Intelligent CIO Middle East Issue 01 | Page 20

TRENDING TECHNIQUES LIKE IP ADDRESS LOGGING CAN BE USED TO IDENTIFY WHERE A LAPTOP OR DESKTOP IS LOCATED TO DETERMINE IF IT HAS BEEN LOST OR TO HELP RECOVER IT. THE SOLUTION NEEDS TO ALLOW ADMINISTRATORS TO SET POLICIES THAT DEFINE GRANULAR ENCRYPTION RULES DOWN TO THE FILE LEVEL efficient, rapid and transparent backup for business-critical data on laptops and desktops through deduplication, opportunistic scheduling, bandwidth throttling, flexible policy definition, and the intelligence to run a backup only if a file has changed. Easily accessing files while mobile Employees will no doubt expect the same quick access to files while using a mobile device as they have from their laptop or desktop. The solution needs to be able to deliver data portability and selfservice access to a secure, personal data cloud so that they are able to access their files from virtually anywhere, at any time, and also protect files from their tablet or phones. Fast eDiscovery It’s also necessary to be able to access and retrieve documents that have legal and compliance 20 INTELLIGENTCIO relevance, regardless of where they reside, without having to spend a lot of resources retrieving laptops from far-flung locations. The solution needs to have simplified administration and the ability to rapidly find key documents. Chief Legal Officers (CLOs) will thus be able to create legal holds and choose the best strategy earlier in the audit or litigation process. Dealing with data on lost or stolen endpoints Data breaches are becoming more prevalent these days. Employees’ increasing mobility only adds more probability to these types of incidences. One of the major enterprise concerns is the incidence of lost or stolen laptops. File encryption is essential to preventing unauthorised access that can occur. Remote wipe can be used to delete files and geo-location is a valuable tool in tracking lost laptops. Techniques like IP address logging can be used to identify where a laptop or desktop is located to determine if it has been lost or to help recover it. The solution needs to allow administrators to set policies that define granular encryption rules down to the file level. BYOD’S next frontier Like it or not, CIOs and IT teams are going to face even more complex challenges as the mobility and BYOD trends continue to accelerate. To further minimise data loss and breach risk, CIOs are looking at new ideas such as ‘geo-fencing’ in which an employee can only access certain data within a specified physical distance from a secure building. 328 million the number of global workers bringing their own smart phones to work by 2017, according to IDC 68 million the number of tablets flooding the workplace by 2017. According to Forrester research, nearly one in five tablet purchases will be made directly by companies 65% of employees don’t understand the security risks of using personal devices in the workplace, according to a recent Cisco Middle East ICT Security Study. It is a critical time in BYOD’s evolution as executives are examining ways to advance data protection solutions that work in a mobile environment. www.intelligentcio.com