Six Ways to Protect your Business in a Mobile World
Mobile technology promises big rewards In a study of how mobility benefits businesses 1 77% say it helps drive business growth 61% say it boosts productivity But what about data security? 8 of 10 employees use their mobile device for both work and personal 1 70 million Only 16% smartphones are lost each year 2 of businesses are prepared for mobility security threats 1 Follow the guide to learn six ways to protect your business in a mobile world! Protect data on mobile devices Easily manage devices and apps Give employees easy, protected access Strengthen access security Protect shared information Protect against cyberattacks 1 Techaisle 2015 SMB Mobility Adoption Trends Study. 2 Channnel Pro Network. 3 Ponemon Institute. 2
Protect data on mobile devices! Your data is perfectly safe. Until it s not. A laptop is stolen every 53 seconds. 1 How do you keep your business data safe if an employee s mobile device is lost or stolen? Microsoft Intune, part of Microsoft Enterprise Mobility + Security (EMS), helps you protect company resources when a device is lost, stolen, or retired from use. When alerted, you can act quickly to remove information and apps from a device remotely, reducing the potential impact of such an event. Get peace of mind that a lost or stolen device doesn t spell disaster for your business with EMS. A sales rep at a small manufacturing company uses her personal smartphone to communicate with customers and take orders. When the sales rep leaves to take a job with a competitor, the company wants to make sure proprietary customers and financial data on her phone stay protected. 1 2 The sales rep loses her cell phone, which contains company emails, contacts, and Office applications combined with personal data, apps, and family photos. IT remotely erases the company information including customer data and business apps from the employee s phone without touching or losing her personal data. Selectively delete data 1 Gartner 3
Enable easy, protected access Access should be simple for those that need it More than ever, employees today access many applications from multiple locations using a range of PCs and mobile devices. How can you ensure easy access for your employees while keeping others out? With Azure Active Directory Premium, which comes with Microsoft Enterprise Mobility + Security (EMS), you can efficiently provide employees with single sign-on access to company resources, eliminating the need to manage multiple passwords. You can also quickly secure certain assets or remove access altogether by managing a single company login. Connect the right people to the right information and resources with EMS. A beach resort is using multiple social media and online travel sites to promote their offers and stay in touch with travelers. Due to the seasonality of their business, their staff changes a lot during a year, including many interns during high season. All of them require easy access to these websites. 1 2 3 With a few clicks, the company easily enables new staff members to access all of the required social media and travel sites. With single sign-on, the team members access what they need quickly and easily with their same, consistent company login. The team is able to be more productive, eliminating time spent managing multiple passwords. When the off-season begins, the temporary employees logins are deactivated and their access to the sites is immediately shut off. If they had been using their own separate logins, they could access and make unauthorized posts to these sites. Instead, the company is protected and easily able to manage access for seasonal staff. 4
Protect shared information Did your sensitive company data just go viral? In the information age, we have to share data to do our jobs effectively. But how can you be sure shared information stays protected? With Azure Rights Management Service, included with Microsoft Enterprise Mobility + Security (EMS), you can protect the data you share by securing the information in your email and restricting certain capabilities, such as forwarding and printing, to certain people or groups. Protect your information wherever it goes with EMS. A mortgage company works with customers over phone and email to process loan applications. The company needs to make sure sensitive customer information stays protected, wherever it goes. 1 2 3 To process a loan application, a mortgage broker requests a social security number and credit card details from a customer via email. The customer emails her personal data to the broker. With Microsoft technology in place, the data in the email is protected, so editing, copying, and printing the customer s information is restricted to the broker and his immediate team. The broker then sends an email containing the customer s personal data to the loan processing team. The email is restricted from forwarding or editing. So the broker can benefit from the convenience of email, while knowing that data stays protected after he clicks the send button. 5
Easily manage devices and apps Your employees likely use their personal devices for work. Should you be worried? Your employees want the flexibility to work on the devices they choose, whether personal or company-owned. How can you ensure that your business assets are protected on these devices? With Microsoft Intune, part of Enterprise Mobility + Security, you can apply the same rules across company-owned and personal devices, prevent unwanted data transfers, and remove apps and sensitive information from lost or stolen devices. Get control over the mobile devices and apps your employees use with EMS. The sales team at a construction company is always on the go, and they often use personal mobile devices for work. The company wants to ensure company data and apps on employee devices are secure whether they are using their own mobile phones or company-issued laptops. 1 2 The sales team uses a wide range of mobile devices at work, from their personal smartphones and tablets to laptops and PCs issued by the company. The company s IT person logs into a cloud-based dashboard where he can easily manage and protect all of the mobile devices and apps used at work. For example, he can set Office apps to prevent the employee from copying sensitive data from company apps and pasting it into personal ones. Copy and paste 6
Strengthen access security What do you do if a password isn t enough? Whether for compliance requirements or for added security, many businesses are choosing to add another layer of protection beyond the password. With Azure Active Directory Premium, included with Microsoft Enterprise Mobility + Security (EMS), you can control access with easy verification options, such as a phone call, text message, or mobile app notification. This adds the extra layer of security while retaining the seamless sign-on experience. Go beyond the password for added protection with EMS. A law firm has attorneys who often work from home or while traveling to client sites. To ensure sensitive client data stays protected, the firm wanted a way to protect remote access to company systems. 1 2 An attorney needs to do some prep work in her hotel room prior to a client meeting. She needs to access the firm s client database and online legal application from her laptop. The attorney logs in using her username and password. Recognizing that the attorney is logging in from offsite, she receives a call on her cell phone requesting that she enter an additional security PIN, which then provides her access to the resources she needs. Traveling attorney Login Law firm Client database Legal apps PIN 7
Protect against cyberattacks You would know if an intruder was lurking. Right? Attackers often spend months hiding in a network before they are detected. How do you find threats before it s too late? Microsoft Advanced Threat Analytics, part of Microsoft Enterprise Mobility + Security (EMS), uses behavioral analytics to highlight abnormal behavior and provides concise attack timelines to quickly alert IT administrators of threats. Reducing the amount of time in the system can help minimize the impact of an attack. Identify advanced security attacks before they can hurt your business with EMS. A traveling sales employee mistakenly reveals login details from a mobile device that allows an intruder to access company resources. The intruder tries to hide on the network while attempting to gather important data. 1 2 3 Using behavioral analytics, suspicious logins from abnormal devices are discovered. The IT administrator is alerted quickly with a clear, relevant profile of the threat via a simple attack timeline. The IT administrator takes action to remove the threat and minimize the impact of the intrusion. The company reduced the amount of time they were exposed and minimized the damage from a potentially devastating attack. 8
Microsoft Enterprise Mobility + Security (EMS) Empower your mobile workforce with greater protection and control of access, devices, and data Get unparalleled value with three products combined into one cloud-based solution all for an affordable subscription. Azure Active Directory Premium Give employees a single sign-on to access all their apps across PCs and devices, with a consistent identity. Easily control who can access what, based on multiple levels of authentication. Reduce IT helpdesk costs by providing self-service functionality to employees. Azure Rights Management Service Data protection stays with your files and information, regardless of the location inside or outside your company. Protect information sent in email by preventing viewing, editing, and forwarding. Restrict editing, copying, and printing files to specific people and groups. Microsoft Intune Protect mobile applications, including Office prevent copy-and-paste from company apps into personal ones. Apply consistent rules and policies across the devices and apps used for work company or employee-owned. Remotely remove corporate data and apps when a device is lost, stolen, or retired from employee use. Microsoft Advanced Threat Analytics Detect threats fast with behavioral analytics Adapt to the changing nature of cybersecurity threats Focus on what s important fast using a simple attack timeline Reduce distractions from false positives 9