1 / 12

Bring your own device

Bring your own device. BYOD and the Impact on IT Security. BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices More organizations allowing “ non-standard” IT devices on their networks

elisha
Télécharger la présentation

Bring your own device

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Bring your own device

  2. BYOD and the Impact on IT Security • BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices • More organizations allowing “non-standard” IT devices on their networks • Significant amount of business content stored/shared on employee owned devices • InformationWeek Mobile Security Survey • 86% of respondents permit use of personally owned devices now or are moving that way • 84% identify lost or stolen devices as a key mobile security concern

  3. BYOD by the Numbers PEOPLE WILL USE THEIR PERSONAL MOBILE DEVICES ON THE JOB, REGARDLESS OF WHETHER THEIR ORGANIZATION HAS A FORMAL ‘BYOD’ POLICY Use a personal electronic device for work-related functions 81% 31% Connect to a company via a free or public wi-ficonnection Who use a personal electronic device for work-related functions say their company has not implemented a BYOD policy 66% 46% Who use a personal device for work let someone else use it

  4. BYOD by the Numbers BYOD DOESN’T ALWAYS HAVE TO MEAN SMART PHONES AND TABLETS. DESKTOP PCS WERE THE PERSONAL DEVICES MOST COMMONLY USED FOR WORK 51% 38% 15% 19% 56% Desktop Laptop SmartPhone Tablet None SOURCE: ESET, Harris Interactive and the SANS Institute as published in Government Computer News

  5. BYOD by the Numbers BYOD by the Numbers DEVICES THAT STORE AND/OR ACCESS COMPANY INFORMATION 41% 47% 24% 10% Desktop Laptop SmartPhone Tablet • Desktop PCs were the personal devices most commonly used to store and/or access company information. • Survey reports that company data was being encrypted on only about a third of BYOD devices. SOURCE: ESET, Harris Interactive and the SANS Institute as published in Government Computer News

  6. BYOD by the Numbers 65% 40% IT PROFESSIONALS RESPOND Said they’ve experienced an increase in network traffic. Said they don’t have the necessary tools in place to manage non-company issued mobile devices on the network. 44% 27% Said they are not at all confident. Said they’ve seen an increase in help desk requests. SOURCE: ESET, Harris Interactive and the SANS Institute as published in Government Computer News

  7. “If 2012 is the year of mobility – as remote computing drives organizations to figure out how to let employees gain access to critical systems from anywhere – 2013 is likely to be a repeat.” Eric Chabrow, Top IT Security Investments for 2013 Survey: Top IT Security Investments for 2013 • Editors if Information Security Media Group surveyed experts on what they expect organizations to invest in the coming year • Top of list is Mobile Security • Other technologies include authentication, encryption and monitoring wares • Trend of moving away from organizationally owned to personally owned devices • “Realistically managing workers’ expectations while establishing appropriate safeguards and controls to reduce risks is the challenge facing almost every organization” • Adoption and use of mobility for both corporate and personal use will make the importance of access management to the enterprise all the more important • How will the CIO and CISO identify and authenticate devices, users, services and data sources for all transactions? • What will the corporate policy for ‘wipe’ of lost devices?

  8. Cause & Effect WORKSPACES ARE NO LONGER JUST THE COMPUTER DOWN THE HALL RESULT BEHAVIOR Despite corporate policies, employees are using their own devices for work related activities • Businesses are losing billions of dollars annually as a result of stolen laptops • 2011 European Study estimate combined cost to organizations at $1.8 billion • 2010 US Study estimate combined costto organizations at $1.2 billion • Growth of telework – workers see as their right; businesses want to offer as benefit • 62% of businesses permit remote work Teleworker effectiveness tied to user experience SOURCE: Ponemon Institute, GigaOM

  9. BYOD Considerations FIVE ASSUMPTIONS IT DEPARTMENTS SHOULD KEEP IN MIND WHEN IT COMES TO BYOD • Assume the worst • Spare the cost of hiring a penetration tester and deploy defenses by assuming the worst • Assume that employees will use their personal devices on the corporate network, even if they are told not to • Use products to block the ones you are not willing to have around and encrypt and audit the movement of devices carrying critical data • Assume employees value convenience more than security • Employees will find a way around cumbersome or inconvenient security policies • Assume storage devices will be lost and IT not informed • Use encrypted drives or do not use at all • Assume that an organization’s first and last defense against a security breach is its own employees • Train employees on good security practices

  10. Full Windows Desktop on Secure USB WITH IMATION MOBILE SECURITY YOU CAN ENABLE BYOD AND LET EMPLOYEES WORK ON THEIR OWN LAPTOPS AND DESKTOPS WITH PEACE OF MIND. Solutions for Microsoft Windows 7 and 8 Direct boot of Windows 7 or 8 ensures widespread adoption and user satisfaction delivering a normal desktop experience Workers can take all their data, applications and systems with them, securely and reliably A direct boot of Microsoft Windows ensures widespread adoption and user satisfaction, delivering a normal desktop experience without the performance drag of desktop virtualization

  11. Why Imation MOBILE SECURITY • Highest security levels available today • Rugged solutions deployed in the world’s most demanding organizations • Unmatched deployment flexibility • On premise • Cloud-based

  12. Yes …TO SECURING THE MOBILE WORKFORCE. Imation Mobile Security

More Related