mobility without vulnerability: secure and enable your mobile users, apps, and devices david clapp...
TRANSCRIPT
- Slide 1
- Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp Intuitive
- Slide 2
- About Intuitive
- Slide 3
- Intuitive Simplify IT Symantec Technology Workforce Solutions Automate | Simplify
- Slide 4
- How Intuitive Helps Customers Solution Lifecycle Methodology Procurement Solution JumpStart Implementation Mentoring Services Remote Support Services Solution Health Check
- Slide 5
- Seminar Series: Securing Data in the Era of Pervasive Computing Your Mobile Users, Apps, and Devices (this session) Secure and Enable On Any Device, Anywhere (web) User-Based Application and Content Management Against Threats and Data Theft (local session) Secure Your Mobile Workforces Devices With Identity and Trust Management (web) Keep Your Data and Services Safe
- Slide 6
- Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize People User productivity and flexibility BYOD Limited device choice Self Service Separate business & personal data Mobilize People User productivity and flexibility BYOD Limited device choice Self Service Separate business & personal data The Mobility Evolution 6
- Slide 7
- Any Device Any Service Any Location By 2015, over 37% of the global workforce will work outside the corporate firewall 60% of devices are used for both work and personal purposes 35% allow employees to procure apps through App Stores The Pervasive Computing Promise
- Slide 8
- User Centric Device Centric Management in a Post-PC world Location Software Patches Device User Apps Data Device Cloud Services Location Mobile Devices Virtual Desktops User
- Slide 9
- Data Is The Key A device is just a piece of hardware. o Most cost just a few hundred dollars o Most are very easy to replace o Increasingly, the company doesnt own many devices on its network o BYOD o Consultants / contractors But data can be worth millions o Intellectual property loss o Legal liability o Standards compliance o Business downtime
- Slide 10
- Secure Data, Not Devices Whats New in Symantec Data Loss Prevention 50% email business documents using personal accounts 37% use file-sharing apps like Dropbox without permission 41% download intellectual property to personal mobile devices
- Slide 11
- Steps to securing your data Secure your services o Database o Authentication / Directory o Applications o Collaboration o File Services Secure your network o Firewalls o VPN o Wireless o Encrypted communication Secure your storage o File encryption o Drive encryption o Physical security Secure your identities o Certificates o Tokens o Authentication standards Secure your devices o Configuration o Encryption o Access
- Slide 12
- Symantec Mobile Information Management (MIM) capability enables full policy management of apps and content at scale
- Slide 13
- Solution Overview: Mobile Management Suite App Management Content ManagementDevice Management App Center Unified Management Platform 13
- Slide 14
- Enterprise App Store Best-in-Class Enterprise App Store Easy branding Consumer-style end-user portal Reviews, screenshots, previews Access to all relevant apps o In-house, third party o Native and web apps o External store apps Support for Popular Mobile OS's o iOS, Android, Blackberry
- Slide 15
- Ability to apply relevant policies to content o Same policies as for apps o Additional content policies such as versioning and expiry Supports diverse content types o PDFs o Videos o ePub documents o Forms o Others to follow Trusted Content Readers o Wrapped using App Center Policy Manager Enterprise Content Store
- Slide 16
- Same security as Sandboxing, But more flexible Symantec App Center.IPA or.APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 16
- Slide 17
- Business and Personal Apps and Data Co-exist Symantec App Center 17
- Slide 18
- App Security Policies 18 Symantec App Center
- Slide 19
- Policy Manager Apply relevant corporate policies to apps and content o User authentication o Encryption o Offline access o Doc sharing o Etc... Automatic creation of containers for apps and content No costly development cycles to add security o No SDK required
- Slide 20
- Next Steps! [email protected] (262) 424-2061 [email protected] (952)452-6926 Assessment Workshop Let Us Help You Map security to pervasive computing challenges!