Six Secrets to Surviving and Thriving
With a Mobile Workforce
Inka Traktman




www.evault.com         12/9/2012                      1
                                        2012.01.0012_PPT
Costs of Data Breach

                       2011      $5.5 M

                                    per
                          $194    record



                                     Poneman Institute 2011


 www.evault.com                                                 2
                                                  2012.01.0012_PPT
It’s critical for IT to take control of remote and mobile
endpoints, start implementing data management
policies for endpoints to mitigate data leakage and
corporate risk now.




 www.evault.com          12/9/2012                                  3
                                                      2012.01.0012_PPT
Receive a companion whitepaper that includes a BYOD
policy checklist to develop your strategic corporate
plan.




 www.evault.com       12/9/2012 | © 2012 EVault, Inc. All Rights Reserved |   CONFIDENTIAL     |    4
                                                                                      2012.01.0012_PPT
To help you survive and thrive with a mobile workforce
           and mitigate organizational risk.




www.evault.com         12/9/2012 | © 2012 EVault, Inc. All Rights Reserved |   CONFIDENTIAL     |    5
                                                                                       2012.01.0012_PPT
Agenda



1


2
3
4
5


 6




www.evault.com   12/9/2012 | © 2012 EVault, Inc. All Rights Reserved |   CONFIDENTIAL     |    6
                                                                                 2012.01.0012_PPT
Mobile devices at
                       work
                       81%




                               Source: ESET/Harris Interactive
www.evault.com     12/9/2012                                              7
                                                            2012.01.0012_PPT
240 hours of
                               annual
                             productivity




www.evault.com   12/9/2012                           8
                                       2012.01.0012_PPT
Safeguard the corporation,
     customers and employees
 Increase productivity and flexibility
      Decrease overhead costs




www.evault.com                           | © 2012 EVault, Inc. All Rights Reserved |     9
                                                                           2012.01.0012_PPT
Enterprises should focus on mobile
  data protection, network access
  control, and mobile device
  management tools to support their
  BYOD in endpoint enterprise mobile
  platform efforts.




                       Endpoints are becoming priority for IT




www.evault.com         12/9/2012                                        10
                                                           2012.01.0012_PPT
Gartner: Top 10 Technology Priorities

 1.       Analytics and Business Intelligence
 2.       Mobile Technologies
 3.       Cloud Computing (SaaS, IaaS, PaaS)
 4.       Collaboration Technologies
 5.       Legacy modernization
 6.       IT Management
 7.       CRM
 8.       ERP Applications
 9.       Security
 10.      Virtualization




www.evault.com                          12/9/2012                11
                                                    2012.01.0012_PPT
Endpoint Layers



      Anti-malware               Anti-spyware




                              Host-based intrusion
    Personal firewalls
                                   prevention



 Port and device
 Port and device control   Full-disk encryption
                             File and file encryption
     control


                            Application vulnerability
Endpoint data loss
  Endpoint data loss
                              management and
     prevention
   prevention                 application control




www.evault.com                             12/9/2012                 12
                                                        2012.01.0012_PPT
Best
practice   1     Understand behaviors, landscape and goals



                        Inventory



                         Roles & Rules



                        Policy Team


                         Security


                        Support


      www.evault.com                     12/9/2012                        13
                                                             2012.01.0012_PPT
Support for employees in the field               40%                25%


 Support for travelling employees               40%                21%
                                                                               Avoid Tactical IT
Mobile connection with customers           31%             21%
                                                                               Set-Backs
  Support for employees working             35%              18%
                     from home

 Building customized mobile apps          29%          11%
                                                                               Move towards
                Mobile commerce                     14%                        BTRD.
        Moderate focus                        Heavy focus

   Source: CompTIA’s Trends in Enterprise Mobility study




      www.evault.com                                               12/9/2012                                    14
                                                                                                   2012.01.0012_PPT
Stay in Charge

  Policy devices & support
  Rights & obligations
  Central management & compatibility
  Self-service solution without impacting performance
  Scalability
  Security




www.evault.com                12/9/2012                               15
                                                         2012.01.0012_PPT
Best
practice   2     Policy Based Protection




                                          Keys to success

       1. Critical data retention
       2. Centralized visibility and control
       3. User adoption; self-service recovery
       4. RTO for IT/users
       5. Mobile device synchronization
       6. Deployment
       7. Technologies to increase efficiencies




      www.evault.com                           12/9/2012                 16
                                                            2012.01.0012_PPT
Data Footprint & Restore Requirements

                Online
                                         Data Reference Patterns
                                                                                       • Recent
                (ms)
                                                                                         Information
                                                                                         requires little data
                                                                                         reference
                 Retrieval activity


                                                      Nearline
                                                      (sec)
                                                                                       • High data footprint
                                                                                         as data ages
                                                                   Archival/deletion
                  Amount of data                                   (Sec/mins)

                                                                                       • Local storage
                                      Days since creation
                                                                                         cache for faster
Source: Harison Information Strategies
                                                                                         recovery and
                                                                                         protection for end-
                                                                                         users, regional
                                                                                         offices
   www.evault.com                                                   12/9/2012                                          17
                                                                                                          2012.01.0012_PPT
Deployment


• Silent deployment / policy enforcement
• Departmental deployment / policy flexibility
• Deployment plan / support plan in rollout
     • Policy
     • OS
     • Geo-location
     • Critical needs

• Exceptions in policy, support




  www.evault.com                  12/9/2012 | © 2012 EVault, Inc. All Rights Reserved |   CONFIDENTIAL     |   18
                                                                                                  2012.01.0012_PPT
Other Technologies to Aid in Successful
Endpoint Protection


                 Data compression and retention


                 Block-level incremental backups and
                 global de-duplication

                 Replication of data to dual data centers



                 Local caching




www.evault.com                12/9/2012                                  19
                                                            2012.01.0012_PPT
Best Practices for Locking Down your
   Best
practice   3    Endpoints



                                                                 Has BYOD affected the measures you take for
                                                                             network security?




                                                                        69%
                                                                                    Yes very
                                                                                    Yes somewhat

             Are you concerned about the security of data                           Not at all
              transmitted over personal smart devices?


                                                                                            Source: Airtight Survey 2012



      www.evault.com                                 12/9/2012                                                                      20
                                                                                                                       2012.01.0012_PPT
Forrester Data Security Priorities




                                             Encryption
                                             Endpoint Control
                                             Device Kill
Source: Forrester Security Survey, Q2 2011




 www.evault.com
                                                           2012.01.0012_PPT
Encryption


                          Encrypting during backup          Encryption and data
  File and folder-based                                                                 Integrated encryption
                               and recovery                    deduplication




• On / off                • Generate random keys         • No decryption or risk      • Easily deployed and
                                                                                        integrated
• Decrypts opening        • Destroy key on stolen/lost   • Secure key escrow system
                            laptop
• At rest and in-flight




       www.evault.com
                                                                                                  2012.01.0012_PPT
Access Control
                 Physical

                 Network

                 Ports

                 File Type

                 Sharing




www.evault.com
                                  2012.01.0012_PPT
www.evault.com
                 2012.01.0012_PPT
Device Wipe

“A mobile device was inadvertently misplaced
and then taken and used by unauthorized
individuals who accessed patient medical and
financial records. It even provided access to
the hospital network itself, healthcare
electronic databases, and the caregiver's
contact lists… just to name a few key sources
of very private data.”                                 68%
                                                of managers keep
                                                valuable data on
                                                endpoint devices




   www.evault.com
                                                                   2012.01.0012_PPT
Best
practice       4   Automated Backup to the Cloud


         Can cloud connectivity solve your data challenges?


           •   Reduce total cost of ownership (TCO)
           •   Capacity and timely scalability
           •   Flexible service levels
           •   Automated policy deployments
           •   Robust redundancies                      Cloud & Mobility
           •   Data center security levels              go hand in hand
           •   Budgeting
           •   Strategic, not tactical leadership




 www.evault.com
                                                                           2012.01.0012_PPT
Cloud Readiness Assessment

         Cloud architecture requirements
         Network
         Security
         Storage
         Compliance
         Support requirements




                                           Free Assessment




www.evault.com
                                                             2012.01.0012_PPT
Issues Surrounding Mobile Device
   Best
practice
            5       Management




                          59%
                  of companies believe lost
                   or stolen smart phones
                  contain sensitive business
                         information




 www.evault.com
                                                       2012.01.0012_PPT
Questions


                 Access   Sharing Rules
                 Policy Management P l a t f o r m
                 Existing Devices Future Support

                 Audit Trails Reporting
                 Secure Data Transmission
                 Location Tracking Data Deletion




www.evault.com
                                                   2012.01.0012_PPT
Best
practice    6      IT Administrator Visibility and Control


            “Companies are beginning to invest in
            technologies that will enable them to more
            centrally manage PC backup and recovery.
            This shift indicates that IT is beginning to
            recognize how mobile devices are changing the
            requirements for endpoint backup and
            recovery.”




  www.evault.com
                                                             2012.01.0012_PPT
IT Administrator Visibility and Control

                                          Capabilities



   •   Data Management                                   •   Self Service
   •   Security Management                               •   Layers of visibility
   •   Reliability on SLA’s                              •   Notifications, alerts
   •   Resource capacity management                      •   Support
   •   Real-time reporting and audit trails
   •   Multi-layered policies




                                Cost effective solution

www.evault.com
                                                                                     2012.01.0012_PPT
Matching organizational need
                                    Vendor Stability
and vendor capabilities is vital
to ensure long term success.
                                     Service Level

                                    Geo Availability

                                   Language Support




www.evault.com
                                                       2012.01.0012_PPT
It’s critical for IT to take control of mobile endpoint
data and start corporate policy management for
personal and corporate endpoints.




www.evault.com
                                                      2012.01.0012_PPT
Download our companion whitepaper that includes our
BYOD policy checklist to develop your strategic
corporate plan.




 www.evault.com      12/9/2012 | © 2012 EVault, Inc. All Rights Reserved |   CONFIDENTIAL     |   34
                                                                                     2012.01.0012_PPT
Survive and thrive with a mobile workforce
                   Mitigate organizational risk.




www.evault.com
                                                         2012.01.0012_PPT
EVault Endpoint Protection

The all-in-one laptop backup, recovery and data security solution that
controls enterprise data across mobile workforces.




 www.evault.com
                                                                         2012.01.0012_PPT
Cloud-Connected backup and
recovery services since 1997
Market leader with 35,000+
customers worldwide
Broad partner network
A Seagate Company


 Headquarters | 201 3rd Street | Suite
   400 | San Francisco, CA 94103 |
        877.901.DATA (3282) |

              www.evault.com

  www.evault.com                         12/9/2012 | © 2012 EVault, Inc. All Rights Reserved |     37
                                                                                      2012.01.0012_PPT

Six steps to survive and thrive with a mobile workforce

  • 1.
    Six Secrets toSurviving and Thriving With a Mobile Workforce Inka Traktman www.evault.com 12/9/2012 1 2012.01.0012_PPT
  • 2.
    Costs of DataBreach 2011 $5.5 M per $194 record Poneman Institute 2011 www.evault.com 2 2012.01.0012_PPT
  • 3.
    It’s critical forIT to take control of remote and mobile endpoints, start implementing data management policies for endpoints to mitigate data leakage and corporate risk now. www.evault.com 12/9/2012 3 2012.01.0012_PPT
  • 4.
    Receive a companionwhitepaper that includes a BYOD policy checklist to develop your strategic corporate plan. www.evault.com 12/9/2012 | © 2012 EVault, Inc. All Rights Reserved | CONFIDENTIAL | 4 2012.01.0012_PPT
  • 5.
    To help yousurvive and thrive with a mobile workforce and mitigate organizational risk. www.evault.com 12/9/2012 | © 2012 EVault, Inc. All Rights Reserved | CONFIDENTIAL | 5 2012.01.0012_PPT
  • 6.
    Agenda 1 2 3 4 5 6 www.evault.com 12/9/2012 | © 2012 EVault, Inc. All Rights Reserved | CONFIDENTIAL | 6 2012.01.0012_PPT
  • 7.
    Mobile devices at work 81% Source: ESET/Harris Interactive www.evault.com 12/9/2012 7 2012.01.0012_PPT
  • 8.
    240 hours of annual productivity www.evault.com 12/9/2012 8 2012.01.0012_PPT
  • 9.
    Safeguard the corporation, customers and employees Increase productivity and flexibility Decrease overhead costs www.evault.com | © 2012 EVault, Inc. All Rights Reserved | 9 2012.01.0012_PPT
  • 10.
    Enterprises should focuson mobile data protection, network access control, and mobile device management tools to support their BYOD in endpoint enterprise mobile platform efforts. Endpoints are becoming priority for IT www.evault.com 12/9/2012 10 2012.01.0012_PPT
  • 11.
    Gartner: Top 10Technology Priorities 1. Analytics and Business Intelligence 2. Mobile Technologies 3. Cloud Computing (SaaS, IaaS, PaaS) 4. Collaboration Technologies 5. Legacy modernization 6. IT Management 7. CRM 8. ERP Applications 9. Security 10. Virtualization www.evault.com 12/9/2012 11 2012.01.0012_PPT
  • 12.
    Endpoint Layers Anti-malware Anti-spyware Host-based intrusion Personal firewalls prevention Port and device Port and device control Full-disk encryption File and file encryption control Application vulnerability Endpoint data loss Endpoint data loss management and prevention prevention application control www.evault.com 12/9/2012 12 2012.01.0012_PPT
  • 13.
    Best practice 1 Understand behaviors, landscape and goals Inventory Roles & Rules Policy Team Security Support www.evault.com 12/9/2012 13 2012.01.0012_PPT
  • 14.
    Support for employeesin the field 40% 25% Support for travelling employees 40% 21% Avoid Tactical IT Mobile connection with customers 31% 21% Set-Backs Support for employees working 35% 18% from home Building customized mobile apps 29% 11% Move towards Mobile commerce 14% BTRD. Moderate focus Heavy focus Source: CompTIA’s Trends in Enterprise Mobility study www.evault.com 12/9/2012 14 2012.01.0012_PPT
  • 15.
    Stay in Charge  Policy devices & support  Rights & obligations  Central management & compatibility  Self-service solution without impacting performance  Scalability  Security www.evault.com 12/9/2012 15 2012.01.0012_PPT
  • 16.
    Best practice 2 Policy Based Protection Keys to success 1. Critical data retention 2. Centralized visibility and control 3. User adoption; self-service recovery 4. RTO for IT/users 5. Mobile device synchronization 6. Deployment 7. Technologies to increase efficiencies www.evault.com 12/9/2012 16 2012.01.0012_PPT
  • 17.
    Data Footprint &Restore Requirements Online Data Reference Patterns • Recent (ms) Information requires little data reference Retrieval activity Nearline (sec) • High data footprint as data ages Archival/deletion Amount of data (Sec/mins) • Local storage Days since creation cache for faster Source: Harison Information Strategies recovery and protection for end- users, regional offices www.evault.com 12/9/2012 17 2012.01.0012_PPT
  • 18.
    Deployment • Silent deployment/ policy enforcement • Departmental deployment / policy flexibility • Deployment plan / support plan in rollout • Policy • OS • Geo-location • Critical needs • Exceptions in policy, support www.evault.com 12/9/2012 | © 2012 EVault, Inc. All Rights Reserved | CONFIDENTIAL | 18 2012.01.0012_PPT
  • 19.
    Other Technologies toAid in Successful Endpoint Protection Data compression and retention Block-level incremental backups and global de-duplication Replication of data to dual data centers Local caching www.evault.com 12/9/2012 19 2012.01.0012_PPT
  • 20.
    Best Practices forLocking Down your Best practice 3 Endpoints Has BYOD affected the measures you take for network security? 69% Yes very Yes somewhat Are you concerned about the security of data Not at all transmitted over personal smart devices? Source: Airtight Survey 2012 www.evault.com 12/9/2012 20 2012.01.0012_PPT
  • 21.
    Forrester Data SecurityPriorities Encryption Endpoint Control Device Kill Source: Forrester Security Survey, Q2 2011 www.evault.com 2012.01.0012_PPT
  • 22.
    Encryption Encrypting during backup Encryption and data File and folder-based Integrated encryption and recovery deduplication • On / off • Generate random keys • No decryption or risk • Easily deployed and integrated • Decrypts opening • Destroy key on stolen/lost • Secure key escrow system laptop • At rest and in-flight www.evault.com 2012.01.0012_PPT
  • 23.
    Access Control Physical Network Ports File Type Sharing www.evault.com 2012.01.0012_PPT
  • 24.
    www.evault.com 2012.01.0012_PPT
  • 25.
    Device Wipe “A mobiledevice was inadvertently misplaced and then taken and used by unauthorized individuals who accessed patient medical and financial records. It even provided access to the hospital network itself, healthcare electronic databases, and the caregiver's contact lists… just to name a few key sources of very private data.” 68% of managers keep valuable data on endpoint devices www.evault.com 2012.01.0012_PPT
  • 26.
    Best practice 4 Automated Backup to the Cloud Can cloud connectivity solve your data challenges? • Reduce total cost of ownership (TCO) • Capacity and timely scalability • Flexible service levels • Automated policy deployments • Robust redundancies Cloud & Mobility • Data center security levels go hand in hand • Budgeting • Strategic, not tactical leadership www.evault.com 2012.01.0012_PPT
  • 27.
    Cloud Readiness Assessment Cloud architecture requirements Network Security Storage Compliance Support requirements Free Assessment www.evault.com 2012.01.0012_PPT
  • 28.
    Issues Surrounding MobileDevice Best practice 5 Management 59% of companies believe lost or stolen smart phones contain sensitive business information www.evault.com 2012.01.0012_PPT
  • 29.
    Questions Access Sharing Rules Policy Management P l a t f o r m Existing Devices Future Support Audit Trails Reporting Secure Data Transmission Location Tracking Data Deletion www.evault.com 2012.01.0012_PPT
  • 30.
    Best practice 6 IT Administrator Visibility and Control “Companies are beginning to invest in technologies that will enable them to more centrally manage PC backup and recovery. This shift indicates that IT is beginning to recognize how mobile devices are changing the requirements for endpoint backup and recovery.” www.evault.com 2012.01.0012_PPT
  • 31.
    IT Administrator Visibilityand Control Capabilities • Data Management • Self Service • Security Management • Layers of visibility • Reliability on SLA’s • Notifications, alerts • Resource capacity management • Support • Real-time reporting and audit trails • Multi-layered policies Cost effective solution www.evault.com 2012.01.0012_PPT
  • 32.
    Matching organizational need Vendor Stability and vendor capabilities is vital to ensure long term success. Service Level Geo Availability Language Support www.evault.com 2012.01.0012_PPT
  • 33.
    It’s critical forIT to take control of mobile endpoint data and start corporate policy management for personal and corporate endpoints. www.evault.com 2012.01.0012_PPT
  • 34.
    Download our companionwhitepaper that includes our BYOD policy checklist to develop your strategic corporate plan. www.evault.com 12/9/2012 | © 2012 EVault, Inc. All Rights Reserved | CONFIDENTIAL | 34 2012.01.0012_PPT
  • 35.
    Survive and thrivewith a mobile workforce Mitigate organizational risk. www.evault.com 2012.01.0012_PPT
  • 36.
    EVault Endpoint Protection Theall-in-one laptop backup, recovery and data security solution that controls enterprise data across mobile workforces. www.evault.com 2012.01.0012_PPT
  • 37.
    Cloud-Connected backup and recoveryservices since 1997 Market leader with 35,000+ customers worldwide Broad partner network A Seagate Company Headquarters | 201 3rd Street | Suite 400 | San Francisco, CA 94103 | 877.901.DATA (3282) | www.evault.com www.evault.com 12/9/2012 | © 2012 EVault, Inc. All Rights Reserved | 37 2012.01.0012_PPT

Editor's Notes

  • #7 As the line between work and personal life continues to blur more and more, employees are bringing their own smartphones, tablets and laptop computers to the workplace—whether that workplace is an office, an airport, a hotel, home or anyplace else. In this new mobile world, IT plays a pivotal role in ensuring organizational competitiveness, business continuity, productivity and risk mitigation when it comes to mobile devices and endpoint data management.Today we’ll explore some of the key strategies for IT managers to consider as they explore solutions to manage and control mobile endpoints.
  • #8 If you haven’t been faced with BYOD demands thus far, you will be. Over 81% of employees are already using personal devices at work. And IT managers are starting to play a pivotal role for companies as C-level executives begin to understand the impact of this movement on the organization. To remain competitive today, organizations have to embrace mobility to increase productivity and collaboration. According to IDC, the mobile workforce is nearing 75% of all workers in the US.Worldwide, mobile worker population will increase to more than 1.3 billion by 2015. About a quarter (24%) of employed adults use their own smartphone to access and/or store company information. The percentage rises to 41% for personal laptops and 47% for personal desktops. Only 10% currently use personally owned tablets to access and/or store company information, but tablets are the fastest growing segment and tablet releases such as the new Windows tablet geared towards business solutions will only increase the trend. SP2, what do you see as the key opportunities and challenges of BYOD for IT in managing data and workforce mobility?
  • #9  An employee who is able to use a device that he is highly comfortable with, is likely to be more productive and more satisfied than those who are forced to use unfamiliar, company-mandated technology platforms. Or worse yet, those employees who are barred from accessing corporate files remotely altogether. A well-thought-out BYOD policy puts computing power into the hands of employees so they can accomplish work when it needs to be done, not just when office hours permit. Recent study…. statistics from a recent security survey about the devices used at work. Note that the organization gains roughly 240 work hours by providing personal device preferences and BYOD according to a recent study.   
  • #11 Other benefits are greater job satisfaction, increased retention, but oin exchange the organization has to . give up control. Gartner released a recent survey that encouraged enterprises to focus on mobile data protection, network access control, and mobile device management tools to support BYOD in endpoint enterprise mobile platform efforts.
  • #12 Gartner names mobility as the second most important priority for IT in 2012, but really IT will need to intersect and layer the endpoint priorities over the top ten technology priorities that Gartner identified to create a seamless business security, continuity and recovery plan. All ten really work together and intersect when it comes to endpoint data protection and security. As part of this mobility, the endpoint strategies companies deploy are becoming increasingly critical.
  • #13 According to Gartner, the enterprise endpoint protection platform (EPP) market is a composite market that includes: Anti-malwareAnti-spywarePersonal firewallsHost-based intrusion preventionPort and device controlFull-disk and file encryptionEndpoint data loss prevention (DLP)Application vulnerability management and application controlOur focus today will be on data management, policies and security. So we will touch on port and device controls, device management, encryption and other security considerations, as well as data loss prevention.   
  • #14 Best practice #1 - Let’s start with the strategic considerations in employee device management: Endpoint Requirement Definition - more often than not, mobile devices are already proliferating the organization, surveying existing devices, usage and behaviors of the different business units will help IT develop a set of requirements that more easily be supported.  Security threats – a key consideration that we’ll explore in more depth a bit later.  Employee policies about how personal devices are used and rights and assumptions need to be well defined before solutions are created that impact privacy and legal issues customers and employees of an organization. Often lines are crossed between corporate and private data on mobile devices. This requires close collaboration with HR and senior management. Take inventory of existing behaviors, devices, define roles and rules, create a policy tem (often business unit managers, IT, HR), define security policies and consider support issues re: operating systems, devices, methodology – do you allow or do you allow and support? We really see IT becoming more and more of strategic player as technology intersect with how organizations are managed and run. Additionally, the complexity of mobility and device/operating system support can easily become a tactical challenge rather than a strategic opportunity for IT , as you see in this study conducted by CompTIA recently…
  • #15 Avoid tactical set backs and focus on the strategic. Too many organizations become too entrenched in the day to day support. We see BYOD merging with BTRD (bring the right device) to ensure support does not become an issue and applications and devices are in line with corporate policies.
  • #16 To avoid this, IT needs become pro-active in the solution development process. Key considerations are:Distributed workforces and mobility require IT to have centralized policy management controls. Since endpoint solutions span different challenges ranging from malware and virus protection to backup and security, IT also has to ensure that the solutions chosen are compatible and can easily be integrated. So, first identifying the endpoint data and device management requirements around security, backup and recovery, then identifying the platforms that IT can pro-actively support and integrate are key to developing a sound strategy to ensure strategic input from IT. On the BYOD side, the mobile management needs are often not yet well-understood by organizations. Rights and obligations include customers, organization and employee. IT is taking on a very strategic role when embarking on a mobile device strategy and should not embark on it as a sole champion in the organization. There are numerous enterprise policy-related issues that must be addressed as this convergence of personal and corporate data is happening with BYOD. It is really a new frontier for many organizations. Employee privacy issues and managing data that crosses personal/corporate lines really requires collaboration between IT and HR to create policies to ensure legal steps are taken to define the new relationship. Collaboration and legal review are necessary to protect yourself and the organizationWe put together a checklist for our attendees to help with some of the issues we have seen emerge with this type of “data mingling”. A BYOD plan requires a human element that includes a combination of communication, training, management, enforcement, and justificationIdentifying requirements, ensuring that endpoint management solutions provide self-service practicalities, so that IT is not taxed with support, and that user performance is not impacted, in a way that slows down adoption, are some of the key aspects of creating a strategic solution in which IT becomes a strategic partner rather than a tactical support. I see the most successful rollouts when an integrated approach is planned. Another consideration is: scalability. Scalability is key – here, often, cloud connectivity offers the most scalable solutions. Of course, cloud-connectivity also makes deployment and monitoring of devices much easier.  ….and another primary concern about mobile solutions is security, especially when it comes to regulated industries. We’ll touch on that aspect later in our webinar.
  • #17 #2 – Benefits of continuous data protection for endpoints Critical data retention Centralized visibility and controlUser adoption; self-service recovery RTO for IT/users Mobile device synchronizationDeployment Technologies to aid in increased efficienciesLet’s talk about another aspect of the endpoint protection strategy which is continuous data protection. Endpoint DLP continues to gain footing as mobility increases. With increasing amounts of data residing outside of the network, endpoint DLP that travels with the data becomes more appealing and necessary to protect the organization with data recovery and security. Over and over again, organizations are faced with employees who do not backup to network, because they do not want to log in or just for convenience sake. Especially remote employees are hard to monitor. Those are the employees who will need support when all of a sudden data is gone. In our experience of reselling and distributing endpoint software, here are some key factors to create a successful solution? For companies to ensure policies are met, IT is charged with making sure that remote employees will adopt those policies. Which, with a remote workforce, is almost impossible. But, if solutions are automated and do not impact employee performance, the chances of employees adopting the solution is much greater. If solutions can be rolled out silently with a central ability to manage policies we see success rates triple. So in summary, we can say that the best adoption in endpoint applications can be achieved when a strategy delivers three things:Ease of deployment from an IT standpoint through policies that are rolled out silently and enforced automatically. central capabilities to deploy policiesRTO / Deliver fast and easy recovery for both IT and end-userYes, those are key elements of a robust data protection strategy. You want to set your backup policy to match your end-user need in frequency and performance impacts. So solutions have to provide flexibility in how they manage different user groups. Many solutions do not allow IT to mange settings or create multi-level policies.Depending on the use of your mobile devices you may or may not require backup of devices beyond laptops, laptop computers. Are device run virtually? Are they synched already to your laptop computer? So look for solutions that provide you with the right abilities.
  • #18 We also see a direct correlation between the frequency of recovery and the when data was created. Typically, the most important data is the most recent data. There’s almost always greater value in the data being worked on currently. You want to ensure that restore points can be set to allow for recovery times that are frequent, if not continuous. Many solutions, also offer a local cache storage that increases recovery times and protects devices, even if they are not online. Most endpoint restore requests are driven by issues such as inadvertently deleted files or data corruption introduced by a virus or a hacker. Typically these problems are discovered within several hours or at most a few days from when they first occur, resulting in restore requests for more recent data. In general, the only time you may need to restore data that has already been archived would be in the event of a disaster. While it pays to be prepared against these occurrences, requests for file and document restores are much more frequent and can tax an IT department that support 100’s of users. Again finding a solution that does not impact performance and runs silently in the background will harvest the best results. You are looking for a light footprint that requires little resources, is flexible in policy to reflect the data protection requirements of the organization and the users.
  • #19 Just a note about deployment of solutions to remote / mobile work groups Many companies want to make sure policy and data is protected, therefore they opt for silent deployment that has set retention frequencies backs up once a day, but different departments may have different needs. Executives may require more frequent back up and a higher level of security on their laptop or tablets. Departmental deployment / policy flexibility Deployment plan / support plan in rollout PolicyOS Geo-location Critical needs Exceptions in policy, support  
  • #20 Let’s touch quickly some other powerful technologies that —if integrated with endpoint data protection—create real corporate advantages. Block-level incremental backups with global de-duplication ensure that no data block is backed up twice.Because only tiny pieces of data are backed up at any given time, it consumes much less network bandwidth, which lowers costs. Global de-duplication minimizes bandwidth usage, shrinks backup windows, and reduces the storage footprint. Recoveries are faster too, because end users restore only changed blocks, not whole files which in turn minimize the data lost between the last backup and the time of failure. Combine this with powerful data compression and you can make sure that when endpoint data is backed up you maximize your bandwidth capacities. Data Compression and retention The ability to set retention policies and customize retention frequency offers additional flexibility that becomes more critical for instance in third tier remote locations or overseas where bandwidth is costly and difficult. Replication to dual data centers ensures that even in a disaster in one geographic area, data is protected in a secondary data center.Local caching is important – Many solutions that originated as a consumer-based online backup service have you perform a restore from their file servers in the cloud. This can take a very long time over a narrow bandwidth connection. Their answer to this problem is often to say that they will burn you a set of disks and mail them to you for an additional fee. This makes it feel like online restore is really an afterthought for these vendors. The right answer is to have secure local caching of data that can enable a restore from the local device or from a storage device on your high speed LAN. Again, the focus is getting the end user back to being as productive as possible as quickly as possible. For end-users automatic back up to local cache also accelerates restore time. It is much faster and backup is not dependent on online connections. We have global clients who appreciate the ability to integrate a local storage device and then set transfer times when bandwidth availability and costs are best.
  • #21 Airtight Survey 2012 – 69% of IT Managers are concerned about the data transmitted over personal devices  Let’s look at a couple of other factors when it comes to endpoint data.  According to Forrester the major driver for enterprise adoption of endpoint solutions is regulatory compliance. Standards and regulations including the Payment Card Industry (PCI) Data SecurityStandard, Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley Act of2002 (SOX), and the Health Information Technology for Economic and Clinical Health (HITECH)What are some of the factors to look out for when developing an endpoint strategy in a regulated industry? Endpoint Security is one of the fastest growing segments in the market today. The endpoint security platform market in the B2B space is projected to increase by over 40% by 2016. And it integrates several concepts.
  • #22 Endpoint security ranges from virus protection to malware protection, firewalls to physical security. So there is a lot to think about for IT. One solution will not address all factors and security levels in an organization vary greatly.  I recommend that organizations adapt security levels for their organization based on users and the sensitivity of the information on their endpoints. Here is a study that Forrester conducted last year for IT priorities in endpoint security. It provides a good overview of all the different objectives that the organization needs to consider.  Let’s look at a few of these concepts - particularly interesting when it comes to mobile device management.Encryption optionsAccess Control considerations Managing data when endpoints are compromised There are various types of encryption – what should IT managers look for when it comes to endpoints?  Craig:Again, one of the main considerations in mobile workforces is the degree of adaption, so you want to make sure that encryption does not impact performance. We tend to see File and Folder level encryption being implemented as a “laptop optimized” version over whole disk encryption. Whole disk encryption can be very performance heavy, and research shows that end users try to circumvent it. According to Forrester, file-level encryption is especially popular in shared environments, because of its security and performance lightness while still offering full government grade security. This is especially critical in the medical field, for retail locations, and at schools/universities where endpoints can have multiple users. Just a couple of other things to consider:Many solutions create vulnerabilities when data is transferred, because data is decrypted before it is de-duplicated. Some advanced solutions now offer technologies that prevent this risk, because they allow for de-duplicated data to be transmitted.At-Rest Encryption—Data is encrypted on the local hard drive of individual users, so that if equipment falls into the wrong hands, data is not accessible.If you already have whole disk encryption deployed, any solution you look for should have the ability to layer on and be integrated easily. So you need flexibility in encryption methodology. Last, but not least important – is your organization is windows or apple based. Both operating systems have their own encryption protocols. This is true for laptops as well as smartphones, so in deciding which solution is right for your organization consider, what type of operating system support will be required.
  • #23 There are various types of encryption – what should IT managers look for when it comes to endpoints?  Again, one of the main considerations in mobile workforces is the degree of adoption, so you want to make sure that encryption does not impact performance, yet offers security levels appropriate to the organization. We tend to see File and Folder level encryption being implemented as a “laptop optimized” version over whole disk encryption. Whole disk encryption can be very performance heavy, and research shows that end users try to circumvent it. According to Forrester, file-level encryption is especially popular in shared environments, because of its security and performance lightness while still offering full government grade security. This is especially critical in the medical field, for retail locations, and at schools/universities where endpoints can have multiple users. Just a couple of other things to consider:Many solutions create vulnerabilities when data is transferred, because data is decrypted before it is de-duplicated. More advanced solutions offer technologies that prevent this risk, because they allow for de-duplicated data to be transmitted.At-Rest Encryption—Data is encrypted on the local hard drive of individual users, so that if equipment falls into the wrong hands, data is not accessible.If you already have whole disk encryption deployed, any solution you look for should have the ability to layer on and be integrated easily. So you need flexibility in encryption methodology. Last, but not least important – is your organization is windows or apple based. Both operating systems have their own encryption protocols. This is true for laptops as well as smartphones, so in deciding which solution is right for your organization, consider what type of operating system support will be required. File- and folder-based encryptionData protected when laptop is on or offDecrypts upon file openingNo user password to remember Encryption during backup and recoveryGenerate random keysDestroy key on stolen/lost laptop Encryption and data de-duplicationEncryption and data de-duplication work together to ensure there is no decryption or risk De-duplication on encrypted data using secure key escrow system Integrated encryption Easily deployed end-to-end solutionIntegrate with existing infrastructure / Operating systems requirement  Apple & Windows considerations  
  • #24  Access Control can refer to many different concepts: Whenever we talk mobility and access there are distinct considerations – one about accessing data, one about the other about accessing devices (beyond virus accessing networks, etc) Because data access and mobility go hand in hand, considerations also include enablement of employees to enhance productivity and minimize IT support as employees travel, break, loose, forget or switch devices to access data. So this is a fine balance for IT to manage. In order to increase productivity, organizations typically give up control. Preventing unauthorized device access that could result in data being downloaded without permission requires IT to have the ability to define port access permissions – such as for USB, disk and other devices for users. Preventing unauthorized access focuses on control mechanisms that allow IT to set rules about the content and files users are allowed to access. Access for productivity is centered around the ability of users to access files, share files and collaborate on files and access data with multiple devices that may require audit trails and authorization. When looking for solutions, think about your user groups and the requirements and necessities to control access in these areas. Many solutions offer a variety of options, but you will need to be specific about the requirements and requirements may vary by user group.
  • #25 Collaboration/ Consumerization We know that collaboration is big trend, particularly when it comes to remote workforces. Without a solution in place, we see employees putting the organization at risk by falling back on consumer applications that may not be secure and do not follow safe protection levels for organizations. You might have seen some of the recent articles about organizations put at risk with these types of applications. Bottom line, IT has to look at the requirements of the organization. Are you looking for collaboration tools, do you want to provide users with the ability to download and access files, or do you want to restrict any type of access/collaboration for certain data sets? Different users, data, organizations will have very differently weight requirements. One last security feature that is becoming standardized with many solutions and that helps minimize risk tremendously for organizations is “remote data wipe”.  
  • #26 10% - Risk of a laptop being stolen 4.3% - Risk of company issued smartphones disappearing 68% of managers continue to keep valuable data on their endpoint devices – often contrary to company policies. Yes, the statistics of endpoint device loss are pretty staggering – and if the device falls into the wrong hands, having an option to remove data on demand or through time based triggers is critical. 10% of laptops end up being stolen over the course of three years and 4.3% of company issued smart phones disappear.  Yet, 68% of managers continue to keep valuable data on their endpoint devices – often contrary to company policies. Take a recent case in the healthcare industry: A mobile device was inadvertently misplaced and then taken and used by unauthorized individuals who accessed patient medical and financial records. It even provided access to the hospital network itself, healthcare electronic databases, and the caregiver's contact lists… just to name a few key sources of very private data.Security breaches like these can expose the healthcare provider and the institution to crippling and expensive litigation and even criminal charges. Non-compliance with the Health Insurance Portability and Accountability Act (HIPAA) standards for securing and protecting patient information can result in up to $1.5 million in penalties and a maximum of five years in prison.The more recent Health Information Technology for Economic and Clinical Health Act (HITECH) turns up the heat another couple of notches by tying government financial aid to compliance and by making it mandatory to disclose any breach that results in patient health information being lost or compromised. In today's social media obsessed society where nothing remains secret, news of a security breach can go viral and result in an embarrassing loss of professional credibility.One more aspect for IT to be aware of when it comes to data wipes: With BYOD, IT has to work together with HR so that employees are informed up front that IT has the ability to wipe any device that has been enabled with access. Personal information that is not backed up may be wiped. This shows again how important it is for the two departments to work together when it comes to workforce mobility. Just a note that device tracing has become pretty sophistuicated as well. Some solutions work together with local police departments to trace devices when they come online, offer insurance or photograph the culprit when he comes online. But for most organizations liability and costs are in the data and wiping data clean is the primary concern.  
  • #27 Enterprises today know that the cloud is more than technology; yes, often dismissed as a buzz word, but its been around as SaaS for a long time and it has significant benefits. It’s a way for enterprises to solve business challenges. From financial flexibility to IT and business scalability, the cloud is solving business challenges for enterprises across all types of verticals today.Some of the benefits are well established now: Create scalability – capacities to scale Choose from flexible service levels Create automated policy deploymentsTake advantage of data center redundancy and provide enhanced disaster recovery opportunityChoose data center security levels that fit your needsCreate more predictable budgets Focus on the strategic, not tactical Depending on the solution, it can reduce total cost of ownership (TCO)We see savings of over 55% with cloud solutions vs. maintaining on premise solutions due its flexible management and lowered operating costs that really help un-burden IT for more strategic projects. Other advantages are that organization can more easily deploy solutions by with automated updates. No need to manually install and re-deploy laptops or mobile devices. Important also is that data centers are really competing for businesses by providing security levels that are hard to match by SMB’s. IT managers can determine the infrastructure by looking at the different tiers of security. Take for instance Azure, the Windows based cloud, you receive Tier 4 data center security and a redundancy of different geographic areas that organizations find hard to duplicate with their own resourcesAlso, we see more and more clients, large corporations, moving from on premise solutions, to hybrid solutions primarly for mobile reasons. The cloud goes hand in hand with mobility and provides protection and security for organizations that rely on mobility.
  • #28 Most likely organizations want to start with a cloud readiness assessment which is offered by many host service providers. This offers a review of requirements, such which cloud architecture best matches their needs. A review of network, security, storage and compliance requirements and support requirements for a successful transition. Of course service requirements and references are key also.   Lot’s of benefits that enterprises can leverage from setting up a cloud
  • #29 59% of companies believe lost or stolen smart phones contain sensitive or confidential business information  Typically smart phones are synchronized with source files, for them backup and recovery is not so much the issue as security and support. What is the burden for corporations, then, when granting users with the ability to access files on smart phones and tablets?59% of companies believe lost or stolen smart phones contain sensitive or confidential business information as more and more users access and retrieve files on smart devices. Tablets in particular are beginning to replace laptops and therefore contain more and more data. So, tablet concerns are similar to laptop concerns. On the BYOD side, the mobile management needs are not yet necessarily well-understood. There are numerous enterprise policy-related issues that must be addressed, and there are typically a large number of different mobile device types to manage. These can include mobile devices that run on different versions of the same mobile operating systems, which in turn bring different levels of security and management capabilities to the table. Finally, BYOD is essentially still a new scenario, and there is a fairly large collection of MDM vendors for businesses to choose from. While the large number of vendors in today’s market ensures that a mobile management technologies develop into a very robust and trusted platform overall, enterprises must still invest significant resources to determine the right fit for specific company needs.Corporate security concerns are not on managing the security of the connection, as is the case with VPNs, but in managing the devices themselves. Companies are developing rules based policies, particularly in regulated industries. So access is strictly limited by business rules. Mobile device access are very restrictive for departments with critically sensitive data, to very liberal for others. Or, rules may be based on file types. So you might see organizations that limit smart device access only to certain file types. What should be on the short-list for IT to evaluate then?
  • #30 How a solution handles access – can it be limited to file types, user groups and devices?How difficult is it to implement rules based policies around those issues. What type of platforms are supported? Again, here it is key to understand what is already happening in the workplace – conduct a survey with employees, so that you really understand how a solution will impact current behaviors so that they won’t fail when it comes to adoption and compliance.Are there audit trails? In many cases regulations require IT and Security to provide audit trails of when and who accesses data. So you might consider how these type of audit trails will be supported when mobile devices are in play. Safe data transmission – look for SSL and encryption technologies to be in place. Do you need to track devices? Many service organizations are looking for solutions that will report locations and routes. Is this important for your business? The shortest and most direct path to BYOD security is to be able to quickly bring a device to a “factory-fresh” state. This means that all corporate information has been reliably removed from a lost or stolen device.As Windows 8-based tablets , we suspect that tablets are destined to replace more enterprise laptops, and that VPNs are likely to be integral to their mobile security profiles, much as they now are for laptops. So we are likely to see a growing need of Windows 8 integration in the Mobile Device Strategy.
  • #31 #6 – Administrative Visibility and Control With the fairly devastating impact of the 2008 recession, IT departments are now hard pressed to muster the resources they once did. Further, with IT departments having to deal not only with mobility but an entire range of new IT issues, including large scale virtualization, database management, and meeting enormous scaling requirements for storage, they are simply stretched thin. BYOD, of course, complicates things in that it touches almost everyone in any given company - BYOD requires IT management on a large scale.What insights have you gathered about surviving this movement - and even thriving - when it comes to policy management, endpoint visibility and sharing of files?
  • #32 Centralized policy management Visibility and control to centrally manage remote assets Ability to manage growing amounts of data Reliability on SLA’s Resource capacity management Real-time reporting and audit trailsMulti-layered policies and support for global organizations     Craig: Visibility, file access, downloads and sharing are just some aspects of policy management to consider. We touched on most of them earlier. Sharing is one more critical element in an endpoint solution as collaboration is becoming a center-point for distributed workforces. Sharing capabilities range from real-time sharing solutions such as Dropbox to secured access solutions such as XXXX. With collaboration and sharing, the key concern is around security – again some departments may not require advanced security, but some departments will. So, finding a solution that offers both is often hard to come by. It is prudent to error on the side of security.Also, our clients are looking for endpoint solutions that can be controlled from one platform. That is not always possible, because endpoints and mobility covers so many different aspects. Customers are concerned about ensuring that the solutions work together and can be managed easily. Questions include Can users easily set up and retrieve, recover files for themselves to alleviate additional support?Do I have control and visibility over who accesses information with what devices to ensure audit trails and safe data handling?Do I receive notifications if policies are broken or circumvented?Can we see that retention and backup is performing to policy and are error reports automated so I can take action?Beyond the policy management modules, organizations – whether SMB’s or enterprises are also very concerned about the company who supplies a solution and the support they can expect. Inka:Working with some of those enterprise customers, what is driving their decisions when it comes to endpoint solutions:Craig:We see a different level of concern with the enterprise. Obviously, support in creating policies and assisting in deployment projects take precedent. They are looking for companies that can roll-out a solution worldwide with engineering support to match their needs. They want to see that solution providers have the resources and capabilities to support global organizations with staff, support, languages and OS. Securing mobile devices can be nearly impossible after disaster strikes. Using a cloud-based service allows them to continue monitoring device use remotely if the office is affected by a disaster. Nearly half of them are using cloud-based disaster recovery services and many are now looking to the cloud for ongoing device management.