Empowering and Securing BYOD Email
-
Upload
justin-pirie -
Category
Technology
-
view
790 -
download
0
description
Transcript of Empowering and Securing BYOD Email
![Page 1: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/1.jpg)
Empower yetSecure BYOD email .
Justin [email protected]@mimecast.comECCV 2012
March 8th 2012
mutsmuts
![Page 2: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/2.jpg)
Analyst Blogger
![Page 3: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/3.jpg)
Community Manager
![Page 4: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/4.jpg)
Where I Work
![Page 9: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/9.jpg)
How the ProblemUsed to be Solved…
![Page 14: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/14.jpg)
Over 1m users
![Page 15: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/15.jpg)
mutsmuts
Empower yetSecure BYOD email .
![Page 16: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/16.jpg)
Paradox
Stuart Barr
![Page 17: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/17.jpg)
Tommy Ironic
76%: Mobile devices Essential-Ponemon
![Page 18: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/18.jpg)
Tommy Ironic
Same 76%: Mobile devices: “Security Risk”
![Page 19: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/19.jpg)
78% Already Allow BYOD- Decisive Analytics
Gerard Stolk (vers le Midi Carême)
![Page 20: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/20.jpg)
Yet only 39% have SecurityControls- Ponemon
Eva the Weaver
![Page 21: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/21.jpg)
And only 45% have EnforceablePolicies- Ponemon
origamidon
![Page 22: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/22.jpg)
Deletion Control
M i x y
![Page 23: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/23.jpg)
63% of Data Loss was from aMobile Device- Ponemon
chrisinplymouth
![Page 24: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/24.jpg)
Houston, We have a problem
Lst1984
![Page 25: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/25.jpg)
3 Questions to Answer today
Leo Reynolds
![Page 26: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/26.jpg)
Why Should we Consider BYOD?
![Page 27: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/27.jpg)
How do I enableWorkers to be productive?
wovox
![Page 28: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/28.jpg)
How should we secureEmail and reduce Risk?
Leo Reynolds
![Page 29: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/29.jpg)
Glass Half Full or Half Empty?
Wootang01
![Page 30: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/30.jpg)
Q4 2010- Smartphones outsell PCs
![Page 31: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/31.jpg)
![Page 32: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/32.jpg)
![Page 33: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/33.jpg)
Growth Rocketing
![Page 34: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/34.jpg)
Platforms- Watch for WP
![Page 35: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/35.jpg)
Android Rocketship:Already 850k/day
![Page 36: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/36.jpg)
Platform Proliferation-Android complex
![Page 37: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/37.jpg)
Employee Device Usage
![Page 38: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/38.jpg)
gamp
“I want to be as productive at work as I am at home”
![Page 39: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/39.jpg)
“On the device I want to. I am more productive”
![Page 40: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/40.jpg)
Mobile workers work anadditional 240 hours per year
Leo Reynolds
![Page 41: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/41.jpg)
91% of Mobile workers check their email during downtime
mag3737
![Page 42: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/42.jpg)
87% of Tablet owners use itfor work
chrisinplymouth
![Page 43: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/43.jpg)
Only 41% of tabletssupplied by Companies
Leo Reynolds
![Page 44: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/44.jpg)
“There is, perhaps, a call to action here… otherwise smart workers will use the initiative you presumably pay them for to work around the limitations.” Dale Vile
![Page 46: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/46.jpg)
Don’t put them in a wheel…Likely most innovative workers
spaceyjessie
![Page 47: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/47.jpg)
Power users: 3 devices, Earn 44% more money, Commute
rheauchyr
![Page 49: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/49.jpg)
Not held back
flatearththeatre
![Page 50: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/50.jpg)
Tech that represents theirPersonal Brand
Victor1558
![Page 51: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/51.jpg)
Benefitsmicheleart
![Page 52: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/52.jpg)
Staffing: Happiness,Retention, Hiring
Craft Australia
![Page 53: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/53.jpg)
More Efficient, Responsive, Productive; Agile
Rsms
![Page 54: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/54.jpg)
![Page 55: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/55.jpg)
How do we enable that?
wovox
![Page 56: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/56.jpg)
Glass Half Full or Half Empty?
Wootang01
![Page 57: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/57.jpg)
Email is a top 5 phone app
![Page 58: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/58.jpg)
17% of Tablet time is email
![Page 59: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/59.jpg)
stevecadman
The only “Universal”Collaboration tool
![Page 60: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/60.jpg)
Estimated 80 % CorporateIP contained in Email
![Page 61: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/61.jpg)
Makes email the gateway tothe majority of corporate IP…
![Page 62: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/62.jpg)
Give email to employeesin a Safe and Secure way
Mysterious Photographer
![Page 63: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/63.jpg)
How should we secureEmail and reduce Risk?
Leo Reynolds
![Page 64: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/64.jpg)
Glass Half Full or Half Empty?
Wootang01
![Page 65: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/65.jpg)
What would we wantif we were in your shoes?
wonderferret
![Page 66: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/66.jpg)
Enable productivity,Reduce risk
wovox
![Page 67: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/67.jpg)
We need to Support MultipleDevices- Enable Choice
![Page 68: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/68.jpg)
Securely Access Information,View, Collaborate
![Page 69: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/69.jpg)
63% of Data Loss was from aMobile Device- Ponemon
chrisinplymouth
![Page 70: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/70.jpg)
Travel Light:Little or No Data on Device
chantal forster
![Page 71: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/71.jpg)
matthewbradley
Evolve to the Cloud SecurityParadigm: Data not Device
![Page 72: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/72.jpg)
IT Holds the KeysAs the Data Custodian
Bohman
![Page 74: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/74.jpg)
Move from Device Controlto Data Liberation
Jonathan_W
![Page 75: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/75.jpg)
Start Making your DataWork for you
Helico
![Page 76: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/76.jpg)
Don’t let your data go to die.API’s coming
Geoffrey Gilson
![Page 77: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/77.jpg)
Gueorgui Tcherednitchenko
Focus on Adding Value
![Page 78: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/78.jpg)
UK Parliament
Two Opposed Approaches?
![Page 79: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/79.jpg)
Glass Half Full or Half Empty?
Wootang01
![Page 80: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/80.jpg)
Lock Everything Down?
kurafire
![Page 81: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/81.jpg)
fczuardi
Or Trust Everyone?
![Page 82: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/82.jpg)
JMC Photos
Or Another Way?
![Page 83: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/83.jpg)
B Tal
Good GRC Essential:Evaluate the Risks
![Page 84: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/84.jpg)
Exchange 2010- Pin LockEnforceable
![Page 85: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/85.jpg)
Exchange 2010- Remote Wipe
M i x y
![Page 86: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/86.jpg)
Need to get data off the deviceEnable access, yet control
![Page 87: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/87.jpg)
Mimecast iPhone App
![Page 88: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/88.jpg)
Search
![Page 89: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/89.jpg)
![Page 90: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/90.jpg)
All your email accessible
![Page 91: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/91.jpg)
![Page 92: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/92.jpg)
Collaborate
![Page 93: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/93.jpg)
Online Authentication
![Page 94: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/94.jpg)
BB and iPhone here.Android and WP7 in Beta
![Page 95: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/95.jpg)
Laptops still represent Risk25Gb Mailboxes increase data
liquidx
![Page 96: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/96.jpg)
Archiving with great search
![Page 97: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/97.jpg)
More MDM Needs?
![Page 98: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/98.jpg)
Cultural Shift in IT HappeningCloud Driving- BYOD visible
![Page 99: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/99.jpg)
Break free from our Shackles
mskogly
![Page 100: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/100.jpg)
Move from Managing Infra.To Managing Data and Glue
![Page 101: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/101.jpg)
Can’t keep doing the same:Data growing 50% + YoYCosts -25%.
Permabit
![Page 102: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/102.jpg)
Gueorgui Tcherednitchenko
Leave the fear behind.Focus on Adding Value
![Page 103: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/103.jpg)
Increasing Productivity
Rsms
![Page 104: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/104.jpg)
B Tal
But it’s not an easy decisionTrusting all this to a vendor
![Page 105: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/105.jpg)
We don’t want it to bea leap of Faith
Nicolas●B
![Page 106: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/106.jpg)
Our job to help you decidee.g. CSA STAR, ISO 27001
![Page 107: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/107.jpg)
Mine’s full.What’s yours?
Simon Cocks
![Page 108: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/108.jpg)
Start your Journey todayCraft Australia
![Page 109: Empowering and Securing BYOD Email](https://reader037.fdocuments.in/reader037/viewer/2022110306/555334aeb4c905e12e8b4c8d/html5/thumbnails/109.jpg)
mutsmuts
Justin [email protected]@mimecast.com
Thank YouFeel free to connect .
ECCV 2012March 8th 2012Images CC Flickr