Mobile Security Buyer s Guide
|
|
|
- Kelley Hopkins
- 10 years ago
- Views:
Transcription
1 ANALYST BRIEF Mobile Security Buyer s Guide PART 1: THE BASICS Author Andrew Braunberg Overview The consumerization of information technology (IT), particularly relating to the increasingly common bring your own device (BYOD) policy, is one of the most important technology trends affecting businesses today. As such, it has resulted in a critical need for enterprises to address security issues associated with the use of such consumer mobile devices on corporate networks. The availability of easy- to- use smartphones, cloud services, and collaborative social networks is creating new work and productivity patterns for employees; however, these new practices are often being implemented without the approval of IT departments or, even worse, without their knowledge. Enterprises that have yet to address these trends should do so quickly. This guide is intended to help enterprises understand the choices available to address security concerns associated with the use of mobile devices on corporate networks. The Mobile Security Buyer s Guide is comprised of two analyst briefs: Part 1: The Basics introduces the technologies, products, and vendors in the mobile security market, while Part 2: Costs And Use Cases highlights the more common use cases and costs associated with managing and securing mobile devices, including a chart that maps available security products to use cases. NSS Lab Findings: The mobile device management (MDM) market is quickly maturing and expanding; there are dozens of vendors in the market today. From a security perspective, MDM delivers a fairly commoditized set of features that are ultimately controlled by the functionality permitted by each mobile operating system (OS). The mobile application security segment is changing as a broad new set of products providing richer and more data- centric security features to mobile devices enters the market, Two important metrics to consider when assessing whether a mobile security technology will find market acceptance are the technology s impact on the end user experience and the demands it makes on application developers. Mobile security is a volatile market and NSS expects large numbers of new products to enter the market for the foreseeable future.
2 Traditional security vendors are adopting a more visible role in the protection and management of mobile ecosystems. Enterprises will often need to mix and match products from multiple vendors, depending on their primary use cases and on their particular market of corporate constraints. While malware is still a relatively minor threat on mobile devices (besides Android), phishing is not. NSS Labs Recommendations: Organizations should approach mobile security in a measured, thoughtful manner. IT personnel should work collaboratively with end users to achieve the best possible balance of productivity and security. Data protection must be the primary security goal of organizations. Enterprises should view MDM as providing a minimum level of security for mobile devices that access corporate networks. Enterprises need to take a best- of- breed approach to building solutions, since security requirements differ significantly depending on individual use cases. 2
3 Analysis Drivers: Consumerization of IT and the Response from Enterprises In 2011, shipments of smartphones exceeded total PC shipments for the first time. This represents a sea change in the way that people consume information and in their use of computers. The number of mobile applications that are being downloaded for both Apple ios and Google Android devices now averages more than one billion per month. That s not a wave, it s a tsunami, and it is being pushed along one consumer purchase at a time. Knowledge about these consumers is as important as the volume of devices being sold. Consumer requirements are driving the mobile market today, with profound implications for enterprises, since these devices and their applications increasingly find their way onto corporate networks. As of February 2013, 57 percent of American adults owned a smart phone. Ninety percent of these phones run either Apple ios or some variant of Google Android. These consumers want to bring their devices to work for several reasons, most obviously because they are personally invested in the technology. Such market- based endorsements represent an emotional and financial investment from the consumer. It is an easy progression for consumers to decide that the same communication, collaboration, and research tools that enhance their personal lives are also adaptable to their work lives. For the last couple years, enterprises have often been caught off guard by the speed and pervasiveness of the consumerization of IT phenomenon. Saying no to consumer mobile devices is no longer is an option for most IT or information security (IS) teams. Today, some of the largest companies in the world, such as Cisco and IBM, have broadly embraced the consumerization of IT. This is often manifest in the BYOD policy, where employees are allowed to use their personal devices to access corporate resources; however, a BYOD policy that amounts to allow all is a mistake. It is important not to conflate the consumerization of IT trend with a corporate policy decision to allow BYOD. The latter is clearly a response to the former, but it is not the only response, nor is it the best response. What is needed is a managed approach to balance the employee desire to use consumer devices with the business requirements for security, compliance, and control. The idea that these business requirements are somewhat negotiable does not sit well with many traditional IT/IS departments; however, these departments generally no longer determine every aspect of technology deployment within an organization because employees now have numerous ways to end run uncooperative IT departments. BYOD policies have been particularly hard on Research in Motion (RIM), the maker of Blackberry phones, which has never been a major player in the consumer market. The company s share of the overall smartphone market continues to slip; it is currently less than 5% globally 1. Concerns about the long- term viability of the company and the reliability of its infrastructure have customers working on contingency plans that would allow them to move to other mobile platforms. While Apple ios and Google Android are the clear choices today, Microsoft Windows Phone 8 may also be a longer term competitor, given the trust and familiarity that enterprise IT shops have with Microsoft and its products /android- beats- ios- 5- to- 1- in- q3- smartphone- market- share/ 3
4 Options The first place to which most organizations turn is MDM. There are dozens of MDM vendors in the market that provide provisioning, configuration, security, and management of mobile devices. However, MDM is only a start, and it is expected that the features in these products will continue to be subsumed by the mobile OS vendors and the device manufacturers. Indeed, more enterprise class controls are being built into mobile operating systems with each new release, and a fairly consistent base of features is likely to emerge across the leading mobile operating systems. MDM vendors continue to differentiate their products in several directions, such as broader mobile OS support, cloud- based delivery options, richer reporting features, enterprise app store support, and the inclusion of additional cost control capabilities. Concurrently, the rich ecosystem of third- party vendors that has emerged to augment native device capabilities in heterogeneous environments will increasingly focus on a broader set of capabilities. There are several important classes of functionality on top of MDM that enterprise customers should be looking for, and NSS believes that the two main areas of focus should be security and mobile application management (MAM). Current MDM products do address these functional areas, but not to the degree that is required going forward. The Basics: MDM MDM products emerged because of the difficulties of using non- Blackberry devices in business environments. Apple s iphone and the many variants of Google Android devices are primarily designed with consumers in mind; however, this is slowly changing as the boundary between business and private use continues to blur. MDM products address the limitations in these devices by enabling device provisioning, configuration, security management, software management, inventory management, and continuous monitoring and support. As the name implies, MDM has traditionally delivered mobile lifecycle management with a device orientation, from provisioning to remote data wipe if the device is lost or if an employee leaves the organization. Despite the continued flow of new entrants to an already crowded market, the MDM market is relatively mature. This is because all MDM vendors rely on mobile OS interfaces to enable their functionality. In the case of Apple devices in particular, access to low level OS functionality is prohibited altogether, severely restricting any form of innovation on the part of MDM vendors. This means that many basic features are uniform and are done through the same mechanisms. More importantly, there is a fundamental limit to what can be accomplished with a device- level orientation. This has driven MDM vendors and many other mobile players to introduce additional products to augment mobile devices. 4
5 BASELINE MDM CAPABILITIES Provisioning/Configuration Remote lock/wipe Feature control/disable Inventory management Software management Enterprise App Store Device monitoring Reporting Help Desk/Service management Expense management Security Blackberry has traditionally been the gold standard with respect to security on a mobile device, but other mobile operating systems are catching up, particularly Apple ios. The strength, and appeal, of consumer devices relies largely in their general ease of use and broad application availability. From a security point of view, however, IT/IS personnel are generally neutral on the former attribute and suspicious of the latter, and neither Apple nor Google have made it a priority to address the concerns of business users. There are several important security features that can be activated out of the box on both platforms. And the OS vendors provide application programming interfaces (APIs) that allow numerous third- party products to augment the security shortcomings in these devices. General device controls are a good start, but they are coarse- grained and must be augmented with many additional security capabilities and policy controls. Organizations should carefully consider what needs protection. The real focus should not be on securing the device, which the enterprise may not even own, but on protecting any corporate data on that device (or data that is moving to and from that device). All non- Blackberry devices used on corporate networks will require some third- party security and management software. The exact amount required will depend on the devices being used, the use cases of employees, and any compliance considerations. Mobile security products can be grouped into four basic categories: General consumer- grade device controls: Examples include passcode use enforcement and remote location capabilities in case of loss or theft. The controls provide a base level of protection against end user misfortune or stupidity. They can be thought of as security features that are enabled out of the box and are designed for security conscious consumers. 5
6 Advanced configuration policy support and feature controls: Exploiting these features typically requires the use of third- party MDM products, but provides a much richer set of configuration and security policy settings. Network access control (NAC) products have also found application in the discovery and control of unmanaged mobile devices attempting to access network resources. Traditional threat protection: (For example, Anti X, URL scans). Much of the malware concern associated with mobile devices is focused specifically on the Android platform. Data protection (For example, encryption and data loss prevention) and application hardening: Protecting corporate data on mobile devices should be the ultimate goal of any security strategy. The level of security required depends on several factors. These factors are covered in detail in the companion document in this series: Part 2: Costs And Use Cases. At the very least, businesses should assume that addressing a base level of security will require the use of third- party MDM software in order to enable configuration and policy controls. RIM s Blackberry Enterprise Server (BES) delivers the most sophisticated and fine- grained policy controls, but historically just for RIM devices. As a benchmark, Blackberry BES supports approximately 550 configuration and security policies. Apple, Google, and Microsoft provide some management and security APIs that allow third- party MDM vendors to provide additional security policy controls on these platforms. Apple, Google, and Microsoft all also have varying levels of support for Microsoft Exchange ActiveSync (EAS). EAS enables approximately 100 mobile policies and features. At a minimum, NSS Labs expects all devices used in corporate environments to support some level of EAS. Several leading MDM vendors use NitroDesk s TouchDown client to augment their EAS feature support. MDM vendors currently OEMing TouchDown are MobileIron, Notify Technology, Sybase Afaria, AirWatch, Fiberlink (MaaS360), SOTI MobiControl, Citrix Zenprise, REVIVAL, 3LM, Wavelink Avalanche, Capricode, Tangoe MDM, and Symantec. While Android is generally considered the least secure, and the least manageable, of the leading mobile operating systems, it is receiving the most third- party help to improve its standing. Android device OEMs are delivering enterprise- ready versions of their mobile devices. For example, Samsung offers Samsung Approved for Enterprise (SAFE) devices that are preconfigured with encryption, MDM, VPN, and secure connectivity software (i.e., wireless local area network (WLAN) security) from a host of third- party security providers. SAFE also supports a much richer set of Microsoft EAS policies than does native Android. Samsung s more recently announced KNOX focuses on additional platform security, applications security, richer MDM APIs and theft recovery features. (For more details see the Samsung KNOX whitepaper.) 2 The impact of consumerization of IT and BYOD policies on corporate WLAN infrastructure is an important consideration from both a security and a performance perspective. Network access control (NAC) products are being adopted to enable the discovery of unmanaged mobile devices attempting to access network resources. NAC products can augment MDM solutions, and partnerships between NAC and MDM vendors are forming, such as the union between MaaS360 and ForeScout. As mobile devices are used in the role of corporate endpoint computing devices, their attack surfaces increase and so does their appeal to malware writers. This is evidenced by the growth in reported malware on Android devices and by the appearance of rogue applications in Google s application store. To address these issues, security 2 images/resource/white- paper/2013/05/samsung_knox_whitepaper_april2013_v1.1-0.pdf 6
7 vendors are porting traditional endpoint security products to mobile platforms. These technologies include VPN, encryption, identity management, web filtering, Anti- X scanning, and personal firewalls. It is expected that traditional security vendors will take an increasingly visible role in protecting and managing mobile ecosystems. The need for traditional endpoint security products on mobile devices currently differs significantly by mobile platform. Apple ios has proved itself immune from malware, while Android has become the preferred target of mobile malware writers. Apple s success is chiefly attributed to its closed application ecosystem. Apple requires that all code running on ios devices is approved by Apple and is digitally signed using an Apple- issued certificate. This requirement extends Apple s secure chain of trust, which begins with system boot up. 3 While malware is currently manageable on most mobile devices, phishing attacks are a serious problem for all. Secure mobile browser applications are appearing on the market to help alleviate this problem. Beyond simply securing the device, enterprises need to move quickly to better protect corporate applications on mobile devices and thus the corporate data that resides within these applications. MDM vendors have reacted to this requirement, with several vendors introducing versions of their data loss prevention (DLP) products for mobile devices. The goal of these solutions is to provide real- time monitoring (and potential blocking) of data moving to and from mobile devices. Vendors such as RSA, Symantec, and Websense have introduced products in this space, and Zenprise (now a part of Citrix) is one of the few traditional mobile players to enter this segment. There are other approaches to the problem of securing corporate data on mobile devices, such as virtualization. These products are marketed as providing dual personae (one personal and one corporate) for mobile devices. The idea is that all corporate applications and data will be stored in a secure and encrypted partition, or vault, on the device, and all personal applications and data will be stored in the standard user space. This approach has attracted interest from the leading server virtualization vendors (for example, Citrix and VMware), as well as from several startups, such as Red Bend and Open Kernel Labs (acquired by General Dynamics). Type 1 (i.e., bare metal) and Type 2 mobile client hypervisors are currently on the market. Virtualization is an interesting approach, but products have been slow to enter the market and questions remain regarding their impact on device performance and on the end user experience. Two virtualization vendors to watch closely in 2013 are Red Bend and VMware. Red Bend has partnered with mobile chip designer, ARM. Red Bend s hypervisor will run in ARM s new Cortex A15 processor, to be delivered this year. VMware also expects its hypervisors to ship this year, through partnerships with LG, Motorola, and Samsung. New classes of security products are emerging in the mobile space, with specific focus on data management and security on a per application basis. Because security is a chief component of mobile application lifecycle management, application- specific security products are an important segment of this market. Mobile Application Management When vendors talk about mobile application management (MAM), they are usually talking about mobile application security, although there is more to it than just that. The primary goal of this security is to ensure the confidentiality, integrity, and availability of corporate data on mobile devices. There are six technical approaches that are being applied to this problem: enterprise class mobile applications, app wrappers, software development kits (SDKs), sandboxes, virtualization, and DLP
8 These approaches can be consolidated into three strategies: individual application hardening (i.e., enterprise apps, app wrappers and SDKs), creation of a dedicated workspace (i.e., sandboxes, virtualization), and data monitoring and control (i.e., DLP). APPLICATION SECURITY STRATEGY CHIEF CHARACTERISTIC VENDOR EXAMPLES Application Hardening Secure Workspaces DLP Secure apps or security feature libraries (for example, authentication, encryption) for building/modifying apps. Isolated workspaces for corporate applications. Data discovery and policy control of data in transit or rest on device. Good Technology, MaaS360, MobileIron, Mocana, Nukona/Symantec Fixmo, Enterproid, Red Bend, VMware RSA, Citrix Zenprise Since secure access to , calendar, and contact information was one of the initial mobile use cases, secure messaging was one of the first enterprise class mobile applications to reach the market. Vendors soon realized that the application hardening techniques being used to build these one- off applications could be abstracted and applied generally to existing consumer applications, or could be used as part of mobile application development. The availability of hardened applications therefore includes existing enterprise applications, wrappers for modifying existing consumer grade applications, and SDKs that developers can use to custom build secure applications. Several vendors offer enterprise- ready mobile enterprise business tools. Secure messaging and/or secure content management products on the market include Mobile Management (Airwatch), Mobile Content Management (AirWatch), Bitzer Enterprise Application Mobility (Citrix), ShareFile (Citrix), Secure Document Sharing with MaaS360 (Fiberlink), Good for Enterprise and Mobile Collaboration (Good Technology), Mobile Enterprise Compliance and Security Server (Mobile Active Defense), and Docs@Work (MobileIron). While the market for mobile enterprise software will continue to expand, it is, for now, limited in scope when compared to that which is available for PCs. Consumer grade applications can be wrapped, with limited need for application developer participation, but hardening can affect the user experience. SDKs provide a means of incorporating security features into mobile applications from the start of the development process, but require much more from the application development community. Developers must become comfortable with a host of security features, such as built- in encryption for data at rest and in motion; application level policy controls, such as passcode management and integrity checks on the device before application launch; and remote wipe and lock on a per- application basis. This space has attracted numerous start ups, including BitzerMobile, Enterproid, Fixmo, Fiberlink, Good Technology, MobileIron, Mocana, Mokafive, Nukona (acquired by Symantec), and OpenPeak. Mobile application security is just one component of broader mobile application management. Provisioning and inventory management through enterprise application stores is also important, as is use monitoring, auditing, reporting, and compliance management. In practice, gray areas will exist with respect to applications because employees will want to use existing third- party mobile applications with which they are familiar. 8
9 Organizations should work with a green, yellow, and red frame of reference. Within such a frame of reference, green applications are supported, maintained and perhaps even required; yellow applications are tolerated, but not supported; and red applications are blocked. Products are currently available to help organizations rate the reputation of mobile applications. Building Solutions Players in the mobile market are building out suites of products to address these requirements, but it is difficult to single out one vendor that delivers best- of- breed functionality across the board. Enterprises will often need to mix and match products from multiple vendors, depending on their primary use cases and on their particular market of corporate constraints. Before considering typical use cases, however, cost and project management should be addressed. The goal is to add the appropriate level of security as the amount of work performed on mobile devices increases and diversifies, but this must be accomplished without negatively impacting the usability of the device. In general, as the number of security controls increases, usability decreases, and costs increase. All of these variables scale with the number of corporate applications on the device Security Costs Usability 1 0 Number of Corp. Apps on Device Figure 1 Security Requirements, Usability, and Cost Versus the Number of Corporate Applications on the Device 9
10 Reading List Mobile Security Buyer s Guide Part 2: Costs and Use Cases. NSS Labs security- buyers- guide- part- 2- costs- and- use- cases Exchange ActiveSync Client Comparison Table activesync- client- comparison- table.aspx 10
11 Contact Information NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX USA +1 (512) This analyst brief was produced as part of NSS Labs independent testing information services. Leading products were tested at no cost to the vendor, and NSS Labs received no vendor funding to produce this analyst brief NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 11
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Implement Mobile Device Management to Deploy HCSS Mobile Apps
Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo [email protected] Our Goal Understand mobile device management and its benefits Examine different
Internet Advertising: Is Your Browser Putting You at Risk?
ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Evolutions in Browser Security
ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
ENTERPRISE EPP COMPARATIVE REPORT
ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET
Five Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
MobileIron and Samsung Value Proposition
MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview
SSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
SANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
Multiple Drivers For Cyber Security Insurance
ANALYST BRIEF Multiple Drivers For Cyber Security Insurance EXPECTATIONS PLACED ON INSURANCE CARRIERS RISE WITH MARKET GROWTH Author Andrew Braunberg Overview There has been considerable good news for
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Mobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
SANS Mobility/BYOD Security Survey
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
On the Radar: Pulse Secure
Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
The Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
MAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013
WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest
Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility
Enabling a Mobile Enterprise Mark Holobach Senior Systems Engineer Citrix Mobility Enabling a Mobile Enterprise Your Technical Blueprint To Getting Started Mark Holobach Citrix Systems How Mobile Feels
Device Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
Key Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
BES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Compatibility Matrix BES12. September 16, 2015
Compatibility Matrix BES12 September 16, 2015 Published: 2015-09-16 SWD-20150916153710116 Contents Introduction... 4 Legend...5 BES12 server... 6 Operating system...6 Database server...6 Browser... 8 Mobile
An Old Dog Had Better Learn Some New Tricks
ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many
Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
Samsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
BROWSER SECURITY COMPARATIVE ANALYSIS
BROWSER SECURITY COMPARATIVE ANALYSIS Privacy Settings 2013 Randy Abrams, Jayendra Pathak Tested Vendors Apple, Google, Microsoft, Mozilla Overview Privacy is an issue on the front lines of the browser
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Critical Capabilities for Mobile Device Management
G00230106 Critical Capabilities for Mobile Device Management Published: 8 August 2012 Analyst(s): Monica Basso, Phillip Redman Mobile device management offerings are expanding from traditional configurations,
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Enterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility [email protected] / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
Page 1 of 16 for Mobile Device 8 August 2012 ID:G00230106 Analyst(s): Monica Basso, Phillip Redman VIEW SUMMARY Mobile device management offerings are expanding from traditional configurations, policy
Compatibility Matrix. VPN Authentication by BlackBerry. Version 1.7.1
Compatibility Matrix VPN Authentication by BlackBerry Version 1.7.1 Published: 2015-07-09 SWD-20150709134854714 Contents Introduction... 4 Legend...5 VPN Authentication server... 6 Operating system...6
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
MaaS360.com > White Paper. Mobile Data Security. Finding the Balance
Mobile Data Security Finding the Balance 1 Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink, an IBM
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet
EndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER
The top five enterprise mobility management vendors: product focus and financials
The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Flyer 1. Meet evolving enterprise mobility challenges with Samsung KNOX
Flyer 1 Meet evolving enterprise mobility challenges with Samsung KNOX Solve today s dynamic enterprise mobility demands with the right solution platform Enterprise Mobility Trends The growth of enterprise
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Mobile Device Management Glossary. www.maas360.com
Mobile Device Management Glossary www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink,
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Securing BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
