TRENDING
TECHNIQUES LIKE IP
ADDRESS LOGGING CAN BE
USED TO IDENTIFY WHERE
A LAPTOP OR DESKTOP IS
LOCATED TO DETERMINE
IF IT HAS BEEN LOST OR
TO HELP RECOVER IT.
THE SOLUTION NEEDS TO
ALLOW ADMINISTRATORS
TO SET POLICIES THAT
DEFINE GRANULAR
ENCRYPTION RULES DOWN
TO THE FILE LEVEL
efficient, rapid and transparent
backup for business-critical data
on laptops and desktops through
deduplication, opportunistic
scheduling, bandwidth throttling,
flexible policy definition, and the
intelligence to run a backup only if
a file has changed.
Easily accessing files while
mobile
Employees will no doubt expect
the same quick access to files while
using a mobile device as they
have from their laptop or desktop.
The solution needs to be able to
deliver data portability and selfservice access to a secure, personal
data cloud so that they are able
to access their files from virtually
anywhere, at any time, and also
protect files from their tablet or
phones.
Fast eDiscovery
It’s also necessary to be able to
access and retrieve documents
that have legal and compliance
20
INTELLIGENTCIO
relevance, regardless of where they
reside, without having to spend a lot
of resources retrieving laptops from
far-flung locations.
The solution needs to have
simplified administration and the
ability to rapidly find key documents.
Chief Legal Officers (CLOs) will thus
be able to create legal holds and
choose the best strategy earlier in
the audit or litigation process.
Dealing with data on lost or
stolen endpoints
Data breaches are becoming more
prevalent these days. Employees’
increasing mobility only adds
more probability to these types
of incidences. One of the major
enterprise concerns is the incidence
of lost or stolen laptops. File
encryption is essential to preventing
unauthorised access that can occur.
Remote wipe can be used to delete
files and geo-location is a valuable
tool in tracking lost laptops.
Techniques like IP address logging
can be used to identify where a
laptop or desktop is located to
determine if it has been lost or to
help recover it. The solution needs to
allow administrators to set policies
that define granular encryption rules
down to the file level.
BYOD’S next frontier
Like it or not, CIOs and IT teams are
going to face even more complex
challenges as the mobility and
BYOD trends continue to accelerate.
To further minimise data loss and
breach risk, CIOs are looking at new
ideas such as ‘geo-fencing’ in which
an employee can only access certain
data within a specified physical
distance from a secure building.
328
million
the number of global workers bringing
their own smart phones to work by
2017, according to IDC
68
million
the number of tablets flooding the
workplace by 2017. According to
Forrester research, nearly one in
five tablet purchases will be made
directly by companies
65%
of employees don’t understand the
security risks of using personal devices
in the workplace, according to a recent
Cisco Middle East ICT Security Study.
It is a critical time in BYOD’s
evolution as executives are
examining ways to advance data
protection solutions that work in a
mobile environment.
www.intelligentcio.com