Balancing BYOD and Security A Guide for Secure Mobility in Today s Digital Era
Executive Summary In today s era of the mobile workforce, working remotely and on-the-go has become a universal norm. Some companies have put in place procedures for BYOD while most have not. Without these safety measures in place businesses can lose track of their valuable data and can jeopardize their whole company. The risks of BYOD far outweigh the advantages of using a secure BYOD solution. In order to mitigate those risks, businesses need an enterprise file sync and share solution that meets your every security and operational requirement. If you are a CIO, an IT Director or an IT manager looking for a way to balance security and BYOD, this paper can help you identify the capabilities and features you should expect from an enterprise-grade solution. This paper will guide you in determining the necessary requirements to look for in an EFSS solution that best suits your organization. A secure BYOD policy can untether the workforce and improve productivity across business units. Contents Executive Summary Typical BYOD Users. Introduction: Why Secure BYOD?... Risks and Advantages of BYOD..... Thru - File Sync and Share for the Enterprise.. The Thru Platform Meets All BYOD Requirements.. Thru: An EFSS Industry Leader...... Solution Overview. Secure BYOD with Thru.... About Thru... 2 3 4 5 6 7 8 9 10 11
Typical BYOD Users There are many different types of BYOD users all of which need secure access to their content at any time. Everyone in the organization has become a BYOD user in today s digital age. Executives, CxOs and Senior Leadership Sales, Marketing and Road Warriors Top-level executives need to be constantly connected with anywhere, anytime access to important reports, data and more. On-the-go employees need anywhere, anytime access to content, presentations, graphics and etc. Support Staff Partner, External or Third-Party Consultants Internal/external technical support employees providing support offsite or with off-hours need necessary content readily available. Sharing files and data with external parties must be secured, especially when being done on-the-go. Additional Employees and Many Others Everyone in the organization has become a BYOD user in today s digital age.
Why Secure BYOD? Businesses are exchanging information around the globe at a faster pace than ever before. In order to secure their valuable data, they must secure BYOD. The First Step Is Acknowledging the Problem Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according to research by Gartner, less than 50 percent of organizations are ready to implement BYOD.¹ Employees have turned to the use of unsecure, unsanctioned file sharing tools such as free tools like Dropbox Inc and Google Drive which pose many serious security risks. Further information on the risks posed by unsecure file sharing solutions can be found in Enterprise File Sync and Share in the Present Day, a comprehensive white paper by Thru. Losing Track of Critical Business Data Companies can lose track of their data as soon as an employee downloads a file onto their mobile device or home computer outside dedicated applications. Changes made to the document may not be recorded back into the central repository and the latest version is not accessible by IT administrators. Thirty-nine percent of respondents reported central management of mobile devices and applications as the biggest challenge (Gartner).¹ 50% Less than 50% are ready to implement BYOD 80% Of tech companies have 77% Are concerned about protecting business and employee data 39% Say central management concerns about content of mobile devices and security on lost or applications are the stolen devices biggest challenge ¹Source 1: According to independent research conducted by Infosec on BYOD & Mobile Security Policies, Gartner Research Source 2: Secure Sharing of Intellectual Property, a study conducted by Forrester on behalf of Thru
Risks and Advantages Decision makers will find themselves in a much stronger position to combat security risks and ensure data control with the advantages of secure BYOD on their side. The Risks of Unmanaged BYOD Data leaks Fraudulent transactions Freeware-based auto storage by employees (i.e. Dropbox, Inc., icloud and Google Drive) Lost / stolen / jail-broken devices Inability to track or have control of sensitive company data The Advantages of Secure BYOD Increased productivity (JIT) for on-the-go employees Employee satisfaction Improved mobility Full IT control and visibility Transaction audits Current with latest technology trends Accelerated business processes
Thru - File Sync and Share for the Enterprise Built exclusively for the business user and enterprises, Thru is an end to end file sharing and collaboration solution, that not only offers enterprise level security and reliability at the core, but also ensures end user ease of usage and integration into a variety of business applications. With access via Web, mobile apps for ios and Android, Thru Desktop Sync and Thru add-ins and apps for Microsoft Outlook, IBM Notes, Microsoft SharePoint and Salesforce, Thru gives your organization 360-degree access and ability to sync and share files from anywhere, anytime and from any device. You can collaborate in real time by connecting all departments and giving your employees a virtual office experience via a secure platform that government and financial organizations trust. The Only Provider To Offer a True 3600 Access - From Anywhere, Anytime, Any Device.
The Thru Platform Meets All BYOD Requirements Native Mobile Applications & Tools Apps for ios and Android Mobile Web access Sync mobile camera photos Integration with Business Applications Microsoft Office for ios and Android CRM and ERP systems IT Administrative Control Policy enforcement for document access and manipulation Restrict downloads to WiFi only (not via 3G or 4G) Enterprise Grade Security AES 256-bit SSL / TLS data encryption in flight Stored with AES 256 FIPS-compliant encryption Password protection Remote wipe of devices lost or stolen Temporarily block access to devices control which devices a user may log into based on MAC address Device lock Device pinning Jailbreak / root detection Geo-fencing Corporate container (isolating from personal content) Corporate Policy Enforcement Digital rights management (DRM) through policies Policy enforcement for document access and manipulation
Thru - An EFSS Industry Leader Recognized Thru as a Niche Player in both 2015 for Enterprise File Sync and Share Enterprise Security at its Best: 99.99% & 2016 Magic Quadrant SLA * Data centers are ISO certified. Thru products are ISO compliant. Recommends Thru for Its Breadth of APIs 100% Business Users & Built Exclusively for the Enterprise Deep Frontend & Backend Integrations Rated as Top Mobile Application Global Data Centers - 170+ Countries and Billions of Annual Transactions Thru was able to meet our needs by giving us a platform that we could automate at a reasonable price and offered the highest level of security. Sam Davidson, The Motley Fool
Thru Solution Overview
Secure BYOD with Thru Learn how Thru can empower your mobile workforce and secure your organization with an enterprise-grade solution for sharing information and increasing productivity. Putting a secure BYOD policy in place can alleviate the pressures of controlling data flow outside the organization and increase mobility for improved productivity. As a CIO, an IT Director or the IT department manager, you are responsible for how information is distributed in an organization and securing its data, no matter what device your users are using. In order to have secure mobility in place, choose the right file sharing solution with necessary features including full IT control and visibility, auditing, remote wipe, device encryption, policy enforcement and more. Thru provides all these features and more to equip businesses with the best enterprise-grade file sharing solution. Thru can help your organization secure BYOD across all business segments. For businesses looking to take back control of their sensitive information and processes, Thru is the right solution. Let s connect today! Contact us to set up a free trial.
About Thru Thru, Inc. offers industry-leading solutions for secure enterprise file sharing and collaboration around the globe. Handling billions of unlimited file size transactions, Thru serves a variety of industries including software, financial services, marketing, architecture and manufacturing. With installations in over 170 countries, Thru's unified platform and products offer both out-ofthe-box and custom solutions for every file sharing need of an enterprise. For more information about Thru, visit www.thruinc.com or contact sales@thruinc.com. Trusted by companies worldwide Do Business The Way You Want Anywhere. Anytime. Any device. Security is core to our service * Data centers are ISO certified. Thru products are ISO compliant. www.thruinc.com 2017 Thru, Inc. All rights reserved.