DLP in a BYOD world. Interview w. DeviceLock CEO, Vince Schiavo

DLP in a BYOD world. Interview w. DeviceLock CEO, Vince Schiavo


In this interview by TMC Vince Schiavo, DeviceLock CEO discusses the importance of data leak prevention software in the BYOD and cloud enabled enterprise. DLP is becoming much more important as employees bring mobile devices into the workplace, allowing them to move data easily from the trusted corporate network out into the wild.
Closed Caption:

the
American tasked with EMC's roadshow
we are here in San Jose Calif this week
and i'm talking with Vineeth
ya beneath the CEO up device like many
thanks for joining a great to have you
thanks for him good to be here so you
know what are the the big
terms the big said up buzz words I in
the industry
lately it's been BYOD I given
what device locked other sure you've
heard a bit what impact has a whole BYOD
movement had
on by what you do well that it's very
topical as you say it's been no
a boon to our business actually because
they're so much emphasis now
on protecting organizations from people
taking sensitive information
and out of the building by eddies these
mobile devices everybody's being
personal mobile devices into the
workplace now and
most tend to think that is their phone
which is kinda obvious one but
this is really been a problem for a long
time not just with my
smartphones but all kinds of small
mobile devices like
USB sticks digital cameras iPods
iPad all these things so our company
really specializes in
setting and enforcing policies you so
those kinds of devices in the workplace
so you mention a number number about
devices at everybody's you with I think
often
go up ignored almost there when people
talk about
mobile security or at a price security a
at large
yeah I think so there's a tendency for
all of us to kinda stereotype that
malicious hackers this evil person on
the other side of the world
trying to hack into your network in gain
access either for
just to disrupt your business actually
steal information for profit
and that certainly an issue in a threat
but I think most large organizations
have
long since deal with that threat through
traditional gateway security products
what our products do is really protected
against the trusted insider
and that's not to say that you're
employees or guests whatever bad
bad guys it's just that a lot of times
people do stuff not realizing the
implications are that
certain things that they do could could
cause security problems for the
organization here all the time about
people
trying to take home work for the weekend
putting it on a USB stick and then
I get home can't find the USB stick and
I have some
secret merger plans or something that
are out in the wild that
election our software allows you to set
and enforce policy
what you can put on those kinda devices
so we can prevent those kinds event
so I can't quite tell you a fire some
those
said to the files on a USB stick take it
home
and put on my home PC where me my
security is a quite a strong
Zack really does help keep that
corporate data where it is
stay that's right now what about that
you how do you work with
mobile devices with its laptops are
cellular phones
well for spots you can look at them as
the same thing
I mean when you take i care and I iPhone
and I know when I go to work at doc my
iPhone so it's charging on working
but also happens to be clicking the USB
port so it's
gigantic 32 gigabyte drive that's
attached to the company network
and anything that I have privileges to
see I can just move over there I wanted
walk out the front door phone in my
pocket so that's the first thing
we need to be able to do is prevent
people putting information on the phone
as if it's a dry and the other thing is
how you can attached from through
wireless
or through the network itself and that's
important all is well
what about attaching documents to
emails that too is important to be able
to see
what kinda documents are being attached
and and whether that conforms
policy are suffer let you set policy
not just on the context above avert data
transfer but the actual content of the
file itself
what that means is context has to do
with time
day be in a week type file size: a file
and who the person is that's doing this
but content is actually okay now all
that stuff checked off
your find the time it is fine all that's
okay but what's actually in the file
that you trying to move does it have
10,000 customer credit card numbers and
it does it have
all other employees Social Security
numbers so that's the content
when do companies come to you before
they pick out at some sort of a data
breach
or rock before well like any security
products and mix
there's there's always there you know
every week if someone somewhere in the
world the contact us in a panic because
there's been a breach in a
yell that may have to do something about
it but you know there's also
companies that are following but best
practices and setting up there
there infrastructure the way they should
in there had ideally getting to us
before the senate
that an easy conversation for you to
approach enterprises with trying to
explain to them
why they need this kind of a solution
yeah it really is I'm
prior to this in a past life I was
involved in selling enterprise
firewalls and you know that's a whole
different
Ballack's in there your you're setting
up this impenetrable
perimeter and it's all about keeping
people out
and and that's really changed over time
so that today people are coming and
going in and out the front door with
with all these mobile devices in their
backpacks briefcases
so so what we're doing today is really
helping companies
address that risk so many large
enterprises have spent
millions of dollars building these these
traditional parameters
and now with all these mobile devices
they're having to scramble to go
wait a minute what do we do about the
person that has walked in the front door
takes information on a
on a phoner USB stick marks out the
front door
so its it's actually kinda fun to sit
down with an IT professional and
point those positions up to that the MRT
thought about me most people
thinking about this but a lot attendants
more the businesspeople
haven't really stopped to think about
the risks that are posed by the trusted
insider
carrying these devices and how the
building X already has been great
chatting with thanks for joining us here
auntie Em's is roadshow my pleasure
thank you

Video Length: 06:03
Uploaded By: DeviceLockVideo
View Count: 288

Related Software Products
DeviceLock
DeviceLock

Published By:
SmartLine Inc.

Description:
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. ...


Related Videos
How to Unlock/Bypass Any iPhone or iOS Device Lock Screen (Skit/Spoof)
How to Unlock/Bypass Any iPhone or iOS Device Lock Screen (Skit/Spoof)

What's up everyone this is DesperateFun! I hope all of you guys are having a great day! At this point I think most of you know that this is a spoof video/prank. I made this video because I forgot my April Fools prank video. I really would like to apologize for not uploading for such a long time. BO3 has just been very disappointing and I haven't had much fun with it. I will now continue to upload and make sure that I keep a good schedule. I hope you guys enjoyed the video and peace! br ...
Video Length: 08:55
Uploaded By: DesperateFun Gaming
View Count: 16,055

In-Depth Demo -- DeviceLock 7.1 Endpoint DLP Suite software for data leak prevention
In-Depth Demo -- DeviceLock 7.1 Endpoint DLP Suite software for data leak prevention

View a detailed software demo of DeviceLock 7.1 endpoint DLP Data Leak Prevention Software. DeviceLock software enforces data privacy policies by monitoring for unauthorized handling of confidential data by end-users. The software prevents unauthorized network connections and data transfers; stops data from leaking out when employees are using cloud-based applications like email, Twitter, Facebook, Google+, Skype and more; and blocks the ability for anyone to copy confidential data from ...
Video Length: 55:40
Uploaded By: DeviceLockVideo
View Count: 2,246

3690 Device Lock Modification
3690 Device Lock Modification

This video will explain how to modify the lock on the 3690 Device. hr / bClosed Caption:/b we're going to use this model 3690 purple show you how to change the sole owner in our unit support within Tercel underdog these instructions would be the same poor 3790 serious room where action it's as well this unit uses a standard room key so perhaps you want to change the cylinder out from the construction zone ...
Video Length: 06:26
Uploaded By: firstchoicebuilding
View Count: 1,173

DeviceLock - City Of London Police Interview
DeviceLock - City Of London Police Interview

Gary Brailsford, Hart Head of Information Services City of London Police. hr / bClosed Caption:/b do p.m. but officials position said 2003 we recognize that processing unit just security standpoint expected to price is connected to the infrastructure going from its a phone book to work forced him to miss you count feature shit stop thinking or more forget shit to manage it a number of questionsbr ...
Video Length: 02:05
Uploaded By: VidPR
View Count: 948

CEO DeviceLock Vincent Schiavo Interviewed on DLP Data Leak Prevention
CEO DeviceLock Vincent Schiavo Interviewed on DLP Data Leak Prevention

Understand what it means to stop data leaks - at the source. The CEO of DeviceLock is interviewed at the RSA Security Conference 2012 on DLP Data Leak Prevention. The DeviceLock endpoint security software solution is practical, affordable and easily managed from within Microsoft Active Directory. DeviceLock DLP software is used on over 4 million computers around the world today. hr / bClosed Caption:/b font color="#CCCCCC"my guess is Vinny skiable/fontfont ...
Video Length: 11:57
Uploaded By: DeviceLockVideo
View Count: 711

DeviceLock 7.0, prevenire la perdita di dati in azienda - TVtech
DeviceLock 7.0, prevenire la perdita di dati in azienda - TVtech

Intervista con Flavio Sangalli, responsabile di DeviceLock per l'Italia, che ci illustra le funzionalità della suite di sicurezza DeviceLock 7.0 Endpoint DLP, per prevenire la sottrazione dolosa o la perdita accidentale di dati all'interno di un'azienda, controllando i canali di comunicazione locali e di rete di ciascun PC
Video Length: 05:38
Uploaded By: TVtech.it
View Count: 627

DeviceLock By BorderLAN
DeviceLock By BorderLAN

DeviceLock by BorderLAN provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can't be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. http://borderlan.com/data-loss-preven... hr / bClosed Caption:/b my name's Adrian speaker for device lock device lock is an independent softwarebr ...
Video Length: 28:08
Uploaded By: BorderLAN
View Count: 621

Android Device Lock removed
Android Device Lock removed

One of plenty posibilities to remove device security lock on Android. This Video is a proof of poor Software Quality of Big Security Software Companies.
Video Length: 01:06
Uploaded By: Mantux
View Count: 510

Websem Technique - DeviceLock 7
Websem Technique - DeviceLock 7

Présentation de la solution DeviceLock 7 et des modules addtionnels NetworkLock et ContentLock. Fonctions abordées : - Console d'administration - Gestion des politiques de sécurité - Modules NetworkLock et ContentLock
Video Length: 44:52
Uploaded By: ATHENA Global Services
View Count: 336

Copyright © 2025, Ivertech. All rights reserved.