This post is based on a recent webinar hosted by CIO.com featuring Deborah L. Bulkeley, Senior Managing Editor, IDG Strategic Marketing Services and Dave Packer, Director of Product Marketing at Druva.
Over 75% of today’s professionals use a laptop, tablet or other mobile device for work, with adoption growing exponentially year over year. At the same time, corporate IT policies have been slow to include endpoints is overall governance. A 2013 IDG Enterprise Mobility Study stated that over 34% of IT leaders said the biggest challenge to enterprise mobile IT implementation and support was ensuring data compliance and producing audit trails with an increasingly mobile workforce.
The increasing demand for anytime, anywhere access to corporate data by the mobile workforce is challenging status quo approaches to data governance by requiring IT leaders to address three primary risks:
1. Gaps In Data Visibility
In today’s business world, worker productivity and collaboration trump compliance. It is not unusual for employees to primarily work from laptops and mobile devices, as well as self-provision cloud-based apps like DropBox and YouSendIt. As a result, large amounts of data – up to 28-35% of all corporate data on endpoint devices – exists outside the organization and outside the purview of IT.
This has created a blind spot for data visibility that undermines a company’s ability to manage risks associated with knowing where content resides, how they control access to content and what to do when devices holding critical data is lost or stolen, or when employees depart.
By closing data visibility gaps related to monitoring data audit trails, improved content identification and device location, organizations become clear custodians of data, reducing risk and cost in the event of litigation or compliance audits.
2. Risk of Data Loss
As workers become more mobile, data loss is just a lost, damaged or stolen laptop away. Not only is lost productivity a risk, but so is the loss of crucial, irreplaceable documents such as important research, financial documents and business plans in development. All of these have big implications for your business.
To mitigate risk, companies need a second, up-to-date copy of data residing on endpoints to enable immediate recovery with minimal downtime and no loss of productivity. Any loss or damage to a device will not block access to content from another device for continuous data availability. This is especially valuable to companies with thousands of workers and devices in the field.
3. Controlling Data Leaks
When a worker leaves a laptop at a restaurant or off-site location, it’s not just worker productivity that is impacted in terms of data recovery, it is also the organization’s trust with its customers and its responsibilities for compliance. The data contained on that device can include customer records, personal data and sensitive customer information including PHI (Personal Health Information). A company is obligated to protect this data.
Avoiding potentially damaging data breaches requires the ability to encrypt data in transit and at rest to close the gap in data exposure, as well as the ability to remotely wipe and restrict access to data on endpoint devices. Proactive measures to protect corporate data at across every location places organizations in a stronger position with both data compliance requirements and with vital customer relationships.
Close the gaps with a holistic approach to data governance
With the unstoppable trends towards business in the cloud and on mobile devices, a status quo approach to data governance will only increase the risk exposure for organizations. Forward-looking companies balance end user goals of freedom of choice and productivity with the need for increased visibility at the edge where mobile data resides. Companies that adopt a proactive and strategic approach to endpoint data governance will be able to assess data risk and be nimble and responsive to data collection requests, while embracing the promise of their mobile and cloud-based workforce.
To learn more about the risks of endpoint data governance and solutions to address them, listen to the full webinar ‘Overcome Data Protection and Governance Challenges in a Mobile World’ here.