Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management



Similar documents
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Symantec Mobile Management Suite

IT Self Service and BYOD Markku A Suistola

#ITtrends #ITTRENDS SYMANTEC VISION

Symantec Client Management Suite 8.0

Symantec Client Management Suite 7.5 powered by Altiris

Mobile Access Software Blade

Symantec Mobile Management 7.2

IBM Endpoint Manager for Mobile Devices

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Risk and threats everywhere, all the time

Mobile App Management:

Symantec Mobile Management 7.1

Altiris Client Management Suite

Symantec Client Management Suite 7.6 powered by Altiris technology

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Symantec Asset Management Suite 7.5 powered by Altiris technology

Symantec IT Management Suite 7.5 powered by Altiris

Symantec Mobile Management for Configuration Manager 7.2

Managing and Securing the Mobile Device Invasion IBM Corporation

Kaspersky Security for Mobile

Secure Your Mobile Workplace

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

6 Things To Think About Before Implementing BYOD

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

AirWatch Solution Overview

Embracing Complete BYOD Security with MDM and NAC

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

What We Do: Simplify Enterprise Mobility

Reducing the cost and complexity of endpoint management

Solve BYOD with! Workspace as a Service!

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption

When enterprise mobility strategies are discussed, security is usually one of the first topics

On and off premises technologies Which is best for you?

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

CHOOSING AN MDM PLATFORM

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

RFI Template for Enterprise MDM Solutions

Mobile App Containers: Product Or Feature?

How To Manage A Mobile Device Management (Mdm) Solution

IBM United States Software Announcement , dated February 3, 2015

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Choosing an MDM Platform

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

BYOD: End-to-End Security

How To Support Bring Your Own Device (Byod)

How To Protect Your Mobile Devices From Security Threats

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

If you can't beat them - secure them

Mobile Device Strategy

/Endpoint Security and More Rondi Jamison

Symantec Asset Management Suite 7.6 powered by Altiris technology

Unified Security, ATP and more

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

ForeScout MDM Enterprise

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

The ForeScout Difference

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

SA Series SSL VPN Virtual Appliances

Secure Your Mobile Device Access with Cisco BYOD Solutions

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ

How To Get A Cloud Service For A Small Business

Securing Enterprise Mobility for Greater Competitive Advantage

Device Independence - BYOD -

Optimizing the Mobile Cloud Era Through Agility and Automation

Payment Card Industry Data Security Standard

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Simplify Your Windows Server Migration

IT Resource Management vs. User Empowerment

How To Protect Your Mobile Device From Attack

BYOD Guidance: BlackBerry Secure Work Space

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Securing Mobile Apps in a BYOD World

Tivoli Automation for Proactive Integrated Service Management

Software defined networking. Your path to an agile hybrid cloud network

Best Practices for a BYOD World

Secure, Centralized, Simple

Demystifying Virtualization for Small Businesses Executive Brief

Transcription:

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1

Today s Workforce 79% employees favor working remotely 87% use a laptop 80% use a smartphone 49% use a tablet Source: Gallup Poll 4/30/14 http://www.gallup.com/poll/168794/workers-upside-staying-connected-work.aspx Managing Remote and Mobile Workers SYMANTEC VISION 2014 2

SYMANTEC VISION 2014

SYMANTEC VISION 2014

Ownership Irrelevance BYOD, CYOD, COPE, etc. Security requirements do not change Protect the data, apps, and resources Solution should support multiple models Source: Gallup Poll 4/30/14 http://www.gallup.com/poll/168794/workers-upside-staying-connected-work.aspx Managing Remote and Mobile Workers SYMANTEC VISION 2014 5

Manage BYOD and Corporate Devices BYOD Unmanaged Managed Unmanaged Device Corporate Device Managed Apps & Data Only Application Management Threat Protection Managed Personal Device Identity Management 3 Device Management Application Management Threat Protection Identity Management Device Management Application Management Threat Protection Identity Management Company Owned 1 Personally Owned 2 Symantec Enterprise Mobility SYMANTEC VISION 2014 6

Productivity vs. and Security Users choose path of least resistance to get the job done Enable them, don t disable Choose least invasive security approach Account for ownership model Productivity Security Managing Remote and Mobile Workers SYMANTEC VISION 2014 7

Device Consistency Implement security for both mobile and desktop Be aware of unique risks to mobile Physical access Location Personal use Untrusted App Stores Managing Remote and Mobile Workers SYMANTEC VISION 2014 8

Focus on Apps Cannot assume the device is secure Apps handle sensitive data At rest In motion Leverage MAM for mobility App wrapping Containerization Sandboxing Managing Remote and Mobile Workers SYMANTEC VISION 2014 9

Approaches to App Security Containerization Done in one of three ways: 1. Encrypted Sandbox 2. Hypervisor 3. Wrapping App Wrapping Isolates and encrypts Per app container Allows/disallows OS or app access in/out of the container Most require code edits Important! Solution re-signs app w/out code change No rooting or jailbreaking required Integrated access control Managing Remote and Mobile Workers SYMANTEC VISION 2014

VPN is not the Answer Do not rely on VPN for remote management Users do not consistently use VPN Causes obsolete inventory/tracking data VPN is at the device level, not application level BYOD = personal apps accessing corporate networks VPN Concentrator Managing Remote and Mobile Workers SYMANTEC VISION 2014 11

Remote Management with Symantec Mobile Devices (ios and Android) App Center with Secure App Proxy Endpoint Management (Windows) Altiris ITMS with Cloud Enabled Management (CEM) Managing Remote and Mobile Workers SYMANTEC VISION 2014 12

Symantec Secure App Proxy Traffic from personal apps untouched Traffic from Symantec wrapped apps is rerouted to Proxy Symantec App Proxy allows corp traffic through Personal traffic does not traverse corporate network Access to Corporate Network from specific corporate apps only Presentation Identifier Goes Here SYMANTEC VISION 2014 13

Enforce Compliance for Mobile Devices Presentation Identifier Goes Here SYMANTEC VISION 2014 14

Boundaryless Endpoint Management Managing Remote and Mobile Workers 15

Common IT challenges How do I manage users who rarely connect to the corporate network? How do I manage all the new devices and software coming into my environment? How can I make sure we are not over or under buying software licenses and are in compliance with our license agreements? How do I protect my corporate assets and network from vulnerabilities? Managing Remote and Mobile Workers SYMANTEC VISION 2014 16

How does Symantec Endpoint Management address these challenges? Managing Remote and Mobile Workers 17

Manage anywhere across remote sites and users Symantec Endpoint Management Securely manage users anywhere on the internet and eliminate the need for dedicated VPN or leased lines Easily support and manage distributed locations regardless of bandwidth constraints Travel Home Maximize administrator to managed device ratios Remote Office Cloud Enabled Management for Windows Managing Remote and Mobile Workers SYMANTEC VISION 2014 18

Cloud Enabled Management External DMZ Internal Internet CeM Agent External Firewall Internet Gateway Internal Firewall Notification Server (SMP) Secure connection No VPN required Gateway blocks un-trusted connections Managing Remote and Mobile Workers SYMANTEC VISION 2014 19

CeM Architecture External DMZ Internal Internet CeM Agents Internet Gateways Notification Servers Managing Remote and Mobile Workers SYMANTEC VISION 2014

Cloud Enabled Management Functionality in ITMS 7.5 Symantec Endpoint Management CeM for Windows endpoints Inventory Gathering Software Distribution Application Metering Patch Management Basic Client Tasks Hierarchy and Replication Managing Remote and Mobile Workers SYMANTEC VISION 2014 21

End-to-end software management Symantec Endpoint Management Common data model provides a single place for purchases/contracts, single definition of software, single interface for different users Advanced reporting supports financial costs, departmental expense for chargeback, alerts on renewal activities, and trending over time Automatic harvesting processes Single click application virtualization Deploy, update, and run SEP Managing Remote and Mobile Workers SYMANTEC VISION 2014 22

Broad patch management Symantec Endpoint Management Support for multiple platforms and over 50 non-microsoft applications including all browsers and plug-ins Routine analysis and compliance enforcement of applied patches Advanced analytic reporting and metrics Automation routines to simplify process Integration with Symantec s endpoint security, compliance and data loss solutions Managing Remote and Mobile Workers SYMANTEC VISION 2014 23

Data insight for faster remediation and planning Symantec Endpoint Management Easily access and share business data Measure improvement with key performance indicators (KPIs) Analyze trends over time Powerful on-the-fly reporting and charts Fast remediation with dynamic, actionable summaries Managing Remote and Mobile Workers SYMANTEC VISION 2014 24

Free yourself from the office ios Remote Access Console Consistent experience from the ipad to the Console Fast access to device summaries Quickly verify status of policies and tasks Remediate issues, including remote control Managing Remote and Mobile Workers SYMANTEC VISION 2014 25

Thank you! Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 26

Symantec Endpoint Management IT Management Suite Client Management Provisioning Inventory Software management Patch management Application virtualization Remote management Reporting and analytics Server Management Provisioning Inventory Software management Patch management VM management Server monitoring Reporting and analytics Asset Management Asset tracking Barcode scanning Contract management Compliance Reporting and analytics Complementary Solutions Mobile Management Endpoint Protection Data Loss Prevention Encryption Managing Remote and Mobile Workers SYMANTEC VISION 2014 27

Solution Overview: Mobile Management Suite App Center Unified Management Platform App Management Threat Protection Device Management Enterprise Mobility - Customer Update SYMANTEC VISION 2014 28