Beyond the Device with 3Eye Technologies

Beyond the Device Episode 34: Syncdog

3Eye Technologies Season 3 Episode 34

What a lot of people don’t understand is how mobile device management works. Oftentimes, people ask if it is software and the answer to that is yes and no. MDM is a solution that uses software as a component in order to provision and protect mobile devices and their data. Organizations practice this by applying not only software but also processes and security policies to their mobile devices and their use.

Besides provisioning and managing device inventory, MDM is a great way to protect a mobile device’s data, content, and applications from threats.

So what sets this apart from mobile security?

Brian Egenrieder and Ted Bienkowski join Reid Estreicher on the Beyond the Device Podcast to discuss mobile security and coming CMMC requirements.

Reid Estreicher (00:04):

Three, two, one. And we are live. And by live, I mean we're prerecording this. So, we can edit it down later in case we make any mistakes, which we of course won't do because we're joined today from the lovely guys at SyncDog, Brian Egenrieder and Ted Bienkowski. Thanks so much for making time guys. This is fantastic. I'm really excited that this is a new partnership we have that we can talk about with you guys. It's a little bit of management, it's a little bit of security, it's a little bit of threat defense, a little bit of everything.

 

Not all things but a lot of things that you guys definitely need to be aware of. Especially going into a mainly digital world that's going to get even more digital and have even more problems with data getting taken and stolen and all those nefarious things. But before we get started, we're going to do an introduction. I work with Brian, I work with Ted on a regular basis, but those guys and girls watching, and listening might not know who you guys are. So, Ted over you first sir, do an intro for yourself and then we'll head over to Brian, and we'll kick this thing off.

Ted Bienkowski (00:54):

Yeah.

Reid Estreicher (00:54):

Ted.

Ted Bienkowski (00:54):

Thanks. We appreciate it. So, Ted Bienkowski, I'm a senior sales manager here at SyncDog. I work directly for Brian Egenrieder.

Brian Egenrieder (01:02):

And I'm Brian Egenrieder. Thanks for having us Reid first and foremost. But I'm the chief revenue officer here at SyncDog, which means I pretty much handle everything customer facing and revenue generating across the world.

Reid Estreicher (01:14):

Awesome. Across the world. You're very important person. Thank you.

Brian Egenrieder (01:16):

I'm pretending I am.

Reid Estreicher (01:21):

So, I know that, so we are going to start with MDM. You guys are not just MDM, I want to be very clear about it, that at the top, but you have a very unique approach to MDM specifically around the setup and the management of it and the ease of use. But you're also many other things we'll get into specifically like CMMC amongst other. But I wanted to talk at the very top because it's one of the things that happens all the time and my dog's barking in the background because even, he's excited to know about this, is that MDM is not security. And I say this to people constantly all the time constantly. It is not security. It's not security, it's not security. There might be security element to it, but it's not security. It's not mobile device security MDS, it's mobile device management. I really want to hit on this. Can you guys give us a little bit a background about how this got swept into the world of security and what you guys are doing to actually address security concerns?

Brian Egenrieder (02:13):

Sure, I'll take that one. Ted, keep us from overlapping. Yeah, it's a great point Reid, because just like you said, MDM literally means mobile device management. And from the very onset it was really designed for inventorying devices, making sure you, you know who's assigned to each device and some other factors in there. And when they leave the company, you can reprovision the device, take it back, reassign it to somebody else. They threw some password protection, they threw in some whitelisting blacklisting of apps and then a device white type capabilities to offer some security like you said. But if you just look at the constantly progressing threats that are out there, it's funny. MDM really hasn't changed. What they do is they keep bolting on additional tools. As data started being a little bit of concern, they threw in some mobile content management capabilities, then they threw in some identification authentication type, another app that combines with MDM and then mobile threat defense and they combine that and then mobile application management.


And suddenly to really protect your data on the devices, you have five, six different vendors, different solutions you have to work with to do it. And what SyncDog is trying to do is change that whole game kind of being a next generation approach, which is, let's simplify this. Let's look at the data primarily, the device is always important but it's the data you're trying to protect. So, our whole vision is let's encrypt and protect that work-related data. Keep it completely separate from the personal data and apps on a given device. Which means employees are only carrying one device. It can be corporate issued or personally owned, but it's one device. Nice clear separation of work and personal data that the work data is completely controlled by the IT and administrative staff, but personal data is all your own. It can't be touched and won't be seen. So, nice set of privacy that goes with it.

Reid Estreicher (04:09):

And now my neighbor's dog is barking so even this dog wants to know about this.

Brian Egenrieder (04:16):

Well, mine's in the office so she might pop up here if she hear them.

Reid Estreicher (04:19):

Yeah, I know he might yeah, Carl's always trying, my dog Carl is always trying to make an appearance in this. He hasn't yet, but one of these days. I think one of the things, so what is this that you addressed on a previous conversation was that, and I think it was really well said, it's like, "We'll protect your device and your data unless it's jailbroken. And I wanted to talk about that because there's so many ways to infect a mobile device now where you don't even have to touch anything. This probably most notably Jeff Bezos, I think everyone knows who that is. Founder of Amazon. He actually had his device whacked. He didn't even open the text that was sent to him. It just delivered a packet and the packet unloaded and they basically had transparency into his phone. That's a crazy thing.

Brian Egenrieder (05:04):

It really is.

Reid Estreicher (05:06):

So, I wanted to talk about that a little bit. You have a unique model that fixes this vulnerability.

Brian Egenrieder (05:11):

It is, and I apologize Ted, but I'm going to take this one too-

Ted Bienkowski (05:13):

Yeah. Good.

Brian Egenrieder (05:13):

... because I passion about this one too. Yeah, we laugh in the industry that, you hear this term zero trust being thrown out all over the place. And in our industry in particular, most of the vendors in this space are like, "We're zero trust this, we're zero trust that" but always has an asterisk behind it. Where zero trust, right up until we have to deal with rooted or jailbroken device, and then it's kind of hey we have to wash our hands to that, because we longer have control.


With SyncDog again, the way we're set up and designed, we are truly zero trust. If it's a rooted or jailbroken device, we can still detect that. We can shut down the system, but we're going to protect it even if it's, and like you said, some of these newer attacks, these zero click type of attacks, you don't have to click on a link or open a site or anything like that. It basically behind the scenes does a non-persistent jailbreak of your device gets in access is the KeyStore, which is almost where every other vendor in the space stores their crypto keys and suddenly, they have access to every bit of data apps on your device. SyncDog is one of the few only or few out there, if not the only one out there that really protects, even if the crypto or the KeyStore is attacked, we're still going to protect your data and they're not getting into our environment. So, we're really proud of that factor.

Reid Estreicher (06:28):

Factor. Yeah, that's a big deal. I know in my previous lives in the corporate world, I've seen some pretty wild hacking attempts and I know everyone's like, "Oh, IOS is, you can't hack it." But I've seen some pretty simplistic things where all of a sudden, you're on the wrong network or you click on the... My favorite was the, I don't have a Costco membership, I might be the only person on the planet that doesn't one, but I get texts on my phone, it's like, "Hey, you overpaid it Costco, click here for your refund." How many people is that applicable to whether work or personal, just these little smishing attacks and all of a sudden, you're basically toasted that information's gone or you, you've basically side loaded something under your IOS device and now that she can keychain is exposed and all those passwords and everybody, nobody reuses passwords, right? We're all, everything's unique. I think everyone, right? Is that the case now? Of course not.

Ted Bienkowski (07:23):

Definitely not me, I'll tell you that.

Reid Estreicher (07:24):

Yeah definitely. I definitely don't use password one, two, three for anything. So, I feel like yeah, it's an easy, once you get exploited once you really find out very quickly you have a lot of problems. You guys also have a really unique setup that I wanted to talk about. It's very simplistic. It doesn't really require a ton of effort or intervention on either the user or the set, the person that's setting it up. Can we just get into that, the setup piece of this because again, deploying it could be the best product in the world, but if it's a nightmare to deploy, I feel like that's a immediate door closed.

Ted Bienkowski (07:55):

Hey, do you want me to take that one Brian?

Brian Egenrieder (07:56):

Sure.

Ted Bienkowski (07:57):

Yeah sure. So, simplicity is what it's all about, right. And protecting the data on the device. But as far as setup is concerned, it's a simple QR code, scan the QR code you provision on download the app, provision on your device and you're often running. So, not a lot of overhead from IT at all. And again, it's a single download for one app. And then once you open that app, it provides you a host of other apps within that container. So, it's email, calendar, contact, secure browser in addition to some other applications that could be available. Whoever the admin allows whatever the admin allows you to have. But simplicity is what it's all about.

 

It's not multiple apps you downloading, trying to provision all these different apps. It's one single solitary app that downloads that gives you a host to all this other information and really helps not only the security but also the productivity of the users as well. Because you don't really have to restrict anybody now because everything's secure and encrypted and it's separate from everything else on the device. So, all your personal information is totally separate from your work information. They don't cross at all. So again, with the ease of installing it and using it in addition to the productivity that it gives, all those people who are out in the field who are leveraging that corporate data on your mobile device, it really empowers the end user.

Reid Estreicher (09:29):

Yeah.

Brian Egenrieder (09:30):

[inaudible 00:09:30] if you don't mind, there's a whole another component too, which is pretty compelling and what Ted was highlighting is the ease of use from the end user perspective. But if you look up at the setup and the administrative of it, you look at the IT component of it or the admin administrative component of it, that's often a really big burden when it comes to setting up the different roles and entitlements and policies. You want different people within your organization to have, most of MDM tools out there. Most of the older approach are set up in at least built of the mindset. It's almost a one size fits all, which we all know is never the case. Your executive team is undoubtedly going to have a different need of access to certain data and different types of use cases that won't apply to even middle management or your sales and services team are often outside the office.

 

With SyncDog, we have this hierarchical approach where it's not uncommon for an organization to maybe have 150 different types of policies that you want people to only be able to access the email from certain times of day certain locations. You want some people to be able to use a camera and not use a camera and it just goes on and on of little things that you want to tweak and almost every other solution on the market, anytime you want to say, okay the executive teams needs are going to be different than middle level management. You have to go and recreate all 150 of those policies. With SyncDog, you set up your organizational policies and your executive team might have four different than middle level management. You just adjust those, you created a new organization, adjust those four, they supersede the other ones middle level management. So, we've taken what in our competition usually takes days, weeks, and sometimes months and brought it down to minutes to hours depending on the size of the organization. So, we take great pride in the end user simplicity as well as the administrative simplicity of it.

Reid Estreicher (11:26):

Yeah. Again, that time to deployment. So, I think been purgatory on several deployments in the past, it's six months and you're like is this still a thing that we're doing? Oh my God. I did want to talk about, and I represent the top, but tell you talked about the containerization. I just want to hit on a couple just key things to this. Yes, there's threat defense. We can get into that a little bit more. I'll talk about Pegasus and yeah, what is the other one? Predator or Necronomicon or whatever the new one is. So, we've got that and then we've got, you guys have a private app store. So, the threat defense, private app store, containerization, MDM is, am I hitting all those pillars? I just want to make sure we're addressing I guess the major points of the product before we go through it.

Brian Egenrieder (12:10):

Yeah. We have an application framework to be able to ingest some native and hybrid apps. If you have any of those built for organization, we can pull that right into our trust and mobile workspace, which is our containerization solution. So that's another component too.

Reid Estreicher (12:23):

Okay, awesome. Well, before we go on though, you said you want to talk about the threat defense piece of this. I had a note in here that I wanted to add about eSIM. This is a big deal. I know we're starting to explore more on the eSIM from an activation perspective of some of our partners and their end user accounts. But can you guys talk about what, and you kind of have a benefit because there's been so many other MDMs out there for so long that product becomes a patchwork to catch up or to stay relevant versus you know guys, GA has been what a little over what, a year and a half now? I think?

Brian Egenrieder (12:56):

Yeah. It's about a year, year and a half. Yeah.

Reid Estreicher (12:58):

So, you guys really have had a benefit of operating selfily and creating a product that can address everything from a new framework rather than trying to, It's like if you've ever been in New York City, I know you're just across the river, but it's like if you ever been in New York, everything's posh, it's patches and or here in Chicago, it's like sometimes you have to take the road back down to the very start and redo it all the way from the scratch in order to really get a good product. But can we talk a little bit about eSIM? Because that's something that's popping up and you guys have the ability to address eSIM and the vulnerabilities that exist with a rollout or a deployment in that mobile environment.

Brian Egenrieder (13:31):

Well, it's interesting because the reason to use an eSIM is to have multiple phone numbers or multiple reaching or contact points on a given device. We always say for the most part, no one wants to carry two devices out there. There are exceptions to that rule. People in customer service who just want to be able to shut off work and not worry about somebody calling them. And then some people that just might be being targeted by some creepy people out there.

 

So, there's definitely these off cases of where, no, I need two phone numbers, don't want to carry two devices but I need two phone numbers. And now, with eSIM, that's really streamlining that whole need. But then that same problem comes into to your work email and personal email work apps and personal apps. So, the combination of eSIM along with a solution like ours that you can separate work and personal on a given device, you can have two phone numbers on a given device and suddenly it's a no brainer out there to use a technology like ours in conjunction with eSIM to just go to market and just address almost every single use case of what people might need to really do their work and live their lives with one mobile device in hand.

Reid Estreicher (14:47):

Yeah. And we're going to talk about that too. We got a whole segment coming up about personal use of these devices, but I wanted to talk about the threat defense piece of this. Mobile threat defense is very crucial. It's not just about securing, or I should say managing the device itself, but it's also managing the data that's on that. Can you guys give us a little bit, without discussing too much of the secret sauce, what is mobile threat defense for you guys and how is that applicable to SyncDog?

Ted Bienkowski (15:17):

Yeah, so with mobile threat defense, if you don't mind Brian.

Brian Egenrieder (15:19):

No.

Ted Bienkowski (15:20):

We have a partnership with Zimperium that's built directly into our platform. So, there's no additional license that you don't have to go out to Zimperium and pull somebody else in which in a lot of cases in the MDM world or other cybersecurity solutions that you might use, you actually have to go out and get a separate license. They don't offer it. So, it's built right into our platform. That's great. So, what it does, in addition to our trusted mobile workspace, which is our container, it sits in the background, and it scans the device and it'll give you alerts as well as in our admin console for whoever your admin is. We'll give them alerts to say, "Hey, your operating system is out of date." There's certain threats that are happening on the device. So, it's just another level of security that we offer through our platform, through our partnership with Zimperium.

Reid Estreicher (16:08):

Okay, awesome. Yeah, they're a great company. We work with them as well and they actually... Oh. Sorry, please.

Brian Egenrieder (16:16):

[inaudible 00:16:15] It's a compelling scenario because we said at the top of this discussion of the likes of these more advanced threats that still can't get into our environment. So, one could argue, and it's a very valid argument that mobile threat defense isn't really needed if you have SyncDog on your device, because even if you do get some of this malware, it's not going to get into our environment and affect the corporate data. But the fact is every employer knows our employee is doing personal things on their device as well, which is the exact reason we included it. We, our primary focus is it's a B2B type of a solution.

 

We're out there working with corporate corporations and governments to make sure that employee's data is protected. But we also want to add that added value of, "Hey let's scan the whole device, let's offer another service that will also in ways protect the personal data on there too." So, you combining us with mobile threat defense will constantly be doing that scan and allow the administrators to help their end users say, "Hey, we noticed this is on there. You might want to take care of it before it does impact some of your personal things," but we can go out there with confidence and saying even if you do get somebody the most advanced threats, it's still not going to get in our environment. But the combination of the two is really, really powerful.

Reid Estreicher (17:37):

Yeah. And you actually you said a keyword here a government and I watch that actually leads us into the CMMC there, I say certification because they'll see in the last C is certification.

 

It's like your, your PIN number, the N is the number, it's very redundant but CMMC, can we talk a little bit about that? Because while it's coming and it's going to be a mandatory certification that you have to have it isn't yet, it's something that you guys have already gotten ahead of. So, anybody that's in government fed space looking for this type of solution, this is a no brainer slam dunk. You guys are way ahead of most organizations when it comes to this, but what is this? What is CMMC? I know it's based off of some missed compliance. Maybe we can talk a little bit about that too and give us some background.

Brian Egenrieder (18:29):

So, the long and the short of it is the government realizes that its data is very valuable that they realize that there's a lot of people out there who are going above and beyond to find ways to get access to it. So, they're both working internally, that's what a lot of the NIST type of mandates and things like that, that are within government agencies and have to be followed as a government employees and things of this sort. But CMMC is an extension of that. That basically is a regulation that's put out to the private sector of saying if you do any work with the government, if you exchange any data with the government specifically it's called CUI data controlled unclassified information. Even if you work with data at that level, not top secret or not anything like that. So, just unclassified but they still what need to make sure that that data at all times is encrypted and protected.

 

And again, going back to the beginning or the top of this discussion is most of the mobile technologies out there now, CMMC touches all facets of an organization, your firewalls, your backend storage and things like that. We're obviously focusing on the mobile piece of it, which is often overlooked or not looked at until you start going through some audit processes and realize like, "Oh man, there's a lot of data that's sitting out there as well."

 

So, we're help people get ahead of that and just say, "By using SyncDog, we have full encryption of the data." We're FIPS, which is a government regulation, we're fully FIPS validated, FIPs certified. You'll see a lot of people out there that they say they, they're FIPS compliant, which means they believe they could be certified but haven't gone through. We've actually gone through all the steps and one of the mandates of CMMC is you have that full FIPS certification and encryptions. So, we're basically going to touch everything outside the firewall on these mobile devices and make sure that data is encrypted on, on your mobile devices to coincide with all your work you're doing with things behind firewall.

Reid Estreicher (20:27):

Yeah. And you also said another word that I want to talk about which is audit. And we had, I think we, Krishna Vishnubhotla from Zimperium I think was the gentleman we spoke with, Krishna Vishnubhotla. Yes, brilliant guy, very smart. But we had a podcast with him where we talked about all the data points where data goes and it's incredible. I don't think, I don't know, it was very new to me, but it's like where all this stuff, the amount of data that's coming back and forth, where it's going, what's hitting servers, connections that are not encrypted in any capacity whatsoever, that can very easily be, the data can be stolen from. Can you talk a little bit about the audit trail when this happens. I think it's important for people to know what does that look like and what are some of the things that are revealed in an audit?

Ted Bienkowski (21:24):

Yeah, I think it's arduous from talking to some clients that I've spoken with goes over five, six, seven, eight-week period, whatever it may be. And it really runs the gamut through their whole system. So, they want to see where's data start and then all, like you were saying, all the places it touches, all those servers and the laptops and the desktops and things of that nature. Where is it touch and is it secure and is it protected? Right? Is it encrypted? And during that audit process and a lot of times they say, "Okay, well it's secure up to this point," so this is where you have to do your work, right.

 

This is where you have to secure the data because from here to here it's good, but once it leaves here, now it's unencrypted again, where a lot of people are finding too is to Brian's point, "Oh, I didn't realize the data on my mobile device needed to be encrypted or wasn't encrypted" because we have MDM. Well again, MDM is protecting your device, it's not protecting your data, it's going to enforce the passwords and things of that nature. So, you really need to take that next step. And if you're allowing any type of corporate or government data to be passed back and forth on a mobile device, you need SyncDog, because they require containerization.

Reid Estreicher (22:45):

And to that point, I know we talked a little bit before about the day-to-day usage of these devices, whether it's somebody giving you a device or it's your own personal phone. I want to talk about the TikTok. This is a thing that I know we talked about this a little bit offline. This application has a more monthly users, that was it, monthly active users them now or whatever I think is the acronym or active monthly use, I can't remember. Well, it doesn't matter. But they have more active users per month than both Facebook and Instagram combined, which is both basically Meta but the amount of, and actually Ted, you sent me an email because you never talking about this offline where they broke down the source code and they're like, there's no reason for the amount of data that this thing is piping out to exist.

 

This application works without the need for any of this information, for this personal information. Which also leads into like GDPR and some of the other requirements I wanted to talk about with like CCP. But when it comes to a person using their device on daily, I don't think everybody is aware of how incredibly vulnerable your everyday devices for something like a TikTok which is wildly popular and basically piping information back to the CCP, which is going to find out. So, it's really wild how the vulnerabilities are right in front of us, but sometimes we just don't pay attention to it.

Ted Bienkowski (24:19):

Yeah. And a lot of cases, you go through and when you sign up for the app, you're like, "Okay, your terms of service sure, I agree with them." And you go. So, Brian just did a blog on, because we were listening to a Joe Rogan podcast, and he dove into the terms when you sign up for TikTok and basically what you're agreeing to and what you're allowing them to access. I mean you're basically telling them, "It's okay, you can take a look at all my applications, everything on my device, file names, pictures." You basically allow them to do that when you say, "Okay, yes I want to sign up for TikTok."

Brian Egenrieder (25:00):

I think you actually give them that your user, they're allowed to access your usernames of every app on your device is one that just baffled me-

Ted Bienkowski (25:06):

And the file names-

Brian Egenrieder (25:07):

... and your point, why would you ever need that?

Ted Bienkowski (25:09):

... pictures. So, it's pretty wild.

Reid Estreicher (25:13):

That's so wild that we have that intrusive. Again, it's like, I know social media is very popular. I think I miss this generationally, thank God, but I don't really understand TikTok. But they have a grip on a lot of people's attention and the attention economy, there's a lot of money to be made on it. But again, that it's one thing for personal, but go back to my comment I made earlier about everybody having great password hygiene and never use reusing a password I mean or never reusing a username. If you get it for one app, if you can find one vulnerability in one app and start to build a database of what those passwords are, you could easily start to take people's stuff, as far as their login their credentials and start to monitor the things that you probably shouldn't be monitoring.

Ted Bienkowski (26:03):

Yeah. I think behavior.

Reid Estreicher (26:05):

Yeah, I know that was one of the things that we talked about it. It's the manipulation that happens in social media versus what is on the digital world. What do we think is real versus what actually is. This is actually part of the thing that came out with Elon Musk trying to buy Twitter was that the amount of fake accounts were significantly higher on Twitter than were originally published. Which the implications are really quite vast over that. Not to beat up on Twitter, but yeah-

Brian Egenrieder (26:31):

I think but here's an interesting point though because it almost sums up our market perfectly. You look at what's happening with TikTok and what you're allowing them access to and your MDM passwords, your password protection that make you change it every three months has zero impact on that. TikTok you already granted them access. So, they're already behind the scenes of it. You already, you're already pass your password on your device when you're using TikTok. So, that serves no purpose whatsoever. The only thing that can sort it, and this is how MDM works and a lot is your organization can basically say you're not allowed to use TikTok on your device.

 

So, it's one of these where the only way to be secure is to stop your users from doing things that they normally do. So, it's that old adage, security goes up, productivity and usage goes down, or as usage goes up, security goes down. So, we're obviously trying to change that game, but it's what makes me almost laugh at how comfortable everybody is with MDM as their security solution. When if it's a corporate owned device with MDM that people are putting TikTok on those all the time and your MDM is doing nothing to protect your personal devices, how can you really say that I'm not going to allow you to have TikTok on your personal device.

Reid Estreicher (27:49):

Right. It's not yours, you can't [inaudible 00:27:51]

Brian Egenrieder (27:51):

It's not yours. So, this one example really shows the weakness and the struggle that IT and security and administrative teams have with how to protect your data. But how do you let people do what they're going to do anyway and if you tell them can't they're still there the whole shadow IT, they're going to find a way to access that. Even if they do have a separate device, then they're going to try to find a way to get their work email on that separate device and you've already just got yourself on the struggle. Again, with SyncDog, it's where we take a lot of pride is the CCP, the Chinese government, if you're using SyncDog, they might still see the pictures of your kids and pets and texts strings with your buddies, but they're not going to get into any of the SyncDog corporate data. And that's our whole focus again is we're going to protect that data no matter what's happening on that device.

Reid Estreicher (28:47):

Yeah, as you were saying, they're not going to be able to get your corporate data. I heard sirens, I wasn't sure if that was them coming for me or not. The joys the of living in downtown Chicago, it's a great city, thank him, thank them here. I wanted to talk about GDPR as well in CCP just a little bit, not the Chinese Communist Party but GDPR as far as Brian, you set offline in another conversation, and I thought it was very well put. You have the right to be forgotten and that from when it comes to your data where you go and we talk about this, I got it ad nauseum when we were doing some stuff in K12 because of the everything's digital now. And so, it's like when a student leaves when they graduate, why is that data being held by companies that shouldn't?

 

That's a child's data, that's their information, it's their likes, it's the things that their dislikes, their communications with their friends. Like that shouldn't be stored and aggregated somebody for somebody to be able to monitor behavior conversations with, especially after they leave. So-

Brian Egenrieder (29:47):

Because they're still minor.

Reid Estreicher (29:48):

... Yeah, well yeah, especially if you're still a minor, I mean, my God. But from a perspective of GDPR, I think this is yet another reason that you guys have gone above and beyond from this perspective of what happens to your data when you leave an organization. Can you talk a little bit about GDPR and the compliance around that?

Brian Egenrieder (30:09):

I'll take this Ted. Yeah, I mean GDPR was one of the first that came out, but you have CCPA, the California Consumer Privacy Act. I think Nevada has basically a data security in privacy. Massachusetts, I think now has one. Saudi Arabia has one called SAMA. You're starting to see, and CMMC is in a sense also a data encryption in privacy regulation. So, you're seeing it happen across all markets, across the whole world. People are just saying you have to protect the data, you have to protect data that isn't yours. If you're an employee, you have to protect your government data, I mean your work-related data. But in that same a 100-degree sense, you have a right to walk away. You have a right to say, "I'm no longer associated with this organization, with this app, with this whatever." And you want that right to be forgotten.

 

You have a right to separate and clear and that's where all these privacy and things like that so that these clear separations, the encryption of anything work related or the encryption of things that belong to you that other people are accessing, you have every right to do with whatever you want with that. But an employee or just an everyday user's personal information when they no longer want to be associated with whatever you do, they have the right to walk away and know that their data is no longer being stored.


So, you're seeing this pop up all over already, but it's just going to get more and more. And I'd contend the days of even being able to put an MDM profile on somebody's personal device, which happens everywhere. I mean a lot of people that join companies are signing somewhere that hey, they have the right to wipe your device if they need to. Many don't thank God, but I would say 90% of employees that use their personal devices for work have already signed something that gives the company the right to wipe it and that's going to go away. People are rising up and that's not going to be allowed in the very near future.

Reid Estreicher (32:15):

Yeah.

Ted Bienkowski (32:17):

Yeah. because again, if they wipe it, you lose everything. You lose your personal information and the corporate information, it all goes.

Brian Egenrieder (32:22):

Yeah.

Reid Estreicher (32:22):

Yep. Photos, photos of your kids.

Ted Bienkowski (32:24):

Yeah, everything.

Reid Estreicher (32:25):

Yeah. Literally everything. Anything that you were trying to store on your phone. Actually, this happened. My father had a couple voicemails from my mother before she passed and those were lost due to a computer hack on his computer, and everything gets shut down.

Ted Bienkowski (32:41):

Oh, it's terrible.

Reid Estreicher (32:42):

Yeah. It's awful. So, it's like when you have something that's like a memory like that or something that you want to keep for yourself for obvious reasons and that's something like that's gone because this in this case was from a computer hack, but God forbid you have something like that on your device and the company you worked for wiped it and it's like, "What are you doing" that's unforgivable, especially in that regard. Not to end on a very serious note there, but I do sincerely appreciate you guys making time for this. That actually brings us to the end of this. I want to just do quick wrap up and closing comments. Anything that we forgot to talk about, anything you want to guys want to go back and mention? Brian over to you and then Ted and we'll get out of your hair.

Brian Egenrieder (33:25):

I don't know, maybe just an easy quick summary of just technology's evolved, technology change. We're just a new generation, next generation disruptor, whatever you want to call our technology, but an elegant new way of doing mobility and protecting data and respecting privacy and making it easy for both the end user and the administrators. And if you ask me, we're severely underpriced so you get a lot for what we charge, and I just love for anybody to come out and take a look at it and trial it and do anything. I mean the more you use it, I think the more you're going to be impressed by it. So, we're happy to talk to anybody or show with anybody and we love to have further conversations.

Reid Estreicher (34:07):

Awesome. Ted, over to you sir.

Ted Bienkowski (34:09):

Yeah, I appreciate the time and I appreciate you having us on. The one thing that I would say is what I touched on before is we're going to give you a different level of security and much more security than with the mobile device management solution, but also help with your productivity. So again, it's not, your productivity isn't going to decrease because now you're more secure. You're actually going to be have access to more information than you did before in a secure and encrypted environment.

Brian Egenrieder (34:37):

That's great point.

Reid Estreicher (34:39):

Yeah. And the reason I'm smirking is because you and I were talking about this before I started recording, which is our security policies sometimes are really freaking annoying and they cause miscommunications because things are getting snagged and spam filters and you know, don't get certain notifications because things don't pop up on your phone. All the way down to... I stopped getting voicemails on my work phone recently, I found out, I'm like, "Why am I not getting voicemails?" Like, "Oh, the alert could be a threat." And I'm like, "Ah, is it?" I don't know. I thought it was a good thing. I should know when people call me.

Brian Egenrieder (35:11):

Friends.

Reid Estreicher (35:13):

But no, I sincerely appreciate you guys making time. If you have any questions, comments, or concerns, please leave them in the comments section below. We can put a link to actually, we get a link to the blog that Ted mentioned, Brian, that you did. You can put that in description as well so you guys can click on that and find it. And like I said, "Be sure to leave us a comment. If you like this video, let us know we did right. Let us know when we're not doing right, let us know what else you guys want to see." We would sincerely like you guys to click like and subscribe. It helps us very much and also helps to see more of this type of content.

 

So, thank you guys very much for tuning in regardless of what you did that either on YouTube or Spotify. Either watching or listening, whatever medium you chose. You should check us out the next episode be on the device. We'll see you guys in the internet.

 

Bye.

Brian Egenrieder (35:51):

Thanks Reid.

Ted Bienkowski (35:52):

Bye, everyone.