Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy
|
|
|
- Angelina Phillips
- 10 years ago
- Views:
Transcription
1 Data Loss Prevention and Secure Access for Mobile Content Ojas Rege VP Strategy
2 Agenda Problem definition Enterprise requirements MobileIron solution Architecture and user experience
3 Traditional enterprise security Firewall & VPN
4 Mobile data ignores the perimeter Copy/Paste Forward Open-in
5 Secure and manage mobile apps, documents, and devices for global organizations Purpose-built for Best at apps Best at security Architected for Leaders Quadrant of 2012 Gartner MDM Magic Quadrant 3,000+ customers in 24 months 97% customer support satisfaction Focused on customer success 7 of top 10 global pharmaceutical companies 4 of top 5 global automotive manufacturers 3 of top 5 global retailers 5 of top 10 global law firms Gartner, Inc: Magic Quadrant for Mobile Device Management Software by Philip Redman, John Girard, and Monica Basso (May 17, 2012). This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
6 The MobileIron platform delivers A B End User Services Complete Mobile IT Management
7 It starts with End User Services Native experience Apps Secure data Content Browsing Separation between work & personal
8 Two primary document repositories attachments View Copy Save Open In SharePoint documents View Copy Save Open In
9 Data Loss Prevention (DLP) requirements Provide secure access to attachments Provide secure access to SharePoint documents Solve open in problem for native ios attachments Store documents securely on device Control cut / copy / paste actions Selectively wipe documents Prevent unauthorized distribution of documents Control end-to-end with policy Leverage existing on-premise content repositories
10 Secure attachments ios Native Mail App MobileIron Client REMOVE with Attachment
11 Secure SharePoint MobileIron Client REMOVE REMOVE SharePoint
12 Secure Attachments Demonstration
13 Secure SharePoint Demonstration
14 Closed-loop actions when compromised Closed-loop actions Notifies user and admin Prevents user from accessing Removes all local files, including attachments Removes SharePoint site configurations as part of protecting enterprise persona
15 Moving forward Policy-based document access for 3rd party solutions (e.g., Accellion, Box, GroupLogic) Secure tunneling on non-vpn BYOD devices Platform expansion
16 DLP best practices for ios Closed-loop compliance Continuous management Inbox protection OS integrity Attachment protection OS versioning Identity Passcode / encryption Role of icloud Auto-wipe Threat blacklist Trusted app development guidelines
17 The journey to mobile productivity Pivot to Mobile Platform Mobile First Deliver Apps & Content Adopt Devices Transformation New business processes New user experiences BYOD access Multi-OS device security Users Enterprise IT
18 Thank you
Mobile First Era with MobileIron. MobileIron Japan Twitter: @mobileironjapan
Mobile First Era with MobileIron MobileIron Japan Twitter: @mobileironjapan Into the new era! The PC/Web Era 2 The Mobile-First Era SOURCES: Asymco.com, Public Filings, Morgan Stanley Research, Gartner,
MobileIron and Samsung Value Proposition
MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global
Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts
Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts 2013 mobco MobileIron Hendrik Van De Velde Your regional
MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system
MobileIron Hendrik Van De Velde Exclusive Mobile Eco-system Agenda MobileIron Company and Vision Mobile First and Mobile IT The MobileIron Solution Mobile Device Management Mobile Application Management
Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean
Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era
Making the Enterprise Mobile First
Making the Enterprise Mobile First You can follow me at @mobilityjourney 2 MobileIron Confidential Agenda The Mobile First Era Mobility Trends Enterprise Mobility Management with MobileIron The Future
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise
MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact
Jits Langedijk Sr. Consultant [email protected]
1 Jits Langedijk Sr. Consultant [email protected] Tomorrow s Workspace Work is not a place, it s something you DO! Tomorrow s Workspace Application and Desktop Delivery Enterprise Mobility Management
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean
Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era
BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service
BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,
How To Improve Your Network Security
Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout
How to Successfully Roll Out an Android BYOD Program
How to Successfully Roll Out an Android BYOD Program Nathan Steuer, Director of Mobility Solutions Ann Marie Cullen, Advisory Services Manager Global Computing Platform Market Share! 1Billion! Android
XenMobile Live Front to Back Demo
XenMobile Live Front to Back Demo Gabriel Smyth Sr. Mobility Sales Engineer, Western Canada EPIC Technology Day November 19, 2014 XenMobile Value Proposition Enable a seamless User Experience across any
Technical Note. ForeScout MDM Data Security
Contents Introduction........................................................................................................................................... 3 Data Security Requirements for BYOD..................................................................................................................
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch
Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch 2016 VMware Inc. All rights reserved. A Leader in Enterprise Mobility Management & Security
The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014
The SDN Opportunity Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 Enterprise is moving to a New Style of IT Networking innovations lay the foundation
Mobile First: Securing Information Sprawl
Mobile First: Securing Information Sprawl January 2014 Contents: Introduction: Addressing Information Sprawl The Next Mobile First Challenge 2 1. Mobile First Platform: About Enterprise Mobility Management
Mobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
The Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS
Extending your Enterprise IT with Amazon Virtual Private Cloud Oyvind Roti Principal Solutions Architect, AWS Three Things Some AWS Concepts Let s build a Virtual Private Cloud together Three New Services
Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01
Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility
Enabling a Mobile Enterprise Mark Holobach Senior Systems Engineer Citrix Mobility Enabling a Mobile Enterprise Your Technical Blueprint To Getting Started Mark Holobach Citrix Systems How Mobile Feels
IT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
Amazon.com, Inc. and its affiliates. All rights reserved.
Amazon.com, Inc. and its affiliates. All rights reserved. How Enterprises Use AWS Augment On-Premises resources with cloud capacity Migrate existing apps & data to the cloud Build new apps, sites, services
Mobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
MobileIron Cloud Pricing Packaging
MobileIron Cloud Pricing Packaging MobileIron Cloud delivers our Enterprise Mobility Management () Solution through a purpose-built cloud platform. It provides users with seamless access to the business
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
MobileIron Product Packaging
MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content
Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing
Enterprise Mobility Security Solution Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing WHAT IS ENTERPRISE MOBILITY MANAGEMENT Enterprise Mobility Management
MobileIron Product Packaging
MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
The Ultimate Guide to Enterprise Mobility Management
The Ultimate Guide to Enterprise Mobility Management v1 Table of Contents Executive Summary 3 Avoid fear and loathing in the era of enterprise mobility 3 Why prioritize the user experience? 3 Accelerate
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
VMware End-User Computing May 8, 2014. 2014 VMware Inc. All rights reserved.
VMware End-User Computing May 8, 2014 2014 VMware Inc. All rights reserved. Sanjay Poonen, EVP & GM, End-User Computing Alan Dabbiere Chairman, AirWatch 2 Mainframe Client-Server Mobile-Cloud Thousands
Sophos Mobile Control
Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce
MAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
CWSI Service Definition for Mobile Device Management and Security
CWSI Service Definition for Mobile Device Management and Security October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1.
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
Top 10 Reasons why VDI is not a good solution for BYOD
Top 10 Reasons why VDI is not a good solution for BYOD WE KNOW A LITTLE ABOUT VDI! AMITABH SINHA, CEO PUNEET CHAWLA, CTO RANA KANAAN, VP (GM XenApp/ XenDesktop, Citrix) (Founding Engineer, VMware View)
IBM MobileFirst Protect: Secure & Manage your mobile enterprise
IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
Implement Mobile Device Management to Deploy HCSS Mobile Apps
Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo [email protected] Our Goal Understand mobile device management and its benefits Examine different
Mobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
Amazon Web Services. Steve Spano, Brig Gen (Ret), USAF GM, Defense and National Security AWS, Worldwide Public Sector
Amazon Web Services Steve Spano, Brig Gen (Ret), USAF GM, Defense and National Security AWS, Worldwide Public Sector Overview Historical Perspective of IT Transformational Value of Cloud Why organizations
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Reshaping the enterprise for the future of work. Are you ready?
Reshaping the enterprise for the future of work. Are you ready? Reshaping the enterprise for Why Pomeroy? the future of work. Pomeroy is a leading independent provider of comprehensive IT infrastructure
Gartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
MDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
IAN MASSINGHAM. Technical Evangelist Amazon Web Services
IAN MASSINGHAM Technical Evangelist Amazon Web Services From 2014: Cloud computing has become the new normal Deploying new applications to the cloud by default Migrating existing applications as quickly
#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
EMC AND VIRTUSTREAM MAY 26, 2015. Copyright 2015 EMC Corporation. All rights reserved.
EMC AND VIRTUSTREAM MAY 26, 2015 1 FORWARD-LOOKING STATEMENTS This presentation contains forward-looking statements as defined under the Federal Securities Laws. Actual results could differ materially
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Total Enterprise Mobility. Norbert Elek [email protected] www.maas360.com
Total Enterprise Mobility Norbert Elek [email protected] www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security
Mobile Security Mobile Device Management Mobile Application Management
Mobile Security Mobile Device Management Mobile Application Management Addressing MDM Challenges in Education Proliferation of mobile devices Asset tracking and multi-os management Student- and teacher-owned
Mobile device Management mit NAC
Mobile device Management mit NAC [email protected] 2012 ForeScout Technologies, Page 1 Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal
How To Secure Your Mobile Device
BREAKING THE MOBILE MOLD Mark Vondemkamp VP Security Product Management Bring-Your-Own-Device Using personal devices for business Why implement BYOD? Increase employee satisfaction, productivity Reduce
Amazon Web Services (AWS) A Secure and Scalable Platform for Global Enterprises. Tim Bixler Sr. Manager, Solutions Architecture
Amazon Web Services (AWS) A Secure and Scalable Platform for Global Enterprises Tim Bixler Sr. Manager, Solutions Architecture What is Cloud Computing? The on-demand delivery of IT resources via the Internet
The Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business
XenMobile MDM and The Mobile Solutions Bundle Jaan Feldmann Sergei Sokolov How Mobile Feels Today User Needs Freedom to access all their apps and data from any of their devices For Enterprise IT, mobile
Building your Big Data Architecture on Amazon Web Services
Building your Big Data Architecture on Amazon Web Services Abhishek Sinha @abysinha [email protected] AWS Services Deployment & Administration Application Services Compute Storage Database Networking
Salient Managed Services. Hosting and Support
Salient Managed Services Hosting and Support Salient Managed Services: Hosting and Support Salient s Managed Services provide clients with the highest level of reliability and peace of mind. We have qualified
Roadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
RPM Business Unit Jürgen Strapko Regional Sales Manager Germany Midmarket +49 162 2779830
RPM Business Unit Jürgen Strapko Regional Sales Manager Germany Midmarket +49 162 2779830 0 Agenda Begrüßung Vorstellung Riverbed als Company Riverbed Applikations- und Netzwerk Performance Management
Enterprise Archiving Simplified
Enterprise Archiving Simplified For organizations that want the peace of mind of knowing that their digital assets are always secure and within reach. 2011 Until 2000 Enterprise Archiving 2015 5 Million
Deliver Desktops as a Service! With VDI 2.0!
Deliver Desktops as a Service! With VDI 2.0! Me! About the Author! Two smart people I work with! Gartner does not endorse any vendor, product or service depicted in our research publications, and does
Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches
Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise
Critical Capabilities for Mobile Device Management
G00230106 Critical Capabilities for Mobile Device Management Published: 8 August 2012 Analyst(s): Monica Basso, Phillip Redman Mobile device management offerings are expanding from traditional configurations,
Good for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
Top. Enterprise Reasons to Select kiteworks by Accellion
Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data
Top. Reasons Federal Government Agencies Select kiteworks by Accellion
Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
