Managing Mobile Devices in a Corporation

Similar documents
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Norton Mobile Privacy Notice

Introduction to the Mobile Access Gateway

Good for Enterprise Good Dynamics

AirWatch Solution Overview

Secure Your Mobile Workplace

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Chris Boykin VP of Professional Services

ForeScout MDM Enterprise

The ForeScout Difference

Mobile First Government

Intermedia Cloud Softphone. User Guide

Sophos Mobile Control Technical Guide. Product version: 3

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Mobile Security and Management Opportunities for Telcos and Service Providers

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Secure iphone Access to Corporate Web Applications

AT&T Toggle. 4/23/2014 Page i

Securing Mobile Apps in a BYOD World

Sophos Mobile Control Technical guide

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

BYOD: End-to-End Security

PULSE SECURE FOR GOOGLE ANDROID

IBM Cognos Mobile Overview

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Mobile Security Solution BYOD

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Total Enterprise Mobility. Norbert Elek

BYOD Guidance: BlackBerry Secure Work Space

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobility Services

Cloud Services MDM. ios User Guide

The Secure Web Access Solution Includes:

Mobile Access Software Blade

The Incident Response Playbook for Android and ios

U.S. Cellular Mobile Data Security. User Guide Version 00.01

Ben Hall Technical Pre-Sales Manager

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

How To Secure Your Mobile Device

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Secure Work Space for Android. User Guide

Fromdistance MDM Feature Sets. Symbian^3 & S60. Windows Mobile

Junos Pulse for Google Android

Ensuring the security of your mobile business intelligence

How To Protect Your Mobile Devices From Security Threats

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Citrix Enterprise Mobility more than just device management (MDM)

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Windows Phone 8.1 Mobile Device Management Overview

Comprehensive Enterprise Mobile Management for ios 8

Systems Manager Cloud Based Mobile Device Management

How To Manage A Mobile Device Management (Mdm) Solution

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Marble & MobileIron Mobile App Risk Mitigation

Centrify Cloud Connector Deployment Guide

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

EndUser Protection. Peter Skondro. Sophos

Sophos Mobile Control SaaS startup guide. Product version: 6

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

Copyright 2013, 3CX Ltd.

Cloud Services MDM. Overview & Setup Admin Guide

AVG Business SSO Partner Getting Started Guide

Symantec Mobile Security

Sophos Mobile Control Technical Guide. Product version: 3.5

Mobile Application Security

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Introduction to the AirWatch Browser Guide

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

ios Enterprise Deployment Overview

Symantec Mobile Management Suite

Mobile Application Management with XenMobile and the Worx App SDK

Cisco Cloud Web Security Datasheet

Mobile device and application management. Speaker Name Date

DUBEX CUSTOMER MEETING

Manage Mobile Devices

Configuration Guide BES12. Version 12.2

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Threat Model for Mobile Applications Security & Privacy

Risk and threats everywhere, all the time

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Mobile app containers with Citrix MDX

Securing Office 365 with MobileIron

Transcription:

Managing Mobile Devices in a Corporation Wallace Lam Senior Regional Product Manager Regional Product Management, Mobility Solution Asia Pacific & Japan

Agenda Typical Corporation requirements on managing mobile. What technology can address these requirements. How to implement BYOD. 2

According to our experience, our customers need Email Service IT Org : I need to allow my end user to access corporate email on mobile device, and I can selective wipe corporate email from end user device without a complete device wipe. 3

According to our experience, our customers need Email Service IT Org : I need to allow my end user to access corporate email on mobile device, and I can selective wipe corporate email from end user device without a complete device wipe. Access intranet website. IT Org : I need to allow my end user to access company intranet website, I don t want to setup VPN profile on end user mobile because it is difficult to manage VPN setting on mobile. 4

According to our experience, our customers need Email Service IT Org : I need to allow my end user to access corporate email on mobile device, and I can selective wipe corporate email from end user device without a complete device wipe. Access intranet website. IT Org : I need to allow my end user to access company intranet website, I don t want to setup VPN profile on end user mobile because it is difficult to manage VPN setting on mobile. Anti-malware(anti-virus) protection for Android IT Org : End user device may access corporate network, and corporate information will store on the device (dataat-rest). I need to provide anti-malware protection on Android. 5

According to our experience, our customers need Email Service IT Org : I need to allow my end user to access corporate email on mobile device, and I can selective wipe corporate email from end user device without a complete device wipe. Access intranet website. IT Org : I need to allow my end user to access company intranet website, I don t want to setup VPN profile on end user mobile because it is difficult to manage VPN setting on mobile. Anti-malware(anti-virus) protection for Android IT Org : End user device may access corporate network, and corporate information will store on the device (dataat-rest). I need to provide anti-malware protection on Android. Distribute and secure App(in-house developed or 3 rd party) to mobile IT Org : I plan to develop App or leverage 3 rd party app to enhance end user productivity, I need a way to deploy, secure and manage Apps on mobile. 6

How technology can help you? Email Service Leveraging sandbox Email App on common mobile platform (ios and Android) as a container to store corporate email on device with different security policy. 1. SaaS and On-premise deployment option. 2. End user enroll device, install Symantec Secure Email app and get Email Profile from Server 4. (Optional) EAS traffic proxy 3. End user access Email Server via EAS push. 7

How technology can help you? Access intranet website. By leveraging Secure Browser App, and Secure Proxy system to build per-app level secure tunnel from mobile into your internal website. DMZ Intranet SSL Secure Proxy Intranet Website 8

What can we get from technologies? Flexible on-premise or SaaS technology Distribute and secure App(in-house developed or 3 rd party) to mobile Leveraging Enterprise App store to deploy and secure in-house app or 3 rd party app. 9

How to implement BYOD? Not to collect personal information (Device location, IMEI..etc). We need certain control on the device such as app install, full device wiping in case end user lose the device, however I don t want to collect and store personal information in my system. 10

How to implement BYOD? IT can selective wipe the corporate information on BYOD device, complete device wiping is not acceptable. IT need flexible wiping technology, full device wiping is only for lose device, if end user leaves company or they want to selective remove corporate content on their device, selective wiping should be supported and easy to use. 11

How to implement BYOD? Per user licensing model is better than Per device licensing model because end user may use different device for their work. End user has their own choice of device and quite often end user will use more than one device to work, per user and un-limit device license can help IT to save cost in long run. 12

How to implement BYOD? Need to separate corporate information/app from personal information/app on BYOD device. No one want the corporate data is being shared to unknown location such via consumer-base file sharing app. 13

How to implement BYOD? Maintain device security, Android device is open platform, end user can install apps from unknown source, these apps maybe malware. 14

Andriod Madware and Malware Trends Report 2013H1 The report is available on Symantec Connect. http://www.symantec.com/connect/blogs/android-madware-and-malware-trends 15

Andriod Madware and Malware Trends Report 2013H1 16

Mobile Insight Intelligence: Security Security score: includes disposition confidence and attributes Score Known Good (Trusted App) High-Confidence Good Low-Confidence Good Neutral/Unknown Low-Confidence Bad High-Confidence Bad Known Bad Attributes App prevalence App first seen date Signer (publisher) prevalence Signer first seen date Uses premium services Contains a root exploit 17

Mobile Insight Intelligence: Greyware PII / Privacy Leaks Phone # Leaks Contacts Leaks Call Log Leaks SMS Logs Leaks Pictures Leaks Microphone Audio Leaks Location Leaks Calendar Leaks Browser History Leaks Bookmarks Leaks IMEI / IMSI Leaks Device Info Leaks Settings Info Annoyances In-context ads Notification bar ads Shortcut ads Bookmark ads SMS inbox ads Changes home page Changes ring tone 18

Mobile Insight Intelligence: Performance Performance Reflects battery drain while the app is in the foreground Reflects battery drain while the app is in the background Reflects cellular bandwidth usage (relative to other apps) This App does the following: GPS Directions - Does not permit your device to enter sleep mode, reducing battery life - Continually runs the app in the background, reducing battery life - High bandwidth usage 19