Mobility Without Vulnerability: Secure and Enable Your Mobile
Users, Apps, and Devices David Clapp Intuitive
Slide 2
About Intuitive
Slide 3
Intuitive Simplify IT Symantec Technology Workforce Solutions
Automate | Simplify
Slide 4
How Intuitive Helps Customers Solution Lifecycle Methodology
Procurement Solution JumpStart Implementation Mentoring Services
Remote Support Services Solution Health Check
Slide 5
Seminar Series: Securing Data in the Era of Pervasive Computing
Your Mobile Users, Apps, and Devices (this session) Secure and
Enable On Any Device, Anywhere (web) User-Based Application and
Content Management Against Threats and Data Theft (local session)
Secure Your Mobile Workforces Devices With Identity and Trust
Management (web) Keep Your Data and Services Safe
Slide 6
Mobilize Business Re-imagine business processes Increase
profitability More competitive Mobilize Business Re-imagine
business processes Increase profitability More competitive Mobilize
Information Real-time data access & mobile collaboration Device
does not matter Data matters most Mobilize Information Real-time
data access & mobile collaboration Device does not matter Data
matters most Mobilize People User productivity and flexibility BYOD
Limited device choice Self Service Separate business & personal
data Mobilize People User productivity and flexibility BYOD Limited
device choice Self Service Separate business & personal data
The Mobility Evolution 6
Slide 7
Any Device Any Service Any Location By 2015, over 37% of the
global workforce will work outside the corporate firewall 60% of
devices are used for both work and personal purposes 35% allow
employees to procure apps through App Stores The Pervasive
Computing Promise
Slide 8
User Centric Device Centric Management in a Post-PC world
Location Software Patches Device User Apps Data Device Cloud
Services Location Mobile Devices Virtual Desktops User
Slide 9
Data Is The Key A device is just a piece of hardware. o Most
cost just a few hundred dollars o Most are very easy to replace o
Increasingly, the company doesnt own many devices on its network o
BYOD o Consultants / contractors But data can be worth millions o
Intellectual property loss o Legal liability o Standards compliance
o Business downtime
Slide 10
Secure Data, Not Devices Whats New in Symantec Data Loss
Prevention 50% email business documents using personal accounts 37%
use file-sharing apps like Dropbox without permission 41% download
intellectual property to personal mobile devices
Slide 11
Steps to securing your data Secure your services o Database o
Authentication / Directory o Applications o Collaboration o File
Services Secure your network o Firewalls o VPN o Wireless o
Encrypted communication Secure your storage o File encryption o
Drive encryption o Physical security Secure your identities o
Certificates o Tokens o Authentication standards Secure your
devices o Configuration o Encryption o Access
Slide 12
Symantec Mobile Information Management (MIM) capability enables
full policy management of apps and content at scale
Slide 13
Solution Overview: Mobile Management Suite App Management
Content ManagementDevice Management App Center Unified Management
Platform 13
Slide 14
Enterprise App Store Best-in-Class Enterprise App Store Easy
branding Consumer-style end-user portal Reviews, screenshots,
previews Access to all relevant apps o In-house, third party o
Native and web apps o External store apps Support for Popular
Mobile OS's o iOS, Android, Blackberry
Slide 15
Ability to apply relevant policies to content o Same policies
as for apps o Additional content policies such as versioning and
expiry Supports diverse content types o PDFs o Videos o ePub
documents o Forms o Others to follow Trusted Content Readers o
Wrapped using App Center Policy Manager Enterprise Content
Store
Slide 16
Same security as Sandboxing, But more flexible Symantec App
Center.IPA or.APK file with standard libraries App wrapped with App
Center libraries and policy controls ready for deployment 16
Slide 17
Business and Personal Apps and Data Co-exist Symantec App
Center 17
Slide 18
App Security Policies 18 Symantec App Center
Slide 19
Policy Manager Apply relevant corporate policies to apps and
content o User authentication o Encryption o Offline access o Doc
sharing o Etc... Automatic creation of containers for apps and
content No costly development cycles to add security o No SDK
required
Slide 20
Next Steps! [email protected] (262) 424-2061
[email protected] (952)452-6926 Assessment Workshop
Let Us Help You Map security to pervasive computing
challenges!