The Endpoint Evolution Mobility

Similar documents
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile App Management:

IT Self Service and BYOD Markku A Suistola

W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

Risk and threats everywhere, all the time

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec Mobile Management Suite

Symantec Mobile Management 7.1

Find the needle in the security haystack

Symantec Mobile Management 7.1

Best Practices for a BYOD World

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Embracing Complete BYOD Security with MDM and NAC

How To Support Bring Your Own Device (Byod)

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Mobile Application Ecosystem

Protect Your Mobile World

Symantec Mobile Management for Configuration Manager 7.2

BEST PRACTICES IN BYOD

Symantec Mobile Management 7.2

Athena Mobile Device Management from Symantec

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

Symantec Mobile Management 7.2

How To Protect Your Mobile Devices From Security Threats

Total Enterprise Mobility

BYOD: No Longer "If" but "How" Justin Martin Regional Product Manager Greg Slade Director Product Management

Solve BYOD with! Workspace as a Service!

What We Do: Simplify Enterprise Mobility

INFORMATION PROTECTION

Mobile Security and Management Opportunities for Telcos and Service Providers

MOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

AirWatch Solution Overview

Choosing an MDM Platform

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

#ITtrends #ITTRENDS SYMANTEC VISION

CHOOSING AN MDM PLATFORM

MAM - Mobile Application Management

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

Technical Note. ForeScout MDM Data Security

Kony Mobile Application Management (MAM)

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

IBM Endpoint Manager for Mobile Devices

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Comprehensive Enterprise Mobile Management for ios 8

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Enterprise Mobility Management

ForeScout MDM Enterprise

Securing Enterprise Mobility for Greater Competitive Advantage

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

How to Create and Secure Your Mobile Infrastructure. Session EM B27

The Maximum Security Marriage:

IBM United States Software Announcement , dated February 3, 2015

Securing Office 365 with MobileIron

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Unified Windows Device Management in the Enterprise

Oracle Mobile Security Management

The ForeScout Difference

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Consumerization Survey Report The Consumerization of IT

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Ben Hall Technical Pre-Sales Manager

Walter Bogorad, Lead Architect Aman Manik, Principal Product Manager. Secure File Sharing Using Norton Zone powered by Symantec

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Mobile Security Market Trends and Best Practices. 24 May 2013

Insert Partner logo here. Financial Mobility Balancing Security and Success

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Secure mobility with Citrix & Cisco

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

6 Things To Think About Before Implementing BYOD

Two-Factor Authentication

Microsoft Enterprise Mobility Suite

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

MobileIron and Samsung Value Proposition

Vodafone Total Managed Mobility

If you can't beat them - secure them

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

Codeproof Mobile Security & SaaS MDM Platform

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Statement of Direction

10 Essential Elements for a Secure Enterprise Mobility Strategy

Enterprise Mobility as a Service

Securing Mobile App Data - Comparing Containers and App Wrappers

MDM and beyond: Rethinking mobile security in a BYOD world

The Future of Mobile Computing

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

SOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business

Enterprise Mobility: winning strategies to get your organization ready for the future

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Transcription:

The Endpoint Evolution Mobility Driving Productivity Without Compromising Protection Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management

The Endpoint Evolution Mobility Driving Productivity Without Compromising Protection Mobilitet er på alles agenda. BYOD brukes i hytt og vær, men hva er viktig og hva er nødvendig? Vi setter fokus på hvordan du som rådgiver kan hjelpe brukere og IT med å oppnå frihet og produktivitet samtidig som sikkerhet og pålitelighet ivaretas.

Agenda 1 Redefining Mobile Protection and solving BYOD 2 Mastering Control Points 3 Use Cases 4 Q&A

Full Control Info/App Access Only Managed Unmanaged Consumerization is Driving disruption Sources: IDC: 227941 and 227367) Gartner: G00212068, Apr 2011 Data Sources: Gartner, & IDC Evolving Focus 246M Corp PCs 293M Personal PCs 819M Smartphones 116M Tablets Relevent Devices Today Future Devices 177M Corp PCs 300M Smartphones 15M Tablets Traditional Focus Corporate-Owned Personally-Owned Devices

New Frontiers and New Risks BYOD Adoption Is Growing Amongst EMEA Enterprise, Despite Security Concerns Cisco Study: IT Saying YES to BYOD study showed a staggering 95% of respondents saying their organizations permit employeeowned devices in some way, shape or form in the workplace. BYOD is Driving IT Crazy says Gartner Analyst IBM Banishes Apple s Siri Due to Privacy Concerns 5

End User Desires? It must be fast I want to stay flexible I hate multiple phones.. I want to be the best I can I use it when I need it.. I need access to business data I want a pink laptop.. I need to share stuff..

Technology at Work Is Changing 80% 65% 52% New apps deployed in the cloud Allow access to their network Workers use three or more devices 7

Upside: BYOD Offers Tangible Business Benefits Benefits Hardware procurement savings Contract plan savings Increased worker productivity Employee satisfaction Competitive advantage Risks Information security Legal 8

The Desires of the User Versus IT Staff User IT Staff Freedom, Privacy & Productivity Easy access to files, apps, email Use the latest technology & apps Personal stuff is untouched Do it themselves (i.e. Self-Service) Simple, Secure & Reliable Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit & monitor 9

Embracing Information Centricity > Business Process <...ERP CRM ECM... Available Reliable Effective VPN SaaS Information Confidential Compliant Efficient

Mastering Control Points...

Success = Mastering Control Points Devices Apps Data without disrupting user experience 12

Managed Unmanaged Mapping Mobile Adoption Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Device Company Controls Personal Device Company-Owned Personally-Owned

Capability Evolution of Mobility Management Mobile Information Management (MIM) Security and management of corporate apps, data & content Mobile Application Management (MAM) App distribution and user access management Mobile Device Management (MDM) Add Blackberry-like controls for other mobile devices Legacy Mobile Management Corporate lockdown for Blackberry & Windows devices Time

Control Points 5 Pillars for Enterprise Mobility User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Apps Data Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile Security Threat detection and removal Enterprise-grade file sharing and collaboration in the cloud 15

End user Value Content Center Mobile & Fileshare Encryption SSO/ Secure Filesharing Authentication DLP for Mobile App control MDM Mobile Security Company Value

Use cases

Use Case #1: Access SaaS Apps From Any Device 18

Why Symantec O 3 Proven Infrastructure Works with federated and nonfederated apps 2 Highly Scalable Leverages existing infrastructure 3 Capture Security Events Correlation of security intelligence 19

O3 Single Sign On to SaaS Demo

Use Case #2: Enable BYOD Separate Private/Corporate info Personal Enterprise App Store Containerized Application CRM Public Apps ACME Corp Apps Corp App Documents 21

App Management & Protection Personal Data Corporate Data Symantec App Center

End-to-End Process is EASY Upload app to console Select policy settings for app App/Content Administrator Select target group and apply Login to App Center Get the Apps End user

App Center Demo

Comprehensive Mobile App Management Deploy Apps Enterprise app store for internal apps Recommendations from public appstore Group based targeting Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Manage Lifecycle Revoke and update apps selectively Centralized visibility & control MDM features for policy management Protect Data Security and Management layer around data Passwords, encryption, offline access, rooting Separate corproate and personal data 25

Symantec App Center Enables Productivity Mobilize Apps & Content In-house Store Distribute/Update/Revoke specific apps/content Web, Native, HTML5 in-house, external apps PDF s, Videos, epub documents, Forms User and IT Friendly Consumer-style portal, reviews, screenshots Corporate Branding Versioning and expiration options

Symantec App Center Secures Corp Data Mobilize Apps & Content Enterprise Security Policies Authentication: LDAP/SAML online, offline access Encryption: FIPS 140-2, AES 256 for all selected data Data Loss Prevention: Copy-paste, Sharing restrictions Advanced Protection: Targeted Data Corporate Apps and data are containerized Applies to in-house, custom or third party apps No source code changes required

Symantec App Center Truly Solves BYOD Clear Separation of Corporate & Personal Data Allow Personal Devices Access to corporate information, securely Auto-configuration of settings like Wi-Fi, VPN Lock and wipe specific corporate data only Personal Data / Apps Privacy - Addressed No device level controls No monitoring of device apps or data Corporate Data / Apps - Per-app policies - Pinpoint revocation Focus on corp. data and apps vs. entire device

Extends Containerization to Third-Party Public Apps Delivery through vendor app stores Apps with built-in Symantec security technology 150+ commercial apps Moxier Mail Polaris Office Good Reader Barcode Essentials Enterprise Email with direct push Mobile Office to edit MS Office docs PDF reader with annotation features Instant access to asset management workflows ikonic Mail Xavy iannotate Picsel Smart Office Secure access to enterprise email Connects to MS Lync & Office Communicator Read, Annotate and Share PDF documents View, Create, Edit and Share Office documents http://www.symantec.com/app-center-ready

Why Symantec for Mobile Apps Quick & Easy Expedite deployment of apps with an easy-to-use SaaS app store Scalable & Seamless Enable any number of apps with no source code changes Independent of MDM Address mobile application needs without managing the complete device 30

Bringing It All Together Devices. Apps. Data. 31

Kontakt oss på: Symantec Brukerforum http://www.symantec.com/connect Symantec Norge på Facebook http://www.facebook.com/symantecnorge Norton Norge på Facebook http://www.facebook.com/nortonnorge Symantec Norge på Twitter http://twitter.com/symantecnorge Lisenser og Support Tips: rapporter på web - ring etterpå http://my.symantec.com/

Thank you! Gunnar Kristian Kopperud gkopperud@symantec.com +47 480 18 908 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Other Use Cases

User & App Access Internal Apps + Symantec O 3 Symantec Validation and ID Protection Service (VIP)

User & App Access VIP O 3

App Driven Use Case Distribution, Data Separation & DLP Single Sign-on & Cloud Gateway Built-in Strong Authentication MAM w/ App Wrapping O3 VIP

Email Driven Use Case, Continued Provision, Policy Control, Selective Wipe Data Loss Prevention, Encryption, Data Separation Integration with Enterprise Encryption Email System MDM w/ Native Email Client MAM w/ Third Party Email Client PGP Viewer w/ Native Email

Data Security Driven Use Case DLP on Device DLP Integrated with Network App/Data Encryption Discover Monitor Protect MAM / App Wrapping DLP for Mobile FIPS 140-2 Protection

Authentication Driven Use Case Two-Factor Authentication 2FA for Applications Single Sign-on for SaaS MPKI & VIP VIP SDK O3

Management Driven Use Case Altiris Microsoft SCCM Mobile Management w/ Altiris Mobile Management for SCCM