1 McAfee Enterprise Mobility Bringing Mobile Devices into the Security Infrastructure John Dasher 14 September 2011
2 Devices/Users (MM in Log Scale) Hypergrowth in Mobile Devices Computing Cycles in Perspective (from Morgan Stanley) 1,000, ,000 Mobile Internet 10,000 1, Minicomputer PC 10M Units Mainframe 1M Units Desktop Internet 100M Units 1B+ Units/ Users B+ Units?? The desktop internet ramp was just a warm-up act for what we re seeing happen on the mobile internet. The pace of mobile innovation is unprecedented, I think, in world history. Mary Meeker, Morgan Stanley April 2010
3 Enterprise Mobility: The Pressure is On Mobile is forcing the industry to replicate what we did last decade across an explosion of platforms this year!
4 Trends Consumerization of IT Employee-owned devices on the corporate network Device diversity ios, Android, Windows, etc. App explosion Beyond and web Mobile threat emergence Android an early favorite
5 But Enabling Mobility Brings Risk Web 2.0, Apps 2.0, Mobility 2.0 There is a policy disconnect between IT and end users HR More than half of all users don t lock their devices IT IT Sales Mobile devices predicted to be New Malware Frontier Finance Almost 1 in 5 devices are lost each year
6 Mobile Threat Outlook Hackers have set their sights on mobile The surge of mobile app & content downloads has rejuvenated hackers interest in mobile technology Mobile platforms are vulnerable The fragility of mobile device security is proven, and exploitation of vulnerabilities is accelerating No vendor or mobile OS is immune Malicious activity follows consumers everywhere and will not stop in front of Android, ios, J2ME, BlackBerry and the mobile web Threatening strategic assets Customer data, location data, billing interface, network, and brand are expected to be the most target & affected assets Android s inbuilt trusted source protection can be disabled easily
7 Mobile Malware Trend and Outlook Mobile Threat Research McAfee, Inc., June 2011
8 Mobile Malware on the Rise Device loss and theft remains a top concern, however, Android attacks have increased by 238% since Dec While Symbian remains the most attacked mobile platform in terms of total malware samples, Android has emerged as the platform experiencing the largest number of new attacks. No ios targeted attacks were found in the wild in Q2. Total Mobile Malware Samples Mobile Malware Target Platforms BlackBerry VBS MSIL Python Android Java ME Symbian 0 1Q '09 2Q '09 3Q '09 4Q '09 1Q '10 2Q '10 3Q '10 4Q '10 1Q '11 2Q '11 Source: McAfee Labs Aug 2011
9 Mobile Security Requirements Protect Mobile Devices Protect Mobile Data Protect Mobile Apps
10 McAfee s Mobile Security Direction Development and Integration Protect Mobile Devices Device management (MDM) Anti-malware Web protection Protect Mobile Data Data protection (MDM) Only viable when device security is assured Sandbox/Containers work; but at expense of user experience Protect Mobile Apps Enterprise App Store McAfee SECURE for App Stores McAfee App Alert The information contained in this document is for informational purposes only and should not be deemed on offer by McAfee or create an obligation on McAfee. McAfee reserves the right to discontinue products at any time, add or subtract features or functionality, or modify its products, at its sole discretion, without notice and without incurring further obligations.
11 McAfee Uniquely Can Accomplish This Continuum of endpoints SECURITY MANAGEMENT epolicy Orchestrator ENDPOINT AV DLP NETWORK FW NAC ndlp epolicy Orchestrator CONTENT web RISK & COMPLIANCE NAC app scanning
12 You already built one security infrastructure. Why build another? Bring Mobile Devices IN
13 McAfee s Mobile Security Integration First Step: epolicy Orchestrator EMM EMM DMZ P McAfee epolicy Orchestrator Enterprise Mobility and Security Management Bring mobile devices into the security management framework for centralized visibility and control. Set policies for all endpoints alike, and report on them all centrally to understand and manage your compliance status and risk profile at any given time.
14 McAfee s Mobile Security Integration Direction Next: McAfee VirusScan Mobile EMM EMM DMZ Anti-Malware Data Loss Prevention Application Security Enterprise Mobility and Anti-Malware Protect mobile devices and networks against viruses, spyware, botnets, and even Advanced Persistent Threats. Roll out anti-malware solution and DAT updates to devices and other endpoints alike centrally and in a policy-based way. Prove compliance with corporate and regulatory policy.
15 McAfee s Mobile Security Integration Direction Next: Secure Container and DLP EMM EMM DMZ Anti-Malware Data Anti-Malware Loss Prevention Application Security Enterprise Mobility and Data Loss Prevention Safeguard leakage of your corporate data with a secure container, at the host or mobile device, and at the network level. Start with a secure container to prevent data loss from , and ultimately extend granular data leakage prevention policies to mobile devices as you do other endpoints.
16 McAfee s Mobile Security Integration Direction Next: Secure Applications Scan Provide secure access Certify Aggregate Monitor Anti-Malware Data Loss Prevention Application Security Enterprise Mobility and the Application Security Lifecycle Start by scanning and certifying mobile applications for vulnerabilities or malware, monitoring their behavior and developing reputations for them, and providing secure access to them via network access control.
17 McAfee s Mobile Security Delivery Direction Today: On-Prem Software; Next: SaaS EMM EMM EMM DMZ On-Prem or SaaS Options Delivering Secure Enterprise Mobility in Multiple Ways Deploy enterprise mobile security as on-premise software or cloud-based software-as-a-service.
18 McAfee EMM is a delivery vehicle to bring critical security and compliance capabilities to mobile devices and McAfee + Intel are uniquely able and committed to doing so.
20 optional Self-Service Provisioning Delighting the User Go to the App Store Enter Your Credentials Agree to Corporate Policy IT Services are Auto-Provisioned Easy, Secure, Automated Easy, Secure, Automated 20 September 14, 2011
21 Self-Service Provisioning for Android Go to the Marketplace Enter Your Credentials Agree to Corporate Policy IT Services are Auto-Provisioned Easy, Secure, Automated 21 September 14, 2011
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
1 Cisco: Addressing the Full Attack Continuum A New Security Model for Before, During, and After an Attack 2 3 9 12 Issue 1 Welcome Addressing the Full Attack Continuum: A New Security Model for Before,
Research Publication Date: 13 April 2011 ID Number: G00211101 Magic Quadrant for Mobile Device Management Software Phillip Redman, John Girard, Leif-Olof Wallin As smartphones proliferate in the enterprise,
The Custom Defense Against Targeted Attacks A Trend Micro White Paper Contents Executive Summary...3 The Anatomy of a Targeted Attack...4 The Reality and Costs of Targeted Attacks...5 Strategic Choices
BEST PRACTICES WHITE PAPER A path to improving the end-user experience By David Williams, Vice President of Strategy, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
A Websense White Paper ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS: THREAT ANALYSIS AND DEFENSE STRATEGIES FOR SMB, MID-SIZE, AND ENTERPRISE ORGANIZATIONS REV 2 ADVANCED PERSISTENT THREATS AND
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
The workplace landscape is changing rapidly as people walk into the office with the expectations and sometimes the tools they carry from home. The requirements for flexibility rise even higher as employees
White Paper Getting ahead in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : March 2013 Users are demanding access to applications and services from wherever they are, whenever
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
www.pwc.com PwC Advisory Oracle practice 2012 How to drive innovation and business growth Leveraging emerging technology for sustainable growth 1 Heart of the matter Top growth driver today is innovation
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success June, 2013 Contents Executive Overview...4 Business Innovation & Transformation...5 Roadmap for Social, Mobile and Cloud Solutions...7
Putting the cloud to work for your organization. A buyers guide to cloud solutions. What s in this guide for you? If you re thinking about bringing the cloud into your business but aren t sure where to
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
Technology Enables Business Innovation akamai.com Innovative experiences must be delivered without speed bumps Accelerating Innovation In A Hyperconnected World 3 The Leading Cloud Platform for Accelerating