BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
|
|
- Crystal Thompson
- 8 years ago
- Views:
Transcription
1 BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved.
2 VMware: Addressing the Market From Data Center to Device Desktop Laptop Tablet Phone End-User Computing Machine Desktop Mobile Content Workspace Services Software-Defined Data Center Center Management & Automation Compute Storage Networking Virtualized Infrastructure Hybrid Cloud Computing 2
3 What Do They Want? End-User Goal: Flexibility of devices, ability to switch between devices seamlessly without compromise. IT Admin Goal: Simplified and unified management across all devices 3
4 CITY HOSPITAL
5 5
6 6
7 7
8 8
9 9
10 10
11 CITY HOSPITAL CITY HOSPITAL UNIVERSITY HOSPITAL
12 CITY HOSPITAL UNIVERSITY HOSPITAL
13 13
14 14
15 CITY HOSPITAL UNIVERSITY HOSPITAL 3D medical imaging on any device All my apps in one place Patient data on the go HIPAA compliant content collaboration
16 Mobile Cloud Architecture Define Centrally, Implement Locally 16
17 Where We are Headed The Virtual Workspace Access Client & Launcher App Store App Catalog Management Application Management Content Management Device Management Common Services Identity, Authentication, Single Sign-on Access Point Social 17
18 Unsolved Problems with Mobility Security Context Internet of Things
19 A Picture of Diminishing Returns The Only Thing Outpacing Security Spend Is Security Losses IT Spend Security Spend Security Breaches 19
20 Access Gateway Many Aspects of Enterprise Mobility Security Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Device VPN Traffic Enterprise Apps & Data Repositories Storage Card USB Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 20
21 Access Gateway Security Outside the Firewall Unapproved Apps, Access MAM Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS MCM Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server MDM Device Hardware Storage Card USB Device VPN Traffic Gateway Enterprise Apps & Data Repositories Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 21
22 Open Problems with Security Outside the Firewall Are there other layers for enforcing app and data security? How can IT balance security with ease of use? Can we take risk-based approaches? 22
23 Access Gateway Security of the App: App Scanning/Behavior Analysis Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Device VPN Traffic Enterprise Apps & Data Repositories Storage Card USB Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 23
24 Open Problems with App Scanning What is the right way to characterize app behavior? How generic can these behavioral algorithms be? Is app scanning even the right approach? 24
25 Access Gateway Security Inside the Firewall Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Storage End-user USB Card Context! Device VPN Traffic VPN Enterprise Apps & Data Repositories Network Virtualization Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 25
26 Open Problems with Security Inside the Firewall How we can automate the creation of micro-tunnels to segment traffic? Can we detect suspicious activity based on behavior analysis? Can we transparently modify app behavior based on risk/threat? 26
27 Access Gateway Securing the Data Itself Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Device VPN Traffic Enterprise Apps & Data Repositories Storage Card USB Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 27
28 Open Problems with Securing the Data Itself How do we automatically identify important content that shouldn t be leaking? Is the container or encryption route the better choice? Is there a 3 rd option? Can we enable any app to open or edit an encrypted document? 28
29 Unsolved Problems with Mobility Security Context Internet of Things
30 IoT Growth Connected Things Exceeds, and Growing Much Faster Than, Number of People Billion people 6.8 Billion people 7.6 Billion people 200 Million connected devices 0.03 devices per person 12.5 Billion connected devices 1.8 devices per person 50 Billion connected devices 6.6 devices per person Source: Cisco IBSC
31 IoT Bettering Lives Connect Apply Measure Transmit Receive GLUCOSE 63 SEND 63 Blood Glocose is NORMAL Remote Acquisition
32 IoT Use Cases Healthcare Patients with non-life-threatening conditions can be monitored remotely/from home by medical staff Smart Asset ID & Tracking used across drug supply chain to prevent drug counterfeiting Industrial & Manufacturing Intelligent commercial aircrafts accurately predict which parts need replacement and when, and optimize inventories & maintenance schedules across entire fleet Smart manufacturing process respond quicker to changing customer demand, with self-organized logistics automatically optimizing production rates and inventories Electricity Smart power generation & transmission grid analysis status updates and performance data for preemptive actions, reducing number and duration of outages Smart buildings and homes analyze real time arrival and usage data to turn on/off electric devices, reducing waste and impact of energy vampires Urban Infrastructure Smart traffic management uses city-wide visibility, smart signals, and traffic flow adjustments to help alleviate congestion and rapidly respond to incidents Smart grid aggregates data from metering devices CONFIDENTIAL 32
33 Biggest Challenge for IoT Lack of Standards Today Tomorrow
34 End-to-End Integration: Eliminate Silos End Points Gateway/Transmission Data Store Data Analytics Data Analytics Private Public Big Data GATEWAY 34
35 Open Problems with End-to-End Integration How can we achieve common standards, APIs, and definitions for each area? Is there a general approach, or does it need to be more specific, e.g. by industry vertical? How can we handle the privacy implications of this always-on big data collection and analysis? 35
36 M2M Integration: Connecting End Points Locally On a factory floor On a highway In a hospital 36
37 Open Problems with Local M2M Integration How can we achieve common standards, APIs, and definitions for these interactions? How do we establish trust between local devices? How do we ensure the protection of data as it moves between devices? 37
38 Shifting Landscape Mobile/cloud architecture driving new and compelling architecture Mobile Cloud Architecture Changing industries, and industries adapting rapidly Many unsolved challenges around security, context, and Internet of Things 38
39 How You Can Help Security innovation from many different angles Mobile Cloud Architecture New insights by analyzing all the data at our fingertips Driving IoT standards at all levels 39
40 Thank you!
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationExtending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change
More informationOptimizing the Mobile Cloud Era Through Agility and Automation
Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationHow To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
More informationIntroducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI
Introducing AirWatch by VMware: Enterprise Mobility Simplified Menny Tsarfaty EUC Business Specialist MEDI Market already changed End-User Computing Vision PCs, Laptops Thin Clients Tablets, Smartphones
More informationSecuring Health Data in a BYOD World
BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security
More informationInternet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationDell Bring Your Own Device
Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationHow To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
More informationCloud Security: The Grand Challenge
Dr. Paul Ashley IBM Software Group pashley@au1.ibm.com Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and
More informationHow To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
More informationThe Identity Defined Security Alliance
The Identity Defined Security Alliance A combined solution for achieving Identity Defined Security Whether it s creation of an authentication ceremony, definition and enforcement of policy, enforcement
More informationMcAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationData Security in a Mobile, Cloud-Based World
Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted
More informationSolve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationSecurity and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationDatawire Secure Transport Value Proposition
Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationCisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More informationEnd-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
More informationTaking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationPCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationThe Software-Defined Enterprise. Thriving in the Mobile-Cloud Era
The Software-Defined Enterprise Thriving in the Mobile-Cloud Era The best way to predict your future is to create it. Abraham Lincoln IT Challenges in the Mobile-Cloud Era IT Technology Eras Mainframe
More informationIBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationDelivering Desktop Resources to Any Device As a Service
Beyond VDI: Delivering Desktop Resources to Any Device As a Service Stevan Jovanovic EUC Specialist MENA May 20 th, 2014 2014 VMware Inc. All rights reserved. Agenda 1 The Move to the Mobile Cloud 2 VMware
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationEnterprise Mobility: A Market Perspective!!
Enterprise Mobility: A Market Perspective!! Paul Black Director Telecommunications and Media IDC Middle East, Africa & Turkey Email: pblack@idc.com Direct: +971 4 446 3106 3 rd Platform Trillions of Things
More informationDelivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More information5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationFive Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
More informationVMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
More informationCloud, security and the mobile enterprise: An end-to-end manageability challenge
GreHack-2012 19 th October, Grenoble France Cloud, security and the mobile enterprise: An end-to-end manageability challenge Boris Balacheff Dave Penkler seamless, secure, context-aware experiences for
More informationSecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More information全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationGREEN HOUSE DATA. 4 Steps to Secure BYOD. Using Virtual Desktops To Increase Productivity Without Increasing Risk. Built right. Just for you.
Built right. Just for you. 4 Steps to Secure BYOD Using Virtual Desktops To Increase Productivity Without Increasing Risk Presented by Green House Data Green House Data 304 Progress Circle Cheyenne, WY
More informationFundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic
Fundamentals of Secure Collaboration in the Mobile Workforce Sinisha Patkovic 1 DISCUSSION Hyper connected X-Times future and blurring of lines between personal, social cloud, & enterprise. CIO Challenge:
More informationBeyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises
Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises www.earthlink.com 1 Are you prepared to bear the cost of mitigation if
More informationThe Next Generation Data Centers: SPECS and The 3 rd Platform.
The Next Generation Data Centers: SPECS and The 3 rd Platform. Dr. Silvio La Porta Senior Research Scientist EMC Research Europe Dr. Said Tabet Senior Technology Strategist Corporate CTO Office, EMC 1
More informationSECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
More informationEnabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX
Enabling Manufacturing Transformation in a Connected World John Shewchuk Technical Fellow DX Internet of Things What is the Internet of Things? The network of physical objects that contain embedded technology
More informationSichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013
More informationSecuring Mobile Apps in a BYOD World
SAP Thought Leadership Paper Mobile App Security Securing Mobile Apps in a BYOD World Protecting Apps Makes You More Responsive to Demands for Enterprise Mobility Table of Contents 4 The Mobile App Tsunami
More informationSimplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls
Simplifying Security & Compliance Innovating IT Managed Services Data Security Threat Landscape and IT General Controls Audit Standards and IT General Controls General IT controls discussed in AUC Section
More informationDell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations
Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining
More informationSecurity Solution Architecture for VDI
Solution Architecture for VDI A reference implementation of VMware BENEFITS Validated solution architecture provides unprecedented end-to-end security dashboard for virtual desktop infrastructure (VDI)
More information聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationClodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage
Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationProductive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationThe State of Application Delivery in 2015
The State of Application Delivery in 2015 a report by F5 f5.com/soad 1 Introduction F5 surveyed customers from more than 300 organizations (of all sizes) across a broad spectrum of vertical markets such
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationVMware Strategy: The Software-Defined Enterprise
VMware Strategy: The Software-Defined Enterprise VCCF Athens 2014 Stefanos Gouliotis Territory Manager IT Technology Eras Mainframe Client-Server Mobile-Cloud Millions of Apps Billions of Users The exponential
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationMoving to the Cloud: What Every CIO Should Know
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationNew Risks in the New World of Emerging Technologies
New Risks in the New World of Emerging Technologies Victor Chu Client Technical Professional Identity, Security, and Compliance Management Software Group IBM Malaysia Risk it s NOT a four simple letter
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationEnabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
More informationSecure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
More informationChief Security Strategist Symantec Public Sector
Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence
More informationSean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches
Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise
More informationVPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
More informationUnified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
More informationWeb Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
More informationAHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS
AHLA JJ. Keeping Your Cloud Services Provider from Raining on Your Parade Jean Hess Manager HORNE LLP Ridgeland, MS Melissa Markey Hall Render Killian Heath & Lyman PC Troy, MI Physicians and Hospitals
More informationSecuring the Database Stack
Technical Brief Securing the Database Stack How ScaleArc Benefits the Security Team Introduction Relational databases store some of the world s most valuable information, including financial transactions,
More informationRE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
More information