Big Data Driven Security for BYOD. Photo by Marc_Smith - Creative Commons Attribution License

Size: px
Start display at page:

Download "Big Data Driven Security for BYOD. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01"

Transcription

1 Big Data Driven Security for BYOD Photo by Marc_Smith - Creative Commons Attribution License Created with Haiku Deck

2 TABLE OF CONTENTS Securing Data in Motion Securing Data at Rest Big Data Driven Security Conclusion

3 WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop, Citrix) (Founding Engineer, VMware View) Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

4 WORKSPOT LEVERAGES EXISTING INFRASTRUCTURE Workspot leverages your existing VPN appliance Supports: Cisco, Juniper, F5, and SonicWall Supports the authentication mechanism AD+RSA Supports all internal SSO providers including CA Siteminder, and Oracle IdP Supports cloud identity integration Okta, Ping Identity, and SAML 2.0 vendors Terminal Server VPNSSO Windows Apps Web Apps AD CIFS SharePoint Native Apps

5 WORKSPOT IS 100% CLOUD Pilot in Minutes Multi-tenant Architecture Always up-to-date 6-8 updates annually On-demand scalability Power of AWS

6 CONTROL VS. DATA SEPARATION Workspot Control has been architected to be a control plane. When the user is performing workflows on the device using Workspot, all the data flows back and forth directly between the client and the business applications (e.g., Exchange, SharePoint, Salesforce.com). If the applications are behind the firewall, then they go back to the corporate network. If the applications are external, then the traffic directly goes to the external application. Separation between control and data planes is very critical for a number of reasons: Security: Data flows directly between the client and the applications; it does not flow through our control service Availability: Since Workspot is not in the data path, the availability of applications is independent of the availability of our service Performance: Since we are not in the data path, there is nothing to impede the end user experience

7 SECURE, CROSS-PLATFORM ARCHITECTURE Unified Workspace Web Apps HTML(5) Engine Encrypted File System (AES-256) & built-in document viewers for common formats Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client Built-in VPN for Cisco, Juniper, F5, and SonicWall SSO VPN ios/android/windows/macos Built-in Single Sign On for NTLM/Kerberos/ CA Siteminder/ Oracle idp/saml 2.0

8 WORKSPOT PROTECTS DATA IN MOTION Web Apps HTML(5) Engine Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client SSO VPN ios/android/windows/macos Full L4-7 Control Custom HTTP stack with OpenSSL VPN termination to any SSLVPN appliance We support Cisco, Juniper, SonicWall, and F5 Workspot-level VPN only Workspot is on the corporate network Control over Blacklist/ whitelist URL

9 WORKSPOT PROTECTS DATA AT REST Secure container on an unmanaged device All enterprise assets fully encrypted in memory before touching the file system Multi-level encryption Each file is encrypted using its own key Each key is encrypted using a master key Master key is encrypted using a PIN which is not stored FIPS validated AES-256 Web Apps HTML(5) Engine Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client SSO VPN ios/android/windows/macos

10 DATA RETENTION POLICY We store the following information in Workspot Control: Configuration: We store configuration information about the VPN, e.g., public URL address, whether it uses RSA or not. User Configuration: First Name, Last Name, Address, etc. Application Configuration: Application URLs, whether or not it is behind the firewall, etc. Performance Data: For each network access, we store the amount of time it took to fetch a response from the application (e.g. SharePoint), the device used (e.g. ipad3), the network used (e.g., AT&T), and the location (e.g., California). Activity Data: We track different kinds of activity on the device, e.g., Open/ Close Workspot, Open/Close Application (e.g., SAP), Open/Close Document, and View/Print Page of Document. All activity data is anonymized. Our current policy is to retain this data for a period of one year.

11 WORKSPOT POLICY ENGINE Network & Security Policies - Trusted WLAN networks - Whitelist and blacklisted addresses - Single sign-on Behavior - Passcode Length and Complexity - Offline Data Retention - RSA Token Usage - VPN Configuration Workspot Control Policies App/User/Geo/Device

12 PROTECTION BEGINS BEFORE WORKSPOT IS LAUNCHED Device Posture Check As soon as the Workspot Client is started, it conducts a posture check to determine whether the device has been jail-broken. An evolving set of checks to verify supported versions and platforms are performed, and only when the device is determined to be secure is the Workspot Client launched Secure Offline Access with PIN When a user taps on Workspot Client on their device, they are prompted for a PIN. The PIN is validated against client master secret (CMS). If the CMS can be decrypted then the PIN is deemed valid; otherwise the PIN is invalid. The Workspot Client will allow up to 5 invalid PIN entries after which Workspot Client will wipe all the data on the device.

13 REAL-TIME PROTECTION Remote Wipe Workspot Control also provides IT the capability to remote wipe any data, including documents, cached objects and cookies, inside the Workspot Client. Data outside the Workspot Client is un-affected by the remote wipe operation. Whitelist/Blacklist IT can also control which sites the user can and cannot visit from inside the Workspot client by configuring the blacklist/whitelist. We also enable dynamic blacklisting of known malicious URLs.

14 EMBEDDED DOCUMENT VIEWERS When an end user downloads a document inside the Workspot application, it is encrypted in-flight. The file system remains in an encrypted state even when the end user is within the container. Only when the end user wants to view a document, for example an Adobe Acrobat document, does the Workspot Client decrypt the selected document and present it inside a viewer that is embedded within Workspot. We have tuned the embedded viewers for the best possible rendering experience. Documents are more secure, because the documents stay within the Workspot Client. As soon as the end user finishes viewing the document and closes the viewer, the document is restored to its encrypted state on the device. For large documents, we only decrypt the pages of the document that are currently being viewed.

15 MOBILE SECURITY NEEDS RISK MANAGEMENT Security must be comprehensive to meet IT Requirements q Device q Network q Application q Data ü All of the above Security must be balanced with convenience to make end users productive Big Data Context Driven Risk Management can help achieve balance, e.g., credit cards

16 KEY TO RISK MANAGEMENT IS CONTEXT What is context? Context is who is doing what, when, and from where. For example, user Adam downloaded a document at 9:00 PM from California. Or Adam took 12 seconds to access the SharePoint application from an iphone in Chicago. Context can help you better secure your data and understand and improve the real user experience for your employees. Context enables compliance, discoverability, and auditability Look for a solution that will help you prove you know what end users are doing with corporate data on the device. For example, you should know which files users are downloading. Or you should know which apps they are accessing from where?

17 CLOUD ARCHITECTURE ENABLES CONTEXT Web Apps Container is highly instrumented Collects Context - who/ what/when/where/how fast data in real-time Uploads to Workspot Control when network conditions permit HTML(5) Engine Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client SSO VPN ios/android/windows/macos

18 WORKSPOT COLLECTS GRANULAR CONTEXT Business Benefits: Discoverability, Compliance, and Auditing Can be integrated with existing SIEM systems, e.g., Splunk

19 INTEGRATION WITH SPLUNK Download Splunk Application from Workspot Control Simple Integration between Splunk and Workspot w/ security keys

20 WHY ADAPTIVE AUTH? Today IT and InfoSec teams cannot balance the needs for convenient access from mobile devices with the requirements of information security. Workspot has granular contextual data that can balance convenience with security. All applications are not equally sensitive the directory application is less sensitive than the financials application. All users are not equally trusted the CEO is more trusted than a contractor. All locations are not equally trusted if a user is connected to a corporate WLAN and is sitting in an office, then they are more trusted than somebody trying to access enterprise assets from a remote location. Workspot can use this data to change the authentication required making it simple when the access is trusted, and providing more challenges when the access is less trusted.

21 CONTEXT CAN BE USED FOR ADAPTIVE AUTH Context also informs us about the typical behavior of an end user how many applications they access, where they access it from, and other information. Context can be used to detect abnormal access patterns and potentially deny access to end users if we detect abnormal behavior. A good analogy is a credit card swipe. Every transaction is examined for risk, and most of the time the risk threshold is low, so the end user is allowed to transact. Occasionally a higher risk is determined and the end user is then challenged or informed of potentially fraudulent activity.

22 ADAPTIVE AUTH EXAMPLES High Trust Context => Aggressive Single Sign-On CFO accessing Intranet from HQ Medium Trust => Require RSA token CFO accessing Financials from new location Low Trust Context => Deny Access - CFO downloading lots of documents while in China

23 BIG DATA DRIVEN ADAPTIVE AUTH

24 WORKSPOT IS SIMPLEST SOLUTION BYOD Features Workspot Secure Browser CIFS, SharePoint, etc. Windows Apps Single Sign-On Mobile Device Management Big Data Security & Performance NO NEW BOXES; PILOT IN MINUTES VMware Citrix MobileIron Mobile Gateway Netscaler App Tunnel Content Locker ShareFile Averail View XenApp Horizon App Controller Airwatch XenMobile MobileIron Citrix, VMware, and MobileIron have complex on-premise architectures. Citrix is the furthest along in integrating the various components. Lets take a deeper look at the Citrix solution.

25 LEARN MORE ABOUT WORKSPOT us at Additional resources at

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:

More information

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,

More information

Workspot. Workspace as a Service enables Secure Access to Desktops, Applications and Data from Any Device. Technical White Paper

Workspot. Workspace as a Service enables Secure Access to Desktops, Applications and Data from Any Device. Technical White Paper Workspot Workspace as a Service enables Secure Access to Desktops, Applications and Data from Any Device Technical White Paper Technical White Paper 1 Table of Contents Introduction... 4 Challenges with

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Solve BYOD with! Workspace as a Service!

Solve BYOD with! Workspace as a Service! Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

Brief History of Enterprise Mobility. Existing Stuff

Brief History of Enterprise Mobility. Existing Stuff Brief History of Enterprise Mobility Existing Stuff YOUR ASSETS ARE ON A PC TODAY YOU HAVE 50-500 APPS 90% ON-PREMISE 70% WEB 25% WINDOWS IT Owned IT Managed Domain Joined 90% CIFS 5% NATIVE 50% SHAREPOINT

More information

Top 10 Reasons why VDI is not a good solution for BYOD

Top 10 Reasons why VDI is not a good solution for BYOD Top 10 Reasons why VDI is not a good solution for BYOD WE KNOW A LITTLE ABOUT VDI! AMITABH SINHA, CEO PUNEET CHAWLA, CTO RANA KANAAN, VP (GM XenApp/ XenDesktop, Citrix) (Founding Engineer, VMware View)

More information

Roadmap to Solving Enterprise Mobility

Roadmap to Solving Enterprise Mobility Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Mobilize your Enterprise in 60 Minutes!

Mobilize your Enterprise in 60 Minutes! Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Top. Enterprise Reasons to Select kiteworks by Accellion

Top. Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

Mobile Security Mobile Device Management Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management Mobile Security Mobile Device Management Mobile Application Management Corporate Overview Largest MDM provider with over 300+ employees, 150 focused on R&D Provide mobility solutions to 1500+ global customers

More information

Delivering Sales Apps and Data on BYOD

Delivering Sales Apps and Data on BYOD Delivering Sales Apps and Data on BYOD BYOD Success Kit Introduction This ebook is to help LOB owners understand how to implement a BYOD strategy that increases the productivity of their field sales &

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy Data Loss Prevention and Secure Access for Mobile Content Ojas Rege VP Strategy Agenda Problem definition Enterprise requirements MobileIron Docs@Work solution Architecture and user experience Traditional

More information

SharePlus Enterprise: Security White Paper

SharePlus Enterprise: Security White Paper INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Citrix ShareFile Enterprise technical overview

Citrix ShareFile Enterprise technical overview Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user

More information

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from

More information

Mobile Security Mobile Device Management Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management Mobile Security Mobile Device Management Mobile Application Management Addressing MDM Challenges in Education Proliferation of mobile devices Asset tracking and multi-os management Student- and teacher-owned

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013 MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters

More information

ShareFile Enterprise technical overview

ShareFile Enterprise technical overview Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The

More information

Key Requirements of Enterprise Mobility Management Solutions

Key Requirements of Enterprise Mobility Management Solutions Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

ShareFile Enterprise for healthcare

ShareFile Enterprise for healthcare for healthcare Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support regulatory compliance and mobilize data access with Citrix.

More information

Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS

Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS Extending your Enterprise IT with Amazon Virtual Private Cloud Oyvind Roti Principal Solutions Architect, AWS Three Things Some AWS Concepts Let s build a Virtual Private Cloud together Three New Services

More information

MDM and beyond: Rethinking mobile security in a BYOD world

MDM and beyond: Rethinking mobile security in a BYOD world MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Top. Reasons Legal Firms Select kiteworks by Accellion

Top. Reasons Legal Firms Select kiteworks by Accellion Top 10 Reasons Legal Firms Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Firms Select kiteworks kiteworks by Accellion provides law firms with secure wherever, whenever

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Comprehensive Enterprise Mobile Management for ios 8

Comprehensive Enterprise Mobile Management for ios 8 Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

Mobile Application Management with XenMobile and the Worx App SDK

Mobile Application Management with XenMobile and the Worx App SDK Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started

More information

Avoid the Hidden Costs of AD FS with Okta

Avoid the Hidden Costs of AD FS with Okta Okta White paper Avoid the Hidden Costs of AD FS with Okta Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-adfs-031413 Table of Contents 1 Challenges of

More information

What s New in Juniper s SSL VPN Version 6.0

What s New in Juniper s SSL VPN Version 6.0 What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper

More information

Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen. März 2014

Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen. März 2014 Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen März 2014 Citrix The Most Complete Mobile Portfolio Mobile Value-on-Investment Mobile Device Management Sandboxed Mail and Web

More information

Citrix Enterprise Mobility more than just device management (MDM)

Citrix Enterprise Mobility more than just device management (MDM) Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

Secure iphone Access to Corporate Web Applications

Secure iphone Access to Corporate Web Applications F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business

More information

Citrix ShareFile Enterprise: a technical overview citrix.com

Citrix ShareFile Enterprise: a technical overview citrix.com Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Copyright Giritech A/S. Secure Mobile Access

Copyright Giritech A/S. Secure Mobile Access Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Mobile app containers with Citrix MDX

Mobile app containers with Citrix MDX Mobile app containers with Citrix MDX 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started with mobile device management

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Ensuring Document Security Across Any Device with the WatchDox Platform

Ensuring Document Security Across Any Device with the WatchDox Platform Ensuring Document Security Across Any Device with the WatchDox Platform A WatchDox White Paper February 2013 INTRODUCTION The confidentiality and integrity of our customers documents is of the utmost importance.

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

Cisco Secure BYOD Solution

Cisco Secure BYOD Solution Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

Citrix Receiver for Mobile Devices Troubleshooting Guide

Citrix Receiver for Mobile Devices Troubleshooting Guide Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Enabling mobile workstyles with an end-to-end enterprise mobility management solution. Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

Achieve Unified Access Control and Scale Cost-Effectively

Achieve Unified Access Control and Scale Cost-Effectively DATASHEET What s Inside 2 Unified Global Access 3 Consolidated Infrastructure and Simplified Management 5 Dynamic and Centralized Access Control 7 Superior Security 8 Secure Web Gateway Services 10 Flexibility,

More information

BREAKING THE MOBILE MOLD. Mark Vondemkamp VP Security Product Management

BREAKING THE MOBILE MOLD. Mark Vondemkamp VP Security Product Management BREAKING THE MOBILE MOLD Mark Vondemkamp VP Security Product Management Bring-Your-Own-Device Using personal devices for business Why implement BYOD? Increase employee satisfaction, productivity Reduce

More information

SAP Mobile Documents. December, 2015

SAP Mobile Documents. December, 2015 SAP Mobile Documents December, 2015 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your

More information

How Intel Cloud SSO Works

How Intel Cloud SSO Works TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities

More information

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

ShareFile for enterprises

ShareFile for enterprises Product Overview ShareFile for enterprises Secure, sync and share enterprise files everywhere ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

XenMobile Technology Overview

XenMobile Technology Overview XenMobile Technology Overview Mobility is a top priority for organizations. Why? Because more employees than ever before are demanding access to the apps and data that will make them productive on the

More information

May 14 th, 2015 INTRODUCING WATCHDOX. And The ABC s Of Secure File Sharing. Jeff Holleran VP Corporate Strategy BlackBerry

May 14 th, 2015 INTRODUCING WATCHDOX. And The ABC s Of Secure File Sharing. Jeff Holleran VP Corporate Strategy BlackBerry INTRODUCING WATCHDOX And The ABC s Of Secure File Sharing May 14 th, 2015 May 14 th, Jeff Holleran VP Corporate Strategy BlackBerry 2015 Tim Choi VP Product Management and Product Marketing WatchDox Introduction

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

CHECK POINT THE MYTHS OF MOBILE SECURITY

CHECK POINT THE MYTHS OF MOBILE SECURITY CHECK POINT THE MYTHS OF MOBILE SECURITY Mobility has transformed the workplace. Laptops, smartphones and tablets not only enable an organization s road warriors, but also create freedoms for all employees

More information

Achieve Unified Access Control and Scale Cost-Effectively

Achieve Unified Access Control and Scale Cost-Effectively DATASHEET What s Inside 2 Unified Global Access 3 Consolidated Infrastructure and Simplified Management 5 Dynamic and Centralized Access Control 7 Superior Security 8 Secure Web Gateway Services 10 Flexibility,

More information

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Ensuring the Security of Your Company s Data & Identities. a best practices guide a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management

More information

Back to the Future: Securing your Unwired Enterprise

Back to the Future: Securing your Unwired Enterprise Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era

More information

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Safeguard Protected Health Information With Citrix ShareFile

Safeguard Protected Health Information With Citrix ShareFile Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare

More information

Achieve Unified Access Control and Scale Cost-Effectively

Achieve Unified Access Control and Scale Cost-Effectively DATASHEET What s Inside 2 Unified Global Access 3 Consolidated Infrastructure and Simplified Management 5 Dynamic and Centralized Access Control 7 Superior Security 8 Flexibility, High Performance, and

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

MobileIron Product Packaging

MobileIron Product Packaging MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content

More information

The fastest, most secure path to mobile employee productivity

The fastest, most secure path to mobile employee productivity The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they

More information

Securing Healthcare Data on Mobile Devices

Securing Healthcare Data on Mobile Devices Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed

More information

PingFederate. SSO Integration Overview

PingFederate. SSO Integration Overview PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,

More information

Amazon.com, Inc. and its affiliates. All rights reserved.

Amazon.com, Inc. and its affiliates. All rights reserved. Amazon.com, Inc. and its affiliates. All rights reserved. How Enterprises Use AWS Augment On-Premises resources with cloud capacity Migrate existing apps & data to the cloud Build new apps, sites, services

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com White Paper The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise citrix.com App Configuration for Enterprise (ACE) was introduced by AirWatch. AirWatch describes

More information

ShareFile Enterprise. Jaan Feldmann Sergei Sokolov

ShareFile Enterprise. Jaan Feldmann Sergei Sokolov ShareFile Enterprise Jaan Feldmann Sergei Sokolov Users Demand Instant file and data access from any device File sharing (with anyone) Easy and familiar (love Dropbox) IT Wants Security Control no data

More information

MobileIron Product Packaging

MobileIron Product Packaging MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content

More information

Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014

Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.

More information

Investing to boost workforce productivity in the mobile-cloud era. Ton Hermes Specialist SE Mobile Cloud

Investing to boost workforce productivity in the mobile-cloud era. Ton Hermes Specialist SE Mobile Cloud Investing to boost workforce productivity in the mobile-cloud era Ton Hermes Specialist SE Mobile Cloud VMware Architecture for IT: One Cloud, Any App, Any Device Any Device Business Mobility: Applications

More information