SlideShare una empresa de Scribd logo
1 de 18
enabling secure BYOD with
cloud access security brokers
may 5 2016
cloud and mobile are inseparable...
saas
driving corporate data outside the firewall.
STORYBOAR
legacy
data
security
secure the
infrastructure
STORYBOAR
security must
evolve to protect
data outside the
firewall
ungoverned
access to
corporate data in
the cloud
sensitive data on
unmanaged
devices
STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
manage
the
device
the evolution of mobile security
data-centric protection is the future
mdm
STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
manage
the
device
wrap the
app
the evolution of mobile security
data-centric protection is the future
mdm mam
STORYBOAR
■ Impedes user privacy
■ Complex solution
deployment and
management
■ Lack of data visibility or
protection
■ User privacy issues
■ Prevents use of native
apps (mail/calendar)
■ 3rd party / cloud apps
non-functional
■ Challenging
manage
the
device
wrap the
app
secure
the data
the evolution of mobile security
data-centric protection is the future
■ Protection of user
privacy and
experience
■ Any device, any app
■ Full data control and
visibility for IT
mdm mam casb
“By 2018, more than half of all bring your
own device (BYOD) users that currently
have an MDM agent will be managed by an
agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOAR
casb
approach
secure the
data
STORYBOAR
agentless BYOD access via activesync
■ Secure mobile devices without invasive
profiles or certificates
■ Protect data in “unwrappable” native apps
like mail, contacts, calendar
■ Selectively wipe corporate data
■ Enforce device security policies
■ Full data control and visibility for IT
STORYBOAR
agentless BYOD access via reverse proxy
■ Secure access from any unmanaged
device without agents
■ Users are automatically routed through the
proxy via SSO
■ Full data control and visibility for IT
■ Control data access with context and
content-aware DLP
STORYBOAR
data leakage prevention
a complete set of data controls
■ Apply granular DLP to sensitive data with
spectrum of actions from watermarking to outright
blocking
■ Context-aware engine can distinguish between
users, managed and unmanaged devices, and
more
■ Easily modify sharing permissions and quarantine
files for review
STORYBOAR
client:
■ 8000 employees
■ s&p 500
challenge:
■ Lack of adherence to BYOD security
measures
■ Failed MobileIron and SAP Afaria
deployments
solution:
■ Bitglass Agentless – device / OS
independent
■ Fast deployment
■ Logging for compliance with internal data
security policies
■ Seamless integration with
ActiveDirectory
fortune
500
beverage
co.
byod
security
STORYBOAR
secure
office 365
+ byod
challenge:
■ Inadequate native O365 security
■ Controlled access from any device
■ Limit external sharing
■ Interoperable with existing infrastructure,
e.g. Bluecoat, ADFS
solution:
■ Real-time data visibility and control
powered by Citadel
■ DLP policy enforcement at upload or
download
■ Quarantine externally-shared sensitive
files in cloud
■ Controlled unmanaged device access
via Omni
fortune 50
healthcare
firm
STORYBOAR
our
mission
total
data
protection est. jan
2013
100+
customer
s
tier 1
VCs
resources:
more info about byod
■ Whitepaper - definitive guide to CASBs
■ Whitepaper - BYOD security that works
■ Report: 2015 BYOD security
download the full BYOD report
the bitglass
research team
surveyed over 2000
enterprise
employees that own
smartphones and
tablets to uncover
trends in BYOD
download
the report
STORYBOAR
bitglass.com
@bitglass

Más contenido relacionado

La actualidad más candente

Predstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaPredstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaDejan Pogačnik
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Bartosz Bredy
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information SecurityPotato
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno
 
CyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementCyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementChad Bowerman
 
Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013F-Secure Corporation
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1Mel Savich
 
IONU For Business
IONU For BusinessIONU For Business
IONU For BusinessTim Beres
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
Cybersecurity and the IIoT
Cybersecurity and the IIoTCybersecurity and the IIoT
Cybersecurity and the IIoTLindseyAllen34
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Lietuvos kompiuterininkų sąjunga
 
EndPoint Protection - Backup & Restore
EndPoint Protection - Backup & RestoreEndPoint Protection - Backup & Restore
EndPoint Protection - Backup & RestoreCristie Nordic AB
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncBiscomMarketing
 

La actualidad más candente (20)

Predstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaPredstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetja
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information Security
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
 
CyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementCyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral Movement
 
Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
IONU For Business
IONU For BusinessIONU For Business
IONU For Business
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
Cybersecurity and the IIoT
Cybersecurity and the IIoTCybersecurity and the IIoT
Cybersecurity and the IIoT
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 
EndPoint Protection - Backup & Restore
EndPoint Protection - Backup & RestoreEndPoint Protection - Backup & Restore
EndPoint Protection - Backup & Restore
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom Verosync
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 

Destacado

Delivering on the Promise of CLASS
Delivering on the Promise of CLASSDelivering on the Promise of CLASS
Delivering on the Promise of CLASSTeachstone
 
IBM_app_letter
IBM_app_letterIBM_app_letter
IBM_app_letterJiali Chen
 
Banchiayehu LemmaHabtew
Banchiayehu LemmaHabtewBanchiayehu LemmaHabtew
Banchiayehu LemmaHabtewbanchi Lemma
 
Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...
Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...
Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...Premier Publishers
 
Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...
Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...
Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...Premier Publishers
 
Transmission of South African maize prices into Botswana markets: an economet...
Transmission of South African maize prices into Botswana markets: an economet...Transmission of South African maize prices into Botswana markets: an economet...
Transmission of South African maize prices into Botswana markets: an economet...Premier Publishers
 
Rail Journey - From Beijing to Lhasa
Rail Journey - From Beijing to LhasaRail Journey - From Beijing to Lhasa
Rail Journey - From Beijing to LhasaThe Other Home
 
Port Lockroy, Antarctica
Port Lockroy, AntarcticaPort Lockroy, Antarctica
Port Lockroy, AntarcticaMario Ricca
 
สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...
สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...
สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...สอบครูดอทคอม เว็บเตรียมสอบ
 
Bilingüismoovejaperdida
BilingüismoovejaperdidaBilingüismoovejaperdida
Bilingüismoovejaperdidaeducarconjesus
 
Makalah nasikh mansukh
Makalah nasikh mansukhMakalah nasikh mansukh
Makalah nasikh mansukhLutfi Widad
 
Convergencia tecnologica
Convergencia tecnologicaConvergencia tecnologica
Convergencia tecnologicacamilo Cardenas
 

Destacado (18)

ETIQUETA NUTRICIONAL
ETIQUETA NUTRICIONALETIQUETA NUTRICIONAL
ETIQUETA NUTRICIONAL
 
Delivering on the Promise of CLASS
Delivering on the Promise of CLASSDelivering on the Promise of CLASS
Delivering on the Promise of CLASS
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
IBM_app_letter
IBM_app_letterIBM_app_letter
IBM_app_letter
 
Banchiayehu LemmaHabtew
Banchiayehu LemmaHabtewBanchiayehu LemmaHabtew
Banchiayehu LemmaHabtew
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Novel toto-chan
Novel toto-chanNovel toto-chan
Novel toto-chan
 
Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...
Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...
Standard heterosis of pipeline maize (Zea mays L.) hybrids for grain yield an...
 
Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...
Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...
Occurrence and antibiotic susceptibility of Streptococcus pyogenes isolated f...
 
Transmission of South African maize prices into Botswana markets: an economet...
Transmission of South African maize prices into Botswana markets: an economet...Transmission of South African maize prices into Botswana markets: an economet...
Transmission of South African maize prices into Botswana markets: an economet...
 
Rail Journey - From Beijing to Lhasa
Rail Journey - From Beijing to LhasaRail Journey - From Beijing to Lhasa
Rail Journey - From Beijing to Lhasa
 
Port Lockroy, Antarctica
Port Lockroy, AntarcticaPort Lockroy, Antarctica
Port Lockroy, Antarctica
 
สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...
สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...
สรุปสาระสำคัญนโยบายการศึกษารัฐบาล(พลเอกประยุทธ์ จันทร์โอชา)และแนวทางการขับเคล...
 
คู่มือเตรียมสอบบรรจุครูผู้ช่วยฉบับพร้อมสอบ
คู่มือเตรียมสอบบรรจุครูผู้ช่วยฉบับพร้อมสอบคู่มือเตรียมสอบบรรจุครูผู้ช่วยฉบับพร้อมสอบ
คู่มือเตรียมสอบบรรจุครูผู้ช่วยฉบับพร้อมสอบ
 
Bilingüismoovejaperdida
BilingüismoovejaperdidaBilingüismoovejaperdida
Bilingüismoovejaperdida
 
Makalah nasikh mansukh
Makalah nasikh mansukhMakalah nasikh mansukh
Makalah nasikh mansukh
 
Convergencia tecnologica
Convergencia tecnologicaConvergencia tecnologica
Convergencia tecnologica
 
Pedagogy fair
Pedagogy fairPedagogy fair
Pedagogy fair
 

Similar a ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityBitglass
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityBitglass
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesBitglass
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudBitglass
 
8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security BrokerBitglass
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Bitglass
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use CasesBitglass
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Bitglass
 
Developing a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial ServicesDeveloping a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial ServicesBitglass
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 SecurityBitglass
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcareBitglass
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareBitglass
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365Bitglass
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New HopeBitglass
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS ApplicationsBitglass
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial servicesBitglass
 

Similar a ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs (20)

Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
Developing a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial ServicesDeveloping a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial Services
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
 

Más de Bitglass

Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security TrendsBitglass
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteBitglass
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365Bitglass
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensBitglass
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Bitglass
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Bitglass
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseBitglass
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataBitglass
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)Bitglass
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsBitglass
 

Más de Bitglass (16)

Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 

Último

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs

  • 1. enabling secure BYOD with cloud access security brokers may 5 2016
  • 2. cloud and mobile are inseparable... saas driving corporate data outside the firewall.
  • 4. STORYBOAR security must evolve to protect data outside the firewall ungoverned access to corporate data in the cloud sensitive data on unmanaged devices
  • 5. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection manage the device the evolution of mobile security data-centric protection is the future mdm
  • 6. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection ■ User privacy issues ■ Prevents use of native apps (mail/calendar) ■ 3rd party / cloud apps non-functional ■ Challenging manage the device wrap the app the evolution of mobile security data-centric protection is the future mdm mam
  • 7. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection ■ User privacy issues ■ Prevents use of native apps (mail/calendar) ■ 3rd party / cloud apps non-functional ■ Challenging manage the device wrap the app secure the data the evolution of mobile security data-centric protection is the future ■ Protection of user privacy and experience ■ Any device, any app ■ Full data control and visibility for IT mdm mam casb
  • 8. “By 2018, more than half of all bring your own device (BYOD) users that currently have an MDM agent will be managed by an agentless solution” Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
  • 10. STORYBOAR agentless BYOD access via activesync ■ Secure mobile devices without invasive profiles or certificates ■ Protect data in “unwrappable” native apps like mail, contacts, calendar ■ Selectively wipe corporate data ■ Enforce device security policies ■ Full data control and visibility for IT
  • 11. STORYBOAR agentless BYOD access via reverse proxy ■ Secure access from any unmanaged device without agents ■ Users are automatically routed through the proxy via SSO ■ Full data control and visibility for IT ■ Control data access with context and content-aware DLP
  • 12. STORYBOAR data leakage prevention a complete set of data controls ■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking ■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more ■ Easily modify sharing permissions and quarantine files for review
  • 13. STORYBOAR client: ■ 8000 employees ■ s&p 500 challenge: ■ Lack of adherence to BYOD security measures ■ Failed MobileIron and SAP Afaria deployments solution: ■ Bitglass Agentless – device / OS independent ■ Fast deployment ■ Logging for compliance with internal data security policies ■ Seamless integration with ActiveDirectory fortune 500 beverage co. byod security
  • 14. STORYBOAR secure office 365 + byod challenge: ■ Inadequate native O365 security ■ Controlled access from any device ■ Limit external sharing ■ Interoperable with existing infrastructure, e.g. Bluecoat, ADFS solution: ■ Real-time data visibility and control powered by Citadel ■ DLP policy enforcement at upload or download ■ Quarantine externally-shared sensitive files in cloud ■ Controlled unmanaged device access via Omni fortune 50 healthcare firm
  • 16. resources: more info about byod ■ Whitepaper - definitive guide to CASBs ■ Whitepaper - BYOD security that works ■ Report: 2015 BYOD security
  • 17. download the full BYOD report the bitglass research team surveyed over 2000 enterprise employees that own smartphones and tablets to uncover trends in BYOD download the report

Notas del editor

  1. but in building out our product, we realized that mobile security is also cloud security.
  2. Competition: AirWatch/VMWare
  3. Competition: Skyhigh, Netskope, Adallom
  4. in: CA, NY, MA, IL, N