Big Data Driven Security for BYOD. Photo by Marc_Smith - Creative Commons Attribution License
|
|
- Esmond Andrews
- 8 years ago
- Views:
Transcription
1 Big Data Driven Security for BYOD Photo by Marc_Smith - Creative Commons Attribution License Created with Haiku Deck
2 TABLE OF CONTENTS Securing Data in Motion Securing Data at Rest Big Data Driven Security Conclusion
3 WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop, Citrix) (Founding Engineer, VMware View) Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
4 WORKSPOT LEVERAGES EXISTING INFRASTRUCTURE Workspot leverages your existing VPN appliance Supports: Cisco, Juniper, F5, and SonicWall Supports the authentication mechanism AD+RSA Supports all internal SSO providers including CA Siteminder, and Oracle IdP Supports cloud identity integration Okta, Ping Identity, and SAML 2.0 vendors Terminal Server VPNSSO Windows Apps Web Apps AD CIFS SharePoint Native Apps
5 WORKSPOT IS 100% CLOUD Pilot in Minutes Multi-tenant Architecture Always up-to-date 6-8 updates annually On-demand scalability Power of AWS
6 CONTROL VS. DATA SEPARATION Workspot Control has been architected to be a control plane. When the user is performing workflows on the device using Workspot, all the data flows back and forth directly between the client and the business applications (e.g., Exchange, SharePoint, Salesforce.com). If the applications are behind the firewall, then they go back to the corporate network. If the applications are external, then the traffic directly goes to the external application. Separation between control and data planes is very critical for a number of reasons: Security: Data flows directly between the client and the applications; it does not flow through our control service Availability: Since Workspot is not in the data path, the availability of applications is independent of the availability of our service Performance: Since we are not in the data path, there is nothing to impede the end user experience
7 SECURE, CROSS-PLATFORM ARCHITECTURE Unified Workspace Web Apps HTML(5) Engine Encrypted File System (AES-256) & built-in document viewers for common formats Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client Built-in VPN for Cisco, Juniper, F5, and SonicWall SSO VPN ios/android/windows/macos Built-in Single Sign On for NTLM/Kerberos/ CA Siteminder/ Oracle idp/saml 2.0
8 WORKSPOT PROTECTS DATA IN MOTION Web Apps HTML(5) Engine Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client SSO VPN ios/android/windows/macos Full L4-7 Control Custom HTTP stack with OpenSSL VPN termination to any SSLVPN appliance We support Cisco, Juniper, SonicWall, and F5 Workspot-level VPN only Workspot is on the corporate network Control over Blacklist/ whitelist URL
9 WORKSPOT PROTECTS DATA AT REST Secure container on an unmanaged device All enterprise assets fully encrypted in memory before touching the file system Multi-level encryption Each file is encrypted using its own key Each key is encrypted using a master key Master key is encrypted using a PIN which is not stored FIPS validated AES-256 Web Apps HTML(5) Engine Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client SSO VPN ios/android/windows/macos
10 DATA RETENTION POLICY We store the following information in Workspot Control: Configuration: We store configuration information about the VPN, e.g., public URL address, whether it uses RSA or not. User Configuration: First Name, Last Name, Address, etc. Application Configuration: Application URLs, whether or not it is behind the firewall, etc. Performance Data: For each network access, we store the amount of time it took to fetch a response from the application (e.g. SharePoint), the device used (e.g. ipad3), the network used (e.g., AT&T), and the location (e.g., California). Activity Data: We track different kinds of activity on the device, e.g., Open/ Close Workspot, Open/Close Application (e.g., SAP), Open/Close Document, and View/Print Page of Document. All activity data is anonymized. Our current policy is to retain this data for a period of one year.
11 WORKSPOT POLICY ENGINE Network & Security Policies - Trusted WLAN networks - Whitelist and blacklisted addresses - Single sign-on Behavior - Passcode Length and Complexity - Offline Data Retention - RSA Token Usage - VPN Configuration Workspot Control Policies App/User/Geo/Device
12 PROTECTION BEGINS BEFORE WORKSPOT IS LAUNCHED Device Posture Check As soon as the Workspot Client is started, it conducts a posture check to determine whether the device has been jail-broken. An evolving set of checks to verify supported versions and platforms are performed, and only when the device is determined to be secure is the Workspot Client launched Secure Offline Access with PIN When a user taps on Workspot Client on their device, they are prompted for a PIN. The PIN is validated against client master secret (CMS). If the CMS can be decrypted then the PIN is deemed valid; otherwise the PIN is invalid. The Workspot Client will allow up to 5 invalid PIN entries after which Workspot Client will wipe all the data on the device.
13 REAL-TIME PROTECTION Remote Wipe Workspot Control also provides IT the capability to remote wipe any data, including documents, cached objects and cookies, inside the Workspot Client. Data outside the Workspot Client is un-affected by the remote wipe operation. Whitelist/Blacklist IT can also control which sites the user can and cannot visit from inside the Workspot client by configuring the blacklist/whitelist. We also enable dynamic blacklisting of known malicious URLs.
14 EMBEDDED DOCUMENT VIEWERS When an end user downloads a document inside the Workspot application, it is encrypted in-flight. The file system remains in an encrypted state even when the end user is within the container. Only when the end user wants to view a document, for example an Adobe Acrobat document, does the Workspot Client decrypt the selected document and present it inside a viewer that is embedded within Workspot. We have tuned the embedded viewers for the best possible rendering experience. Documents are more secure, because the documents stay within the Workspot Client. As soon as the end user finishes viewing the document and closes the viewer, the document is restored to its encrypted state on the device. For large documents, we only decrypt the pages of the document that are currently being viewed.
15 MOBILE SECURITY NEEDS RISK MANAGEMENT Security must be comprehensive to meet IT Requirements q Device q Network q Application q Data ü All of the above Security must be balanced with convenience to make end users productive Big Data Context Driven Risk Management can help achieve balance, e.g., credit cards
16 KEY TO RISK MANAGEMENT IS CONTEXT What is context? Context is who is doing what, when, and from where. For example, user Adam downloaded a document at 9:00 PM from California. Or Adam took 12 seconds to access the SharePoint application from an iphone in Chicago. Context can help you better secure your data and understand and improve the real user experience for your employees. Context enables compliance, discoverability, and auditability Look for a solution that will help you prove you know what end users are doing with corporate data on the device. For example, you should know which files users are downloading. Or you should know which apps they are accessing from where?
17 CLOUD ARCHITECTURE ENABLES CONTEXT Web Apps Container is highly instrumented Collects Context - who/ what/when/where/how fast data in real-time Uploads to Workspot Control when network conditions permit HTML(5) Engine Document Viewers Windows Apps RDP Client Context Agent Virtual File System Network Drives CIFS Client SSO VPN ios/android/windows/macos
18 WORKSPOT COLLECTS GRANULAR CONTEXT Business Benefits: Discoverability, Compliance, and Auditing Can be integrated with existing SIEM systems, e.g., Splunk
19 INTEGRATION WITH SPLUNK Download Splunk Application from Workspot Control Simple Integration between Splunk and Workspot w/ security keys
20 WHY ADAPTIVE AUTH? Today IT and InfoSec teams cannot balance the needs for convenient access from mobile devices with the requirements of information security. Workspot has granular contextual data that can balance convenience with security. All applications are not equally sensitive the directory application is less sensitive than the financials application. All users are not equally trusted the CEO is more trusted than a contractor. All locations are not equally trusted if a user is connected to a corporate WLAN and is sitting in an office, then they are more trusted than somebody trying to access enterprise assets from a remote location. Workspot can use this data to change the authentication required making it simple when the access is trusted, and providing more challenges when the access is less trusted.
21 CONTEXT CAN BE USED FOR ADAPTIVE AUTH Context also informs us about the typical behavior of an end user how many applications they access, where they access it from, and other information. Context can be used to detect abnormal access patterns and potentially deny access to end users if we detect abnormal behavior. A good analogy is a credit card swipe. Every transaction is examined for risk, and most of the time the risk threshold is low, so the end user is allowed to transact. Occasionally a higher risk is determined and the end user is then challenged or informed of potentially fraudulent activity.
22 ADAPTIVE AUTH EXAMPLES High Trust Context => Aggressive Single Sign-On CFO accessing Intranet from HQ Medium Trust => Require RSA token CFO accessing Financials from new location Low Trust Context => Deny Access - CFO downloading lots of documents while in China
23 BIG DATA DRIVEN ADAPTIVE AUTH
24 WORKSPOT IS SIMPLEST SOLUTION BYOD Features Workspot Secure Browser CIFS, SharePoint, etc. Windows Apps Single Sign-On Mobile Device Management Big Data Security & Performance NO NEW BOXES; PILOT IN MINUTES VMware Citrix MobileIron Mobile Gateway Netscaler App Tunnel Content Locker ShareFile Averail View XenApp Horizon App Controller Airwatch XenMobile MobileIron Citrix, VMware, and MobileIron have complex on-premise architectures. Citrix is the furthest along in integrating the various components. Lets take a deeper look at the Citrix solution.
25 LEARN MORE ABOUT WORKSPOT us at Additional resources at
Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01
Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:
More informationBYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service
BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,
More informationWorkspot. Workspace as a Service enables Secure Access to Desktops, Applications and Data from Any Device. Technical White Paper
Workspot Workspace as a Service enables Secure Access to Desktops, Applications and Data from Any Device Technical White Paper Technical White Paper 1 Table of Contents Introduction... 4 Challenges with
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationSolve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationBrief History of Enterprise Mobility. Existing Stuff
Brief History of Enterprise Mobility Existing Stuff YOUR ASSETS ARE ON A PC TODAY YOU HAVE 50-500 APPS 90% ON-PREMISE 70% WEB 25% WINDOWS IT Owned IT Managed Domain Joined 90% CIFS 5% NATIVE 50% SHAREPOINT
More informationTop 10 Reasons why VDI is not a good solution for BYOD
Top 10 Reasons why VDI is not a good solution for BYOD WE KNOW A LITTLE ABOUT VDI! AMITABH SINHA, CEO PUNEET CHAWLA, CTO RANA KANAAN, VP (GM XenApp/ XenDesktop, Citrix) (Founding Engineer, VMware View)
More informationRoadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationMobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationTop. Enterprise Reasons to Select kiteworks by Accellion
Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data
More informationTop. Reasons Federal Government Agencies Select kiteworks by Accellion
Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationEnsuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
More informationProtecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationMobile Security Mobile Device Management Mobile Application Management
Mobile Security Mobile Device Management Mobile Application Management Corporate Overview Largest MDM provider with over 300+ employees, 150 focused on R&D Provide mobility solutions to 1500+ global customers
More informationDelivering Sales Apps and Data on BYOD
Delivering Sales Apps and Data on BYOD BYOD Success Kit Introduction This ebook is to help LOB owners understand how to implement a BYOD strategy that increases the productivity of their field sales &
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationData Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy
Data Loss Prevention and Secure Access for Mobile Content Ojas Rege VP Strategy Agenda Problem definition Enterprise requirements MobileIron Docs@Work solution Architecture and user experience Traditional
More informationSharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
More informationMobile Security Mobile Device Management Mobile Application Management
Mobile Security Mobile Device Management Mobile Application Management Addressing MDM Challenges in Education Proliferation of mobile devices Asset tracking and multi-os management Student- and teacher-owned
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationWorkspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationCitrix ShareFile Enterprise technical overview
Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user
More informationF5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France
F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationMANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
More informationShareFile Enterprise technical overview
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
More informationMobile Access Software Blade
Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.
More informationKey Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
More informationShareFile Enterprise for healthcare
for healthcare Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support regulatory compliance and mobilize data access with Citrix.
More informationComprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
More informationExtending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS
Extending your Enterprise IT with Amazon Virtual Private Cloud Oyvind Roti Principal Solutions Architect, AWS Three Things Some AWS Concepts Let s build a Virtual Private Cloud together Three New Services
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationMDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationTop. Reasons Legal Firms Select kiteworks by Accellion
Top 10 Reasons Legal Firms Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Firms Select kiteworks kiteworks by Accellion provides law firms with secure wherever, whenever
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationCopyright Giritech A/S. Secure Mobile Access
Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary
More informationMobile Application Management with XenMobile and the Worx App SDK
Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started
More informationWhat s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
More informationAvoid the Hidden Costs of AD FS with Okta
Okta White paper Avoid the Hidden Costs of AD FS with Okta Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-adfs-031413 Table of Contents 1 Challenges of
More informationGet ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen. März 2014
Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen März 2014 Citrix The Most Complete Mobile Portfolio Mobile Value-on-Investment Mobile Device Management Sandboxed Mail and Web
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More informationCitrix ShareFile Enterprise: a technical overview citrix.com
Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose
More informationCitrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
More informationSecure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationMAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationEnsuring Document Security Across Any Device with the WatchDox Platform
Ensuring Document Security Across Any Device with the WatchDox Platform A WatchDox White Paper February 2013 INTRODUCTION The confidentiality and integrity of our customers documents is of the utmost importance.
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationCitrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
More informationMobile app containers with Citrix MDX
Mobile app containers with Citrix MDX 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started with mobile device management
More informationCisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
More informationDevice Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
More informationCisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationHow to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
More informationEnabling mobile workstyles with an end-to-end enterprise mobility management solution.
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
More informationAchieve Unified Access Control and Scale Cost-Effectively
DATASHEET What s Inside 2 Unified Global Access 3 Consolidated Infrastructure and Simplified Management 5 Dynamic and Centralized Access Control 7 Superior Security 8 Secure Web Gateway Services 10 Flexibility,
More informationHow To Secure Your Mobile Device
BREAKING THE MOBILE MOLD Mark Vondemkamp VP Security Product Management Bring-Your-Own-Device Using personal devices for business Why implement BYOD? Increase employee satisfaction, productivity Reduce
More informationSAP Mobile Documents. December, 2015
SAP Mobile Documents December, 2015 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your
More informationChoosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions
Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationHow To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
More informationXenMobile Technology Overview
XenMobile Technology Overview Mobility is a top priority for organizations. Why? Because more employees than ever before are demanding access to the apps and data that will make them productive on the
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationMay 14 th, 2015 INTRODUCING WATCHDOX. And The ABC s Of Secure File Sharing. Jeff Holleran VP Corporate Strategy BlackBerry
INTRODUCING WATCHDOX And The ABC s Of Secure File Sharing May 14 th, 2015 May 14 th, Jeff Holleran VP Corporate Strategy BlackBerry 2015 Tim Choi VP Product Management and Product Marketing WatchDox Introduction
More informationThe fastest, most secure path to mobile employee productivity
The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationAchieve Unified Access Control and Scale Cost-Effectively
DATASHEET What s Inside 2 Unified Global Access 3 Consolidated Infrastructure and Simplified Management 5 Dynamic and Centralized Access Control 7 Superior Security 8 Secure Web Gateway Services 10 Flexibility,
More informationMaking the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean
Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era
More informationCHECK POINT THE MYTHS OF MOBILE SECURITY
CHECK POINT THE MYTHS OF MOBILE SECURITY Mobility has transformed the workplace. Laptops, smartphones and tablets not only enable an organization s road warriors, but also create freedoms for all employees
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationEnsuring the Security of Your Company s Data & Identities. a best practices guide
a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationEnterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
More informationSafeguard Protected Health Information With Citrix ShareFile
Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare
More informationSECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationAchieve Unified Access Control and Scale Cost-Effectively
DATASHEET What s Inside 2 Unified Global Access 3 Consolidated Infrastructure and Simplified Management 5 Dynamic and Centralized Access Control 7 Superior Security 8 Flexibility, High Performance, and
More informationShareFile for enterprises
Product Overview ShareFile for enterprises Secure, sync and share enterprise files everywhere ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs
More informationAdministering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
More informationactivecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
More informationPingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
More informationMobileIron Product Packaging
MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content
More informationSecuring Healthcare Data on Mobile Devices
Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed
More informationCitrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.
More informationShareFile Enterprise. Jaan Feldmann Sergei Sokolov
ShareFile Enterprise Jaan Feldmann Sergei Sokolov Users Demand Instant file and data access from any device File sharing (with anyone) Easy and familiar (love Dropbox) IT Wants Security Control no data
More informationWhite Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com
White Paper The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise citrix.com App Configuration for Enterprise (ACE) was introduced by AirWatch. AirWatch describes
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationWhat s new in AM 9.30 Accelerating business outcomes
What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive
More informationAmazon.com, Inc. and its affiliates. All rights reserved.
Amazon.com, Inc. and its affiliates. All rights reserved. How Enterprises Use AWS Augment On-Premises resources with cloud capacity Migrate existing apps & data to the cloud Build new apps, sites, services
More informationMobileIron Product Packaging
MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content
More information