Pouring Cement on Mobile Devices

Preview:

DESCRIPTION

A light and insightful look at mobile device security. When did it become acceptable to lock down or wipe a personal mobile device? In the age of user empowerment and BYOD, these practices are no longer being tolerated by the savvy employee.Read more...So what are the implications of taking a device lockdown approach, and what are some of the alternatives? Well tell you how a company can secure its data but maintain the privacy and integrity of its employees.

Citation preview

MDM. Cemented Security?

What do you see?

Camera

Internet in my hand

Tricorder

Web Browser

GPS

HDTV

CommunityCommunication

Collaboration

Opportunity?

Crisis?

Crisitunit

Flexibility Security

Risks Are

How do we secure these things?

Protect the castle75% of employees work outside the “walls”

Ah Ha! What if...

Cement Security

Mobile Device Management

+

DataAppOS

DeviceNetworkLocation

The MDM way

MDM

The MDM way

Device is secure.

um... did I mention the device is secure?

The Good

The not so good• Privacy concerns

• Can’t mix personal & business Apps & data

• Policies are draconian

• Forced to use 2 devices

• Inherited liability

• One-size-fits-all security model

• Complete device wipe upon threat detection

What if we used the MDM

approach to

using old solutions to solve new

(doesn’t always work)

DataAppOS

DeviceNetworkLocation

A better way

MAM

A better way

Every time a phone gets MDM’d, god kills a kitten

Recommended