top 7 ways to protect your data in the face of shadow it and enterprise saas
DESCRIPTION
(Watch this webcast with audio at http://elastica.net/od-webcast-7sins-dlp/ ) Do you find protecting your company’s sensitive data a challenge with the proliferation of unauthorized apps used by your employees, especially those on mobile devices? If you are like most companies, over 500 apps are running on your network at any given time. Many of these are mobile native apps running on wireless networks, where employees are storing everything from IP to customer data, often in violation of PII, PCI and PHI compliance. So what do you do? In this webcast, Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS, two noted cybersecurity experts and industry thought leaders, Centrify CTO, Paul Moore, and Zulfikar Ramzan, CTO from Elastica to learn how to: --Discover the presence of Shadow IT and understand the implications from an IT risk, governance, and compliance perspective --Get needed visibility and security controls between users and the cloud-based services they consume --Protect your data in the face of Shadow IT --Get enterprise identity access control to SaaS applications without the added cost of an alternate MDM solution.TRANSCRIPT
![Page 1: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/1.jpg)
The Top 7 Ways to Protect Your Data in the Face of Shadow IT and Enterprise SaaS
![Page 2: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/2.jpg)
Zulfikar Ramzan, PhDCTO Elastica
Paul MooreCTO Centrify
• Introduction• Discussion• Q&A – If you have any
questions during the event, please type them into the panel on the right side of your screen.
Agenda
![Page 3: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/3.jpg)
New role of ITThe Good, the Bad, and the
Ugly
Broad definition; our
focus (SaaS)
Understanding Shadow IT
![Page 4: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/4.jpg)
Two kinds of orgs: those who use cloud and
those who don’t know
they use cloud
5000+ Apps tracked by
Elastica
Hundreds of file sharing apps
alone…
#1 Discover What’s on Your Network
![Page 5: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/5.jpg)
#2 Assess Security Implications
Not all SaaS App Created Equal
Understand App Usage
![Page 6: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/6.jpg)
Traditional control:
Black and white
Understand application
usage
#3 Act to Compensate For Risk
Protect against
front door and back
doorMALWAREMALWARE
INSIDER THREATINSIDER THREAT
PHISHINGPHISHING
![Page 7: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/7.jpg)
#4 Control Identity
• In the good old days we had centralized identity.• Now we have chaos• Identities are invisible• See #1
CLOUD (IaaS & PaaS)
CLOUD (SaaS)
MOBILE
DATA CENTER SERVERS
DATA CENTER APPS
by Red Hat
DESKTOPS
ID
ID
ID
ID
ID
ID
ID
IDID
ID
IDID
ID+
+
+
![Page 8: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/8.jpg)
CLOUD (IaaS & PaaS)
CLOUD (SaaS)
MOBILE
DATA CENTER SERVERS
DATA CENTER APPS
by Red Hat
DESKTOPS
ID
#4 Control Identity
• Use identity as the perimeter• Re-centralize user identity
into something you manage• Need apps that support
centralized identity• Or manage the user’s
passwords
![Page 9: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/9.jpg)
#5 Manage Shared Accounts
• Sometimes users have to share• Do it safely• Track the usage• Control usage
• Use discovery (#1) to find out what’s going on
The new identity database
![Page 10: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/10.jpg)
#6 Provision and Deprovision
• Ensure that users have accounts that match their corporate profile• Hire as salesperson -> Sales account in SalesForce• Move to marketing -> Marketing account in SalesForce, account in Marketo• Leave -> remove SalesForce and Marketo accounts
• IAM solution that supports it• Choose apps that support provisioning
![Page 11: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/11.jpg)
#7 Secure Mobile
• Shadow IT => BYOD, BYOD => Insecure• Use MDM to enforce policies
on devices• At least a PIN
• Use MDM that allows self service• Find / lock / wipe lost device,
• Use MDM that integrates with your IAM solution• Can match devices to users• Linked to hire / fire cycle
![Page 12: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/12.jpg)
Recap
#1 Discover what’s on your network#2 Assess Security Implications#3 Act to Compensate Risk#4 Control Identity#5 Manage Shared Accounts#6 Provision and deprovision#7 Secure Mobile
1 Discoverwhat’s on your network
2 AssessSecurity Implications
3 Actto Compensate Risk
4 ControlIdentity
5 ManageShared Accounts
6 ProvisionAnd deprovision
7 SecureMobile
![Page 13: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS](https://reader036.vdocuments.site/reader036/viewer/2022062709/558ce935d8b42aa7498b457d/html5/thumbnails/13.jpg)
Q&A
Thank You
If you have any questions, please type them into the panel on the right side of your screen and they will be answered in the order in which they come in
If you have any questions after the event about Elastica, please contact [email protected]
If you have any questions about Centrify, please contact [email protected]
To learn more, please go to:www.elastica.netwww.centrify.com