1 Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera
2 The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,
3 Learnings From 2014 Mobility Deployments Mobile Security External threats, data loss Mobile Data Optimization Data costs, analytics Mobile Cloud Identity Mgmt SSO, DLP for cloud apps Secure workspace & apps MAM MMS TEM, Governance, Support Device controls, content MDM EMM Basic building block 1st Generation Next Generation
4 Mobile Data Gateway: Unique Architecture App configures profile to route app & browser web traffic to the Cloud Gateway True Mobile First platform: cloud-based proxy Gateway in the path of the data Powerful, real-time mobile data analytics across browser & all apps, corp + cloud Configurable compression, intelligent data policy capabilities Advanced threat detection, data correlation Transparent, easy to deploy, no change to user. OTT
5 Risk Level Addressing Mobility Challenges Mobile Threats Rising Costs Lack of Insight Malicious & Insecure Apps, Phishing, Jailbreaks, Profiles, Exploits $$ 133% growth 6x ios spike $45Bn roaming 32% mobile share of Internet usage but a black box Secure Secure the device from external threats, protect data Extend Reduce data costs by 60% through compression and policy, avoid bill shock View Understand user behavior, enhance productivity, itemize costs bill-split
6 View: Powerful Analytics SSO via Anatole portal. Powerful drill-down analytics in to data costs and app productivity
7 Extend: Real-time Data Savings Compression Proprietary algorithms optimize content for mobile Configurable, adaptive compression for video, images & text Policy 50% of data potentially blockable when roaming High-bandwidth, personal or inappropriate: app downloads, YouTube, Instagram, pornography Domestic compliance Capping Real-time alerts & blocks Sophisticated whitelist of critical resources (e.g. ) Up to 30% Savings Combined up to 60% Savings
8 Mobile Threat Landscape Malware Vulnerabilities Jailbreaks Malicious Profiles OS Vulnerabilities Insecure Apps Browser Leaks Elevated privileges bypass OS protection Malicious configurations lead to full device access, all content sent to rogue destination Exploits of OS vulnerabilities have greater impact as OS update window is longer Unencrypted sensitive content sent in the clear - Apple does not verify app security Leaks of user login details unencrypted over web protocol Phishing Network Exploits User Activity Smartphone users 3x more likely to get phished small screen real estate and easier social engineering Man-in-the-middle attacks can intercept data and monitor device Frequent access of new URLs and Wifi hotspots increases risk of compromise. Infrequent updates of OS versions Higher Severity, Lower Volume Lower Severity, Higher Volume
9 Wandera Secure: Multi-Level Security 1. SmartWire detects insecure app exposing user credentials in the clear over unprotected network 2. HeartBeat identifies all current active users of insecure app 3. Wandera EMM Connect scans app and device inventory to identify all users of insecure app Traffic analysis & scanning - User & browser behavior - App attributes Dynamic device monitoring including app and network activity Consumes MobileIron API for inventory updates and push remediation policies Machine learning algorithms Third party resources Data set correlation 4. Admin alerted to company risk exposure. Remediation such as Detect and block Malware and Risks & Leaks quarantine via EMM Connect or real-time block via SmartWire.
10 Manage and Secure All Mobile Data, Not Just the Device EMM Enterprise Mobility Management Basic building block of enterprise mobility. Provides device-level management and security for corporate data at rest Mobile Device Management (MDM) Inventory / Asset Information Password enforcement & remote wipe Device configurations (E.g. , VPN, etc) Mobile Application Management (MAM) Secure workspace (PIM) and secure corp. apps Deploy and configure mobile apps MDG Mobile Data Gateway Manages data usage and protects against external threats. Security for all data in transit across apps and browser Mobile Data Optimization (MDO) Cloud-based compression Granular policy controls Analytics across all browser and apps including cloud apps (noncorp) which is 80% of the traffic Mobile Security Identify and remediate persistent threats such as leaky apps Block malware, phishing attacks and other network threats Wandera is a complementary solution to EMM without feature overlap. MDG integrates seamlessly with the key EMM products. 83% of Wandera s customers have an EMM in place
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
The Ultimate Guide to Enterprise Mobility Management v1 Table of Contents Executive Summary 3 Avoid fear and loathing in the era of enterprise mobility 3 Why prioritize the user experience? 3 Accelerate
The Future of Mobile Enterprise Security Gearing Up for Ubiquitous Computing August 2014 795 Folsom Street, 1 st Floor San Francisco, CA 94107 Tel.: 415.685.3392 Fax: 415.373.3892 Contents Introduction...
1 MOBILITY IN FINANCIAL SERVICES A Checklist Towards Regulatory Compliance Whitepaper Whitepaper Brochure 2 A Checklist Towards Regulatory Compliance Like business leaders in every industry, decision makers
What ios 7 Means for the Enterprise Introduction 3 1. ios 7 Mobile Application Management Enhancements 4 Enhancements to Accelerate Enterprise Application Development and Use 5 Enterprise Application Single
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
SecuRity technologies for mobile and Byod. Executive summary 1.0 the mobile challenges The volume of new malware that is specifically targeting mobile devices is growing at an almost 1.1 increasing threat
Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure A call to action for IT and security professionals Against a backdrop of unprecedented growth in smartphones
G00250008 Critical Capabilities for Mobile Device Management Software Published: 23 May 2013 Analyst(s): Phillip Redman The critical capabilities for MDM take a deep look at the top technologies in MDM
G00230106 Critical Capabilities for Mobile Device Management Published: 8 August 2012 Analyst(s): Monica Basso, Phillip Redman Mobile device management offerings are expanding from traditional configurations,
Mike Davis Risk Management / Cyber Security Consultant, MSEE, CISSP (Virtual CISO) Mike.Davis.SD@gmail.com Cloud & Mobile Security What really matters? -- Clarifying the fog of cyber security UoP CyberCon
Keep Your Enemies Closer: Three Steps to Bring Mobile Devices into Your Security Infrastructure A Call to Action for IT and Security Professionals Introduction Newer mobile computing models are pushing
Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy Mobile Device Management Learn the basics to build your MDM Strategy Poll Question #1 3 of 39
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
WHITE PAPER Mobile Device Security Emerging Threats, Essential Strategies Key Capabilities for Safeguarding Mobile Devices and Corporate Assets Copyright 2011, Juniper Networks, Inc. 1 Table of Contents
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract This paper highlights what is the need of Enterprise Mobility Management
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
Enterprise Mobility Management Different Devices & Platforms Shared BYOD Access and Control Corporate-owned Your Mobile Environment is Becoming Complex Smartphones Corporate Resources Email Infrastructure
Oracle Access Management Complete, Integrated, Scalable Access Management Solution O R A C L E W H I T E P A P E R M A Y 2 0 1 5 Disclaimer The following is intended to outline our general product direction.