SlideShare uma empresa Scribd logo
1 de 26
The Mobile Organization
Bridging the consumer
and enterprise worlds

Eyal Manor
emanor@checkpoint.com

©2013 Check Point Software Technologies Ltd.
Organizational Boundaries Disappear

©2013 Check Point Software Technologies Ltd.

2
I need to continue to work tonight…
…I’ll send this data via email

©2013 Check Point Software Technologies Ltd.

3
Error 552: Sorry, this message exceeds
your maximum size limit.
Dropbox
YouSendIt
Windows Live

©2013 Check Point Software Technologies Ltd.

4
This doesn’t affect me…
right?

©2013 Check Point Software Technologies Ltd.

5
Let’s Have a Closer Look
at your Network

900 Businesses
120,000 Hours of Inspected Traffic

©2013 Check Point Software Technologies Ltd.

6
Storing and Sharing Applications

70

Dropbox

51

Windows Live

25

Curl

22

YouSendIt
Sugarsync
PutLocker

13
10

80%
of Organizations
Use File Storage
and Sharing Apps

Source: Check Point Security Report 2013, 900 companies, 120,000 of traffic monitored

©2013 Check Point Software Technologies Ltd.

7
Data Loss at Organizations

54%
of Organizations
Experienced
Data Loss
Source: Check Point Security Report 2013, 900 companies, 120,000 of traffic monitored

[Restricted] ONLY for designated groups and individuals

©2013 Check Point Software Technologies Ltd.

8
…And Where All This Data Goes To?

93%
of Organizations
Allow Mobile Devices
into the Business

Source: Check Point Mobile Survey, March 2013, 790 IT professionals
©2013 Check Point Software Technologies Ltd.

9
Organizational Boundaries Disappear

Smartphones
and Tablets

USB Devices

Data Collaboration

Email

Data Leaves to Uncontrolled Environments
©2013 Check Point Software Technologies Ltd.

10
The Risks

Device Lost
or Stolen

Data Uploaded
to the web

Sharing Data with
External Parties

©2013 Check Point Software Technologies Ltd.

11
The Risks

Device Lost
Data Uploaded
A new version Stolen
for
or of Zeus malware designed to the web
mobile devices has stolen 36 million euros
from more than 30,000 customers.

Sharing Data with
External Parties

Malware on
Mobile Devices

©2013 Check Point Software Technologies Ltd.

12
Conventional Security Thinking
Protect the Device at All Costs
(even if it blocks the business…)

Manage
ALL Devices
Block
Is that Realistic?
File-Sharing Apps
Contain Everything
in the Perimeter

©2013 Check Point Software Technologies Ltd.

13
Protect Business Data Wherever Its Used

Available
anywhere

Meet All
User Needs

Multi Layered
Solution

©2013 Check Point Software Technologies Ltd.

14
Control the Access and Usage
of Business Data

USB Devices
Smartphones
and Tablets

Available
anywhere

Data
Collaboration

Encrypt Data in Uncontrolled Environments
Set Authentication & Access Rights to Data
Look for Exceptions in the “Trail of Data”
Be Able to Revoke Access to Data if Needed
©2013 Check Point Software Technologies Ltd.

15
On Mobile Devices

Use Business Data
within a Secure
Business Application
*****
Only Authenticated Users
Access the Business Container

©2013 Check Point Software Technologies Ltd.

16
On Mobile Devices

Use Business Data
within a Secure
Business Application
Use Emails Securely

Use Documents Securely

©2013 Check Point Software Technologies Ltd.

17
On USB Drives

Use Business Data
Within a Secure Folder
Personal Data
 Data is not encrypted
 Access to any user/device

Business Data
 Data is encrypted
 Transparent access only to
approved users and devices

©2013 Check Point Software Technologies Ltd.

18
Sharing Documents

Use and Share
Documents Securely
with Anyone
Data is Encrypted Upon Creation

Access to Authorized Users Only

Authorized

Non Authorized
©2013 Check Point Software Technologies Ltd.

19
Sharing Documents

Transparent Access
to Documents from
any Device

©2013 Check Point Software Technologies Ltd.

20
Engage People and Allow Them to Work

Enable BYOD –
Manage only Business Data

Engage and Educate End-users

Meet All
User Needs

©2013 Check Point Software Technologies Ltd.

21
Bring Your Own Device - BYOD

Personal
data & apps

Business
information

NOT
MANAGED

Use Personal Devices
for Business Data

MANAGED
Only
Business
Data is
Managed

Remotely
Wipe
Business
Data

©2013 Check Point Software Technologies Ltd.

22
Engage and Educate End Users

Salaries

Simple to
Understand
the Problem
& Resolution

©2013 Check Point Software Technologies Ltd.

23
Protect Data with a Multi Layered
Solution

Orchestrated Together

Simple to Manage Policy and Incidents

Multi Layered
Solution

©2013 Check Point Software Technologies Ltd.

24
Mobile Information Protection –
A Multi Layer Solution

Mobile Security

Enables Secure BYOD

Document Security

Enables Secure Document Sharing

DLP

Keeps Data Away from Wrong Hands

Endpoint Security

Protects Data on PCs and USBs

©2013 Check Point Software Technologies Ltd.

25
Summary

Protect Business Information
Wherever it is Used

Meets End Users Needs –
Enables BYOD & Information Sharing

Multi Layer Solution Protect Data on
Mobile Devices, Documents & Endpoints

©2013 Check Point Software Technologies Ltd.

26

Mais conteúdo relacionado

Mais procurados

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?syrinxtech
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securitysyrinxtech
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Iot application platform
Iot application platformIot application platform
Iot application platformSolair
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing GlobalSign
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & ChallengesDr. Mazlan Abbas
 
Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...Chris Doolittle
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Digi locker presentation Digi locker PPT
Digi locker presentation Digi locker PPTDigi locker presentation Digi locker PPT
Digi locker presentation Digi locker PPTKetan Kich
 
3rd Media & Entertainment CIO Summit Sales ppt
3rd Media & Entertainment CIO Summit Sales ppt3rd Media & Entertainment CIO Summit Sales ppt
3rd Media & Entertainment CIO Summit Sales pptRahul Neel Mani
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditingsyrinxtech
 

Mais procurados (20)

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Iot application platform
Iot application platformIot application platform
Iot application platform
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...Addressing analytics, data warehouse and Big Data challenges beyond database ...
Addressing analytics, data warehouse and Big Data challenges beyond database ...
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Digi locker presentation Digi locker PPT
Digi locker presentation Digi locker PPTDigi locker presentation Digi locker PPT
Digi locker presentation Digi locker PPT
 
3rd Media & Entertainment CIO Summit Sales ppt
3rd Media & Entertainment CIO Summit Sales ppt3rd Media & Entertainment CIO Summit Sales ppt
3rd Media & Entertainment CIO Summit Sales ppt
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditing
 

Destaque

Escritura del Consorcio Hensap-Mineros del Caribe
Escritura del Consorcio Hensap-Mineros del CaribeEscritura del Consorcio Hensap-Mineros del Caribe
Escritura del Consorcio Hensap-Mineros del Caribeagregadosdellitoral
 
Daily i-forex-report-1 by epic research 27 may 2013
Daily i-forex-report-1 by epic research 27 may 2013Daily i-forex-report-1 by epic research 27 may 2013
Daily i-forex-report-1 by epic research 27 may 2013Epic Daily Report
 
1 доповнення до р чного плану закуп-вель
1 доповнення до р чного плану закуп-вель1 доповнення до р чного плану закуп-вель
1 доповнення до р чного плану закуп-вельLibrary Franko
 
ICP: открываем новые горизонты!
ICP: открываем новые горизонты!ICP: открываем новые горизонты!
ICP: открываем новые горизонты!Denis Lelin
 
Primeiros passos com dropbox
Primeiros passos com dropboxPrimeiros passos com dropbox
Primeiros passos com dropboxPedro Witzoreke
 
Estefan arroyo manual de interpretación de carta astrológica
Estefan arroyo manual de interpretación de carta astrológicaEstefan arroyo manual de interpretación de carta astrológica
Estefan arroyo manual de interpretación de carta astrológica1Ligia
 
Digestion and absorption review k&m chapter1
Digestion and absorption review k&m chapter1Digestion and absorption review k&m chapter1
Digestion and absorption review k&m chapter1Pave Medicine
 

Destaque (20)

Recruitment
RecruitmentRecruitment
Recruitment
 
Escritura del Consorcio Hensap-Mineros del Caribe
Escritura del Consorcio Hensap-Mineros del CaribeEscritura del Consorcio Hensap-Mineros del Caribe
Escritura del Consorcio Hensap-Mineros del Caribe
 
Daily i-forex-report-1 by epic research 27 may 2013
Daily i-forex-report-1 by epic research 27 may 2013Daily i-forex-report-1 by epic research 27 may 2013
Daily i-forex-report-1 by epic research 27 may 2013
 
Sākam biznesu
Sākam biznesuSākam biznesu
Sākam biznesu
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
1 доповнення до р чного плану закуп-вель
1 доповнення до р чного плану закуп-вель1 доповнення до р чного плану закуп-вель
1 доповнення до р чного плану закуп-вель
 
Gaby univa educación
Gaby univa educaciónGaby univa educación
Gaby univa educación
 
English 3
English 3English 3
English 3
 
Comenzar
ComenzarComenzar
Comenzar
 
ICP: открываем новые горизонты!
ICP: открываем новые горизонты!ICP: открываем новые горизонты!
ICP: открываем новые горизонты!
 
TAO DAYS - API (IT Session)
TAO DAYS - API (IT Session)TAO DAYS - API (IT Session)
TAO DAYS - API (IT Session)
 
Primeiros passos com dropbox
Primeiros passos com dropboxPrimeiros passos com dropbox
Primeiros passos com dropbox
 
Leme santa casa
Leme santa casaLeme santa casa
Leme santa casa
 
El aguila y la zorra
El aguila  y  la  zorraEl aguila  y  la  zorra
El aguila y la zorra
 
Estefan arroyo manual de interpretación de carta astrológica
Estefan arroyo manual de interpretación de carta astrológicaEstefan arroyo manual de interpretación de carta astrológica
Estefan arroyo manual de interpretación de carta astrológica
 
Acesso Scifinder Web
Acesso Scifinder WebAcesso Scifinder Web
Acesso Scifinder Web
 
Retailing
RetailingRetailing
Retailing
 
Freedom Writers
Freedom WritersFreedom Writers
Freedom Writers
 
History
History History
History
 
Digestion and absorption review k&m chapter1
Digestion and absorption review k&m chapter1Digestion and absorption review k&m chapter1
Digestion and absorption review k&m chapter1
 

Semelhante a Check Point Mobile Security

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Group of company MUK
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?Miradore
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 

Semelhante a Check Point Mobile Security (20)

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 

Mais de Group of company MUK

Mais de Group of company MUK (17)

Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Check Point Mobile Security

  • 1. The Mobile Organization Bridging the consumer and enterprise worlds Eyal Manor emanor@checkpoint.com ©2013 Check Point Software Technologies Ltd.
  • 2. Organizational Boundaries Disappear ©2013 Check Point Software Technologies Ltd. 2
  • 3. I need to continue to work tonight… …I’ll send this data via email ©2013 Check Point Software Technologies Ltd. 3
  • 4. Error 552: Sorry, this message exceeds your maximum size limit. Dropbox YouSendIt Windows Live ©2013 Check Point Software Technologies Ltd. 4
  • 5. This doesn’t affect me… right? ©2013 Check Point Software Technologies Ltd. 5
  • 6. Let’s Have a Closer Look at your Network 900 Businesses 120,000 Hours of Inspected Traffic ©2013 Check Point Software Technologies Ltd. 6
  • 7. Storing and Sharing Applications 70 Dropbox 51 Windows Live 25 Curl 22 YouSendIt Sugarsync PutLocker 13 10 80% of Organizations Use File Storage and Sharing Apps Source: Check Point Security Report 2013, 900 companies, 120,000 of traffic monitored ©2013 Check Point Software Technologies Ltd. 7
  • 8. Data Loss at Organizations 54% of Organizations Experienced Data Loss Source: Check Point Security Report 2013, 900 companies, 120,000 of traffic monitored [Restricted] ONLY for designated groups and individuals ©2013 Check Point Software Technologies Ltd. 8
  • 9. …And Where All This Data Goes To? 93% of Organizations Allow Mobile Devices into the Business Source: Check Point Mobile Survey, March 2013, 790 IT professionals ©2013 Check Point Software Technologies Ltd. 9
  • 10. Organizational Boundaries Disappear Smartphones and Tablets USB Devices Data Collaboration Email Data Leaves to Uncontrolled Environments ©2013 Check Point Software Technologies Ltd. 10
  • 11. The Risks Device Lost or Stolen Data Uploaded to the web Sharing Data with External Parties ©2013 Check Point Software Technologies Ltd. 11
  • 12. The Risks Device Lost Data Uploaded A new version Stolen for or of Zeus malware designed to the web mobile devices has stolen 36 million euros from more than 30,000 customers. Sharing Data with External Parties Malware on Mobile Devices ©2013 Check Point Software Technologies Ltd. 12
  • 13. Conventional Security Thinking Protect the Device at All Costs (even if it blocks the business…) Manage ALL Devices Block Is that Realistic? File-Sharing Apps Contain Everything in the Perimeter ©2013 Check Point Software Technologies Ltd. 13
  • 14. Protect Business Data Wherever Its Used Available anywhere Meet All User Needs Multi Layered Solution ©2013 Check Point Software Technologies Ltd. 14
  • 15. Control the Access and Usage of Business Data USB Devices Smartphones and Tablets Available anywhere Data Collaboration Encrypt Data in Uncontrolled Environments Set Authentication & Access Rights to Data Look for Exceptions in the “Trail of Data” Be Able to Revoke Access to Data if Needed ©2013 Check Point Software Technologies Ltd. 15
  • 16. On Mobile Devices Use Business Data within a Secure Business Application ***** Only Authenticated Users Access the Business Container ©2013 Check Point Software Technologies Ltd. 16
  • 17. On Mobile Devices Use Business Data within a Secure Business Application Use Emails Securely Use Documents Securely ©2013 Check Point Software Technologies Ltd. 17
  • 18. On USB Drives Use Business Data Within a Secure Folder Personal Data  Data is not encrypted  Access to any user/device Business Data  Data is encrypted  Transparent access only to approved users and devices ©2013 Check Point Software Technologies Ltd. 18
  • 19. Sharing Documents Use and Share Documents Securely with Anyone Data is Encrypted Upon Creation Access to Authorized Users Only Authorized Non Authorized ©2013 Check Point Software Technologies Ltd. 19
  • 20. Sharing Documents Transparent Access to Documents from any Device ©2013 Check Point Software Technologies Ltd. 20
  • 21. Engage People and Allow Them to Work Enable BYOD – Manage only Business Data Engage and Educate End-users Meet All User Needs ©2013 Check Point Software Technologies Ltd. 21
  • 22. Bring Your Own Device - BYOD Personal data & apps Business information NOT MANAGED Use Personal Devices for Business Data MANAGED Only Business Data is Managed Remotely Wipe Business Data ©2013 Check Point Software Technologies Ltd. 22
  • 23. Engage and Educate End Users Salaries Simple to Understand the Problem & Resolution ©2013 Check Point Software Technologies Ltd. 23
  • 24. Protect Data with a Multi Layered Solution Orchestrated Together Simple to Manage Policy and Incidents Multi Layered Solution ©2013 Check Point Software Technologies Ltd. 24
  • 25. Mobile Information Protection – A Multi Layer Solution Mobile Security Enables Secure BYOD Document Security Enables Secure Document Sharing DLP Keeps Data Away from Wrong Hands Endpoint Security Protects Data on PCs and USBs ©2013 Check Point Software Technologies Ltd. 25
  • 26. Summary Protect Business Information Wherever it is Used Meets End Users Needs – Enables BYOD & Information Sharing Multi Layer Solution Protect Data on Mobile Devices, Documents & Endpoints ©2013 Check Point Software Technologies Ltd. 26

Notas do Editor

  1. Hi, today we will talk about the mobile organization
  2. So, up until fewyears ago or organization was our fortress. We had the ability to understand what our data is stored. It was in side the organization. People were working remotely at all times and road warriors is not something new – but those employees connected remotely – usually from managed devices, and data was traveling between the organization and those devices in a control manner. Today…. Everybody has its mobile device and everybody expects to use it… so, what are we doing with those devices today?
  3. Need to work on your data when away? Not a problem – its very simple to send it to your personal email address and continue working from your personal mobile device…
  4. Email servers can’t handle large files anymore. Got an error message about the size of the file? Not a problem as well, there are so many cloud-based services that allow us to upload huge files to the web and use them from anywhere.
  5. ….so, I’m sure that many of the people in the room say – “well…. those are simple problems, and at our organization it does NOT happen, because that we educated our employees, and block the abilities to do it”. So let’s see what our recent analysis discovered:During the year of 2012, Check Point Software have analyzed the perimeter traffic of 900 organization. A total of 120,000 hours of traffic were collected and analyzer, so our security report is not based on yet another survey that was filled by people, but it reflects reality. So – what have we seen?...
  6. First, we’ve seen that 80% of the organizations are using file storage and sharing applications today. At 70% of the organizations that we’ve analyzed we’ve seen files being uploaded to dropbox, followed by Windows Live, Yousend it and other web services. That’s a lot of files being uploaded from your organization into the public web.
  7. At more than half of the organizations that were analyzed, there was a severe leak of business data into the network. In 36% of financial organizations – credit card information was sent outside of the buisnessIn 16% of healthcare organizations – some protected health information was sent outside of the business – And all of that – were sent over the web and email to attendees that probably should not have access to this data.
  8. Last, when askingthese organizations, we see that more than 9 out of any 10 businesses today is allowing a verity of smartphones and tablets to access any resources in the business.
  9. So, as we can see, it is simpler than ever to use data anywhere today – On smartphones, tablets, over USB devices and over the web. Users would like to use business resources anywhere, and they have a lot of free and public means to do so. The challenge is that each and everyone of those means can not be controlled by the organization – not the personal smartphones, not USB devices, and of course that not services such as dropbox or public email services. All of these are uncontrolled environments.
  10. So, what are the risks of having data in uncontrolled environment?First, of course that any device such as USB, smartphone or tablet can be very easily got lost or stolen. All data on those devices will be simply available to anybody finds them.Data uploaded to the web is not very safe as well. services such as dropbox or evernote were hacked in the past, and additionally hackers try (and many times succeed) to login to those services with usernames and passwords that were reveleaed in other hackes – since eventually, most of us use the same user and password on many services.Sharing data with external partners is important to do business, but once data was transmitted to a business partner – we consider that an ‘uncontrolled environment’ as well, as we have no way to guarantee that the business partner will not loss this data (by mistake, or maybe on purpose….?)
  11. And finally – malware on mobile devices proliferates in the last two years. Only recently, Check Point discovered and published an interesting case study about more than 30,000 people in the EU that were infected with a virus on their mobile device more than EU36M were stolen from those people. Malware can get today to mobile devices at the same way it gets to PC and access easily data on native apps on the device such as the native email app, calendar, and others.
  12. So, when organizations come today to protect their assets, they usually try to protect data at the same way they protect data in “controlled environments” – meaning control the devices that store the data. Organizations try today to manage the entire device – even if it belongs to the end user, telling the user that “you need to comply with our policy in case that you can to connect to the business”. They will try to block file-sharing applications, although that eventually users will connect to those networks as they can be outside of the business or get connected to a 3G/4G network that is not routed via the business, and last – organizations will try to continue and contain everything inside the perimeter.The question that we need to ask ourselves is whether in the era of the mobile organization – such approach is still realistic. Can we still control the devices and keep all data inside the perimeter?
  13. We need to start to adopt a new way, and for that we need a change of mind. The new way is not looking at the devices – just because that the variant of devices and methods of using data becomes infinite, and instead we need to look at the data itself and understand how can we protect the business data. The new organization will expect data to:Be available anywhereUnderstand the end-users, meet their needs, and allow the security team to roll out a solution successfully. Understand that protecting data is a multi layer challenge ; a one that requires a multi layer solution.so, let’s see how we can think into the future in order to enable the mobile organization and still protect our business data
  14. End-users expect their data to be available anywhere today: On their smartphones and tablets, in USB devices and in cloud-applications such as dropbox, iCloud, Google Drive, etc. The organization needs to enable those devices, and have the ability to encrypt only the business data stored on those devices, without encrypting anything else – that is not considered to be business. The organization should be able to control the authentication to access this data – and set access rights to it – so only authorised users can see it, while others can’t. The business needs to have the ability to get alerts in case that business data is not used properly, and as a result should have the ability to block any further access to it from remote.
  15. And last – as the challenge is very wide, there are also a wide variety of technologies that business can adopt to protect their data. For the ability of the organization to control the security policy in an effective manner – we need to try to adopt a technology that will be orchestrated and provide us added value – such as Data Loss Protection with Data Rights Management, or Data Loss Protection and USB encryption that can protect and set access rights to data automatically once leaving the network. And last – of course that all businesses are expecting to adopt a solution that is simple to manage – as organizations don’t have the ability to increase IT human resources and spend.