Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing
Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173 M personal PCs 2015 293M personal PCs 2010 300M smartphones 2015 1017M smartphones 2010 15M tablets 2015 326M tablets 2
Changes In Working Style 80% 65% 52% 1 2 3 New apps deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices 3
The Desires of the User Versus IT Staff User IT Staff Freedom, Privacy & Productivity Easy access to files, apps, email Use the latest technology & apps Personal stuff is untouched Do it themselves (i.e. Self-Service) Simple, Secure & Reliable Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit & monitor 4
Success = Mastering Control Points Devices Apps Data without disrupting user experience 5
Managed Unmanaged Evolving Endpoint Adoption Map BYOD Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Device Company Controls Personal Device Company-owned Personally-owned 6
Use Case #1: Access SaaS Apps From Any Device 7
Symantec O 3 A Cloud Information Protection Platform End-User Any Device Symantec O 3 Intelligence Center Context-based Policies Status Monitoring Log and Audit Services Private Cloud / Data Center Symantec O 3 Gateway Identity and Access Broker Information Gateway Public Cloud Layered Protection 2F Authentication DLP Encryption Symantec O 3 Cloud, SaaS and Web Applications 8
Cloud & mobile: Opportunity And Challenge Cloud Private Cloud Mobile We should embrace BYOD, BYOA and the new mobile platform to augment productivity and innovate new business models Challenge How do we layer common protection across cloud and mobile without undermining the convenience of the mobile experience? 9
Solving the Cloud-mobile Protection Challenge A single control point: for all cloud applications and services for all users for all devices for compliance 10
Symantec O 3 Key Features Cloud Identity and Access Control Identity Integration, Single ID Federation, Password Management, SSO Context-based Authorization and Policy Strong Authentication Access Event Log Deployment Choices Cloud Information Security DLP Classification and Enforcement Encryption and Key Management Unstructured Data Encryption Mobile Sandbox Security Event Log Available 2H 2012 11
Why Symantec O 3 Proven Infrastructure Works with federated and nonfederated apps 2 Highly Scalable Leverages existing infrastructure 3 Capture Security Events Correlation of security intelligence 12
Use Case #2: Access Company & Personal Email Wi-Fi VPN CA Network Access 13
Symantec Mobile Management Standalone or Plug into SMP and SCCM Enable Activate enterprise access, apps and data easily and automatically > ios, Android, MSFT, BB, Symbian Secure Protect enterprise data and infrastructure from attack and theft > Detect JB, ensure passcodes, Manage Control inventory and configuration with massive scalability > Integrated with SMP & SCCM 14
Comprehensive Device Management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute Apps In-house apps or public-store apps Docs, videos any active content Group based management Manage Assets Centralized visibility & control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe & Full wipe 15
Device Management For Your Enterprise Symantec Mobile Management (stand-alone) Symantec Mobile Management for Symantec ITMS Symantec Mobile Management for Microsoft SCCM Built-on a widely deployed system managements platform In-built automation and workflow modules Integration with Symantec DLP, MPKI products Mature & Scalable Integrates with Symantec Endpoint Management suite ios + Android + Windows Phone + Macs + PCs + Linux Integrates with Symantec DLP and MPKI products Integrated & Efficient Integrates with Microsoft System Center Config Mgr ios + Android + Windows Phone + PCs Leverages existing investments resources & processes Faster time to value, Lower TCO 16
Unified Management with SCCM iphone + Android + PCs 17
Unified Management with SMP iphones + Android + Macs + PCs 18
Why Symantec MDM Fully functional MDM ios, Android and Windows Phone 2 Reliable & Scalable MDM Proven to support 20,000+ devices 3 Integrated MDM Unified management with Macs & PCs 19
Use Case #3: Secure ios/android/html5 Apps & Content Personal Enterprise App Store Containerized Application CRM Public Apps ACME Corp Apps Corp App Documents 20
Mobile Application Management Comprehensive App Wrapping Tech App Store Repository for internal and external mobile applications App Policy Protect app against data loss through encryption, removal control and separation of corporate data Content Center DLP policy to control confidential data access Mobile App Management 21
Symantec App Center Mobile App & Data Protection SYMANTEC APP CENTER App deployment & provisioning User authentication across apps Copy & paste prevention Per app file encryption Remote data/app wipe ios & Android support 22
Comprehensive Mobile App Management Deploy Apps Enterprise app store for internal apps Recommendations from public appstore Group based targeting Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Manage Lifecycle Revoke and update apps selectively Centralized visibility & control MDM features for policy management Protect Data Security and Management layer around data Passwords, encryption, offline access, rooting Separate corproate and personal data 23
Same security as Sandboxing, But more flexible.ipa or.apk file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 24
Business and Personal Apps and Data Co-exist 25
ios & MDM Enhancements FIPS 140-2 Level 1 Encryption for apps & data on ios devices MDM Enhancements Ability to upload config profiles Additional ios MDM restrictions Badge wrapped apps Customers in regulated verticals can confidently use App Center data protection Customers can comply with regulatory requirements with App Center Customers can use App Center for additional MDM capabilities 26
Why Symantec for Mobile Apps Quick & Easy Expedite deployment of apps with an easy-to-use SaaS app store Scalable & Seamless Enable any number of apps with no source code changes Independent of MDM Address mobile application needs without managing the complete device 27
Use Case #4: Secure Email and Prevent Malware Personal CRM Email ACME Corp Apps Corp App Documents 28
Jul-10 Oct-10 Jan-11 Apr-11 Jul-11 Oct-11 Jan-12 Android Has Malware Problem More Than 50% Of Mobile Malware Is On Android 2500 Android Malware Family Variants 2000 1500 1000 500 67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey 0 29
Symantec Mobile Security Comprehensive Protection Management Antimalware Anti-Theft Web Protection Centralized Management Advanced Protection 30
Comprehensive Protection 1 Mobile Client Collectors Metadata from Norton mobile clients Android Marketplace Crawlers APKs from over 70 Android appstores Mobile App Analysis System APK Data Extraction Static code analysis Dynamic analysis Heuristics 2 3 Security Reputation Systems Advanced Data Analytics Privacy Trust Perform ance Resource Usage App Profiles 3 rd -Party Feeds Mobile malware sample exchange Safe Web Domain Reputation Insight File Reputation Trusted Signer DB IP / Network Reputation Symantec Mobile Security for Android 31
Symantec Mobile Security for Android 1. On-device Anti-Malware Scanning Google Play Amazon Browser External Sources 2 to 10 seconds Background, Scheduled OR Manual 3 rd Party Markets 32
Symantec Mobile Security continued 2. Additional Device Protections Management 3. Central Enterprise & All Policy-based, centrally managed and all Enterprise Integrated, alongside Mobile Management (Altiris / SMP) 33
Why Symantec for Mobile Security High efficacy Monitors 70+ appstores, analyzes 3 million+ apps, information from 7 million+ active devices Enterprise Grade Security Most apps are freeware, consumer editions. SMS provides centralized mgmt including LiveUpdates Enterprise Integration Anti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with MDM 34
Control Points 5 Pillars for Enterprise Mobility User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Apps Data 35
Symantec s Comprehensive Solution User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Primary Products Symantec O 3 App Center Mobile Management Mobile Security Content Center Complementary Products MPKI VIP DLP for Mobile PGP Encryption ITMS CMS SEP O 3 36
Symantec Total Mobile Story Company Owns an Unmanaged Device BYOD Company Controls Apps & Data Only Unmanaged Managed Company Controls Standard Device User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing User & App Access Mgmt. User & App Access Mgmt. Company Controls Personal Device App& Data Protection App& Data Protection Device Management Secure File Sharing Threat Protection Secure File Sharing 3 Company Owned 1 Personally Owned 2 37
Bringing It All Together Devices. Apps. Data. 38
Accelerate virtualization of business critical applications Create mission-critical applications and databases (specifically on Oracle and Linux) Enable mobile productivity without vulnerability View HP/Symantec joint solutions at: http://hp.symantec.com/techex Presentation Identifier Goes Here 39
Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 40