www.atlassian.com Open in urlscan Pro
185.166.143.30  Public Scan

Submitted URL: https://links.eml.atlassian.com/dc/jJSklxE05Rx8OSS_2WGEXUUrXlMqYlugCuVBIFUqQXFzRhiohVpgA_LiF_g-bc5aUM2PpVWO7j2T90kYiN-2A3KewW2nP...
Effective URL: https://www.atlassian.com/blog/enterprise/state-of-data-security-protection?utm_source=nurture-email&utm_medium=email&utm_...
Submission: On November 02 via api from DE — Scanned from DE

Form analysis 3 forms found in the DOM

<form><span class="fieldset">
    <p><input type="checkbox" value="check" id="chkMain" checked="checked" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
  </span></form>

GET https://www.atlassian.com/blog/

<form class="search-form" action="https://www.atlassian.com/blog/" method="get">
  <label class="screen-reader-text" for="search">Search in https://www.atlassian.com/blog/</label>
  <div class="row">
    <div class="col-10">
      <input type="text" class="search-input" name="s" id="search" placeholder="Search for something" value="">
    </div>
    <div class="col-1 offset-1">
      <button class="search-submit" type="submit" data-event-container="searchForm" data-event-component="button" data-label="Search" data-uuid="37eb57a28d5b7f62ec52c63351f74e55">
        <i class="icon-search" aria-hidden="true"></i>
        <span class="screen-reader-text">Search</span>
      </button>
    </div>
  </div>
</form>

POST

<form method="post" enctype="multipart/form-data" id="consenthub-form">
  <input type="hidden" name="action" value="atlassian_blog_process_consenthub">
  <header class="form-heading">
    <span class="subscribe-label">Subscribe to Work Life</span>
    <h3 class="form-description">Advice, stories, and expertise about work life today.</h3>
  </header>
  <div id="consenthub_error_msg"></div>
  <div class="form-body">
    <label class="sr-only" for="consenthub_email">Email<span class="gfield_required">*</span></label>
    <div class="form-input-container form-input-container-email">
      <input name="consenthub_email" id="consenthub_email" type="text" value="" class="large" tabindex="5" placeholder="Email Address" aria-required="true" aria-invalid="false">
    </div>
  </div>
  <div class="form-footer">
    <input type="hidden" id="consenthub_key" value="atlassian.atlassianBlog">
    <input type="hidden" id="consenthub_success_msg" value="We know your inbox is protected space, so we promise to send only the good stuff, twice a month.">
    <input type="submit" id="consenthub_form_submit" class="button button__primary--yellow" value="Subscribe" tabindex="6">
  </div>
</form>

Text Content

Cookie Notice

This site uses cookies to improve your browsing experience, perform analytics
and research, and conduct advertising. To change your preferences, click Cookie
Settings. Otherwise, clicking on the the website, closing the banner, or
clicking Accept all Cookies indicates you agree to our use of cookies on your
device. Atlassian Cookies and Tracking Notice


Close
Accept all Cookies
Cookie Settings


 * Your Privacy

 * Strictly Necessary Cookies

 * Performance and Analytics Cookies

 * Functional Cookies

 * Targeting Cookies

 * Atlassian Cookies and Tracking Notice

Privacy Preference Centre

Active

Always Active



Save Settings

Allow All

Skip to main content

Atlassian

 * Work Life
   
 * Products & news
   
 * Team Playbook
   
 * Community
   

More from Atlassian
Products & news
 * Products
    * Jira Software
    * Jira Work Management
    * Jira Service Management
    * Confluence
    * Bitbucket
    * Apps
    * Atlassian Access
    * Halp
    * Opsgenie
    * Jira Align
    * Statuspage
    * Crowd
    * Bamboo
    * Fisheye
    * Crucible
    * Sourcetree
   
   
 * Topics
    * Agile
    * Company News
    * Continuous Delivery
    * DevOps
    * Enterprise
    * Git
    * Inside Atlassian
    * IT Service Management
    * Work Management

 * Subscribe

Search
Primary Menu
Search in https://www.atlassian.com/blog/
Search
 * Products
    * All Products
    * Access
    * Apps
    * Bamboo
    * Bitbucket
    * Confluence
    * Crowd
    * Crucible
    * Fisheye
    * Halp
    * Jira Align
    * Jira Core
    * Jira Service Management
    * Jira Software
    * Opsgenie
    * Platform
    * Portfolio for Jira
    * Sourcetree
    * Statuspage

 * Topics
    * Agile
    * Company News
    * Continuous Delivery
    * DevOps
    * Enterprise
    * Git
    * Inside Atlassian
    * IT Service Management
    * Platform

 * Blog

Published May 26, 2021 in Enterprise


THE STATE OF DATA SECURITY AND PROTECTION IN THE ENTERPRISE

With distributed work and digital transformation initiatives constantly
evolving, the question of data protection has never been more central to
ensuring enterprise success.

Published May 26, 2021 in Enterprise
Brian Keough

Product Marketing Manager

Subscribe to Work Life

Get stories about tech and teams in your inbox

Subscribe

The meteoric shift in the need for tools that can support a dispersed workforce
has had a significant impact on the way enterprises prioritize and strategize.
While data protection has always been non-negotiable, it has experienced a
resurgence as the adoption of hybrid workforces appear to be accelerating
advancements by months, or even years. Now, enterprise leaders and system admins
alike are faced with a challenge – is our data security strategy keeping pace
with an increasingly globalized workforce?


DATA PROTECTION IN A DISTRIBUTED WORKPLACE

Related Article

SECURITY IN A REMOTE WORLD

By Jacob Shepard In Enterprise

One of the primary challenges of managing a distributed workforce is data
governance, or safeguarding personally identifiable information (PII) for
customers and teams as systems and processes were performed entirely online.

There was suddenly the need for novel data processing activities at global scale
and corresponding measures that needed to be put in place to ensure that
applications adhered to a certain standard of security. The biggest challenge
came in how quickly this all unfurled; privacy impact assessments and data
protection impact assessments needed to be carried out under significant time
pressure. On top of all this, organizations lacked guidance and clarification on
how to interpret existing legislation in the crisis environment, and the Schrems
II ruling made the waters even murkier. All of a sudden, it became very
difficult to comply with GDPR if any data at all was being transferred outside
of confines of the EU. And unprecedented levels of remote work made the Schrems
II implications all that more complex. What was clear is that more industries
adopting distributed workspaces sparked foundational changes to the way
enterprises approach their data protection strategy and processes.

The most notable area of impact pertaining to enterprise software and Atlassian
products is device management – due to many newly minted remote employees would
be working from their personal devices, as well as a renewed focus on mobile
device/mobile app security.

WHAT TO KNOW ABOUT SCHREMS II

The Schrems II ruling was decided on by the Court of Justice of the European
Union (CJEU) in which they declared that the EU-US personal data transfer
framework, Privacy Shield, was no longer lawful. The ruling had an obvious
impact on EU-US personal data transfers, and organizations who previously
leveraged this mechanism now have to find alternative data transfer measures.


COMBATTING CYBER ATTACKS WITH ENTERPRISE USER PROVISIONING

Cyber attacks evolve just as quickly as the measures designed to prevent them,
and the surge of distributed employees created even more opportunities to take
advantage of new vulnerabilities. Inherently, mobility became a need for a
globally dispersed workplace and caused the network perimeter held by enterprise
organizations to expand significantly. Roughly 83% of organizations across the
world experienced phishing attacks against their remote workforce in 2021, a 46%
increase over 2020. method to consistently combat this at enterprise scale is
thorough attention to validating the devices being used to access the network—
user provisioning.

User provisioning not only reduces the manual work involved with granting
employees application access when they join the company or move to a new team,
but automated deprovisioning reduces the risk of information breaches by
removing access for those that leave the company (or a given team). And since
user accounts are automatically removed when people leave the company or a
group, costs are more tightly controlled.

HOW USER PROVISIONING WORKS

When a new employee joins the company, perhaps the engineering team, the IT
admin typically needs to give this new employee access to at least 10 different
apps that engineers typically use to do their jobs. With user provisioning set
up, the admin just needs to add the employee to the engineering group once, and
all the apps they need will be automatically provisioned for that user. If the
engineer leaves the company, the admin just needs to make one change in their
user directory, and access is revoked.  

If an employee switches teams – say, from engineering to product – they might
need access to a slightly different toolset. All the admin needs to do is make
one change in their user directory group settings, and access is revoked to the
tools they no longer need and granted to the new ones.

This ultimately allows admins to have maximum visibility across all endpoints
that are being used to interact with sensitive data, and makes it much easier at
enterprise scale to ensure that data is being protected.


UPPING THE ANTE ON MOBILE DEVICE MANAGEMENT

Related Article

ATLASSIAN MOBILE APPS ARE ENTERPRISE READY WITH MDM

By Matthew Ho In Platform

As mentioned before, mobile device and mobile app security have been equal
beneficiaries of enterprise focus when it comes to data security and protection.
We see this in three areas:

 1. Increased risk of data leaks: The significant rise in flexible
    work-from-home arrangements and use of bring-your-own-device (BYOD), has led
    to an increase in access points for end-users and subsequently higher risk
    of data leaks or unauthorized access. Corporate compliance: With enterprises
    increasingly moving to SaaS applications, there are typically predefined
    corporate policies for securely delivering these apps to employees over
    mobile devices. Support for mobile device management (MDM) and mobile app
    management (MAM) are often key requirements for meeting these corporate
    policies.
 2. Organizational control: Enterprise admins often have to manage thousands of
    mobile devices and need efficient ways to enforce security controls across
    them.

Enterprise organizations need their software to provide MDM and MAM capabilities
to enable admins to push predefined security configuration to mobile apps on
company managed devices through the given MDM device application. Security
controls should include things such as data export restriction, screenshot
disabling, clipboard management, device encryption, and compromised device
detection (to name a few). With more enterprise organizations reaping the
benefits of a distributed workforce, mobile device controls like these are the
table stakes.


WHAT DOES THIS MEAN FOR ENTERPRISE SOFTWARE SOLUTIONS?

Just like the policies designed to protect data, the security capabilities your
enterprise software provides should be evolving to accommodate for these needs.
Data protection is an area that Atlassian has invested heavily in — both in our
cloud and self-managed offerings — to ensure the trust and peace of mind that
our customers have come to expect from us. Click below to learn more about what
we’re doing specifically to address these challenges.

Visit our Compliance and Security Center
About this Article
Published May 26, 2021
About the Author

Brian Keough Product Marketing Manager

 * Facebook
 * Twitter
 * Linkedin
 * Pocket
 * Email

Related Content


MORE IN ENTERPRISE

Enterprise

ATLASSIAN AND ACCENTURE ARE TEAMING UP

Enterprise

CLOUD CYBERSECURITY RISES TO THE CHALLENGES OF LEGACY SYSTEMS

Jira Align

ATLASSIAN JOINS THE VALUE STREAM MANAGEMENT CONSORTIUM

Enterprise

DIGITAL TRANSFORMATION: GETTING EXECUTIVE LEADERSHIP ON BOARD

MORE COLLECTIONS

Collection


OPEN STORIES

With an Open mindset, teams can achieve great things. They can truly unleash
their potential. But what does Open really mean? It’s not about the type of
office or the perks of the job. It's not even about the tools you use - although
they help. Truly Open work is a frame of mind. It is the willingness to share
your point of view, and listen to the point of view of others.

View Collection
Collection


BRING YOUR FULL SELF TO WORK

Teams are made up of individuals, and they function best when each member is
happy, healthy, and productive. These stories will show you how to grow your
skills, make your own path, and become the best version of yourself.

View Collection
Collection


COMMUNICATION IN THE WORKPLACE

Crossed wires and missed connections - good communication among teams is
tablestakes for effective teamwork. Get best practices and sound advice on how
to create understanding and work together better.

View Collection
Collection


OPEN STORIES

With an Open mindset, teams can achieve great things. They can truly unleash
their potential. But what does Open really mean? It’s not about the type of
office or the perks of the job. It's not even about the tools you use - although
they help. Truly Open work is a frame of mind. It is the willingness to share
your point of view, and listen to the point of view of others.

View Collection
Collection


BRING YOUR FULL SELF TO WORK

Teams are made up of individuals, and they function best when each member is
happy, healthy, and productive. These stories will show you how to grow your
skills, make your own path, and become the best version of yourself.

View Collection
Collection


COMMUNICATION IN THE WORKPLACE

Crossed wires and missed connections - good communication among teams is
tablestakes for effective teamwork. Get best practices and sound advice on how
to create understanding and work together better.

View Collection
Collection


OPEN STORIES

With an Open mindset, teams can achieve great things. They can truly unleash
their potential. But what does Open really mean? It’s not about the type of
office or the perks of the job. It's not even about the tools you use - although
they help. Truly Open work is a frame of mind. It is the willingness to share
your point of view, and listen to the point of view of others.

View Collection
Collection


BRING YOUR FULL SELF TO WORK

Teams are made up of individuals, and they function best when each member is
happy, healthy, and productive. These stories will show you how to grow your
skills, make your own path, and become the best version of yourself.

View Collection
Collection


COMMUNICATION IN THE WORKPLACE

Crossed wires and missed connections - good communication among teams is
tablestakes for effective teamwork. Get best practices and sound advice on how
to create understanding and work together better.

View Collection
PreviousNext


THE STATE OF DATA SECURITY AND PROTECTION IN THE ENTERPRISE

 * Subscribe

 * Facebook
 * Twitter
 * Linkedin
 * Pocket
 * Email

Join over 50,000 working professionals


WORK LIFE

By Atlassian

Culture, tech, teams, and tips, delivered twice a month

Sign me up!
 * Atlassian.com
 * Terms of Use
 * Privacy Policy
 * Copyright © 2022 Atlassian

Subscribe to Work Life


ADVICE, STORIES, AND EXPERTISE ABOUT WORK LIFE TODAY.


Email*