Is My Company Spying On Me? - Citrix

8 downloads 229 Views 1MB Size Report
AD changes to user. Jailbroken ... Encrypted email and attachments. • Micro-VPN to ... Secure email means you wont ina
Is My Company Spying On Me? Myths and Misconceptions with EMM and BYOD

 Is my company spying on me?

NO 2

© 2014 Citrix. Confidential.

 IT has a dilemma  Q: How do I allow employees to be productive from their mobile device without sacrificing corporate data security?  A: Enterprise Mobility Management (EMM) minimizes data leakage while allowing users to be productive on personally owned and corporate owned mobile devices by adding a layer of security to the devices and/or the applications? 3

© 2014 Citrix. Confidential.

Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation and financial stability

“Gartner predicts that the focus of endpoint breaches will shift to tablets and smartphones (by 2017).” “75 percent of mobile security breaches will be the result of mobile application misconfiguration.” Gartner Research, 2014 Mobile security breaches have affected more than two-thirds (68 percent) of global organizations in the last 12 months, according to a study from British Telecom.

4

© 2014 Citrix. Confidential.

Data Leakage – Hackers aren’t the only concern Examples of data leakage

Disgruntled employee has been using DropBox on their personal device to store and access corporate files and documents. Employee leaves the company for a competitor. The company can’t recover the data.

An Employee fails to password protect his/her mobile device and loses it on a plane or at an industry event where competitors are present. Hacker gains access to sensitive corporate information by hacking an unsecure mobile device rather than the data center.

5

© 2014 Citrix. Confidential.

EMM

Productivity and Collaboration Data Management

App Management

Enterprise Mobility Management Device Management

6

© 2014 Citrix. Confidential.

What takes place on my device? Mobile Device Management Initiate compliance actions based on a variety of triggers

Passcode policy

Lock device

AD changes to user

Modify policy set

Jailbroken device

Block network access

Unmanaged device Data Roaming

7

Compliance Engine

Selective wipe Full wipe

Geo-fencing

Revoke

App Blacklist

Send notification

App Whitelist

Set out of compliance

© 2014 Citrix. Confidential.

7

What takes place on my device? Mobile App Management

8

© 2014 Citrix. Confidential.

What takes place on my device? Mobile App Management Containerized Applications • 

Encrypted

• 

Inter-app controls

• 

Encrypted tunnel (Micro-VPN)

• 

App lock and wipe

© 2014 Citrix. Confidential.

How does a containerized app differ from native? Native Email •  Encrypted email and attachments •  Micro-VPN to corporate network •  Password/Authentication Required •  Looks and feels like native email •  Business-class features •  Integration with other XenMobile Apps for best-in-class mobile workflows

•  Familiar experience •  No security policies •  Lacks business class features/ built for consumer •  Can share information with other apps (i.e. contacts)

Secure email means you wont inadvertently leak confidential information. Plus...you get more business features like one-touch joining of meetings, set/edit Out of Office messages, attach multiple files and much more. © 2014 Citrix. Confidential.

What can my company see on my mobile device?

•  •  •  •  •  •  • 

Make/Model/OS version Phone Number All apps on device Location of device Battery Level Storage Capacity Corporate Email and attachments •  Corporate Contacts 11

© 2014 Citrix. Confidential.

•  •  •  •  •  • 

Personal Email Browsing History Text Messages Photos/Albums/Camera Roll Voice Mails Personal Application Data

 Your personal stuff stays personal

Success depends on Trust and Communication

Trust

Communication

12

© 2014 Citrix. Confidential.

•  IT must earn and retain employee trust. •  Employees must trust IT will not cross personal boundaries. •  IT must communicate product features and functionality to employees. •  Employees must communicate likes/dislikes to IT so they can improve the end-user experience.

13

© 2014 Citrix. Confidential.

Containerized Applications •  Encrypted communication and data •  Can only “talk” to other containerized apps if permitted by IT •  Cut and Paste restrictions (optional) •  Turn off app access to camera (optional)

App2

App 1

Open-In

Mobile OS

© 2014 Citrix. Confidential.

EMM

Enterprise Mobility Management

Productivity and Collaboration Data Management Productivity and Collaboration

App Management Data Management

Device Management

App Management

Device Management

© 2014 Citrix. Confidential.