+ All Categories
Home > Documents > MOBILE SECURITY · protect your at risk data mobile devices at risk: in 2014 there were a record...

MOBILE SECURITY · protect your at risk data mobile devices at risk: in 2014 there were a record...

Date post: 27-Jun-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
1
MOBILE SECURITY: COMMVAULT.COM | 888.746.3849 | [email protected] © 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. PROTECT. ACCESS. COMPLY. SHARE. Suggested Reading 7 Reasons To Worry About Your Current Email Archiving Strategy http://commvau.lt/1MrS7eg 1 FORBES, “THE AVERAGE MOBILE WORKER CARRIES 3.5 DEVICES. HERE’S THE DOWNSIDE,” 2012 2 PONEMON INSTITUTE, “PONEMON INSTITUTE RELEASES 2014 COST OF DATA BREACH: GLOBAL ANALYSIS,” 2014 3 ANALYST PONEMON INSTITUTE, “PONEMON INSTITUTE RELEASES 2015 COST OF DATA BREACH: GLOBAL ANALYSIS,” 2015 4 PRECYSESOURCE, “THE CAUSE OF A DATA BREACH – LOST/STOLEN LAPTOPS OR A SECURITY DESIGN FLAW” 2014 5 TWO-FACTOR AUTHENTICATION AND SINGLE SIGN-ON. PROTECT YOUR AT RISK DATA MOBILE DEVICES AT RISK: IN 2014 THERE WERE A RECORD NUMBER OF HIPAA BREACHES. ALMOST 79% OF THESE BREACHES WERE ON UNENCRYPTED LAPTOPS AND THUMB DRIVES. 4 EMPLOYEES AVERAGE 3 MOBILE DEVICES PER USER 1 $3.5 Million IN 2014, U.S. COMPANIES AVERAGED $3.5 MILLION FOR A DATA BREACH 2 $217 IN 2015, EACH STOLEN CONFIDENTIAL RECORD AVERAGED $217, TOTALING $6.5 MILLION PER BREACH 3 79 % 6 WAYS TO FIGHT THE BAD GUYS WIN WITH COMMVAULT REPEL data breaches and exposure across the enterprise ENCRYPT data-at-rest and data-in-flight without impacting performance REDUCE security costs with policies SECURE user access with Single Sign-on and Active Directory AND MORE. Get strong security plus backup and recovery, file sharing, eDiscovery and compliance, and data analysis ENCRYPT STORED FILES Encrypt files and folders against would-be data thieves ENCRYPT DATA-IN-FLIGHT Secure data transfer protects moving data without a VPN CONTROL USER ACCESS Keep data safe from fake user credentials with 2Fa and SSO 5 TRACK THAT LAPTOP DOWN Geo-tracking lets you narrow down a missing laptop’s location by country, state, city, zip code and street REMOTE WIPE A LAPTOP Full or selective data wipes zero out blocks for complete data security AUTOMATE SECURITY IT efficiently manages security for an entire mobile network
Transcript

MOBILE SECURITY:

COMMVAULT.COM | 888.746.3849 | [email protected]© 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED.

PROTECT. ACCESS. COMPLY. SHARE.

Suggested Reading 7 Reasons To Worry About Your Current Email Archiving Strategyhttp://commvau.lt/1MrS7eg

1 FORBES, “THE AVERAGE MOBILE WORKER CARRIES 3.5 DEVICES. HERE’S THE DOWNSIDE,” 2012 2 PONEMON INSTITUTE, “PONEMON INSTITUTE RELEASES 2014 COST OF DATA BREACH: GLOBAL ANALYSIS,” 2014 3 ANALYST PONEMON INSTITUTE, “PONEMON INSTITUTE RELEASES 2015 COST OF DATA BREACH: GLOBAL ANALYSIS,” 2015 4 PRECYSESOURCE, “THE CAUSE OF A DATA BREACH – LOST/STOLEN LAPTOPS OR A SECURITY DESIGN FLAW” 2014

5 TWO-FACTOR AUTHENTICATION AND SINGLE SIGN-ON.

PROTECT YOUR AT RISK DATA

MOBILE DEVICES AT RISK:

IN 2014 THERE WERE A RECORD NUMBER OF HIPAA BREACHES. ALMOST 79% OF

THESE BREACHES WERE ON UNENCRYPTED LAPTOPS AND THUMB DRIVES.4

EMPLOYEES AVERAGE 3 MOBILE DEVICES PER USER1

$3.5 MillionIN 2014, U.S. COMPANIES

AVERAGED $3.5 MILLION FOR A DATA BREACH2

$217IN 2015, EACH STOLEN

CONFIDENTIAL RECORD AVERAGED $217, TOTALING $6.5 MILLION PER BREACH3

79%

6 WAYS TO FIGHT THE BAD GUYS

WIN WITH COMMVAULT• REPEL data breaches and exposure across the enterprise • ENCRYPT data-at-rest and data-in-flight without impacting performance• REDUCE security costs with policies• SECURE user access with Single Sign-on and Active Directory • AND MORE. Get strong security plus backup and recovery, file sharing, eDiscovery and compliance, and data analysis

ENCRYPT STORED FILES Encrypt files and folders against would-be data thieves

ENCRYPT DATA-IN-FLIGHT Secure data transfer protects

moving data without a VPN

CONTROL USER ACCESS Keep data safe from fake user credentials with 2Fa and SSO5 TRACK THAT LAPTOP DOWN

Geo-tracking lets you narrow down a missing laptop’s location

by country, state, city, zip code and street

REMOTE WIPE A LAPTOPFull or selective data wipes zero out blocks for complete data security AUTOMATE SECURITY

IT e�ciently manages security for an entire mobile network

Recommended