Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp...
Preview:
Citation preview
- Slide 1
- Mobility Without Vulnerability: Secure and Enable Your Mobile
Users, Apps, and Devices David Clapp Intuitive
- Slide 2
- About Intuitive
- Slide 3
- Intuitive Simplify IT Symantec Technology Workforce Solutions
Automate | Simplify
- Slide 4
- How Intuitive Helps Customers Solution Lifecycle Methodology
Procurement Solution JumpStart Implementation Mentoring Services
Remote Support Services Solution Health Check
- Slide 5
- Seminar Series: Securing Data in the Era of Pervasive Computing
Your Mobile Users, Apps, and Devices (this session) Secure and
Enable On Any Device, Anywhere (web) User-Based Application and
Content Management Against Threats and Data Theft (local session)
Secure Your Mobile Workforces Devices With Identity and Trust
Management (web) Keep Your Data and Services Safe
- Slide 6
- Mobilize Business Re-imagine business processes Increase
profitability More competitive Mobilize Business Re-imagine
business processes Increase profitability More competitive Mobilize
Information Real-time data access & mobile collaboration Device
does not matter Data matters most Mobilize Information Real-time
data access & mobile collaboration Device does not matter Data
matters most Mobilize People User productivity and flexibility BYOD
Limited device choice Self Service Separate business & personal
data Mobilize People User productivity and flexibility BYOD Limited
device choice Self Service Separate business & personal data
The Mobility Evolution 6
- Slide 7
- Any Device Any Service Any Location By 2015, over 37% of the
global workforce will work outside the corporate firewall 60% of
devices are used for both work and personal purposes 35% allow
employees to procure apps through App Stores The Pervasive
Computing Promise
- Slide 8
- User Centric Device Centric Management in a Post-PC world
Location Software Patches Device User Apps Data Device Cloud
Services Location Mobile Devices Virtual Desktops User
- Slide 9
- Data Is The Key A device is just a piece of hardware. o Most
cost just a few hundred dollars o Most are very easy to replace o
Increasingly, the company doesnt own many devices on its network o
BYOD o Consultants / contractors But data can be worth millions o
Intellectual property loss o Legal liability o Standards compliance
o Business downtime
- Slide 10
- Secure Data, Not Devices Whats New in Symantec Data Loss
Prevention 50% email business documents using personal accounts 37%
use file-sharing apps like Dropbox without permission 41% download
intellectual property to personal mobile devices
- Slide 11
- Steps to securing your data Secure your services o Database o
Authentication / Directory o Applications o Collaboration o File
Services Secure your network o Firewalls o VPN o Wireless o
Encrypted communication Secure your storage o File encryption o
Drive encryption o Physical security Secure your identities o
Certificates o Tokens o Authentication standards Secure your
devices o Configuration o Encryption o Access
- Slide 12
- Symantec Mobile Information Management (MIM) capability enables
full policy management of apps and content at scale
- Slide 13
- Solution Overview: Mobile Management Suite App Management
Content ManagementDevice Management App Center Unified Management
Platform 13
- Slide 14
- Enterprise App Store Best-in-Class Enterprise App Store Easy
branding Consumer-style end-user portal Reviews, screenshots,
previews Access to all relevant apps o In-house, third party o
Native and web apps o External store apps Support for Popular
Mobile OS's o iOS, Android, Blackberry
- Slide 15
- Ability to apply relevant policies to content o Same policies
as for apps o Additional content policies such as versioning and
expiry Supports diverse content types o PDFs o Videos o ePub
documents o Forms o Others to follow Trusted Content Readers o
Wrapped using App Center Policy Manager Enterprise Content
Store
- Slide 16
- Same security as Sandboxing, But more flexible Symantec App
Center.IPA or.APK file with standard libraries App wrapped with App
Center libraries and policy controls ready for deployment 16
- Slide 17
- Business and Personal Apps and Data Co-exist Symantec App
Center 17
- Slide 18
- App Security Policies 18 Symantec App Center
- Slide 19
- Policy Manager Apply relevant corporate policies to apps and
content o User authentication o Encryption o Offline access o Doc
sharing o Etc... Automatic creation of containers for apps and
content No costly development cycles to add security o No SDK
required
- Slide 20
- Next Steps! David.Clapp@IntuitiveTech.com (262) 424-2061
Todd.Hambrecht@IntuitiveTech.com (952)452-6926 Assessment Workshop
Let Us Help You Map security to pervasive computing
challenges!