Управление мобильными платформами: от развертывания и конфигурирования до антивирусной защиты подход Symantec. Михаил Савушкин
|
|
- Britton Wiggins
- 8 years ago
- Views:
Transcription
1 Управление мобильными платформами: от развертывания и конфигурирования до антивирусной защиты подход Symantec Михаил Савушкин
2 Управляемые Не управляемые BYOD BYOD Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Device Company Controls Personal Device Корпоративные Личные Embracing Bring-Your-Own-Device 2
3 Symantec Mobile Solutions User & App Access Mgmt. App & Data Device Threat Secure File Sharing Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile security threat detection and removal Enterprise-grade file sharing and collaboration in the cloud Symantec Mobile Portfolio Overview 3
4 Symantec Mobile Solutions User & App Access Mgmt. App & Data Device Threat Secure File Sharing Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile security threat detection and removal Enterprise-grade file sharing and collaboration in the cloud O 3 Nukona (App Wrapping) Mobile For SMP & SCCM Mobile Security (Android & Windows Mobile) Zone for Enterprise Symantec Mobile Portfolio Overview 4
5 Symantec O3: Единая точка доступа O 3 Identity & Access Control Layer Control Cloud Information Security Layer Security Privat Private e Cloud Cloud Cloud Information Layer Compliance Увеличение встроенных политик безопасности для публичных и частных облаков при доступе к ним с мобильных устройств Symantec Mobile Portfolio Overview 5
6 Symantec Mobile Solutions User & App Access Mgmt. App & Data Device Threat Secure File Sharing Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile security threat detection and removal Enterprise-grade file sharing and collaboration in the cloud O 3 Nukona (App Wrapping) Mobile For SMP & SCCM Mobile Security (Android & Windows Mobile) Zone for Enterprise Symantec Mobile Portfolio Overview 6
7 Мобильные приложения & Защита данных SYMANTEC APP CENTER Symantec Mobile Portfolio Overview Распространение приложений Аутентификация пользователей Контроль Copy & Paste Пофайловое шифрование Удаленное удаление данных/приложений ios & Android 7
8 Advancing Mobile Application Comprehensive App Wrapping Tech App Store Магазин приложений для внутренних или публичных приложений App Policy Защита данных с помощью шифрования, удаленного контроля, разделения доступа Content Center Защита и распространение контента для мобильных устройств Возможно как сервис и как полноценная установка Symantec Mobile Portfolio Overview 8
9 Как это работает: Policy.IPA or.apk file с стандартными библиотеками Приложение упаковывается с библиотеками AppCenter и готово к применению политик Symantec Mobile Portfolio Overview 9
10 Консоль магазина приложений Symantec Mobile Portfolio Overview 10
11 Symantec Mobile Solutions User & App Access Mgmt. App & Data Device Threat Secure File Sharing Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile security threat detection and removal Enterprise-grade file sharing and collaboration in the cloud O 3 Nukona (App Wrapping) Mobile For SMP & SCCM Mobile Security (Android & Windows Mobile) Zone for Enterprise Symantec Mobile Portfolio Overview 11
12 Symantec Mobile Solutions Агенты, Security & Identity Управление Portal SMP (Altiris) / SCCM Symantec Mobile Portfolio Overview 12
13 Mobile Comprehensive Enterprise Mobility - MDM Enable Activate enterprise access, apps and data easily and automatically > ios, Android, Windows Phone Win Mobile, BB Secure Protect enterprise data and infrastructure from attack and theft > Prevent JB, ensure passcodes, Manage Control inventory and configuration with massive scalability > Integrated via SCCM / SMP (Altiris) Symantec Mobile Portfolio Overview 13
14 DLP for Mobile Corporate Network Mobile configuration and enforcement (7.1 SP1) Network Traffic Web Top Apps Proxy VPN at all times Internet Tablet Direct access to Internet Symantec DLP Mobile Server Key Benefits Reduce risk of data loss from ipads, assuming data WILL be on device Supports consumerization - coverage for personal and corporate use cases Lay groundwork for future tablet DLP solution enhancements Symantec Mobile Portfolio Overview 14
15 Symantec Mobile Solutions User & App Access Mgmt. App & Data Device Threat Secure File Sharing Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile security threat detection and removal Enterprise-grade file sharing and collaboration in the cloud O 3 Nukona (App Wrapping) Mobile For SMP & SCCM Mobile Security (Android & Windows Mobile) Zone for Enterprise Symantec Mobile Portfolio Overview 15
16 Mobile Security for Android Android Security Agent Увеличение безопасностив дополнение к Windows Mobile и Symbian security Репутационный анализ Ручное/Запланированное антивирусное сканирование Черные,белые списки приложений Защита от удаленичя Базовые функции безопасности locate/lock/passcode reset/wipe и функционал защиты от воров управляемые централизованно Единая консоль управления (интегрированная с MDM) Mobile Security for WP7/8 or ios (under consideration for 2013) Symantec Mobile Portfolio Overview 17
17 Symantec Mobile Solutions User & App Access Mgmt. App & Data Device Threat Secure File Sharing Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile security threat detection and removal Enterprise-grade file sharing and collaboration in the cloud O 3 Nukona (App Wrapping) Mobile For SMP & SCCM Mobile Security (Android & Windows Mobile) Zone for Enterprise Symantec Mobile Portfolio Overview 18
18 Доступ к файлам не зависимо от платформы: web, Windows, ios, android Symantec Confidential - NDA Required 19
19 Keep home and work content separate but integrated 20
20 ИТОГО Symantec Mobile Portfolio Overview 21
21 Bringing, Security & Identify Together in a Post-PC Era Combining MDM, mobile app management and identity allows Symantec to offer a comprehensive enterprise mobility solution Device Mobile : Centralized Console for MDM SCCM: MDM for Microsoft System Center Mobile Security: App insight for Android Trad. Security: SEP, DLP, Backup etc App/Data App Center: Centralized policy and security wrapping for Apple, Android, BB and WP7/8 Zones: Secure data sharing and collaboration O3: Federated Identity Enterprise Mobility Identity O3: Federated Identity mpki: certificate integration and deployment Symantec Mobile Portfolio Overview 22
22 Thank you! Михаил Савушкин Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Mobile Portfolio Overview
How to Create and Secure Your Mobile Infrastructure. Session EM B27
How to Create and Secure Your Mobile Infrastructure Session EM B27 Mike Littleton Manager, EndPoint Infrastructure Kelly Services John Engels Principal Product Manager, Symantec Enterprise Mobility Typical
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationMobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
More informationManaging Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management
Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor
More informationMobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationRisk and threats everywhere, all the time
Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationSymantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationDeploying Management and Security Agents to Mobile Devices
Deploying Management and Security Agents to Mobile Devices John Engels Adam Licata Scott Jareo Principal Product Manager Sales Engineer Field Enable. Symantec ITS Partners Symantec EM B23 Deploying Mgmt
More informationIf you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More information#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
More informationThe Endpoint Evolution Mobility
The Endpoint Evolution Mobility Driving Productivity Without Compromising Protection Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management The Endpoint Evolution Mobility
More informationComponents. Key features
BlackBerry Enterprise Service 10 What is it? BlackBerry Enterprise Service 10 helps you manage BlackBerry smartphones and BlackBerry PlayBook tablets, as well as ios devices and Android devices, all from
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSamsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics
Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationThe User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More informationCA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationCommunity Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager justrong@novell.com
Community Chat MDM Meets Endpoint Mgmt Justin Strong Sr. Product Marketing Manager justrong@novell.com Bryce Romney Product Manager bromney@novell.com The next 45 minutes or so Why is MDM so important
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationWalter Bogorad, Lead Architect Aman Manik, Principal Product Manager. Secure File Sharing Using Norton Zone powered by Symantec
Secure File Sharing Using Norton Zone powered by Symantec Walter Bogorad, Lead Architect Aman Manik, Principal Product Manager Secure File Sharing Using Norton Zone powered by Symantec 1 Agenda Norton
More informationMDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationIC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption
IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption Jeremy Tully, Douglas Rivers, Matt Dawdy Technical Field Enablement 1 Is your Enterprise Data secure in the
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationIBM Cognos Mobile Overview
IBM Cognos Business Intelligence 10.2.1 IBM Cognos Mobile Overview Agenda IBM Cognos Mobile Overview Analysis on Mobile Security + Configuration Deploying Good Technology Latest Updates IBM Confidential
More informationAchieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert
Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in
More information6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
More informationNew Features: What s new in Windows Intune?
New Features: What s new in Windows Intune? Contents Release Overview... 2 Unified Enterprise Management Solution... 2 User-based Licensing... 5 Extending Client Support... 5 Understanding Mobile Device
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationmobilecho: 5-Step Deployment Plan for Mobile File Management
mobilecho: 5-Step Deployment Plan for Mobile File Management Overview GroupLogic s mobilecho is the industry s first and only secure Mobile File Management (MFM) solution for ipads. mobilecho enables IT
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationMobility Manager 9.5. Installation Guide
Mobility Manager 9.5 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationSAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015
SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any
More informationAbila Nonprofit Online. Connection Guide
Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationBENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
More informationManaging BlackBerry Enterprise Service 10 version 10.2
Managing BlackBerry Enterprise Service 10 version 10.2 Course details Course code 726-08882-123 Approximate duration Labs 3 days Labs are included in this course Course overview This course explains how
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationHow to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationManage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation
SAP Brief SAP Afaria, Cloud Edition Objectives Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation Low-cost investment yields high returns Low-cost investment yields
More informationWhat s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?
What s New with Enterprise Vault 11? 1 Disclaimer Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and
More informationApple Configurator MDM Site - Review
Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?
More informationINFORMATION PROTECTION
INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary
More informationApple has been popularized by businesses and their employees as they continue to utilize
Apple Volume Purchase Program Apple has been popularized by businesses and their employees as they continue to utilize mobile devices on the job. In recent reports, Apple won about 8% of global business
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationThe Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
More informationBetter Together: Microsoft Office 365 & Symantec Office 365
#SymVisionEmea #SymVisionEmea Better Together: Microsoft Office 365 & Symantec Office 365 & Symantec Mike Smart Product Marketing Information SECURITY David Moseley Product Marketing Information MANAGEMENT
More informationData Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense
Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense Consumerization of IT Fast & disruptive Enables business Increases productivity It s Mine! THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS
More informationBYOD: No Longer "If" but "How" Justin Martin Regional Product Manager Greg Slade Director Product Management
Justin Martin Regional Product Manager Greg Slade Director Product Management Your Presenters Part of the UP&P User Protection and Productivity Group Customer advocates for the Enterprise Mobility Product
More informationTRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationLot 3 Service Specification MANAGED MOBILE SERVICE
Lot 3 Service Specification MANAGED MOBILE SERVICE Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED MOBILE SERVICE Fujitsu Managed Mobile is a global service providing lifecycle management services
More informationMAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationMobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
More informationEmail Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment
Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment Phil Walters Principal Learning Consultant, Technical Field Enablement Email Security.cloud
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationWorkplace-as-a-Service BYOD Management
For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationCorporate Presentation 2016
Corporate Presentation 2016 2 AGENDA About SPAMINA Cool Vendor 2016 The Security Challenge 3 Concerns over data protection and confidentiality Why Spamina? SPAMINA Platform 4 Parla Secure Cloud Email ParlaMI
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationMobility Security and. Nigel Hawthorn EMEA Marketing Director
Mobility Security and Nigel Hawthorn EMEA Marketing Director Evolution of Personal Computing The PC/Web Era The The Mobile Post-PC First Era Era 2 MobileIron Confidential SOURCES: Asymco.com, Public Filings,
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009
ITIL and Altiris ServiceDesk Joseph Carson, Sr. Product Manager October 21, 2009 Agenda Altiris Portfolio Overview IT Lifecycle Management Service Framework Establish the Face of IT to the Business Automate
More informationProtect Your Mobile World
Protect Your Mobile World Doward Wilkinson Mobile Strategic Trend s May, 2012 1 It is a Fact We Live in a Mobile World People Devices Apps Access Payments Commerc Market e Opportuni At Risk ty 2 In the
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More information5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet
5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet Sr. Sales Engineer 1 What we ll talk about What is BYOD? Mobile Revolution, the Post PC era? BYOD: What to consider 1. Users 2. Devices
More informationEmbracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More information