Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

How To Navigate The Challenge of Managed vs. Un-Managed Devices?

Truth in IT
08/24/2023
16
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hank Schless: So the next one, the thing that I like to just show here and Andy, if you wouldn't mind diving into a little bit more from from the technical side is really, you know, what's the why do we have to look at the managed versus unmanaged use case here? You know, this showing how we do on the managed side, but then the next next piece will show unmanaged as well. But, you know, we've talked so much about the variety of devices that people are using and and, you know, organizations enabling Bring Your Own Device, whether that's for smartphones or laptops. That's kind of one in the same these days. So I think that going through this real quick is important. So, Andy, if you wouldn't mind sort of running through this piece quickly. Sure. Andy Olpin: So first and foremost, in the in the use case that will make the most sense to everyone is when you think about, you know, bringing your own laptop, what happens when that user leaves the organization or if there's any data left on that laptop, you don't have a way to call it back, right? So in many cases, you want to make sure they're using a corporate laptop that they're accessing, accessing sensitive data so that you can make sure you can wipe that device, bring the data back. But there's also more security controls on the managed device. The most obvious is antivirus or EDR to keep malware off there so you have some assurance that the operating system is in good shape. But the other thing that we can do is one of the controls here with managed endpoint is we also have this option to see on the left hand side for forward proxy. Now you can talk about that forward proxy has been around for forever, but they're kind of getting new life today as something like a secure web gateway. And what that lets me do as an administrator is all these contextual policies can also apply to personal clouds from managed endpoints. So what I mean is, let's say I let the user on their corporate laptop download this document with salary information for my entire executive staff. That's clearly sensitive information and want to control where that goes. But that's going to a corporate device to a user in finance. So they are a valid person to be able to download it. So my contextual policies are going to let the user download that. But if that same user on their corporate device goes to Google, they log in with their personal Google account, I need to stop them from taking that same sensitive document and uploading it to Google. So this managed endpoint as part of our secure web gateway and our proxy there, can not only we can allow them to sign into their personal Google if that's what we want to do, but I can still analyze all of the data they're attempting to upload there. So if they're uploading their shopping list, they create on their work laptop, no problem. But as soon as they attempt to upload that list with all the sensitive salary information, we can block that upload from occurring. Right? So I've got more control and management on that managed endpoint that lets me be a little more confident in that data residing on that device. Mike Matchett: So DLP can be better implemented, obviously, if you have a managed endpoint and you can put some filters and and I don't want to say Big Brother stuff, but definitely gateway kinds of activities on there that keep everybody. Andy Olpin: And the real advantage here is not just blocking. Right? So the old school answer would have been, you're not allowed to ever use your work laptop for personal stuff at all. Right? You can't go to Google with your personal account. We just won't allow it. Well, now what I can say is you can use your laptop for personal. You can do some personal stuff. You can go to your Google account, that's yours. But we are going to restrict any upload of sensitive data. Right? So now your users can say, great, my work gave me this laptop and they're letting me do some personal stuff with it, which is a really nice benefit. I'm glad I worked for this company, but you're still able to keep your data secure and safe. Mike Matchett: Yeah, and I think that's, you know, as people become more and more, we become more and more digital natives, we integrate more work and life together. It's really hard to maintain separate devices for those things as as we integrate our our balance. You know, I'm carrying a laptop around, I'm doing work on it, I'm doing my life on it. I'm doing everything on it. I don't even know whether it's a company laptop or a personal laptop. Six months later, I forget, but it would be great to just augment that and enable that rather than block it. Right? Andy Olpin: Right. Yep. Hank Schless: And I think that sort of conversely on that, the the unmanaged use case too, you know, just like you just said, like, you know, it's at what point does your mindset shift to the point where you don't really know is it you know, you know, you just kind of treat whether you have a you know, I've got my work laptop here. I've also got a personal laptop. There are plenty of times where, you know, I kind of to your point, forget which is which. So from a from your perspective, Andy, on the on the more technical side, how does what we just talked about sort of shift when it comes to unmanaged devices? Andy Olpin: Well, I think, again, the goal here is to enable users to have an unmanaged device and still connect to Office. Right. So what you don't want to say is you have to have a work laptop at all times because there are situations where that just doesn't happen, you know, oh, I'm traveling on vacation. I didn't expect to do any work. I didn't bring my work laptop with me and an emergency happens and they need me to do something right. And all my data is in Office, so there's no technical reason I couldn't get access to it. But company policy doesn't allow. Right? So what we're going to do here is we're going to allow you to access that data. But again, all the contextual policies will control what you can do with it. So your personal device gets to Office. Great, no problem. Now, we're not going to let you download that salary document. We may we can do things like if you download a document with social security numbers in it, maybe we redact or remove those social security numbers from the document as it's downloaded. Right? So document you can still see it, but the sensitive data parts get removed because it's a personal device. Or we could do something like encrypt or apply EDRM to the document that even though you've downloaded it and you do have access to it, we can ensure that no matter where that document goes, we have the ability to pull it back and restrict who can open it, because again, you're coming to it from an unmanaged device. So we want to actually use this not as a as I said earlier about CISOs, we don't want to use it as a way to say, no, you can't access the system. We want to use it to say you can access the system because we have assurance that our sensitive data is being handled in an appropriate way and only going to the appropriate people.
Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
Channels:
  • Where Does Your Data Go? Data Loss Preventing and Stopping Data Exfiltration
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • matchett
  • lookout
  • dlp
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: How To Navigate The Challenge of Managed vs. Un-Managed Devices?

              Upcoming Webinar Calendar

              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Trends into Tangible Business Success with Druva
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-trends-into-tangible-business-success-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                EMEA Partner Sales Talk: Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1554/emea-partner-sales-talk-transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Advancements in Click Fraud Defense: Insights from LinkedIn and HUMAN for Budget and Campaign Protection
                https://www.truthinit.com/index.php/channel/1583/advancements-in-click-fraud-defense-insights-from-linkedin-and-human-for-budget-and-campaign-protection/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Transforming AI Buzz into Tangible Business Gains with Druva
                https://www.truthinit.com/index.php/channel/1556/transforming-ai-buzz-into-tangible-business-gains-with-druva/
              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Fostering Trust Amidst Agentic Commerce Dynamics
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-fostering-trust-amidst-agentic-commerce-dynamics/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Maximize M365 Opportunities with Clean Recovery and Entra ID Protection
                https://www.truthinit.com/index.php/channel/1624/maximize-m365-opportunities-with-clean-recovery-and-entra-id-protection/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize M365 Opportunities with Clean Recovery and Entra ID Protection
                https://www.truthinit.com/index.php/channel/1625/maximize-m365-opportunities-with-clean-recovery-and-entra-id-protection/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Maximize M365 Opportunities with Clean Recovery and Entra ID Security Insights
                https://www.truthinit.com/index.php/channel/1623/maximize-m365-opportunities-with-clean-recovery-and-entra-id-security-insights/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Nov
                18

                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                11/18/202501:00 PM ET
                • Nov
                  20

                  Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                  11/20/202501:00 PM ET
                  • Dec
                    10

                    The Next Generation of Managed Data Security Services

                    12/10/202501:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Nov
                      12

                      Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR

                      11/12/202512:00 PM ET
                      • Nov
                        12

                        Transforming AI Trends into Tangible Business Success with Druva

                        11/12/202510:00 PM ET
                        • Nov
                          13

                          EMEA Partner Sales Talk: Transforming AI Buzz into Tangible Business Value with Druva

                          11/13/202505:00 AM ET
                          More events

                          Upcoming 360 View Events

                          • Nov
                            20

                            360View: Budget Optimization: Doing More with Less

                            11/20/202512:00 PM ET
                            • Dec
                              18

                              360View: 2026 IT Predictions & Emerging Trends

                              12/18/202512:00 PM ET
                              More events

                              Recent Spotlight Events

                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                • Oct
                                  15

                                  Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                  10/15/202501:00 PM ET
                                  • Sep
                                    16

                                    KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                    09/16/202501:00 PM ET
                                    More events

                                    Recent Industry Events

                                    • Oct
                                      30

                                      Rethinking Secure Access Beyond VPN and NAC for a Zero Trust Era

                                      10/30/202512:00 PM ET
                                      • Oct
                                        30

                                        Rethink secure access solutions in a zero trust landscape beyond VPN and NAC.

                                        10/30/202506:00 AM ET
                                        • Oct
                                          29

                                          Practical Strategies for Platform Engineering in the AI Era

                                          10/29/202512:00 PM ET
                                          More events
                                          Truth in IT
                                          • Sponsor
                                          • About Us
                                          • Terms of Service
                                          • Privacy Policy
                                          • Contact Us
                                          • Preference Management
                                          Desktop version
                                          Standard version