mutsmuts
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
tipiro
dolescum
neilalderney123
matthewbradley
Empowering and Securing BYOD Email
minifig
mescon
szeke
Ronan_C
Empowering and Securing BYOD Email
mutsmuts
Stuart Barr
Tommy Ironic
Tommy Ironic
Gerard Stolk (vers le Midi Carême)
Eva the Weaver
origamidon
M i x y
chrisinplymouth
Lst1984
Leo Reynolds
Empowering and Securing BYOD Email
wovox
Leo Reynolds
Wootang01
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
gamp
Empowering and Securing BYOD Email
Leo Reynolds
mag3737
chrisinplymouth
Leo Reynolds
“There is, perhaps, a call to
action here… otherwise
smart workers will use the
initiative you presumably
pay them for to work
around the limitations.”
Dale Vile
shindohd
spaceyjessie
rheauchyr
shindohd
flatearththeatre
Victor1558
micheleart
Craft Australia
Rsms
Empowering and Securing BYOD Email
wovox
Wootang01
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
stevecadman
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Mysterious Photographer
Leo Reynolds
Wootang01
wonderferret
wovox
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
chrisinplymouth
chantal forster
matthewbradley
Bohman
shindohd
Jonathan_W
Helico
Geoffrey Gilson
Gueorgui Tcherednitchenko
UK Parliament
Wootang01
kurafire
fczuardi
JMC Photos
B Tal
Empowering and Securing BYOD Email
M i x y
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
liquidx
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
Empowering and Securing BYOD Email
mskogly
Empowering and Securing BYOD Email
Permabit
Gueorgui Tcherednitchenko
Rsms
B Tal
Nicolas●B
Empowering and Securing BYOD Email
Simon Cocks
Craft Australia
mutsmuts

More Related Content

PPTX
Quote about Doctor
DOCX
Post questionnaire graphs
DOCX
Post questionnaire
DOCX
Post questionnaire graphs
PPTX
How to Train your Dragon
PPTX
The end of IT as we know it.
PPTX
Synergistic outcomes company
PPTX
Cloud and The Channel- Where's the space?
Quote about Doctor
Post questionnaire graphs
Post questionnaire
Post questionnaire graphs
How to Train your Dragon
The end of IT as we know it.
Synergistic outcomes company
Cloud and The Channel- Where's the space?

More from Justin Pirie (20)

PPTX
Adoption Trends for SaaS- Cloud Computing World Forum 2012
PPTX
Unifying Devices in the Cloud
PPTX
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
PPTX
CLT Law Conference Cloud intro
PPTX
Copenhagen Lean Startup
PPTX
The Great Migration- Cloud Circle
PPTX
Bristol Tech Startup School: Lean Startup
PPTX
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
PPTX
Microsoft Worldwide Partner Conference Session
PPTX
Cloud- A Technical or Organisational Challenge? Or Both?
PPTX
Email: The Future Direction
PPTX
Cloud and the Channel- A Perfect Storm?
PPTX
Lean Startup - A Primer for Entrepreneurs
PPTX
The Hidden Security Danger – Don’t Let Email Be Your Downfall
PPTX
Mimecast Partner Day
PPTX
CLT Legal Cloud Conference
PPTX
Swindon- Talk on Cloud
PPTX
Cloud: Space for the Channel?
PPTX
Cloud Security: Is My Data Safe?
PPTX
Cloud Adoption Secrets
Adoption Trends for SaaS- Cloud Computing World Forum 2012
Unifying Devices in the Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
CLT Law Conference Cloud intro
Copenhagen Lean Startup
The Great Migration- Cloud Circle
Bristol Tech Startup School: Lean Startup
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
Microsoft Worldwide Partner Conference Session
Cloud- A Technical or Organisational Challenge? Or Both?
Email: The Future Direction
Cloud and the Channel- A Perfect Storm?
Lean Startup - A Primer for Entrepreneurs
The Hidden Security Danger – Don’t Let Email Be Your Downfall
Mimecast Partner Day
CLT Legal Cloud Conference
Swindon- Talk on Cloud
Cloud: Space for the Channel?
Cloud Security: Is My Data Safe?
Cloud Adoption Secrets
Ad

Recently uploaded (20)

PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DOCX
search engine optimization ppt fir known well about this
PPTX
Modernising the Digital Integration Hub
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Architecture types and enterprise applications.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Chapter 5: Probability Theory and Statistics
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPT
Geologic Time for studying geology for geologist
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Five Habits of High-Impact Board Members
UiPath Agentic Automation session 1: RPA to Agents
Credit Without Borders: AI and Financial Inclusion in Bangladesh
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
search engine optimization ppt fir known well about this
Modernising the Digital Integration Hub
Custom Battery Pack Design Considerations for Performance and Safety
Zenith AI: Advanced Artificial Intelligence
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
The influence of sentiment analysis in enhancing early warning system model f...
Microsoft Excel 365/2024 Beginner's training
Convolutional neural network based encoder-decoder for efficient real-time ob...
Architecture types and enterprise applications.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Chapter 5: Probability Theory and Statistics
sbt 2.0: go big (Scala Days 2025 edition)
Geologic Time for studying geology for geologist
A comparative study of natural language inference in Swahili using monolingua...
A proposed approach for plagiarism detection in Myanmar Unicode text
Five Habits of High-Impact Board Members
Ad

Editor's Notes

  • #2: Hi My name’s Justin Pirie I’m the Cloud Strategist here at Mimecast but I’m best known as an Analyst Blogger in the SaaS and Cloud space.
  • #7: Archive
  • #8: Continutity
  • #9: Security
  • #17: Confict?
  • #18: Recent survey- 76% said Mobile devices are essential
  • #19: Same 76% said devices presented a security risk
  • #20: 78% already allow employees to use personal devices- Decisive analytics
  • #21: Only 39 percent have the necessary security controls to address the risk,
  • #22: and only 45 percent have enforceable policies
  • #23: Deletion- control. How can you be sure everything is deleted?
  • #24: 63% of data loss was on a mobile device- Ponenmon
  • #25: We have a looming problem
  • #26: There are 3 Questions we need to ask:
  • #27: Why should we consider BYOD?
  • #28: How do I enable employees to be productive
  • #29: How do I secure access to corporate email and reduce the risk of data loss
  • #30: Glass half full or half empty?
  • #31: http://tech.fortune.cnn.com/2011/02/07/idc-smartphone-shipment-numbers-passed-pc-in-q4-2010/
  • #34: Smartphone market growing strong
  • #38: Disconnect between what the business thinks they use and what employees do
  • #39: For the first time in history, consumers have access to better IT at home than at work
  • #40: I want to use the device I want to Smartphones Tablets Laptops PC Social Media
  • #41: 240 Additional hours worked per year by the average mobile worker- iPass
  • #42: 91% of mobile workers will check their smartphone during downtime
  • #43: 87% of mobile workers will use their tablets for work – only 41% of tablets are corp. provided
  • #44: 87% of mobile workers will use their tablets for work – only 41% of tablets are corp. provided
  • #45: The people who actually BYOD are most likely to be your most innovative workers There is, perhaps, a call to action here for… otherwise smart workers will use the initiative you presumably pay them for to work around the limitations.
  • #46: Enable your HERO’s
  • #47: The people who actually BYOD are most likely to be your most innovative workers
  • #48: power laptop users make 44% more money, use more collaboration apps, and carry an average of three devices wherever they go." Also more likely to communte longer distances and be part of a distributed team
  • #49: HERO’s want tech that think makes them more efficient
  • #50: Not holds them back
  • #51: And represents their personal brand BIN?
  • #52: Benefits
  • #53: Staffing- Retention, Happiness, Hiring
  • #54: More efficient, More productive, More responsive, More Agile
  • #56: How do I enable employees to be productive
  • #57: Glass half full or half empty?
  • #58: Email is the “Killer” smartphone app
  • #60: The only Universal communication tool- over 1 trillion attachments are sent every day in email
  • #61: So it’s not surprising then an estimated 80% of corporate IP is contained within email
  • #62: Having email gives employees access the corporate archive- tip of the iceberg
  • #63: So we need to give email to our employees in a safe, secure way
  • #64: How do I secure access to corporate email and reduce the risk of data loss
  • #65: Glass half full or half empty?
  • #66: We started by putting ourselves in your shoes
  • #67: How do we enable productivity while minimising risk of loss
  • #68: Supporting Multiple devices- allow users to make their own choices
  • #69: Securely access information, view, collaborate
  • #70: Because we already know that 63% of data loss was on a mobile device- Ponenmon And we already know that 80% of Corporate IP is stored in email
  • #71: Carry very little on the device
  • #72: Evolve to the Cloud data security paradigm- secure the data, not the device
  • #73: IT’s role is emerging as the data custodian
  • #74: To protect and empower the enterprise
  • #75: If we want the benefits of BYOD we need to move away from control over the device to liberating the data
  • #76: Making data work for you and your people
  • #77: Don’t let your data go to die in an archive We used to make email easy, Starting this year, we’ll be making email more useful, productive
  • #78: Add value to the business- don’t be looking over your shoulder
  • #79: There have been two polarised approaches?
  • #80: Glass half full or half empty?
  • #81: Lock it all Down Draconian Secure
  • #82: Trust Everyone Easy and Open Zero security
  • #83: There is a Middle ground?
  • #84: All good security decisions are done with GRC. Evaluate the risk posed by the data.
  • #85: MDM- Exchange 2010 has significantly improved MDM. Enforcing PIN lock and remote wipe.
  • #86: Deletion- control. How can you be sure everything is deleted?
  • #87: But we still need to solve the problems of having the data on the device
  • #88: Mimecast iPhone App
  • #89: Archive Search- all your data available on the device. Full email function and control. Forward, reply.
  • #94: Online authentication
  • #95: The cultural shift in that’s happening in IT is palpable- BYOD is driving- visible manifestation and Cloud
  • #96: Laptops- big mailboxes are still a risk
  • #97: Archiving with great search and online authentication makes sure your data is always safe.
  • #98: More advanced MDM features are available from other vendors if you’re not on Exchange 2010 or have additional requirements http://www.sap.com/campaigns/2011_04_mobility/assets/GartnerReport_MDM_MQ_April2011.pdf
  • #99: The cultural shift in that’s happening in IT is palpable- BYOD is driving- visible manifestation and Cloud
  • #100: It’s about losing the shackles
  • #101: Moving from managing infrastructure to manging data and the glue
  • #102: http://blog.permabit.com/index.php/2011/02/data-affordability-gap/
  • #103: Move away from a fear of problems arising Focus on adding business value
  • #104: Increasing productivity
  • #105: We can’t pretend its an easy decision- leap of trust Trusting so many of these things to a cloud vendor So you can concentrate on the important things
  • #106: A leap of faith?
  • #107: It’s encumbant on us- CSA- ISO27001 leap of faith Non trivial decision
  • #108: Full cold crisp lager
  • #109: Mean professional services
  • #110: Hi My name’s Justin Pirie I’m the Cloud Strategist here at Mimecast but I’m best known as an Analyst Blogger in the SaaS and Cloud space.