anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape



Similar documents
Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

IT Enterprise Services

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

ForeScout MDM Enterprise

The ForeScout Difference

How To Make Your Computer System More Secure And Secure

Smart Givaudan. From BYOD experience to new mobile opportunities

Windows Phone 8 Security Overview

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

MDM and beyond: Rethinking mobile security in a BYOD world

Securing Enterprise Mobility for Greater Competitive Advantage

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Choosing an MDM Platform

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune

Readiness Assessments: Vital to Secure Mobility

Windows Phone 8 Security deep dive

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Simplifying Desktop Mgmt With Novell ZENworks

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IT Self Service and BYOD Markku A Suistola

Secure Mobile Solutions

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

CHOOSING AN MDM PLATFORM

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

The Maximum Security Marriage:

BYOD Management : Geo-fence

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Ben Hall Technical Pre-Sales Manager

When enterprise mobility strategies are discussed, security is usually one of the first topics

Mobile Access Software Blade

Enterprise Mobility Services

Embracing Complete BYOD Security with MDM and NAC

Mobile device and application management. Speaker Name Date

AirWatch Solution Overview

Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

An Intelligent Solution for the Mobile Enterprise

activecho Driving Secure Enterprise File Sharing and Syncing

How To Support Bring Your Own Device (Byod)

Empowering People-Centric IT. October 2013

IT Resource Management & Mobile Data Protection vs. User Empowerment

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

VMware End User Computing Horizon Suite

How To Manage A Mobile Device Management (Mdm) Solution

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Chris Boykin VP of Professional Services

Howtomanage and protectend usersdata? Mati Raidma

How To Write A Mobile Device Policy

The Future of Mobile Device Management

APRIL Must-Have Features for Endpoint Backup

Mobile Security & BYOD Policy

Solve BYOD with! Workspace as a Service!

Google Identity Services for work

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

Enabling Enterprise Mobility Through People-Centric IT. October 2014

If you can't beat them - secure them

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

What We Do: Simplify Enterprise Mobility

BYOD(evice) without BYOI(nsecurity)

The Changing Role of the CIO. An IDC InfoBrief, sponsored by Samsung Canada March 2014

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

BYOD (Bring Your Own Device)

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Dell World Software User Forum 2013

Dell World Software User Forum 2013

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

New Features: What s new in Windows Intune?

IT Resource Management vs. User Empowerment

SA Series SSL VPN Virtual Appliances

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Microsoft Enterprise Mobility Suite

Transcription:

Office

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

Consumers adopting mobile

RISKS

Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying and managing applications across platforms is difficult. Users need to be productive while maintaining compliance and reducing risk.

Great experience across devices and hardware Enables the new multi channel

Security Considerations Unified Identity Management UEFI secure boot TPM cryptographic protection Prevent hardware-based attacks Standards-based hardware Biometrics Trusted boot Store apps App sandboxing App platform commonality Real time anti-phishing protection Secured browser Device attestation Device encryption all editions IP protection with IRM Corporate encryption enforcement Corporate compliance Selective Wipe

Unified Device Management Devices & Platforms IT Single admin console Windows PCs/Tablets (x86/64, Intel SoC), Windows To Go Android Mac OS X Windows RT Windows Phone 8 ios Android

Secure boot and secure apps

Full device encryption

Bring Your Own Device Dilemma What is BYOD (Bring Your Own Device)? Recent trend of employees bringing personally-owned mobile devices to their place of work, and using those devices to access privileged company resources. Globally, 88% of executives report employees are using their personal computing technologies for business purposes today* Globally, 62% of executives say they are now have or are planning to have a BYOD program for smartphones and tablets* * Gartner: Using Peer-to-Peer communities to Drive BYOD self-support; Aug 3, 2012

BYOD pros and cons Pros For businesses Reduced Cost (employee devices) Employees take care of personal devices Embracing newer technologies For employees Empowerment Work with preferred technology Exclusive control over features Cons For businesses Company information less secure Administrative effort Increase Cost (Infrastructure & Administrative) May need to pay for phone service for the devices Compliance, Legal & HR Considerations For employees May not fully control their devices Out-of-pocket expense Responsible for device maintenance

Top BYOD security considerations for enterprise BYOD blurs the line between enterprise and personal computing, which significantly complicates the job of governance, risk, and compliance management Defining a security policy Enforcing security policies Information on devices Interactions with the cloud Unmanaged connections to the internal network Source: http://www.cioupdate.com/technology-trends/byod-byoc-may-change-everything-about-security.html

BYOD strategies Trust Risk Access Employee influences Company influences Employee manages Company manages Employee purchases Company purchases Source: http://blogs.msdn.com/b/arnoha/archive/2012/04/09/a-framework-for-byod-byoc.aspx Freedom

Enterprise Scenarios

Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying and managing applications across platforms is difficult. Users need to be productive while maintaining compliance and reducing risk.

Apps Opportunity Apps for Customers (Store) Internal line of business apps

Robust application platform

Application platform security

Support for private business apps

Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying and managing applications across platforms is difficult. Users need to be productive while maintaining compliance and reducing risk.

Information Rights Management

Empower users Simplified registration and enrollment for BYO devices Automatically connect to internal resources when needed Access to company resources is consistent across devices Unify your environment Common identity to access resources on-premises and in the cloud Protect your data Centralize corporate information for compliance and data protection Policy-based access control to applications and data

Office