Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Similar documents
Mobile App Management:

IT Self Service and BYOD Markku A Suistola

Symantec Mobile Management Suite

Secure Your Mobile Workplace

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Mobile Security and Management Opportunities for Telcos and Service Providers

Symantec Mobile Management 7.2

Symantec Mobile Management 7.1

Athena Mobile Device Management from Symantec

Risk and threats everywhere, all the time

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Best Practices for a BYOD World

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec Mobile Security

Symantec Endpoint Security Management Solutions Presentation and Demo for:

What We Do: Simplify Enterprise Mobility

The ForeScout Difference

Embracing Complete BYOD Security with MDM and NAC

ForeScout MDM Enterprise

How To Support Bring Your Own Device (Byod)

Total Enterprise Mobility

IBM Endpoint Manager for Mobile Devices

#ITtrends #ITTRENDS SYMANTEC VISION

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

BYOD: End-to-End Security

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Kaspersky Security for Mobile

BENEFITS OF MOBILE DEVICE MANAGEMENT

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

If you can't beat them - secure them

Technical Note. ForeScout MDM Data Security

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

IBM United States Software Announcement , dated February 3, 2015

PULSE SECURE FOR GOOGLE ANDROID

Managing Mobility in the BYOD Era:

SA Series SSL VPN Virtual Appliances

Chris Boykin VP of Professional Services

AirWatch Solution Overview

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Managing and Securing the Mobile Device Invasion IBM Corporation

Cisco Mobile Collaboration Management Service

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Google Identity Services for work

Hands on, field experiences with BYOD. BYOD Seminar

CHOOSING AN MDM PLATFORM

Guideline on Safe BYOD Management

The Maximum Security Marriage:

Kony Mobile Application Management (MAM)

Codeproof Mobile Security & SaaS MDM Platform

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Introduction to IBM Worklight Mobile Platform

How To Protect Your Mobile Devices From Security Threats

Mobile First Government

Symantec Client Management Suite 8.0

Securing the mobile enterprise with IBM Security solutions

The User is Evolving. July 12, 2011

MAM - Mobile Application Management

Strengthen security with intelligent identity and access management

How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

Cyber and Mobile Landscape, Challenges, & Best Practices

Choosing an MDM Platform

Symantec Consulting Services

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Secure Your Mobile Device Access with Cisco BYOD Solutions

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Total Enterprise Mobility. Norbert Elek

Управление мобильными платформами: от развертывания и конфигурирования до антивирусной защиты подход Symantec. Михаил Савушкин

Advanced Configuration Steps

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Unified Security, ATP and more

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Addressing BYOD Challenges with ForeScout and Motorola Solutions

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Transcription:

Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing

Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173 M personal PCs 2015 293M personal PCs 2010 300M smartphones 2015 1017M smartphones 2010 15M tablets 2015 326M tablets 2

Changes In Working Style 80% 65% 52% 1 2 3 New apps deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices 3

The Desires of the User Versus IT Staff User IT Staff Freedom, Privacy & Productivity Easy access to files, apps, email Use the latest technology & apps Personal stuff is untouched Do it themselves (i.e. Self-Service) Simple, Secure & Reliable Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit & monitor 4

Success = Mastering Control Points Devices Apps Data without disrupting user experience 5

Managed Unmanaged Evolving Endpoint Adoption Map BYOD Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Device Company Controls Personal Device Company-owned Personally-owned 6

Use Case #1: Access SaaS Apps From Any Device 7

Symantec O 3 A Cloud Information Protection Platform End-User Any Device Symantec O 3 Intelligence Center Context-based Policies Status Monitoring Log and Audit Services Private Cloud / Data Center Symantec O 3 Gateway Identity and Access Broker Information Gateway Public Cloud Layered Protection 2F Authentication DLP Encryption Symantec O 3 Cloud, SaaS and Web Applications 8

Cloud & mobile: Opportunity And Challenge Cloud Private Cloud Mobile We should embrace BYOD, BYOA and the new mobile platform to augment productivity and innovate new business models Challenge How do we layer common protection across cloud and mobile without undermining the convenience of the mobile experience? 9

Solving the Cloud-mobile Protection Challenge A single control point: for all cloud applications and services for all users for all devices for compliance 10

Symantec O 3 Key Features Cloud Identity and Access Control Identity Integration, Single ID Federation, Password Management, SSO Context-based Authorization and Policy Strong Authentication Access Event Log Deployment Choices Cloud Information Security DLP Classification and Enforcement Encryption and Key Management Unstructured Data Encryption Mobile Sandbox Security Event Log Available 2H 2012 11

Why Symantec O 3 Proven Infrastructure Works with federated and nonfederated apps 2 Highly Scalable Leverages existing infrastructure 3 Capture Security Events Correlation of security intelligence 12

Use Case #2: Access Company & Personal Email Wi-Fi VPN CA Network Access 13

Symantec Mobile Management Standalone or Plug into SMP and SCCM Enable Activate enterprise access, apps and data easily and automatically > ios, Android, MSFT, BB, Symbian Secure Protect enterprise data and infrastructure from attack and theft > Detect JB, ensure passcodes, Manage Control inventory and configuration with massive scalability > Integrated with SMP & SCCM 14

Comprehensive Device Management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute Apps In-house apps or public-store apps Docs, videos any active content Group based management Manage Assets Centralized visibility & control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe & Full wipe 15

Device Management For Your Enterprise Symantec Mobile Management (stand-alone) Symantec Mobile Management for Symantec ITMS Symantec Mobile Management for Microsoft SCCM Built-on a widely deployed system managements platform In-built automation and workflow modules Integration with Symantec DLP, MPKI products Mature & Scalable Integrates with Symantec Endpoint Management suite ios + Android + Windows Phone + Macs + PCs + Linux Integrates with Symantec DLP and MPKI products Integrated & Efficient Integrates with Microsoft System Center Config Mgr ios + Android + Windows Phone + PCs Leverages existing investments resources & processes Faster time to value, Lower TCO 16

Unified Management with SCCM iphone + Android + PCs 17

Unified Management with SMP iphones + Android + Macs + PCs 18

Why Symantec MDM Fully functional MDM ios, Android and Windows Phone 2 Reliable & Scalable MDM Proven to support 20,000+ devices 3 Integrated MDM Unified management with Macs & PCs 19

Use Case #3: Secure ios/android/html5 Apps & Content Personal Enterprise App Store Containerized Application CRM Public Apps ACME Corp Apps Corp App Documents 20

Mobile Application Management Comprehensive App Wrapping Tech App Store Repository for internal and external mobile applications App Policy Protect app against data loss through encryption, removal control and separation of corporate data Content Center DLP policy to control confidential data access Mobile App Management 21

Symantec App Center Mobile App & Data Protection SYMANTEC APP CENTER App deployment & provisioning User authentication across apps Copy & paste prevention Per app file encryption Remote data/app wipe ios & Android support 22

Comprehensive Mobile App Management Deploy Apps Enterprise app store for internal apps Recommendations from public appstore Group based targeting Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Manage Lifecycle Revoke and update apps selectively Centralized visibility & control MDM features for policy management Protect Data Security and Management layer around data Passwords, encryption, offline access, rooting Separate corproate and personal data 23

Same security as Sandboxing, But more flexible.ipa or.apk file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 24

Business and Personal Apps and Data Co-exist 25

ios & MDM Enhancements FIPS 140-2 Level 1 Encryption for apps & data on ios devices MDM Enhancements Ability to upload config profiles Additional ios MDM restrictions Badge wrapped apps Customers in regulated verticals can confidently use App Center data protection Customers can comply with regulatory requirements with App Center Customers can use App Center for additional MDM capabilities 26

Why Symantec for Mobile Apps Quick & Easy Expedite deployment of apps with an easy-to-use SaaS app store Scalable & Seamless Enable any number of apps with no source code changes Independent of MDM Address mobile application needs without managing the complete device 27

Use Case #4: Secure Email and Prevent Malware Personal CRM Email ACME Corp Apps Corp App Documents 28

Jul-10 Oct-10 Jan-11 Apr-11 Jul-11 Oct-11 Jan-12 Android Has Malware Problem More Than 50% Of Mobile Malware Is On Android 2500 Android Malware Family Variants 2000 1500 1000 500 67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey 0 29

Symantec Mobile Security Comprehensive Protection Management Antimalware Anti-Theft Web Protection Centralized Management Advanced Protection 30

Comprehensive Protection 1 Mobile Client Collectors Metadata from Norton mobile clients Android Marketplace Crawlers APKs from over 70 Android appstores Mobile App Analysis System APK Data Extraction Static code analysis Dynamic analysis Heuristics 2 3 Security Reputation Systems Advanced Data Analytics Privacy Trust Perform ance Resource Usage App Profiles 3 rd -Party Feeds Mobile malware sample exchange Safe Web Domain Reputation Insight File Reputation Trusted Signer DB IP / Network Reputation Symantec Mobile Security for Android 31

Symantec Mobile Security for Android 1. On-device Anti-Malware Scanning Google Play Amazon Browser External Sources 2 to 10 seconds Background, Scheduled OR Manual 3 rd Party Markets 32

Symantec Mobile Security continued 2. Additional Device Protections Management 3. Central Enterprise & All Policy-based, centrally managed and all Enterprise Integrated, alongside Mobile Management (Altiris / SMP) 33

Why Symantec for Mobile Security High efficacy Monitors 70+ appstores, analyzes 3 million+ apps, information from 7 million+ active devices Enterprise Grade Security Most apps are freeware, consumer editions. SMS provides centralized mgmt including LiveUpdates Enterprise Integration Anti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with MDM 34

Control Points 5 Pillars for Enterprise Mobility User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Apps Data 35

Symantec s Comprehensive Solution User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Primary Products Symantec O 3 App Center Mobile Management Mobile Security Content Center Complementary Products MPKI VIP DLP for Mobile PGP Encryption ITMS CMS SEP O 3 36

Symantec Total Mobile Story Company Owns an Unmanaged Device BYOD Company Controls Apps & Data Only Unmanaged Managed Company Controls Standard Device User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing User & App Access Mgmt. User & App Access Mgmt. Company Controls Personal Device App& Data Protection App& Data Protection Device Management Secure File Sharing Threat Protection Secure File Sharing 3 Company Owned 1 Personally Owned 2 37

Bringing It All Together Devices. Apps. Data. 38

Accelerate virtualization of business critical applications Create mission-critical applications and databases (specifically on Oracle and Linux) Enable mobile productivity without vulnerability View HP/Symantec joint solutions at: http://hp.symantec.com/techex Presentation Identifier Goes Here 39

Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 40