Event Recording

Borja Rosales, Martin Edwards - Defending Your Data in the Wild: Eliminating the Risks of Mobile Data


Log in and watch the full video!

Keynote at the European Identity & Cloud Conference 2014

May 13-16, 2014 at Munich, Germany

Log in and watch the full video!

Upgrade to the Professional or Specialist Subscription Packages to access the entire KuppingerCole video library.

I have an account
Log in  
Register your account to start 30 days of free trial access
Register  
Subscribe to become a client
Choose a package  
Thank you. And it it's very interesting what you said, because of course the finance industry and the insurance industry in particular has always depended upon being able to collect enormous amounts of data and to be able to understand the patents from those things. And so that really provides a very interesting lead, shall we say, into the next presentation, which is about defending your data in the wild and eliminating the risks of mobile data by Mr. Rosales and Mr. Edwards from DVA. So please welcome these gentlemen and we look forward to your presentation. Thank you.
Okay, good morning, everyone. Nice to see a good crowd this morning, like to welcome you to our keynote defending data in the world by Drever. My name's Martin Edwards.
My name is Boje Rosales. And as the subject of the confidences, we are to speak about the defending the data in the wild. First of all, let's define what's the wild while it's the area beyond the limits of our corporate, the limit beyond the limits of our firewalls. We have a number of devices that are out there in an our style environment. Okay, we are gonna do it as let's say, entertain as possible. That's the reason why we are two of us here today. We are gonna make it in four, five chapters. First one, first of the threads that we are facing is the data scroll. What is the data? Scroll data, scroll it under that data is gonna double in 14 months, and that is gonna happen. It's it's a fact, okay. We know that it's going to happen. Any case we know as well, that 57% of our working force is gonna be working in more than one location in a given week.
That means that the, our workforce is gonna be mobile and we have to cope with the, the fact that the data is gonna be in different places. And at the end, we have also to understand that mobility it's here to, to stay for long. And that 3.3 devices are average are gonna be used by a single user in any corporate. We know with all this information, we know that 28% of the existing corporate data it's living only in these mobile devices. That means that that data, that data needs to be protected at this and risk Martin, please get us, how can we protect all this data that is out there?
Sure, certainly. So for the first thing, obviously we're turning into a mobile workforce. The important thing really is to capture data from all devices. So no longer is it just the fact that you're walking into the office using a desktop computer and having that protected within your, within your secure bounds. So now it's a case of capturing not only the data that's physically on your laptop itself, but any personal devices or company given devices like tablets and mobile smart devices. The important thing to do as well is containerized. So keeping your, your corporate data in a container and making sure that you can capture any changes, any modifications, any sharing activity that happens on a personal device for a user, but still maintaining their privacy. So you're not inflicting on their privacy on those devices. The important thing as well is not just taking one snapshot of that, but frequently capture changes to data and doing that in an efficient manner. So we know that within the, the general corporation, about 80% of the data is duplicated between users. So being able to work on that at a device level means that we are efficiently able to make sure that we are capturing all of that change, all of that change to data.
And again, more importantly, view all data activity. So all of that data that's currently out on those mobile devices, you have no visibility off from an it perspective. It's important that you are able to see that activity, understand that activity, see what your data is doing, where it's moving to and who it's being shared with brings us onto chapter two. So it's not only about the working and the capturing of that data, but it's also making sure that that data doesn't get into the wrong hands.
Yeah.
Getting into the broad hands, bring us to the data breach. How can data get to a place where it should not be the most? And the most frequent case for that is not an attack or any kind of intention. It, an innocent mistake by users insiders in the organization, users that are sharing data, thinking that they are doing right and giving access to data, that to people that should not have that access, the second reason or the second cost of data breach is the loss of, or theft of a device. We will cover this in a specific chapter in this presentation today. Third one is fishing, nothing to say about that. All of us, we understand what, what does it mean? Fourth one is abuse by insiders that intentionally are trained to
Use or misuse the data of the company, giving access to it, to people that should not have access. And this is intentionally made as well as external attacks that are happening to the company. On this end yesterday, I heard one of the panels that nowadays, almost half of the attacks happening into the organizations are targeted to the endpoints targeted to the users instead of being targeted to the data center and the big service of the company. As an example of the innocent mistakes by inside us, we know that 66% of the users are using an unsanction not approved consumer grade file sharing tools that are great for us to work from home or to, to use it at home for per personal use. But at the same time we are using the same tools are not secure to share data and without any control from the organization, from this point, Martin, who can be this other rest.
Okay. So it all sounds like I'm teaching everyone how to suck eggs, but control your access with sharing policies. We've heard it, we've seen it in other keynotes that we've had here, but making sure that the right people have the right access. And you've also have both user and device policies in place. So what a user can do on one device, they might not be able to do on another device that they own restricting activity by file classification, making sure that we do use information, rights management, making sure that users can't do things with data, that they shouldn't be able to do
Preventing data by unauthorized applications. It's very, very tempting. When you have access to corporate data on your mobile device to use the same tools that you would use on a personal level, to get that data to another place, we need to be able to provide all of our employees with a tool that is sanctioned and works for that user. It isn't difficult. It's not awkward to use. It's familiar to the other tools that they're doing, but it is a divide or a control that we have overall control over from an it perspective and visibility of, and again, controlling all aspects of data usage. So using any technology that you have available to automatically, you know, prevent users from copy and pasting data, you know, to set automatic data destruction on certain types of data, all of these things can be used just to help prevent that leakage of data.
These drive us to the third of the threats and looks a little bit odd, right? That the threat's litigation of compliance the threat is that we are, we have to provide tools for, to be defended against any kind of litigation coming to the company. This brings us to understand that 28% only, only I insist only 28% of the CIOs. They believe that they could pass in a positive way as security audit. Okay. This is really a nightmare, but Martin, what are the real nightmares
Indeed? So put, put a, a light spin on things slightly. So it's worst nightmares. First thing for getting to wear your pants to work. It's never good, but the most important one there is down in number one, getting notice from legal, from the legal team to preserve data for a user, especially if that data is on a mobile device that we have no real control over gathering information within an organization is very, very well. It's difficult enough to identify custodians of data, even when you've got that data in your own data center. When actually looking at that data and trying to understand that if legal hold is being done on a mobile user, that has 28% of the corporation's data on a laptop that we have no visibility of it makes gathering and maintaining and, and preserving that data very, very difficult to do in the first thing we need to do is identify that custodians data, locate it, and then capture that data, preserving it, making sure that we have snapshots in time of that particular data. And we need to store that in a centralized place, placing legal holds on that data. We need to be different about how we cope with that data. It needs to be preserved. It can't be tampered with,
And we then need to hold that data in that state until our legal teams are ready to consume. And eventually the legal teams may well get rounds to, to, to demanding that data. And we need to somehow securely provide that data to the legal team. Is
This related to anyhow? We see discovery tools.
Yeah, certainly. So a lot of the legal teams will use additional tools to further data mine, that information, but being able to provide that information in the first place allows these e-discovery tools to then go in. Now, the amount of data that we need to collect from a legal hold perspective is vast when you compare it to the actual amount of data that may be needed for that specific, that specific legal challenge, the e-discovery tools combine that down, but we do need to separate that data in the first place to allow that process to happen.
Yeah. Another aspect on this legal information and providing information for litigation is to track the usage of data. We have said data is gonna double in 14 months, but not only it's gonna double it's also going to change the existing data today is gonna change. We have to track record of what are these changes, how the data is being modified, and by whom we need to track specific files and folders that are under risk or suspicion of being attacked. And we have also to see how the users are acting with that data, how they are sharing data within and externally in the organization. Okay. Finally, we have to also track not only what the users are doing. We have also to track what other people that have access to the information like the system administrators are handling that information. If they are doing something, a part of what the natural owner of the information is doing.
Absolutely. And moving on from there. I mean, obviously locating deleted files, taking a snapshot of a user's data at a specific point in time is great, but the whole thing of legal hold is being able to trace and see the history of data. Most importantly, keeping da keeping copies of deleted data as well. Now, the only way to effectively do that is have a tool that is constantly monitoring what is going on with that user's device. If a user does get an inkling that he's done something naughty and he's likely to get called into the legal process, the chances are the first thing he's gonna do is make sure that that data doesn't exist on his device anymore. It's a very easy process to do, but without the organization, having a way to track what happened in the data last month, last weeks, or however, however far back, not being able to call back on that data makes the whole legal process very difficult. Again, we need to be able to locate those files in question, and not only from a deleted file data data perspective, we may also need to go back to all previous versions of that file. So we know that data changes on a regular basis. We may need to go back and look at the last 50 iterations of a document to see who changed what in that document, at what time to actually breach that legal process.
We are coming to the fourth chapter of our presentation today. And this is probably the most common thread when everyone is asked about what are, what are the risks related to the mobile devices? And all of us, we think about the device being forgotten somewhere, being lost, being stolen, being damaged. How can we protect this? Okay. We have to understand some, let's say situations. The 75% of our workforce is mobile, and this is going to grow 28% of the data we already said before exist, only on those devices and what is more concerning and worrying only 35% of that information it's protected in an regular and positive way. How can we overcome about this situation and protecting this lost or stolen devices?
Absolutely. I mean the, the first thing, and again, you know, all of this is stuff that sounds quite obvious, but you know, I ask in the room today, you know, how many of you can honestly say that before you came out today, you were sure that any data that existed on your, on your mobile device was protected, should the worst thing happen. And I can pretty much guarantee that it's not gonna be all of you. If you'd lost your device on the taxi, then you are gonna be a little lost. You wouldn't be able to have access to that data. So we need to ensure that all of your user's devices are protected. Now, when I say all, we talked about 3.3 devices per, per user. Yeah. We need to make sure it's not just the laptops. It's any data that you are using to access that data, making sure that we have a copy of that within the corporates control, that we can then provide back to that user in the worst, worst scenario.
And that comes into restoring that data and providing ongoing data access. If a user does lose their device, the last thing you want is them to sit down and do nothing for three or four days. Whilst you're trying to gather all of this information back because it's, it is just not the thing to be done. You wanna be able to give the user the access to that data, allow them to carry on with their work and allow them to be productive. And then the last thing really from a breach perspective is being able to try and locate that device. Now it might have just been misplaced. It might have been stolen, but the first thing to do is to prevent, to find that device, if you can, if you can't, it's preventing data breach, you might do that by encrypting the device as a whole, maybe just encrypting the data that you are classing as important business data that you are backing up. And if you have the ability to, as well, being able to wipe that data off of the device, one thing is having encrypted data on your device, but in theory, that could still be cracked if there's a way that you can target that data and make sure that that data does not exist. It's securely overwritten. If that device does get picked up, then you know that you are safe and your data isn't gonna get into the wrong hands.
Okay. We have defined what is the data in the Goil and what are the four major threads that we are facing on protecting that data? Okay. But what is Drew's vision who is by address in this need of protecting the endpoint data?
Sure. So again, we know that we have a whole plethora of devices. So we have apple windows, Linux from a laptop based environment, as well as all of the mobile devices. So iOS, Android, windows eight mobile. So what we do as Grover in the first instance, we are making sure that you have an automated way of capturing all of that specific data on all of your users' devices, backing up, capturing providing, share functionality within the same tool, so that we are able to track all of that data and capture it and store it in a central location that is de duplicated is reduced in size.
Yeah, we have also to provide governance of that data. We have to provide analysis and discover what's happening with the data organizations. That is the reason why we need to get that information from the while. We have to get that information from the thousands of devices that our users are, are, are having and make it available for our proper analytics and the discovery tools.
And then the last thing access and serve. So serving that data back to the user that could be on their physical device, wanting to access data that they've backed up from their mobile, but on their laptop because they have lost their mobile or the other way around the user is only here with their mobile in their pocket. And they want data that they've created on their laptop device. We want to be able to serve that data to them. It may be that they're in a, a web cafe or away from any of their devices and they want access to their data through a secure web Porwal or indeed with the litigation. It may be that we need to serve all of that preserved data back to our legal teams so that they can data mine further with any eDiscovery at tool.
Yeah. In terms of deployments, what are the options?
Okay, so we are the software vendor. So we are flexible in our deployment options. We can go from a single on-premise server. You install in your own data center for larger organizations. We do have our private cloud solution. Again, that's gonna allow you a single administrative Porwal, but allow you to have multiple centers of storage, whether they're over the globe or within regions. And then for those of you that are cloud-friendly, we have a cloud-based solution fully integrated with the grid brace cloud model, fully scalable, allowing all of the benefits of cloud. So incredibly good durability availability and maintained and hosted by ourselves.
Yeah. This is something that it's already used by more than 3000 companies in the world. And this is across the globe. I said, it's more than 72 countries where our software is being used and Martin.
Yeah. And, and within those 3000 plus organizations, we actually have at last count 2.2 million devices being protected by our solution.
We are coming to the end of our presentation. So what's next.
So we are doing a talk in the beer garden at 10 40, for anyone that wants to see a little bit more about the physical product itself and what the end users can see and do with the product.
Yeah. And we do have a, an ebook survival guide for data in the wild that we are inviting you to come and grab from our booth in the first floor. We are really looking to see you up there.
And that pretty much leaves us just saying, thank you very much for your, for your patience and attentiveness. And thank you very much.
Thank you very much.
Cheers.

Stay Connected

KuppingerCole on social media

Related Videos

Event Recording

Denis Joannides - Empowering the Digital Insurers

In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to a digital Insurer. Denis discusses the importance of a secure infrastructure including…

Webinar Recording

Creating Secure and Unified Next Generation Workspaces

Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach to the administration and supervision of all types of…

Webinar Recording

Managing Risk through Cloud App Authentication and 360° Control

The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud…

Webinar Recording

The Future of Mobile Authentication: Strong, Adaptive, Intelligent

The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the overwhelming proliferation of mobile devices put enormous pressure on modern businesses to become…

Webinar Recording

Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00