Mobile Security Buyer s Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Mobile Security Buyer s Guide"

Transcription

1 ANALYST BRIEF Mobile Security Buyer s Guide PART 1: THE BASICS Author Andrew Braunberg Overview The consumerization of information technology (IT), particularly relating to the increasingly common bring your own device (BYOD) policy, is one of the most important technology trends affecting businesses today. As such, it has resulted in a critical need for enterprises to address security issues associated with the use of such consumer mobile devices on corporate networks. The availability of easy- to- use smartphones, cloud services, and collaborative social networks is creating new work and productivity patterns for employees; however, these new practices are often being implemented without the approval of IT departments or, even worse, without their knowledge. Enterprises that have yet to address these trends should do so quickly. This guide is intended to help enterprises understand the choices available to address security concerns associated with the use of mobile devices on corporate networks. The Mobile Security Buyer s Guide is comprised of two analyst briefs: Part 1: The Basics introduces the technologies, products, and vendors in the mobile security market, while Part 2: Costs And Use Cases highlights the more common use cases and costs associated with managing and securing mobile devices, including a chart that maps available security products to use cases. NSS Lab Findings: The mobile device management (MDM) market is quickly maturing and expanding; there are dozens of vendors in the market today. From a security perspective, MDM delivers a fairly commoditized set of features that are ultimately controlled by the functionality permitted by each mobile operating system (OS). The mobile application security segment is changing as a broad new set of products providing richer and more data- centric security features to mobile devices enters the market, Two important metrics to consider when assessing whether a mobile security technology will find market acceptance are the technology s impact on the end user experience and the demands it makes on application developers. Mobile security is a volatile market and NSS expects large numbers of new products to enter the market for the foreseeable future.

2 Traditional security vendors are adopting a more visible role in the protection and management of mobile ecosystems. Enterprises will often need to mix and match products from multiple vendors, depending on their primary use cases and on their particular market of corporate constraints. While malware is still a relatively minor threat on mobile devices (besides Android), phishing is not. NSS Labs Recommendations: Organizations should approach mobile security in a measured, thoughtful manner. IT personnel should work collaboratively with end users to achieve the best possible balance of productivity and security. Data protection must be the primary security goal of organizations. Enterprises should view MDM as providing a minimum level of security for mobile devices that access corporate networks. Enterprises need to take a best- of- breed approach to building solutions, since security requirements differ significantly depending on individual use cases. 2

3 Analysis Drivers: Consumerization of IT and the Response from Enterprises In 2011, shipments of smartphones exceeded total PC shipments for the first time. This represents a sea change in the way that people consume information and in their use of computers. The number of mobile applications that are being downloaded for both Apple ios and Google Android devices now averages more than one billion per month. That s not a wave, it s a tsunami, and it is being pushed along one consumer purchase at a time. Knowledge about these consumers is as important as the volume of devices being sold. Consumer requirements are driving the mobile market today, with profound implications for enterprises, since these devices and their applications increasingly find their way onto corporate networks. As of February 2013, 57 percent of American adults owned a smart phone. Ninety percent of these phones run either Apple ios or some variant of Google Android. These consumers want to bring their devices to work for several reasons, most obviously because they are personally invested in the technology. Such market- based endorsements represent an emotional and financial investment from the consumer. It is an easy progression for consumers to decide that the same communication, collaboration, and research tools that enhance their personal lives are also adaptable to their work lives. For the last couple years, enterprises have often been caught off guard by the speed and pervasiveness of the consumerization of IT phenomenon. Saying no to consumer mobile devices is no longer is an option for most IT or information security (IS) teams. Today, some of the largest companies in the world, such as Cisco and IBM, have broadly embraced the consumerization of IT. This is often manifest in the BYOD policy, where employees are allowed to use their personal devices to access corporate resources; however, a BYOD policy that amounts to allow all is a mistake. It is important not to conflate the consumerization of IT trend with a corporate policy decision to allow BYOD. The latter is clearly a response to the former, but it is not the only response, nor is it the best response. What is needed is a managed approach to balance the employee desire to use consumer devices with the business requirements for security, compliance, and control. The idea that these business requirements are somewhat negotiable does not sit well with many traditional IT/IS departments; however, these departments generally no longer determine every aspect of technology deployment within an organization because employees now have numerous ways to end run uncooperative IT departments. BYOD policies have been particularly hard on Research in Motion (RIM), the maker of Blackberry phones, which has never been a major player in the consumer market. The company s share of the overall smartphone market continues to slip; it is currently less than 5% globally 1. Concerns about the long- term viability of the company and the reliability of its infrastructure have customers working on contingency plans that would allow them to move to other mobile platforms. While Apple ios and Google Android are the clear choices today, Microsoft Windows Phone 8 may also be a longer term competitor, given the trust and familiarity that enterprise IT shops have with Microsoft and its products /android- beats- ios- 5- to- 1- in- q3- smartphone- market- share/ 3

4 Options The first place to which most organizations turn is MDM. There are dozens of MDM vendors in the market that provide provisioning, configuration, security, and management of mobile devices. However, MDM is only a start, and it is expected that the features in these products will continue to be subsumed by the mobile OS vendors and the device manufacturers. Indeed, more enterprise class controls are being built into mobile operating systems with each new release, and a fairly consistent base of features is likely to emerge across the leading mobile operating systems. MDM vendors continue to differentiate their products in several directions, such as broader mobile OS support, cloud- based delivery options, richer reporting features, enterprise app store support, and the inclusion of additional cost control capabilities. Concurrently, the rich ecosystem of third- party vendors that has emerged to augment native device capabilities in heterogeneous environments will increasingly focus on a broader set of capabilities. There are several important classes of functionality on top of MDM that enterprise customers should be looking for, and NSS believes that the two main areas of focus should be security and mobile application management (MAM). Current MDM products do address these functional areas, but not to the degree that is required going forward. The Basics: MDM MDM products emerged because of the difficulties of using non- Blackberry devices in business environments. Apple s iphone and the many variants of Google Android devices are primarily designed with consumers in mind; however, this is slowly changing as the boundary between business and private use continues to blur. MDM products address the limitations in these devices by enabling device provisioning, configuration, security management, software management, inventory management, and continuous monitoring and support. As the name implies, MDM has traditionally delivered mobile lifecycle management with a device orientation, from provisioning to remote data wipe if the device is lost or if an employee leaves the organization. Despite the continued flow of new entrants to an already crowded market, the MDM market is relatively mature. This is because all MDM vendors rely on mobile OS interfaces to enable their functionality. In the case of Apple devices in particular, access to low level OS functionality is prohibited altogether, severely restricting any form of innovation on the part of MDM vendors. This means that many basic features are uniform and are done through the same mechanisms. More importantly, there is a fundamental limit to what can be accomplished with a device- level orientation. This has driven MDM vendors and many other mobile players to introduce additional products to augment mobile devices. 4

5 BASELINE MDM CAPABILITIES Provisioning/Configuration Remote lock/wipe Feature control/disable Inventory management Software management Enterprise App Store Device monitoring Reporting Help Desk/Service management Expense management Security Blackberry has traditionally been the gold standard with respect to security on a mobile device, but other mobile operating systems are catching up, particularly Apple ios. The strength, and appeal, of consumer devices relies largely in their general ease of use and broad application availability. From a security point of view, however, IT/IS personnel are generally neutral on the former attribute and suspicious of the latter, and neither Apple nor Google have made it a priority to address the concerns of business users. There are several important security features that can be activated out of the box on both platforms. And the OS vendors provide application programming interfaces (APIs) that allow numerous third- party products to augment the security shortcomings in these devices. General device controls are a good start, but they are coarse- grained and must be augmented with many additional security capabilities and policy controls. Organizations should carefully consider what needs protection. The real focus should not be on securing the device, which the enterprise may not even own, but on protecting any corporate data on that device (or data that is moving to and from that device). All non- Blackberry devices used on corporate networks will require some third- party security and management software. The exact amount required will depend on the devices being used, the use cases of employees, and any compliance considerations. Mobile security products can be grouped into four basic categories: General consumer- grade device controls: Examples include passcode use enforcement and remote location capabilities in case of loss or theft. The controls provide a base level of protection against end user misfortune or stupidity. They can be thought of as security features that are enabled out of the box and are designed for security conscious consumers. 5

6 Advanced configuration policy support and feature controls: Exploiting these features typically requires the use of third- party MDM products, but provides a much richer set of configuration and security policy settings. Network access control (NAC) products have also found application in the discovery and control of unmanaged mobile devices attempting to access network resources. Traditional threat protection: (For example, Anti X, URL scans). Much of the malware concern associated with mobile devices is focused specifically on the Android platform. Data protection (For example, encryption and data loss prevention) and application hardening: Protecting corporate data on mobile devices should be the ultimate goal of any security strategy. The level of security required depends on several factors. These factors are covered in detail in the companion document in this series: Part 2: Costs And Use Cases. At the very least, businesses should assume that addressing a base level of security will require the use of third- party MDM software in order to enable configuration and policy controls. RIM s Blackberry Enterprise Server (BES) delivers the most sophisticated and fine- grained policy controls, but historically just for RIM devices. As a benchmark, Blackberry BES supports approximately 550 configuration and security policies. Apple, Google, and Microsoft provide some management and security APIs that allow third- party MDM vendors to provide additional security policy controls on these platforms. Apple, Google, and Microsoft all also have varying levels of support for Microsoft Exchange ActiveSync (EAS). EAS enables approximately 100 mobile policies and features. At a minimum, NSS Labs expects all devices used in corporate environments to support some level of EAS. Several leading MDM vendors use NitroDesk s TouchDown client to augment their EAS feature support. MDM vendors currently OEMing TouchDown are MobileIron, Notify Technology, Sybase Afaria, AirWatch, Fiberlink (MaaS360), SOTI MobiControl, Citrix Zenprise, REVIVAL, 3LM, Wavelink Avalanche, Capricode, Tangoe MDM, and Symantec. While Android is generally considered the least secure, and the least manageable, of the leading mobile operating systems, it is receiving the most third- party help to improve its standing. Android device OEMs are delivering enterprise- ready versions of their mobile devices. For example, Samsung offers Samsung Approved for Enterprise (SAFE) devices that are preconfigured with encryption, MDM, VPN, and secure connectivity software (i.e., wireless local area network (WLAN) security) from a host of third- party security providers. SAFE also supports a much richer set of Microsoft EAS policies than does native Android. Samsung s more recently announced KNOX focuses on additional platform security, applications security, richer MDM APIs and theft recovery features. (For more details see the Samsung KNOX whitepaper.) 2 The impact of consumerization of IT and BYOD policies on corporate WLAN infrastructure is an important consideration from both a security and a performance perspective. Network access control (NAC) products are being adopted to enable the discovery of unmanaged mobile devices attempting to access network resources. NAC products can augment MDM solutions, and partnerships between NAC and MDM vendors are forming, such as the union between MaaS360 and ForeScout. As mobile devices are used in the role of corporate endpoint computing devices, their attack surfaces increase and so does their appeal to malware writers. This is evidenced by the growth in reported malware on Android devices and by the appearance of rogue applications in Google s application store. To address these issues, security 2 images/resource/white- paper/2013/05/samsung_knox_whitepaper_april2013_v1.1-0.pdf 6

7 vendors are porting traditional endpoint security products to mobile platforms. These technologies include VPN, encryption, identity management, web filtering, Anti- X scanning, and personal firewalls. It is expected that traditional security vendors will take an increasingly visible role in protecting and managing mobile ecosystems. The need for traditional endpoint security products on mobile devices currently differs significantly by mobile platform. Apple ios has proved itself immune from malware, while Android has become the preferred target of mobile malware writers. Apple s success is chiefly attributed to its closed application ecosystem. Apple requires that all code running on ios devices is approved by Apple and is digitally signed using an Apple- issued certificate. This requirement extends Apple s secure chain of trust, which begins with system boot up. 3 While malware is currently manageable on most mobile devices, phishing attacks are a serious problem for all. Secure mobile browser applications are appearing on the market to help alleviate this problem. Beyond simply securing the device, enterprises need to move quickly to better protect corporate applications on mobile devices and thus the corporate data that resides within these applications. MDM vendors have reacted to this requirement, with several vendors introducing versions of their data loss prevention (DLP) products for mobile devices. The goal of these solutions is to provide real- time monitoring (and potential blocking) of data moving to and from mobile devices. Vendors such as RSA, Symantec, and Websense have introduced products in this space, and Zenprise (now a part of Citrix) is one of the few traditional mobile players to enter this segment. There are other approaches to the problem of securing corporate data on mobile devices, such as virtualization. These products are marketed as providing dual personae (one personal and one corporate) for mobile devices. The idea is that all corporate applications and data will be stored in a secure and encrypted partition, or vault, on the device, and all personal applications and data will be stored in the standard user space. This approach has attracted interest from the leading server virtualization vendors (for example, Citrix and VMware), as well as from several startups, such as Red Bend and Open Kernel Labs (acquired by General Dynamics). Type 1 (i.e., bare metal) and Type 2 mobile client hypervisors are currently on the market. Virtualization is an interesting approach, but products have been slow to enter the market and questions remain regarding their impact on device performance and on the end user experience. Two virtualization vendors to watch closely in 2013 are Red Bend and VMware. Red Bend has partnered with mobile chip designer, ARM. Red Bend s hypervisor will run in ARM s new Cortex A15 processor, to be delivered this year. VMware also expects its hypervisors to ship this year, through partnerships with LG, Motorola, and Samsung. New classes of security products are emerging in the mobile space, with specific focus on data management and security on a per application basis. Because security is a chief component of mobile application lifecycle management, application- specific security products are an important segment of this market. Mobile Application Management When vendors talk about mobile application management (MAM), they are usually talking about mobile application security, although there is more to it than just that. The primary goal of this security is to ensure the confidentiality, integrity, and availability of corporate data on mobile devices. There are six technical approaches that are being applied to this problem: enterprise class mobile applications, app wrappers, software development kits (SDKs), sandboxes, virtualization, and DLP

8 These approaches can be consolidated into three strategies: individual application hardening (i.e., enterprise apps, app wrappers and SDKs), creation of a dedicated workspace (i.e., sandboxes, virtualization), and data monitoring and control (i.e., DLP). APPLICATION SECURITY STRATEGY CHIEF CHARACTERISTIC VENDOR EXAMPLES Application Hardening Secure Workspaces DLP Secure apps or security feature libraries (for example, authentication, encryption) for building/modifying apps. Isolated workspaces for corporate applications. Data discovery and policy control of data in transit or rest on device. Good Technology, MaaS360, MobileIron, Mocana, Nukona/Symantec Fixmo, Enterproid, Red Bend, VMware RSA, Citrix Zenprise Since secure access to , calendar, and contact information was one of the initial mobile use cases, secure messaging was one of the first enterprise class mobile applications to reach the market. Vendors soon realized that the application hardening techniques being used to build these one- off applications could be abstracted and applied generally to existing consumer applications, or could be used as part of mobile application development. The availability of hardened applications therefore includes existing enterprise applications, wrappers for modifying existing consumer grade applications, and SDKs that developers can use to custom build secure applications. Several vendors offer enterprise- ready mobile enterprise business tools. Secure messaging and/or secure content management products on the market include Mobile Management (Airwatch), Mobile Content Management (AirWatch), Bitzer Enterprise Application Mobility (Citrix), ShareFile (Citrix), Secure Document Sharing with MaaS360 (Fiberlink), Good for Enterprise and Mobile Collaboration (Good Technology), Mobile Enterprise Compliance and Security Server (Mobile Active Defense), and (MobileIron). While the market for mobile enterprise software will continue to expand, it is, for now, limited in scope when compared to that which is available for PCs. Consumer grade applications can be wrapped, with limited need for application developer participation, but hardening can affect the user experience. SDKs provide a means of incorporating security features into mobile applications from the start of the development process, but require much more from the application development community. Developers must become comfortable with a host of security features, such as built- in encryption for data at rest and in motion; application level policy controls, such as passcode management and integrity checks on the device before application launch; and remote wipe and lock on a per- application basis. This space has attracted numerous start ups, including BitzerMobile, Enterproid, Fixmo, Fiberlink, Good Technology, MobileIron, Mocana, Mokafive, Nukona (acquired by Symantec), and OpenPeak. Mobile application security is just one component of broader mobile application management. Provisioning and inventory management through enterprise application stores is also important, as is use monitoring, auditing, reporting, and compliance management. In practice, gray areas will exist with respect to applications because employees will want to use existing third- party mobile applications with which they are familiar. 8

9 Organizations should work with a green, yellow, and red frame of reference. Within such a frame of reference, green applications are supported, maintained and perhaps even required; yellow applications are tolerated, but not supported; and red applications are blocked. Products are currently available to help organizations rate the reputation of mobile applications. Building Solutions Players in the mobile market are building out suites of products to address these requirements, but it is difficult to single out one vendor that delivers best- of- breed functionality across the board. Enterprises will often need to mix and match products from multiple vendors, depending on their primary use cases and on their particular market of corporate constraints. Before considering typical use cases, however, cost and project management should be addressed. The goal is to add the appropriate level of security as the amount of work performed on mobile devices increases and diversifies, but this must be accomplished without negatively impacting the usability of the device. In general, as the number of security controls increases, usability decreases, and costs increase. All of these variables scale with the number of corporate applications on the device Security Costs Usability 1 0 Number of Corp. Apps on Device Figure 1 Security Requirements, Usability, and Cost Versus the Number of Corporate Applications on the Device 9

10 Reading List Mobile Security Buyer s Guide Part 2: Costs and Use Cases. NSS Labs security- buyers- guide- part- 2- costs- and- use- cases Exchange ActiveSync Client Comparison Table activesync- client- comparison- table.aspx 10

11 Contact Information NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX USA +1 (512) This analyst brief was produced as part of NSS Labs independent testing information services. Leading products were tested at no cost to the vendor, and NSS Labs received no vendor funding to produce this analyst brief NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 11

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,

More information

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Implement Mobile Device Management to Deploy HCSS Mobile Apps Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo Femi@hcss.com Our Goal Understand mobile device management and its benefits Examine different

More information

ENTERPRISE EPP COMPARATIVE ANALYSIS

ENTERPRISE EPP COMPARATIVE ANALYSIS ENTERPRISE EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Ahmed Garhy Tested Products Fortinet Fortigate 100D Management station Forticlient- 5.0.7.333 McAfee VirusScan

More information

Is Your Browser Putting You at Risk?

Is Your Browser Putting You at Risk? ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

Enterprise mobile management a need or an option?

Enterprise mobile management a need or an option? perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

ENTERPRISE EPP COMPARATIVE REPORT

ENTERPRISE EPP COMPARATIVE REPORT ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Evolutions in Browser Security

Evolutions in Browser Security ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013

More information

Bold Move Further Builds Blue Coat Portfolio

Bold Move Further Builds Blue Coat Portfolio ANALYST BRIEF Bold Move Further Builds Blue Coat Portfolio SOLERA ACQUISITION PROVIDES BLUE COAT ABILITY TO LEVERAGE BIG DATA ANALYTICS Author John W. Pirc Overview On May 23, 2013, security vendor Blue

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 Consumerization of IT Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 1 Agenda What is consumerization of IT? What s the hype? And why now? Media tablets in the enterprise 2 Is

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview

More information

SSL Performance Problems

SSL Performance Problems ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation

More information

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos

More information

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

MobileIron and Samsung Value Proposition

MobileIron and Samsung Value Proposition MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Total Cost of Ownership () 2014 Thomas Skybakmoen, Jason Pappalexis Tested s Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

Siemens PLC Vulnerabilities

Siemens PLC Vulnerabilities ANALYST BRIEF Siemens PLC Vulnerabilities Author Bob Walder Overview Supervisory Control Automation and Data Acquisition (SCADA) systems are cornerstones of modern industrial society. Via the use of Programmable

More information

Multiple Drivers For Cyber Security Insurance

Multiple Drivers For Cyber Security Insurance ANALYST BRIEF Multiple Drivers For Cyber Security Insurance EXPECTATIONS PLACED ON INSURANCE CARRIERS RISE WITH MARKET GROWTH Author Andrew Braunberg Overview There has been considerable good news for

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

CORPORATE AV / EPP COMPARATIVE ANALYSIS

CORPORATE AV / EPP COMPARATIVE ANALYSIS CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Key Requirements of Enterprise Mobility Management Solutions

Key Requirements of Enterprise Mobility Management Solutions Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:

More information

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the

More information

Mobile App Management:

Mobile App Management: Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest

More information

Mobile Device Management Buyer s Guide

Mobile Device Management Buyer s Guide Mobile Device Management Buyer s Guide An Insider s View of the MDM Market Get to the bottom line on your MDM software decision Introduction The information contained in this document is based on the experience

More information

On the Radar: Pulse Secure

On the Radar: Pulse Secure Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

BYOD: The Threats and the Opportunity for Carriers

BYOD: The Threats and the Opportunity for Carriers BYOD: The Threats and the Opportunity for Carriers Adrian Drury, Practice Leader, Consumer Impact Technology adrian.drury@ovum.com Richard Absalom, Analyst, Consumer Impact Technology richard.absalom@ovum.com

More information

Mobile Device. Management-

Mobile Device. Management- Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014 Remote 2014 Monitoring & Control Securing Mobile Devices November 7 th 2014 Purpose / Agenda Ken Lewis, CISSP Director of Cross Domain Security Solutions for Tresys Technology Systems Security Engineer

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Back to the Future: Securing your Unwired Enterprise

Back to the Future: Securing your Unwired Enterprise Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

Mobile: Application Management, Infrastructure and Analytics UNION SQUARE ADVISORS LLC

Mobile: Application Management, Infrastructure and Analytics UNION SQUARE ADVISORS LLC Mobile: pplication Management, Infrastructure and nalytics UNION SQURE DVISORS LLC CONFIDENTIL DRFT Setting the Stage The mobile explosion is upon us both Consumer and Enterprise Growth in mobility accelerating,

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

The top five enterprise mobility management vendors: product focus and financials

The top five enterprise mobility management vendors: product focus and financials The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Protect Your Enterprise by Securing All Entry and Exit Points

Protect Your Enterprise by Securing All Entry and Exit Points SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

Enterprise Mobility: The Impact of Changing Employee Behaviour

Enterprise Mobility: The Impact of Changing Employee Behaviour Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus. Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT GETTING CONTROL OF MOBILITY IN THE MARKET In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business

More information

Compatibility Matrix BES12. September 16, 2015

Compatibility Matrix BES12. September 16, 2015 Compatibility Matrix BES12 September 16, 2015 Published: 2015-09-16 SWD-20150916153710116 Contents Introduction... 4 Legend...5 BES12 server... 6 Operating system...6 Database server...6 Browser... 8 Mobile

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices

More information

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville

More information

Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility

Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility Enabling a Mobile Enterprise Mark Holobach Senior Systems Engineer Citrix Mobility Enabling a Mobile Enterprise Your Technical Blueprint To Getting Started Mark Holobach Citrix Systems How Mobile Feels

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview

More information

IBM United States Software Announcement 215-078, dated February 3, 2015

IBM United States Software Announcement 215-078, dated February 3, 2015 IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

As worldwide growth in the mobility market surges among both business and personal users,

As worldwide growth in the mobility market surges among both business and personal users, February 2012 Galvin Consulting, LLC EXECUTIVE SUMMARY As worldwide growth in the mobility market surges among both business and personal users, organizations are seeking ways to monitor, manage and secure

More information

Compatibility Matrix. VPN Authentication by BlackBerry. Version 1.7.1

Compatibility Matrix. VPN Authentication by BlackBerry. Version 1.7.1 Compatibility Matrix VPN Authentication by BlackBerry Version 1.7.1 Published: 2015-07-09 SWD-20150709134854714 Contents Introduction... 4 Legend...5 VPN Authentication server... 6 Operating system...6

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION

WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION WHITE PAPER THE 7 KEY FACTORS IN CHOOSING A MOBILE DEVICE MANAGEMENT SOLUTION Executive Summary Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities

More information

MaaS360.com > White Paper. Mobile Data Security. Finding the Balance

MaaS360.com > White Paper. Mobile Data Security. Finding the Balance Mobile Data Security Finding the Balance 1 Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink, an IBM

More information

Agenda. The Mobile Tornado The Birth of Mobile IT MobileIron Company and Vision The MobileIron Solution Partnering for Success

Agenda. The Mobile Tornado The Birth of Mobile IT MobileIron Company and Vision The MobileIron Solution Partnering for Success MobileIron Overview Sid Lazizi. Regional Director South EMEA. slazizi@mobileiron.com Gabriel Vernot. Systems Engineer South EMEA. gvernot@mobileiron.com Agenda The Mobile Tornado The Birth of Mobile IT

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

Compatibility Matrix. BES12 Cloud. July 20, 2016

Compatibility Matrix. BES12 Cloud. July 20, 2016 Compatibility Matrix BES12 Cloud July 20, 2016 Published: 2016-07-20 SWD-20160719104452880 Contents Introduction... 4 Legend... 4 Browser...5 BlackBerry Connectivity Node... 6 Operating system...6 Microsoft

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Compatibility Matrix. BES12 Cloud. December 14, 2015

Compatibility Matrix. BES12 Cloud. December 14, 2015 Compatibility Matrix BES12 Cloud December 14, 2015 Published: 2015-12-14 SWD-20151214144314895 Contents Introduction... 4 Legend... 4 Browser... 4 BlackBerry Cloud Connector...5 Operating system...5 Microsoft

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER

More information

Compatibility Matrix. Strong Authentication by BlackBerry. Version 1.8

Compatibility Matrix. Strong Authentication by BlackBerry. Version 1.8 Compatibility Matrix Strong Authentication by BlackBerry Version 1.8 Published: 2016-02-03 SWD-20160203124911593 Contents Introduction... 4 Legend...5 Strong Authentication server...6 Operating system...6

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

Solve BYOD with! Workspace as a Service!

Solve BYOD with! Workspace as a Service! Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information