mobility without vulnerability: secure and enable your mobile users, apps, and devices david clapp...

Download Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive

If you can't read please download the document

Upload: buck-porter

Post on 24-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

  • Slide 1
  • Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp Intuitive
  • Slide 2
  • About Intuitive
  • Slide 3
  • Intuitive Simplify IT Symantec Technology Workforce Solutions Automate | Simplify
  • Slide 4
  • How Intuitive Helps Customers Solution Lifecycle Methodology Procurement Solution JumpStart Implementation Mentoring Services Remote Support Services Solution Health Check
  • Slide 5
  • Seminar Series: Securing Data in the Era of Pervasive Computing Your Mobile Users, Apps, and Devices (this session) Secure and Enable On Any Device, Anywhere (web) User-Based Application and Content Management Against Threats and Data Theft (local session) Secure Your Mobile Workforces Devices With Identity and Trust Management (web) Keep Your Data and Services Safe
  • Slide 6
  • Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize People User productivity and flexibility BYOD Limited device choice Self Service Separate business & personal data Mobilize People User productivity and flexibility BYOD Limited device choice Self Service Separate business & personal data The Mobility Evolution 6
  • Slide 7
  • Any Device Any Service Any Location By 2015, over 37% of the global workforce will work outside the corporate firewall 60% of devices are used for both work and personal purposes 35% allow employees to procure apps through App Stores The Pervasive Computing Promise
  • Slide 8
  • User Centric Device Centric Management in a Post-PC world Location Software Patches Device User Apps Data Device Cloud Services Location Mobile Devices Virtual Desktops User
  • Slide 9
  • Data Is The Key A device is just a piece of hardware. o Most cost just a few hundred dollars o Most are very easy to replace o Increasingly, the company doesnt own many devices on its network o BYOD o Consultants / contractors But data can be worth millions o Intellectual property loss o Legal liability o Standards compliance o Business downtime
  • Slide 10
  • Secure Data, Not Devices Whats New in Symantec Data Loss Prevention 50% email business documents using personal accounts 37% use file-sharing apps like Dropbox without permission 41% download intellectual property to personal mobile devices
  • Slide 11
  • Steps to securing your data Secure your services o Database o Authentication / Directory o Applications o Collaboration o File Services Secure your network o Firewalls o VPN o Wireless o Encrypted communication Secure your storage o File encryption o Drive encryption o Physical security Secure your identities o Certificates o Tokens o Authentication standards Secure your devices o Configuration o Encryption o Access
  • Slide 12
  • Symantec Mobile Information Management (MIM) capability enables full policy management of apps and content at scale
  • Slide 13
  • Solution Overview: Mobile Management Suite App Management Content ManagementDevice Management App Center Unified Management Platform 13
  • Slide 14
  • Enterprise App Store Best-in-Class Enterprise App Store Easy branding Consumer-style end-user portal Reviews, screenshots, previews Access to all relevant apps o In-house, third party o Native and web apps o External store apps Support for Popular Mobile OS's o iOS, Android, Blackberry
  • Slide 15
  • Ability to apply relevant policies to content o Same policies as for apps o Additional content policies such as versioning and expiry Supports diverse content types o PDFs o Videos o ePub documents o Forms o Others to follow Trusted Content Readers o Wrapped using App Center Policy Manager Enterprise Content Store
  • Slide 16
  • Same security as Sandboxing, But more flexible Symantec App Center.IPA or.APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 16
  • Slide 17
  • Business and Personal Apps and Data Co-exist Symantec App Center 17
  • Slide 18
  • App Security Policies 18 Symantec App Center
  • Slide 19
  • Policy Manager Apply relevant corporate policies to apps and content o User authentication o Encryption o Offline access o Doc sharing o Etc... Automatic creation of containers for apps and content No costly development cycles to add security o No SDK required
  • Slide 20
  • Next Steps! [email protected] (262) 424-2061 [email protected] (952)452-6926 Assessment Workshop Let Us Help You Map security to pervasive computing challenges!