Compliance Ready Mobile Device Management (MDM)



Similar documents
February Considerations When Choosing a Secure Web Gateway

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

FireSphere Advanced APT Defense Web and Application Security Mobile Security

The Advantages of Security as a Service versus On-Premise Security

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

Symantec Mobile Management for Configuration Manager 7.2

Systems Manager Cloud Based Mobile Device Management

Symantec Mobile Management 7.2

Unmatched protection for borderless networks, covering BYOD, MDM and the Cloud

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

AirWatch Solution Overview

Ensuring the security of your mobile business intelligence

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Why Encryption is Essential to the Safety of Your Business

Symantec Mobile Management 7.2

Symantec Mobile Management Suite

Zscaler Internet Security Frequently Asked Questions

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Secure Your Mobile Device Access with Cisco BYOD Solutions

A 3-STEP PLAN FOR MOBILE SECURITY

What We Do: Simplify Enterprise Mobility

Transform EMC Object Storage Into Enterprise Storage Services

Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Securing Virtualization with Check Point and Consolidation with Virtualized Security

ForeScout MDM Enterprise

Codeproof Mobile Security & SaaS MDM Platform

The ForeScout Difference

Mobility Challenges & Trends The Financial Services Point Of View

Protect Students. Secure Data. Improve Productivity. Advanced IT Solutions to Secure and Enrich Your K-12 Community

The User is Evolving. July 12, 2011

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Cloud Roadmap to Success. October, 2014

Network and Security Controls

Nominee: Barracuda Networks

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

REVOLUTIONIZING ADVANCED THREAT PROTECTION

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

RFI Template for Enterprise MDM Solutions

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Cortado Corporate Server

Dell Bring Your Own Device

Enterprise Mobility as a Service

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI

Unified Threat Management, Managed Security, and the Cloud Services Model

High Performance NGFW Extended

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Symantec Endpoint Security Management Solutions Presentation and Demo for:

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Securing Corporate on Personal Mobile Devices

MECS: Mobile Enterprise Compliance and Security Server

High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

Readiness Assessments: Vital to Secure Mobility

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Enterprise Buyer Guide

10 easy steps to secure your retail network

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Securing Office 365 with MobileIron

Providing Secure IT Management & Partnering Solution for Bendigo South East College

e2e Secure Cloud Connect Service - Service Definition Document

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Microsoft Windows Intune: Cloud-based solution

Executive Brief on Enterprise Next-Generation Firewalls

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Mobile Security: The good, the bad, the way forward

Achieve Deeper Network Security

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Risk and threats everywhere, all the time

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

CLOUD GUARD UNIFIED ENTERPRISE

Information Technology Strategic Plan

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Achieve Deeper Network Security and Application Control

Endpoint protection for physical and virtual desktops

History, Trends and Use Cases in Enterprise Mobility Management. Preston Winn, Director Business Development, Education

Securing Healthcare Data on Mobile Devices

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

Extending FactoryTalk View Site Edition with Microsoft's Remote Desktop Services

Transcription:

Presenting Network Security Solutions: Compliance Ready Mobile Device Management (MDM) Presenters: Your Name iboss Network Security Your Title

Background on iboss Network Security Over Nine Years of Engineering: The company was founded in 2004 and originally engineered as a Bi-Directional AES Encryption Solution (iphantom), which utilized cloud architecture to protect mobile users data from being compromised. In 2005, Web 2.0, fiber Internet, and mobile technology emerged, creating a demand for Web Security to address modern enterprises. Our teams spent three years in development and created over 32 million lines of proprietary code before releasing the iboss Secure Web Gateway (SWG) product line in 2008. Innovation and Dedication: Our proprietary engineering has included 34 patents pending related to mobile security, authentication, and SSL. We ve developed scalable, proprietary cloud architecture as the foundation for all products. We found a need for greater content awareness and engineered a high-performance Threat & Event console-reporting platform. The company has expanded its product base to include Web, behavioral data, IPS, and threat security solutions to integrate with the Threat & Event console.

A World Gone Mobile By 2015mobile app development projects will out number native PC projects by a ratio of 4:1. By 2015, 80% of people accessing the internet will do so from a mobile device.

Different Mobile Device Scenarios There are two common scenarios of mobile devices on a network, those owned by an organization and Bring Your Own Devices (BYOD) user owned devices Organization Owned Organization purchases and distributes devices Have more control over device to install security agents Typically requires an organizations compliance be extended to wherever that device is on or off-premise Potential security issues when off-premise BYOD Organization does not own the device. Users bring personal device Increase technology in the organization without increasing budgets Limited ability to install a security agent on these devices The need to extend compliance on a device that you have limited control of Can introduce threats to the network

BYOD Programs Growth of Mobile Devices in Classrooms Types of Devices Elementary Middle School High School Higher Education Access to Mobile Devices A cart with a class set of mobile devices is shared by multiple classrooms Some or all classrooms have a set of mobile devices students share Some classrooms have a full class set of mobile devices and some don t Classrooms have a 1:1 ratio of mobile devices to students

Common Concerns with Mobile Devices Filtering a mix of device platforms Making mobile devices directory aware for group based policy enforcement Extending the Acceptable Use Policy (AUP) & compliance when the device is off campus Protecting network bandwidth and network resources Centralized policy and reporting management across all devices Ideally gain more control of mobile devices to push Apps, wipe, and remotely update settings Managing BYOD mobile devices in which we have limited access to physical device BYOD Specific Issues: Consistent access to the internet Reporting & Compliance Exhausting network Resources Networks can quadruple overnight Introduction of new threats through unsecured devices

Why We Need Mobile Device Management (MDM) Mobile users will outpace desktop users by 2017 MDM simplifies managing devices and expands the technology into the classroom Mobile devices allow for more productivity and the potential to work while off campus The growth of mobile devices also creates a need to extend compliance to these devices on and off premise Core compliance concerns for mobile devices whether on or off premise: -CIPA- Technology protection measure to block obscene, child pornography, or harmful to minors -HIPAA- Prevent access to unauthorized sites, transmission of sensitive information, and downloading of files with malicious code

Traditional MDM & Its Limitations Traditional MDM manages what is on mobile device Example - Push APPs, set WIFI, opening and closing the APP store Traditional MDM does NOT provide is compliance to mobile devices To achieve CIPA, COPPA or HIPAA compliance, traditional MDM requires 3 rd party integration for: web filtering data loss protection document security bandwidth management email security Increases cost to provide compliance on mobile devices 3 rd party integration typically is done through proxy settings adding complexity and increases total cost of ownership MDM and 3 rd party integration not cohesive

Security Beyond MDM for ALL Devices

Maximize Your Investment All inclusive MDM & Web Security across all devices Includes web filtering, application firewall security, and threat/reporting solutions Scalable to grow as your network expands Remember, networks can quadruple overnight when BYOD Programs are initiated Future Proof Innovative and flexible to secure the next latest and greatest device your students will bring in

TM MobileEther by iboss Security Enterprise Mobility Management

Off-Premise and BYOD Unified Security Off-Premise Mobile Security Secure across HTTPS/SSL, Applications and Threats in the cloud while off-premise Extend industry compliance such as CIPA or HIPAA Unified Security Centralized policy management applies to on and off premise devices Secure devices in the cloud with or without on premise hardware BYOD Management Tools Secures against Botnet, Malware and Data Loss Protection (DLP) Secure across HTTPS/SSL and manage applications Consistent policies Users have the same web access on BYOD device or traditional PC Make BYOD Users Directory Aware even without an existing NAC Throttle/QoS Bandwidth management Ensures BYOD users do not interrupt mission critical traffic

Integration With Existing iboss Security Products iboss MobileEther integrates seamlessly with existing iboss SWG products in seconds at no cost (not required) One policy creation erase the need to create policies for on premise vs. mobile devices Report on premise network activity and mobile device activity through central console Consistent Internet access as users move from traditional PCs to BYOD or organization owned mobile devices

TM MobileEther Provides Forensic Reporting Identify Mobile Devices by User Name, Location, and Activity Packet Level Resource Tracking Bandwidth Heat Maps Live Threat Dashboards Dynamic Geomapping Activity Malware and Botnet Reporting and Mitigation Data Loss Prevention with Suspect Data Tracking Compliance Report Automation

Conclusion The right solution will save you time & resources Protects all devices wired/mobile Secures devices wherever they are on/off campus Creates a seamless experience for the end users

The iboss Secure Web Gateway is a cost-effective, turn-key solution that addresses the complexities of today s network security needs saving your district time, resources, and money. Contact me for a personalized webinar or evaluation. Learn more at iboss University Follow us on our blog, LinkedIn & Twitter Your Name Your.name@iboss.com 877-742-6832 x your extension www.iboss.com