Kaspersky Security for Mobile

Similar documents
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Feature List for Kaspersky Security for Mobile

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Symantec Mobile Management Suite

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

BEST PRACTICE GUIDE TO SYSTEMS MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Kaspersky Security for Mobile Administrator's Guide

SecuRity technologies for mobile and Byod.

Guideline on Safe BYOD Management

IBM Endpoint Manager for Mobile Devices

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

The ForeScout Difference

Symantec Mobile Management 7.2

ForeScout MDM Enterprise

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Managing and Securing the Mobile Device Invasion IBM Corporation

BEST PRACTICE GUIDE TO CONTROl TOOLS

Symantec Mobile Management for Configuration Manager 7.2

BYOD: End-to-End Security

Symantec Mobile Management 7.1

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

RESELLER BRANDING BEST PRACTICE GUIDE TO MAIL & WEB.

CHOOSING AN MDM PLATFORM

Mobile Device Management and Security Glossary

Symantec Mobile Management 7.1

Choosing an MDM Platform

Athena Mobile Device Management from Symantec

Embracing Complete BYOD Security with MDM and NAC

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

IT Resource Management vs. User Empowerment

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Chris Boykin VP of Professional Services

Kaspersky Lab Mobile Device Management Deployment Guide

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

World-class security solutions for your business. Business Products. C a t a l o g u e

What We Do: Simplify Enterprise Mobility

What Do You Mean My Cloud Data Isn t Secure?

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

BEST PRACTICES. Systems Management.

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Cisco Mobile Collaboration Management Service

IT Resource Management & Mobile Data Protection vs. User Empowerment

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Securing Corporate on Personal Mobile Devices

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Mobile Device Management for CFAES

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

[BRING YOUR OWN DEVICE POLICY]

Mobile First Government

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Cortado Corporate Server

PULSE SECURE FOR GOOGLE ANDROID

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Security Intelligence Services.

IBM United States Software Announcement , dated February 3, 2015

White Paper. Data Security. The Top Threat Facing Enterprises Today

Addressing NIST and DOD Requirements for Mobile Device Management

How To Manage A Mobile Device Management (Mdm) Solution

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Mobile Device Management Glossary.

Healthcare Buyers Guide: Mobile Device Management

Mobile device and application management. Speaker Name Date

Secure, Centralized, Simple

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Mobility Challenges & Trends The Financial Services Point Of View

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

How To Write A Mobile Device Policy

Bell Mobile Device Management (MDM)

Codeproof Mobile Security & SaaS MDM Platform

BEST PRACTICES. Security Controls.

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Version 1.3. Kaspersky Lab FOR INTERNAL USE ONLY

Systems Manager Cloud Based Mobile Device Management

Enterprise solution comparison chart

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

Ensuring the security of your mobile business intelligence

Transcription:

Kaspersky Security for Mobile See. Control. Protect.

MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months alone, 51 per cent of organizations globally have experienced data loss due to insecure mobile devices 1. Malware and device loss or theft may seem the most obvious threats, but the trend towards Bring Your Own Device (BYOD) promises almost as many risks as benefits. Seventy-five per cent of employees choose mobile devices without any regard for security or management needs 2. But unsecured corporate data, mixed with personal applications and files, is easily exploited. Personal devices are often shared between family members, with no regard for application security; some are even rooted or jailbroken. And who s going to manage all these devices anyway? In today s always-on world, most information workers now use three or more devices for work at least one of which is a smart device. That s great for productivity, but not so easy on the person tasked with ensuring their control and security. Corporate servers, desktops, email, mobile devices, shared data, applications Employees, Contractors, Partners Personal smartphones, tablets, laptops, consumer applications Organizations Consumers 1 Ponemon Institute, 2012 2 Forrsights Workforce Employee Survey 2012 3

CHOOSING THE RIGHT SOLUTION BYOD WITHOUT THE HEADACHES The majority of vendors on the market offer separate solutions for mobile device protection and MDM. Or they offer an additional MDM console to the major corporate IT security solution. Besides the management complexity and additional expense they incur, these solutions have another significant drawback: lack of visibility and centralized control over the mobile devices and data flow can lead to IT security gaps. You need increased management visibility and security for mobile endpoints without the complexity of a separate solution. Kaspersky Security for Mobile solves these problems by enabling secure configuration and deployment of smartphones and tablets using the same console as your network security giving you the confidence that, if lost or stolen, devices are properly configured and secured. Kaspersky Security for Mobile Allows quick and easy enablement of all popular mobile devices Minimizes business risks by protecting corporate data from malware, attacks and other threats, even if the mobile devices is lost or stolen Optimizes expenses, providing a single solution for security and management of all mobile devices across the company BYOD entails a lot of multiplatform mobile devices. All of them need to be adjusted and protected. But most of all they need to be visible, controlled and managed. Kaspersky Security for Mobile can turn BYOD from a headache into a benefit. Deploying, managing and securing your mobile IT environment need not be complicated or expensive. Mobile Device Management (MDM) makes secure device configuration painless and straightforward. A mobile agent installed on the device gives all the protection you need even on employee-owned devices. Multiple platforms & single console Kaspersky Security for Mobile supports all popular mobile platforms manage smartphones and tablets from a single console. Android ios Symbian BlackBerry Windows Phone Windows Mobile MICROSOFT EXCHANGE ACTIVESYNC and Apple MDM Server Kaspersky Security for Mobile fully supports all functionality in Microsoft Exchange ActiveSync and Apple MDM. Administrators can enforce PIN settings, define password complexity, control encryption features, prevent camera usage and manage other related features. Moreover, Kaspersky Security for Mobile can track server connections and save history. There is no need to use separate Exchange and Apple MDM consoles - all actions can be performed from Kaspersky s single management console. Self-Service Portal Set up your own corporate portal using Kaspersky Security for Mobile. Upload and deliver your own approved, secure mobile applications and automate the application installation process, reducing administrator workload. OTA Application Deployment Once uploaded, the approved applications and settings can be pushed out to end users via application links or QR codes all from the Kaspersky Security Center. You get to ensure the security of the device without ever having to physically touch it users simply install the software and certificates, as well as enable corporate email, themselves. 4 5

Separate corporate and personal data STAY ON TOP OF THREATS If you re allowing BYOD, you have to accept that users will engage in usage patterns you don t like: they want to download apps, play games, browse the Internet and share files. When they move to another job, their device (and the data on it) goes with them... BYOD presents a conflict between the device owner s right to do what they want with their own property, and your company s need to protect its data. Kaspersky s containerization technology resolves this, giving everyone what they want. Here s how: Mobile devices are highly functional. And easy to lose or steal. The increasingly sensitive data they re capable of storing/sharing also has made them attractive to cybercriminals mobile malware has increased exponentially over the past three years. Don t make the mistake of believing that your chosen mobile operating system is somehow less vulnerable to threat social engineering attacks such as phishing can be executed on any device. Mobile device security is just as important as other endpoint protection and should never be overlooked. Containerization Containerization is a simple solution that completely separates personal and business content on the device the owner can continue doing whatever he likes with it, there just happens to be a small section within it a corporate container where your security policies apply. Additional container protection Because the container and data stored in it belongs to the company, the administrator can increase its security level. For example, all data in the container can be encrypted; even if the device is lost and someone manages to unlock it, the container will remain encrypted and the corporate data will remain secured. In addition, end user authorization can be enforced prior to application launch even if the device is lost when a corporate application is open, data will be protected by an additional password. When employee is leaving the company When your employee moves on to another company, you can make sure he doesn t take your data with him. Kaspersky Security for Mobile allows you to remote wipe the business container, removing all associated data leaving the owner s photos, playlists, contacts and other data and settings untouched. Anti-malware Kaspersky s award-winning anti-malware technology sits at the core of everything we do. The mobile security technologies include a blended anti-malware solution that combines traditional, signature-based detection with proactive and cloud-assisted technologies, such as Kaspersky Security Network. This improves detection rates and gives real-time protection from malware. Ondemand as well as scheduled scans ensure maximum protection automatic, over-the-air updates are essential to any MDM strategy. Anti-Theft Even if a device is lost or stolen, it need not pose any risk to the business; Kaspersky Security for Mobile can remotely block or wipe any sensitive information. The Anti-Theft functionality includes: SIM control lock or wipe a stolen/lost phone, even if the SIM is replaced Device/location tracking use GPS, GSM or WiFi to pinpoint device location Remote/selective wipe completely erase all data on any device, or just sensitive company information Remote lock prevent unauthorized access to a device; no need to wipe data Encryption Kaspersky Security for Mobile allows you to enable encryption within your corporate data container, making it easy for you to protect sensitive information stored on the device. Even if the device is lost / stolen and then rooted / jailbroken the data stored in the container remains secure. With Kaspersky, it s easy to enforce encryption technologies on the entire user device, providing additional security levels for corporate data. Safe Web Browsing This is underpinned by Kaspersky Secure Network our cloud-based service offering constantlyupdated reputation analysis, protecting users from phishing and malicious web sites. 6 7

KEEP CONTROL For companies that prefer to retain ownership of mobile devices, Kaspersky offers additional control tools. Common parameters of mobile device security Through the Kaspersky Security Center, administrators can use Microsoft Exchange ActiveSync and Apple MDM plug-ins to, among other things: control the presence and complexity of passwords, enforce whole device encryption, disable the camera or Bluetooth features and so on. Jailbreak/Rooting Detection End users attempting to jailbreak a company-owned device are grounds for suspicion. Such serious IT security violations can be detected by Kaspersky Security for Mobile. In addition to administrator notification, it can automatically perform the following: block containers, selectively wipe corporate data or wipe the whole mobile device. Application Control Administrators can manage and restrict application usage to company-approved ones only, while prohibiting the usage of unwanted or grey software. Enforce the installation of selected approved applications, making device functionality dependent on the presence of these. Application inactivity controls allow you to set time limits on how long any application can remain idle before re-log-in is required. Web Control In addition to blocking malicious sites, administrators can control access to sites that don t conform to corporate security or usage policies e.g. social media, gambling, head hunter, adult, proxy servers or online stores. TAKING THE PAIN OUT OF MOBILE DEVICE MANAGEMENT AND SECURITY Now you can get one platform that gives you Mobile Device Management capabilities as well as the world s best anti-malware protection and robust control tools. All in one console and at one cost. It closes the IT security gaps, makes all mobile devices in the corporate network visible and allows you to keep the corporate data flow under control. But this isn t just about you getting separate systems or a suite of products for one price. This is about you getting one, integrated platform that reduces risk to your data, reduces the complexity of your security tools and reduces your investment. And if your goals are to protect your data, improve your efficiency, and enable and secure mobile users, this is the only way to accomplish all three. Kaspersky Security for Mobile simplifies mobile device management, centralizing control into one easy-to-use console while providing integrated, real-time protection against threats and data loss. See. Control. Protect. 8 9

Licensing Kaspersky Security for Mobile is available as a Targeted Security Solution or as part of Kaspersky Endpoint Security for Business Select, Advanced and Total. Collaboration Mail Web Total License Management Network Access (NAC) Software Installation Advanced Select Image Management Patch Management Vulnerability Scan Data Protection (Encryption) Mobile Endpoint Security Mobile Device Management (MDM) File Server Security Application Control Device Control Web Control Kaspersky Security Center Core Anti-Malware + Firewall Cloud Enabled via the Kaspersky Security Network (KSN) Endpoint Management Contact your reseller for details and pricing. For more information, please consult www.kaspersky.com 10

Kaspersky Lab ZAO, Moscow, Russia www.kaspersky.com All about Internet security: www.securelist.com Find a partner near you: www.kaspersky.com/buyoffline 2013 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners. Mac and Mac OS are registered trademarks of Apple Inc. Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. IBM, Lotus, Notes and Domino are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Microsoft, Windows, Windows Server and Forefront are registered trademarks of Microsoft Corporation in the United States and other countries. Android is a trademark of Google, Inc. The Trademark BlackBerry is owned by Research In Motion Limited and is registered in the United States and may be pending or registered in other countries.