Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Similar documents
KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

RHM Presentation. Maas 360 Mobile device management

Mobile Security using IBM Endpoint Manager Mobile Device Management

Storage Made Easy. Enterprise File Fabric for Unified Data Indexing, Auditing, e-compliance, and secure file sharing.

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

OneDrive for Business

How Next Generation Trusted Identities Can Help Transform Your Business

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced.

Maintain Data Control and Work Productivity

AKAMAI CLOUD SECURITY SOLUTIONS

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Mobilize with Enterprise Security and a Productive User Experience

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Augmenting security and management of. Office 365 with Citrix XenMobile

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Microsoft IT deploys Work Folders as an enterprise client data management solution

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Cisco Spark from Telstra. Empower teamwork

UNCLASSIFIED. Mimecast UK Archiving Service Description

Next-Gen CASB. Patrick Koh Bitglass

Securing Today s Mobile Workforce

LiveMeeting conferencing solution

Microsoft 365 Business FAQs

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

The Connected Worker and the Enterprise of Things

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

What is a mobile protection product?

Streamline IT with Secure Remote Connection and Password Management

How Identity as a Service Makes UCaaS/SaaS Integrations More Scalable, Productive, and Secure

Rethinking MDM in a BYOD World

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Providing an Enterprise File Share and Sync Solution for

THE FUTURE OF COMMUNICATIONS IN FINANCIAL SERVICES

XenApp, XenDesktop and XenMobile Integration

Go mobile. Stay in control.

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

Design and deliver cloud-based apps and data for flexible, on-demand IT

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

The office for the anywhere worker!!! Your LCB SOFTPHONE: A powerful new take on the all-in-one for a more immersive experience.

The Little Fuchsia Book of HPE Data Center Solutions

The Road to a Secure, Compliant Cloud

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Citrix ShareFile Enterprise: a technical overview citrix.com

Better skilled workforce

Enterprise Mobility Management

Macromedia Breeze. Introducing web communications that really speak to people.

Bring Your Own TVH. Kalman Tiboldi CBIO

The Device Has Left the Building

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Office 365 Business The Microsoft Office you know, powered by the cloud.

Evolved Backup and Recovery for the Enterprise

What can the OnBase Cloud do for you? lbmctech.com

Connect & take control

Start Now with Information Governance

Mobilize your corporate content and apps

Mobile Devices prioritize User Experience

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Securing Corporate Data on Mobile Devices

The Dropbox Problem: It s Worse than You Think

Citrix XenMobile and Windows 10

Creating Trust in a Highly Mobile World

Securing Office 365 with MobileIron

Take your business to the next level with fully integrated unified communications

MaaS360 Secure Productivity Suite

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

MDM and beyond: Rethinking mobile security in a BYOD world

The more intuitive way to work.

Maximize your move to Microsoft in the cloud

Providing an Enterprise File Share and Sync Solution for

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Be prepared for future

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

Social Engineering: We are the target Sponsor Guide

Enterprise Mobile Management (EMM) Policies

Google Identity Services for work

BYOD... or CYOD? 2 BILLION 5 BILLION. The Choice is Yours MOBILE DEVICES WORLDWIDE BY 2015 MOBILE DEVICES WORLDWIDE BY 2020

Quick Heal Mobile Device Management. Available on

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Top. Reasons Legal Teams Select kiteworks by Accellion

Take your business to the next level with fully integrated unified communications

Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise.

2016 BITGLASS, INC. mobile. solution brief

2015 Mobiliya. All Rights Reserved Page 2

Enterprise Mobility Management: completing the EMM story

Make security part of your client systems refresh

OWA Security & Enhancements

ModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific

The secure remote support, remote access and online meeting software that the world relies on.

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Transcription:

Balancing BYOD and Security A Guide for Secure Mobility in Today s Digital Era

Executive Summary In today s era of the mobile workforce, working remotely and on-the-go has become a universal norm. Some companies have put in place procedures for BYOD while most have not. Without these safety measures in place businesses can lose track of their valuable data and can jeopardize their whole company. The risks of BYOD far outweigh the advantages of using a secure BYOD solution. In order to mitigate those risks, businesses need an enterprise file sync and share solution that meets your every security and operational requirement. If you are a CIO, an IT Director or an IT manager looking for a way to balance security and BYOD, this paper can help you identify the capabilities and features you should expect from an enterprise-grade solution. This paper will guide you in determining the necessary requirements to look for in an EFSS solution that best suits your organization. A secure BYOD policy can untether the workforce and improve productivity across business units. Contents Executive Summary Typical BYOD Users. Introduction: Why Secure BYOD?... Risks and Advantages of BYOD..... Thru - File Sync and Share for the Enterprise.. The Thru Platform Meets All BYOD Requirements.. Thru: An EFSS Industry Leader...... Solution Overview. Secure BYOD with Thru.... About Thru... 2 3 4 5 6 7 8 9 10 11

Typical BYOD Users There are many different types of BYOD users all of which need secure access to their content at any time. Everyone in the organization has become a BYOD user in today s digital age. Executives, CxOs and Senior Leadership Sales, Marketing and Road Warriors Top-level executives need to be constantly connected with anywhere, anytime access to important reports, data and more. On-the-go employees need anywhere, anytime access to content, presentations, graphics and etc. Support Staff Partner, External or Third-Party Consultants Internal/external technical support employees providing support offsite or with off-hours need necessary content readily available. Sharing files and data with external parties must be secured, especially when being done on-the-go. Additional Employees and Many Others Everyone in the organization has become a BYOD user in today s digital age.

Why Secure BYOD? Businesses are exchanging information around the globe at a faster pace than ever before. In order to secure their valuable data, they must secure BYOD. The First Step Is Acknowledging the Problem Mobility is a challenge for companies for many reasons. While 77 percent of companies are concerned about protecting business and employee data, according to research by Gartner, less than 50 percent of organizations are ready to implement BYOD.¹ Employees have turned to the use of unsecure, unsanctioned file sharing tools such as free tools like Dropbox Inc and Google Drive which pose many serious security risks. Further information on the risks posed by unsecure file sharing solutions can be found in Enterprise File Sync and Share in the Present Day, a comprehensive white paper by Thru. Losing Track of Critical Business Data Companies can lose track of their data as soon as an employee downloads a file onto their mobile device or home computer outside dedicated applications. Changes made to the document may not be recorded back into the central repository and the latest version is not accessible by IT administrators. Thirty-nine percent of respondents reported central management of mobile devices and applications as the biggest challenge (Gartner).¹ 50% Less than 50% are ready to implement BYOD 80% Of tech companies have 77% Are concerned about protecting business and employee data 39% Say central management concerns about content of mobile devices and security on lost or applications are the stolen devices biggest challenge ¹Source 1: According to independent research conducted by Infosec on BYOD & Mobile Security Policies, Gartner Research Source 2: Secure Sharing of Intellectual Property, a study conducted by Forrester on behalf of Thru

Risks and Advantages Decision makers will find themselves in a much stronger position to combat security risks and ensure data control with the advantages of secure BYOD on their side. The Risks of Unmanaged BYOD Data leaks Fraudulent transactions Freeware-based auto storage by employees (i.e. Dropbox, Inc., icloud and Google Drive) Lost / stolen / jail-broken devices Inability to track or have control of sensitive company data The Advantages of Secure BYOD Increased productivity (JIT) for on-the-go employees Employee satisfaction Improved mobility Full IT control and visibility Transaction audits Current with latest technology trends Accelerated business processes

Thru - File Sync and Share for the Enterprise Built exclusively for the business user and enterprises, Thru is an end to end file sharing and collaboration solution, that not only offers enterprise level security and reliability at the core, but also ensures end user ease of usage and integration into a variety of business applications. With access via Web, mobile apps for ios and Android, Thru Desktop Sync and Thru add-ins and apps for Microsoft Outlook, IBM Notes, Microsoft SharePoint and Salesforce, Thru gives your organization 360-degree access and ability to sync and share files from anywhere, anytime and from any device. You can collaborate in real time by connecting all departments and giving your employees a virtual office experience via a secure platform that government and financial organizations trust. The Only Provider To Offer a True 3600 Access - From Anywhere, Anytime, Any Device.

The Thru Platform Meets All BYOD Requirements Native Mobile Applications & Tools Apps for ios and Android Mobile Web access Sync mobile camera photos Integration with Business Applications Microsoft Office for ios and Android CRM and ERP systems IT Administrative Control Policy enforcement for document access and manipulation Restrict downloads to WiFi only (not via 3G or 4G) Enterprise Grade Security AES 256-bit SSL / TLS data encryption in flight Stored with AES 256 FIPS-compliant encryption Password protection Remote wipe of devices lost or stolen Temporarily block access to devices control which devices a user may log into based on MAC address Device lock Device pinning Jailbreak / root detection Geo-fencing Corporate container (isolating from personal content) Corporate Policy Enforcement Digital rights management (DRM) through policies Policy enforcement for document access and manipulation

Thru - An EFSS Industry Leader Recognized Thru as a Niche Player in both 2015 for Enterprise File Sync and Share Enterprise Security at its Best: 99.99% & 2016 Magic Quadrant SLA * Data centers are ISO certified. Thru products are ISO compliant. Recommends Thru for Its Breadth of APIs 100% Business Users & Built Exclusively for the Enterprise Deep Frontend & Backend Integrations Rated as Top Mobile Application Global Data Centers - 170+ Countries and Billions of Annual Transactions Thru was able to meet our needs by giving us a platform that we could automate at a reasonable price and offered the highest level of security. Sam Davidson, The Motley Fool

Thru Solution Overview

Secure BYOD with Thru Learn how Thru can empower your mobile workforce and secure your organization with an enterprise-grade solution for sharing information and increasing productivity. Putting a secure BYOD policy in place can alleviate the pressures of controlling data flow outside the organization and increase mobility for improved productivity. As a CIO, an IT Director or the IT department manager, you are responsible for how information is distributed in an organization and securing its data, no matter what device your users are using. In order to have secure mobility in place, choose the right file sharing solution with necessary features including full IT control and visibility, auditing, remote wipe, device encryption, policy enforcement and more. Thru provides all these features and more to equip businesses with the best enterprise-grade file sharing solution. Thru can help your organization secure BYOD across all business segments. For businesses looking to take back control of their sensitive information and processes, Thru is the right solution. Let s connect today! Contact us to set up a free trial.

About Thru Thru, Inc. offers industry-leading solutions for secure enterprise file sharing and collaboration around the globe. Handling billions of unlimited file size transactions, Thru serves a variety of industries including software, financial services, marketing, architecture and manufacturing. With installations in over 170 countries, Thru's unified platform and products offer both out-ofthe-box and custom solutions for every file sharing need of an enterprise. For more information about Thru, visit www.thruinc.com or contact sales@thruinc.com. Trusted by companies worldwide Do Business The Way You Want Anywhere. Anytime. Any device. Security is core to our service * Data centers are ISO certified. Thru products are ISO compliant. www.thruinc.com 2017 Thru, Inc. All rights reserved.