<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
whatisacasb.jpg

Glass Class - Total Data Protection

 

Glass Class - Total Data Protection

Video Transcript

Hi everyone, and thanks for joining today's episode of Glass Class. My name is Rich Campagna, Vice President of Products. Today we're going to be talking about the four main areas of risk that you must protect as corporate data moves outside of the firewall. Now it wasn't too long ago that our life in IT security was relatively easy. We had premises based applications. We had managed devices. To secure this picture was a simple matter of basically controlling these things, and using our whole litany of layered security defenses starting with the firewall, to ensure that we contained corporate data.

Now we have an explosion of data along two different axis, two different trends that are really making this picture quite a bit more difficult to defend. We have the move from those premises applications up to the cloud, and we have moved from these managed devices out to mobile devices in BYOD. Now obviously this much bigger picture is quite a bit more difficult to defend, but let's break this down into a little bit of a smaller segments, and talk about the four main areas where this represents a huge risk for us.

First of all we have data moving, leaving the corporate network, and this comes in many shapes and forms. Primarily malware, hacks, shadow IT, but data leaving the corporate network. We need to gain visibility into what's happening here in order to provide protections at a later stage.

The second piece is data at rest inside of the cloud based application. Now all of a sudden we've moved from our own infrastructure to somebody else's infrastructure, and what we want to do is make sure that this data is every bit as protected as we had it in our own infrastructure. We use tools like encryption, and other security technologies to make sure that we have an appropriate security posture here.

The next piece is at the point of access. As I explained before we can put a lot of different security devices in front of those applications, but we can't go out to Microsoft with Office 365 and say, "Hey. Let's put a firewall in front of this application." They're just not going to let that happen, but we still need to provide visibility and control. Control giving you a better handle on who's accessing what data, and under what context even as we move out to the cloud.

This last piece is data moving out these devices. Whether it's BYOD, or managed devices, we have a lot of data sinking out of these environments, and from premises applications into a device that's no longer strictly controlled by the organization. If you can hit all four of these areas, and protect them on the network, in the cloud, at access, and on the device, you've achieved total data protection. That's the Bitglass approach. My name is Rich Campagna, and thanks for joining today's session.