IT has a dilemma Q: How do I allow employees to be productive from their mobile device without sacrificing corporate data security? A: Enterprise Mobility Management (EMM) minimizes data leakage while allowing users to be productive on personally owned and corporate owned mobile devices by adding a layer of security to the devices and/or the applications? 3
Mobile devices are top concern for data leakage Data leakage can impact your company’s reputation and financial stability
“Gartner predicts that the focus of endpoint breaches will shift to tablets and smartphones (by 2017).” “75 percent of mobile security breaches will be the result of mobile application misconfiguration.” Gartner Research, 2014 Mobile security breaches have affected more than two-thirds (68 percent) of global organizations in the last 12 months, according to a study from British Telecom.
Data Leakage – Hackers aren’t the only concern Examples of data leakage
Disgruntled employee has been using DropBox on their personal device to store and access corporate files and documents. Employee leaves the company for a competitor. The company can’t recover the data.
An Employee fails to password protect his/her mobile device and loses it on a plane or at an industry event where competitors are present. Hacker gains access to sensitive corporate information by hacking an unsecure mobile device rather than the data center.
How does a containerized app differ from native? Native Email • Encrypted email and attachments • Micro-VPN to corporate network • Password/Authentication Required • Looks and feels like native email • Business-class features • Integration with other XenMobile Apps for best-in-class mobile workflows
• Familiar experience • No security policies • Lacks business class features/ built for consumer • Can share information with other apps (i.e. contacts)
Make/Model/OS version Phone Number All apps on device Location of device Battery Level Storage Capacity Corporate Email and attachments • Corporate Contacts 11
• IT must earn and retain employee trust. • Employees must trust IT will not cross personal boundaries. • IT must communicate product features and functionality to employees. • Employees must communicate likes/dislikes to IT so they can improve the end-user experience.
Containerized Applications • Encrypted communication and data • Can only “talk” to other containerized apps if permitted by IT • Cut and Paste restrictions (optional) • Turn off app access to camera (optional)