD Email
Page 55: Empowering and Securing BYOD Email

How do we enable that?

wovox

Page 56: Empowering and Securing BYOD Email

Glass Half Full or Half Empty?

Wootang01

Page 57: Empowering and Securing BYOD Email

Email is a top 5 phone app

Page 58: Empowering and Securing BYOD Email

17% of Tablet time is email

Page 59: Empowering and Securing BYOD Email

stevecadman

The only “Universal”Collaboration tool

Page 60: Empowering and Securing BYOD Email

Estimated 80 % CorporateIP contained in Email

Page 61: Empowering and Securing BYOD Email

Makes email the gateway tothe majority of corporate IP…

Page 62: Empowering and Securing BYOD Email

Give email to employeesin a Safe and Secure way

Mysterious Photographer

Page 63: Empowering and Securing BYOD Email

How should we secureEmail and reduce Risk?

Leo Reynolds

Page 64: Empowering and Securing BYOD Email

Glass Half Full or Half Empty?

Wootang01

Page 65: Empowering and Securing BYOD Email

What would we wantif we were in your shoes?

wonderferret

Page 66: Empowering and Securing BYOD Email

Enable productivity,Reduce risk

wovox

Page 67: Empowering and Securing BYOD Email

We need to Support MultipleDevices- Enable Choice

Page 68: Empowering and Securing BYOD Email

Securely Access Information,View, Collaborate

Page 69: Empowering and Securing BYOD Email

63% of Data Loss was from aMobile Device- Ponemon

chrisinplymouth

Page 70: Empowering and Securing BYOD Email

Travel Light:Little or No Data on Device

chantal forster

Page 71: Empowering and Securing BYOD Email

matthewbradley

Evolve to the Cloud SecurityParadigm: Data not Device

Page 72: Empowering and Securing BYOD Email

IT Holds the KeysAs the Data Custodian

Bohman

Page 73: Empowering and Securing BYOD Email

shindohd

Protect and Empower

Page 74: Empowering and Securing BYOD Email

Move from Device Controlto Data Liberation

Jonathan_W

Page 75: Empowering and Securing BYOD Email

Start Making your DataWork for you

Helico

Page 76: Empowering and Securing BYOD Email

Don’t let your data go to die.API’s coming

Geoffrey Gilson

Page 78: Empowering and Securing BYOD Email

UK Parliament

Two Opposed Approaches?

Page 79: Empowering and Securing BYOD Email

Glass Half Full or Half Empty?

Wootang01

Page 80: Empowering and Securing BYOD Email

Lock Everything Down?

kurafire

Page 81: Empowering and Securing BYOD Email

fczuardi

Or Trust Everyone?

Page 82: Empowering and Securing BYOD Email

JMC Photos

Or Another Way?

Page 83: Empowering and Securing BYOD Email

B Tal

Good GRC Essential:Evaluate the Risks

Page 84: Empowering and Securing BYOD Email

Exchange 2010- Pin LockEnforceable

Page 85: Empowering and Securing BYOD Email

Exchange 2010- Remote Wipe

M i x y

Page 86: Empowering and Securing BYOD Email

Need to get data off the deviceEnable access, yet control

Page 87: Empowering and Securing BYOD Email

Mimecast iPhone App

Page 88: Empowering and Securing BYOD Email

Search

Page 89: Empowering and Securing BYOD Email
Page 90: Empowering and Securing BYOD Email

All your email accessible

Page 91: Empowering and Securing BYOD Email
Page 92: Empowering and Securing BYOD Email

Collaborate

Page 93: Empowering and Securing BYOD Email

Online Authentication

Page 94: Empowering and Securing BYOD Email

BB and iPhone here.Android and WP7 in Beta

Page 95: Empowering and Securing BYOD Email

Laptops still represent Risk25Gb Mailboxes increase data

liquidx

Page 96: Empowering and Securing BYOD Email

Archiving with great search

Page 97: Empowering and Securing BYOD Email

More MDM Needs?

Page 98: Empowering and Securing BYOD Email

Cultural Shift in IT HappeningCloud Driving- BYOD visible

Page 99: Empowering and Securing BYOD Email

Break free from our Shackles

mskogly

Page 100: Empowering and Securing BYOD Email

Move from Managing Infra.To Managing Data and Glue

Page 101: Empowering and Securing BYOD Email

Can’t keep doing the same:Data growing 50% + YoYCosts -25%.

Permabit

Page 102: Empowering and Securing BYOD Email

Gueorgui Tcherednitchenko

Leave the fear behind.Focus on Adding Value

Page 103: Empowering and Securing BYOD Email

Increasing Productivity

Rsms

Page 104: Empowering and Securing BYOD Email

B Tal

But it’s not an easy decisionTrusting all this to a vendor

Page 105: Empowering and Securing BYOD Email

We don’t want it to bea leap of Faith

Nicolas●B

Page 106: Empowering and Securing BYOD Email

Our job to help you decidee.g. CSA STAR, ISO 27001

Page 107: Empowering and Securing BYOD Email

Mine’s full.What’s yours?

Simon Cocks

Page 108: Empowering and Securing BYOD Email

Start your Journey todayCraft Australia

Page 109: Empowering and Securing BYOD Email

mutsmuts

Justin [email protected]@mimecast.com

Thank YouFeel free to connect .

ECCV 2012March 8th 2012Images CC Flickr