With data mobility’s rise, you would expect that security of data would increase as well. However, many of the controls to mitigate the risk of data exposure still rely on traditional protection. Direct attacks, simple mistake, and even negligence are still major reasons as why data is lost. Below are some of the most common examples of common security pitfalls:
- Loss or destruction of endpoints
- Using consumer-grade collaboration and file sharing tools
- Transferring files over insecure media including USB drives
- Emailing sensitive information to personal email accounts
- Social engineering (i.e. phishing) – the human factor and malware
These days, we use new IT services built on multiple cloud infrastructures to work in conjunction with the legacy and custom applications (business critical apps) built on-prem, this results in business data sprawled across multiple devices and locations. This makes the traditional enterprise perimeter almost completely eroded. The industry’s response has been to solve each gap in security with slew of security products, which each have their own unique policies, capabilities and limitations. This creates even more complexity in the already complex problem which can do ultimately do more damage than help.
In the global study from Citrix and The Ponemon Institute, they discovered that:
- 64 percent of respondents say their organization has no way to effectively reduce the inherent risk of unmanaged data (e.g. downloaded onto USB drives, shared with third parties, or files * with no expiration date)
- 79 percent of respondents are worried about security breaches involving high-value information
- 52 percent of respondents do not feel that their security infrastructure facilitates compliance and regulatory enforcement with a centralized approach to controlling, monitoring and reporting of data
That requires a purpose-built architecture, one that is designed and hardened for security from the ground up. Integral to this architecture is the inherent security Citrix provides by:
The solution to the problem? Control must be given back to IT while delivering security to the business without affecting the users experience. This type of architecture is inherent in the security Citrix provides by:
- Centralizing and keeping data off endpoints
- Containerizing and encrypting data on mobile devices
- Controlling access to data contextually
- Using file level access and control (DLP and IRM) for data in motion
- Partnering with industry leaders to protect data
At the end of the day, people need and want to work efficiently, if we make data sharing onerous it would create more problems rather than help solve them.
To learn more about Citrix products, please visit our product page or call us directly at 893-9515.