webinarfeb 12017
6 essentials for secure
BYOD in healthcare
STORYBOARDS
the traditional approach to
security is inadequate
STORYBOARDS
1: end-user adoptionemployees are rejecting MDM and MAM
■ Employees are resisting IT “big brother”
■ 38% of IT professionals don’t participate in their own BYOD programs
■ 57% of employees refuse MDM/MAM for BYOD Bitglass BYOD Security Survey
2015
STORYBOARDS
■ Impedes user privacy
■ Complex solution deployment and management
■ Lack of data visibility or protection
■ User privacy issues■ Prevents use of
native apps (mail/calendar)
■ 3rd party / cloud apps non-functional
■ Challenging deployments
manage the device
wrap the app
secure the data
1: end-user adoptiondata-centric protection is the future
■ Protection of user privacy and experience
■ Any device, any app
■ Full data control and visibility for IT
■ Deploys in minutes, no software
mdm mam casb
STORYBOARDS
2: HIPAA compliance
■ access control
■ transmission security
■ audit and visibility
■ data integrity
STORYBOARDS
3: agentless BYOD access
■ Secure access from any unmanaged device without agents
■ Users are automatically routed through the proxy via SSO
■ Full data control and visibility for IT■ Control data access with context and
content-aware DLP
STORYBOARDS
3: agentless BYOD access
“By 2018, more than half of all bring your own device (BYOD) users that
currently have an MDM agent will be managed by an agentless solution”
Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
STORYBOARDS
4: data leakage prevention
■ Apply granular DLP to sensitive data
■ Distinguish between users, managed and unmanaged devices, access locations
■ Modify sharing permissions and quarantine sensitive files (e.g. PHI) before sharing
STORYBOARDS
5: device-centric controls
■ Maintain device pin/passcode requirements
■ Wipe corporate data from deprovisioned devices
■ Disk encryption
STORYBOARDS
6: easy management and deployment
■ Security must be adopted by end users
○ Independent physicians common in healthcare
■ Policies should work across applications
STORYBOARDS
recap: 6 essentials for BYOD security in healthcare
■ End-user adoption■ HIPAA compliance■ Agentless solution that works on
unmanaged devices■ DLP■ Device-centric controls■ Easy management and deployment
STORYBOARDS
challenge
■ Ensure OneDrive usage is HIPAA-compliant■ Prevent leakage of PII and PHI■ Maintain end user privacy■ Enforce data security policies on managed
and unmanaged devices
solution
■ Real-time inline data protection on any device
■ Block downloads of PHI and PII to unmanaged devices
■ Agentless BYOD with selective wipe■ Ability to support future enterprise-wide
SaaS deployments
200K users
secure office 365 + byod
major US hospital system
STORYBOARDS
our mission
total data
protectionoutside the
firewall
13
#1 CASB real-time data protection
founded 2013tier 1 funding
award-winning
tech leader3 patents,3 pending
resources:more info about byod and healthcare
■ research: healthcare breach report
■ case study: healthcare firm secures cloud and mobile
■ infographic: cloud adoption in healthcare
STORYBOARDS
bitglass.com@bitglass
Top Related