our mobile addiction what could possibly go wrong? · confidential ©2019 vmware, inc. 4 saas and...

Post on 30-Jul-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Our Mobile Addiction what could possibly go wrong?

Jon BakerStaff Solutions Engineer - VMware EUC

November 20, 2019

Confidential │ ©2019 VMware, Inc. 2

In the beginning

First, there were apps.

Then we added a desktop to access them from the office desk.

Then a laptop to work on them from home (offline)

Enter the Internet, and we could connect to the office from anywhere.

But we needed to protect our apps, so we added a firewall.

Firewalls became the control point for access to all of our apps and networks.

Trust wasn’t really a thing

Laptop

Apps

Desktop

FirewallInternet

Confidential │ ©2019 VMware, Inc. 3

Then things got complicated

But we still wanted to work from anywhere…

So we came up with VPNs, which stretched the office network to our laptops.

But that gave people too much access, so we added DMZs and more firewalls.

And this worked for a long time.

Until SaaS apps showed up. And they didn’t run inside our network.

The Internet created new challenges

Internet AppsFirewall

DesktopLaptop

VPN FirewallDMZ

SaaS Apps

Confidential │ ©2019 VMware, Inc. 4

SaaS and mobile hit the scene

Now add smart phones and tablets and watches and…

Some of us tried to control SaaS access by making everything look like the office.

This let us keep our control point at the firewall, but it forced everyone to come through the office network first.

We had to track a lot more things in a lot more places

Internet AppsFirewall

DesktopLaptop

VPN FirewallDMZ

SaaS Apps Devices

Confidential │ ©2019 VMware, Inc. 5

The perimeter went global

What if we could manage control from any device?

What if we could dissolve the perimeter firewall and treat external access the same way we treat internal access?

What if we could provide certificate-based authentication and single sign-on from mobile devices as well as your PC or Mac?

What we need is a new control point.

Different times call for different measures

Internet AppsFirewall

Laptop

VPN FirewallDMZ

SaaS Apps Devices DesktopEMM/UEM

Confidential │ ©2019 VMware, Inc. 6

Confidential │ ©2019 VMware, Inc. 7

End-to-End SecurityDigital Workspace Security

Unified Endpoint Management Desktop and App Virtualization

API Framework

DLPEncryptionAnalytics

Aggregated View

Apps

IntelligenceDecision Engine | Notifications | Remediation | Automation | Analytics

Insights & Dashboards

RISKS INSIGHTS

• Risk Score• Patch Levels• Apps Deployed• Device Health Score• License Status

COST SECURITY PRODUCTIVITY

Endpoints

Single Sign-On & Multi-Factor Authentication

Secure Productivity AppsSelf Service

Unified CatalogCloud Apps

Conditional / Contextual Access

Trust Network

Mobile Threat Defense

Cloud Access Security Broker

Endpoint Detection and Response

Identity Management

IdentityEmployees

SD Data Center

AnalyticsAggregated View

Presenter
Presentation Notes
To wrap up, Workspace ONE Trust Network gives organizations a comprehensive and modern enterprise security approach to secure their employees, apps, endpoints and networks. With capabilities to protect, detect and remediate modern-day threats, Workspace ONE Trust Network augments the inherent security capabilities of the intelligence-driven Workspace ONE platform with a rich ecosystem of integrated partner solutions to deliver continuous risk monitoring and rapid mitigation response across the digital workspace.

Confidential │ ©2019 VMware, Inc. 8

So how do we secure things today…

Confidential │ ©2019 VMware, Inc. 9

“Attackers can use that access to trick vulnerable phones into giving up their unique identifiers, such as their IMEI and IMSI numbers, downgrade a target's connection in order to intercept phone calls, forward calls to another phone or block all phone calls and internet access altogether.”-Techcruch

Facebook App Using iPhone Camera Without User's Knowledge-mactrast

Confidential │ ©2019 VMware, Inc. 10

Confidential │ ©2019 VMware, Inc. 11

Confidential │ ©2019 VMware, Inc. 12

Confidential │ ©2019 VMware, Inc. 13

Confidential │ ©2019 VMware, Inc. 14

Who’s Listening…

Confidential │ ©2019 VMware, Inc. 15

Anyone Distracted Yet?

Questions

top related