www.atlassian.com
Open in
urlscan Pro
185.166.143.30
Public Scan
Submitted URL: https://links.eml.atlassian.com/dc/jJSklxE05Rx8OSS_2WGEXUUrXlMqYlugCuVBIFUqQXFzRhiohVpgA_LiF_g-bc5aUM2PpVWO7j2T90kYiN-2A3KewW2nP...
Effective URL: https://www.atlassian.com/blog/enterprise/state-of-data-security-protection?utm_source=nurture-email&utm_medium=email&utm_...
Submission: On November 02 via api from DE — Scanned from DE
Effective URL: https://www.atlassian.com/blog/enterprise/state-of-data-security-protection?utm_source=nurture-email&utm_medium=email&utm_...
Submission: On November 02 via api from DE — Scanned from DE
Form analysis
3 forms found in the DOM<form><span class="fieldset">
<p><input type="checkbox" value="check" id="chkMain" checked="checked" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
</span></form>
GET https://www.atlassian.com/blog/
<form class="search-form" action="https://www.atlassian.com/blog/" method="get">
<label class="screen-reader-text" for="search">Search in https://www.atlassian.com/blog/</label>
<div class="row">
<div class="col-10">
<input type="text" class="search-input" name="s" id="search" placeholder="Search for something" value="">
</div>
<div class="col-1 offset-1">
<button class="search-submit" type="submit" data-event-container="searchForm" data-event-component="button" data-label="Search" data-uuid="37eb57a28d5b7f62ec52c63351f74e55">
<i class="icon-search" aria-hidden="true"></i>
<span class="screen-reader-text">Search</span>
</button>
</div>
</div>
</form>
POST
<form method="post" enctype="multipart/form-data" id="consenthub-form">
<input type="hidden" name="action" value="atlassian_blog_process_consenthub">
<header class="form-heading">
<span class="subscribe-label">Subscribe to Work Life</span>
<h3 class="form-description">Advice, stories, and expertise about work life today.</h3>
</header>
<div id="consenthub_error_msg"></div>
<div class="form-body">
<label class="sr-only" for="consenthub_email">Email<span class="gfield_required">*</span></label>
<div class="form-input-container form-input-container-email">
<input name="consenthub_email" id="consenthub_email" type="text" value="" class="large" tabindex="5" placeholder="Email Address" aria-required="true" aria-invalid="false">
</div>
</div>
<div class="form-footer">
<input type="hidden" id="consenthub_key" value="atlassian.atlassianBlog">
<input type="hidden" id="consenthub_success_msg" value="We know your inbox is protected space, so we promise to send only the good stuff, twice a month.">
<input type="submit" id="consenthub_form_submit" class="button button__primary--yellow" value="Subscribe" tabindex="6">
</div>
</form>
Text Content
Cookie Notice This site uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. To change your preferences, click Cookie Settings. Otherwise, clicking on the the website, closing the banner, or clicking Accept all Cookies indicates you agree to our use of cookies on your device. Atlassian Cookies and Tracking Notice Close Accept all Cookies Cookie Settings * Your Privacy * Strictly Necessary Cookies * Performance and Analytics Cookies * Functional Cookies * Targeting Cookies * Atlassian Cookies and Tracking Notice Privacy Preference Centre Active Always Active Save Settings Allow All Skip to main content Atlassian * Work Life * Products & news * Team Playbook * Community More from Atlassian Products & news * Products * Jira Software * Jira Work Management * Jira Service Management * Confluence * Bitbucket * Apps * Atlassian Access * Halp * Opsgenie * Jira Align * Statuspage * Crowd * Bamboo * Fisheye * Crucible * Sourcetree * Topics * Agile * Company News * Continuous Delivery * DevOps * Enterprise * Git * Inside Atlassian * IT Service Management * Work Management * Subscribe Search Primary Menu Search in https://www.atlassian.com/blog/ Search * Products * All Products * Access * Apps * Bamboo * Bitbucket * Confluence * Crowd * Crucible * Fisheye * Halp * Jira Align * Jira Core * Jira Service Management * Jira Software * Opsgenie * Platform * Portfolio for Jira * Sourcetree * Statuspage * Topics * Agile * Company News * Continuous Delivery * DevOps * Enterprise * Git * Inside Atlassian * IT Service Management * Platform * Blog Published May 26, 2021 in Enterprise THE STATE OF DATA SECURITY AND PROTECTION IN THE ENTERPRISE With distributed work and digital transformation initiatives constantly evolving, the question of data protection has never been more central to ensuring enterprise success. Published May 26, 2021 in Enterprise Brian Keough Product Marketing Manager Subscribe to Work Life Get stories about tech and teams in your inbox Subscribe The meteoric shift in the need for tools that can support a dispersed workforce has had a significant impact on the way enterprises prioritize and strategize. While data protection has always been non-negotiable, it has experienced a resurgence as the adoption of hybrid workforces appear to be accelerating advancements by months, or even years. Now, enterprise leaders and system admins alike are faced with a challenge – is our data security strategy keeping pace with an increasingly globalized workforce? DATA PROTECTION IN A DISTRIBUTED WORKPLACE Related Article SECURITY IN A REMOTE WORLD By Jacob Shepard In Enterprise One of the primary challenges of managing a distributed workforce is data governance, or safeguarding personally identifiable information (PII) for customers and teams as systems and processes were performed entirely online. There was suddenly the need for novel data processing activities at global scale and corresponding measures that needed to be put in place to ensure that applications adhered to a certain standard of security. The biggest challenge came in how quickly this all unfurled; privacy impact assessments and data protection impact assessments needed to be carried out under significant time pressure. On top of all this, organizations lacked guidance and clarification on how to interpret existing legislation in the crisis environment, and the Schrems II ruling made the waters even murkier. All of a sudden, it became very difficult to comply with GDPR if any data at all was being transferred outside of confines of the EU. And unprecedented levels of remote work made the Schrems II implications all that more complex. What was clear is that more industries adopting distributed workspaces sparked foundational changes to the way enterprises approach their data protection strategy and processes. The most notable area of impact pertaining to enterprise software and Atlassian products is device management – due to many newly minted remote employees would be working from their personal devices, as well as a renewed focus on mobile device/mobile app security. WHAT TO KNOW ABOUT SCHREMS II The Schrems II ruling was decided on by the Court of Justice of the European Union (CJEU) in which they declared that the EU-US personal data transfer framework, Privacy Shield, was no longer lawful. The ruling had an obvious impact on EU-US personal data transfers, and organizations who previously leveraged this mechanism now have to find alternative data transfer measures. COMBATTING CYBER ATTACKS WITH ENTERPRISE USER PROVISIONING Cyber attacks evolve just as quickly as the measures designed to prevent them, and the surge of distributed employees created even more opportunities to take advantage of new vulnerabilities. Inherently, mobility became a need for a globally dispersed workplace and caused the network perimeter held by enterprise organizations to expand significantly. Roughly 83% of organizations across the world experienced phishing attacks against their remote workforce in 2021, a 46% increase over 2020. method to consistently combat this at enterprise scale is thorough attention to validating the devices being used to access the network— user provisioning. User provisioning not only reduces the manual work involved with granting employees application access when they join the company or move to a new team, but automated deprovisioning reduces the risk of information breaches by removing access for those that leave the company (or a given team). And since user accounts are automatically removed when people leave the company or a group, costs are more tightly controlled. HOW USER PROVISIONING WORKS When a new employee joins the company, perhaps the engineering team, the IT admin typically needs to give this new employee access to at least 10 different apps that engineers typically use to do their jobs. With user provisioning set up, the admin just needs to add the employee to the engineering group once, and all the apps they need will be automatically provisioned for that user. If the engineer leaves the company, the admin just needs to make one change in their user directory, and access is revoked. If an employee switches teams – say, from engineering to product – they might need access to a slightly different toolset. All the admin needs to do is make one change in their user directory group settings, and access is revoked to the tools they no longer need and granted to the new ones. This ultimately allows admins to have maximum visibility across all endpoints that are being used to interact with sensitive data, and makes it much easier at enterprise scale to ensure that data is being protected. UPPING THE ANTE ON MOBILE DEVICE MANAGEMENT Related Article ATLASSIAN MOBILE APPS ARE ENTERPRISE READY WITH MDM By Matthew Ho In Platform As mentioned before, mobile device and mobile app security have been equal beneficiaries of enterprise focus when it comes to data security and protection. We see this in three areas: 1. Increased risk of data leaks: The significant rise in flexible work-from-home arrangements and use of bring-your-own-device (BYOD), has led to an increase in access points for end-users and subsequently higher risk of data leaks or unauthorized access. Corporate compliance: With enterprises increasingly moving to SaaS applications, there are typically predefined corporate policies for securely delivering these apps to employees over mobile devices. Support for mobile device management (MDM) and mobile app management (MAM) are often key requirements for meeting these corporate policies. 2. Organizational control: Enterprise admins often have to manage thousands of mobile devices and need efficient ways to enforce security controls across them. Enterprise organizations need their software to provide MDM and MAM capabilities to enable admins to push predefined security configuration to mobile apps on company managed devices through the given MDM device application. Security controls should include things such as data export restriction, screenshot disabling, clipboard management, device encryption, and compromised device detection (to name a few). With more enterprise organizations reaping the benefits of a distributed workforce, mobile device controls like these are the table stakes. WHAT DOES THIS MEAN FOR ENTERPRISE SOFTWARE SOLUTIONS? Just like the policies designed to protect data, the security capabilities your enterprise software provides should be evolving to accommodate for these needs. Data protection is an area that Atlassian has invested heavily in — both in our cloud and self-managed offerings — to ensure the trust and peace of mind that our customers have come to expect from us. Click below to learn more about what we’re doing specifically to address these challenges. Visit our Compliance and Security Center About this Article Published May 26, 2021 About the Author Brian Keough Product Marketing Manager * Facebook * Twitter * Linkedin * Pocket * Email Related Content MORE IN ENTERPRISE Enterprise ATLASSIAN AND ACCENTURE ARE TEAMING UP Enterprise CLOUD CYBERSECURITY RISES TO THE CHALLENGES OF LEGACY SYSTEMS Jira Align ATLASSIAN JOINS THE VALUE STREAM MANAGEMENT CONSORTIUM Enterprise DIGITAL TRANSFORMATION: GETTING EXECUTIVE LEADERSHIP ON BOARD MORE COLLECTIONS Collection OPEN STORIES With an Open mindset, teams can achieve great things. They can truly unleash their potential. But what does Open really mean? It’s not about the type of office or the perks of the job. It's not even about the tools you use - although they help. Truly Open work is a frame of mind. It is the willingness to share your point of view, and listen to the point of view of others. View Collection Collection BRING YOUR FULL SELF TO WORK Teams are made up of individuals, and they function best when each member is happy, healthy, and productive. These stories will show you how to grow your skills, make your own path, and become the best version of yourself. View Collection Collection COMMUNICATION IN THE WORKPLACE Crossed wires and missed connections - good communication among teams is tablestakes for effective teamwork. Get best practices and sound advice on how to create understanding and work together better. View Collection Collection OPEN STORIES With an Open mindset, teams can achieve great things. They can truly unleash their potential. But what does Open really mean? It’s not about the type of office or the perks of the job. It's not even about the tools you use - although they help. Truly Open work is a frame of mind. It is the willingness to share your point of view, and listen to the point of view of others. View Collection Collection BRING YOUR FULL SELF TO WORK Teams are made up of individuals, and they function best when each member is happy, healthy, and productive. These stories will show you how to grow your skills, make your own path, and become the best version of yourself. View Collection Collection COMMUNICATION IN THE WORKPLACE Crossed wires and missed connections - good communication among teams is tablestakes for effective teamwork. Get best practices and sound advice on how to create understanding and work together better. View Collection Collection OPEN STORIES With an Open mindset, teams can achieve great things. They can truly unleash their potential. But what does Open really mean? It’s not about the type of office or the perks of the job. It's not even about the tools you use - although they help. Truly Open work is a frame of mind. It is the willingness to share your point of view, and listen to the point of view of others. View Collection Collection BRING YOUR FULL SELF TO WORK Teams are made up of individuals, and they function best when each member is happy, healthy, and productive. These stories will show you how to grow your skills, make your own path, and become the best version of yourself. View Collection Collection COMMUNICATION IN THE WORKPLACE Crossed wires and missed connections - good communication among teams is tablestakes for effective teamwork. Get best practices and sound advice on how to create understanding and work together better. View Collection PreviousNext THE STATE OF DATA SECURITY AND PROTECTION IN THE ENTERPRISE * Subscribe * Facebook * Twitter * Linkedin * Pocket * Email Join over 50,000 working professionals WORK LIFE By Atlassian Culture, tech, teams, and tips, delivered twice a month Sign me up! * Atlassian.com * Terms of Use * Privacy Policy * Copyright © 2022 Atlassian Subscribe to Work Life ADVICE, STORIES, AND EXPERTISE ABOUT WORK LIFE TODAY. Email*