Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

Similar documents
MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

Making the Enterprise Mobile First

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

MobileIron Product Packaging

What We Do: Simplify Enterprise Mobility

IT Resource Management & Mobile Data Protection vs. User Empowerment

MobileIron Product Packaging

Mobile First Era with MobileIron. MobileIron Japan

Enterprise Mobility Management -

The Ultimate Guide to Enterprise Mobility Management

CWSI Service Definition for Mobile Device Management and Security

IT Enterprise Services

Securing Office 365 with MobileIron

How To Manage A Mobile Device Management (Mdm) Solution

IT Resource Management vs. User Empowerment

MobileIron Support. Table of Contents. 1. Introduction. 2. Supported Features. Version November 2015

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Mobile First: Securing Information Sprawl

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

How to Successfully Roll Out an Android BYOD Program

Cisco Mobile Collaboration Management Service

MAM - Mobile Application Management

Sophos Mobile Control

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Mobility Solutions for Plant Personnel

Healthcare Buyers Guide: Mobile Device Management

A CIO s Guide To Mobility Management

Dell World Software User Forum 2013

MobileIron Cloud Pricing Packaging

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013

Securing your Mobile Workforce with Okta and Espion

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

AirWatch Solution Overview

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

Smart Givaudan. From BYOD experience to new mobile opportunities

BYOD: End-to-End Security

Productive and Secure Enterprise Mobility with Cisco and Citrix

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

Key Requirements of Enterprise Mobility Management Solutions

Mobile Security: Threats and Countermeasures

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview

The Future of Mobile Device Management

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

Managing Mobility in the BYOD Era:

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

How To Protect Your Mobile Devices From Security Threats

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

The Maximum Security Marriage:

How To Write A Mobile Device Policy

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Technical Note. ForeScout MDM Data Security

Embracing Complete BYOD Security with MDM and NAC

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

What ios 7 Means for the Enterprise

Software AG TechEd 2015 User Conference Mobile Enabler for Natural

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

MobileIron and Samsung Value Proposition

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

HDAA BYOD Workshops May 2013

Symantec Mobile Management Suite

Device Independence - BYOD -

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

Total Enterprise Mobility

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

How To Support Bring Your Own Device (Byod)

How To Secure Your Mobile Device

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.

Transcription:

Enterprise Mobility Security Solution Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

WHAT IS ENTERPRISE MOBILITY MANAGEMENT Enterprise Mobility Management (EMM) is an all-encompassing approach to securing and enabling employee use of smartphones and tablets. In addition to addressing security concerns, a strong EMM strategy also helps employees be more productive by providing them with the tools they need to perform work-related tasks on mobile devices.

CORPORATE & PERSONAL DEVICES ARE PROMINENT, BUT MOST AREN T MANAGED Source: Enterprise Mobility Malaysia, 2014

Mobile Workforce

WHAT IS MOBILITITY CHALLENGE How do I distribute apps and embrace BYOD? How do I manage the explosion of operating systems? How do I manage security, identity, and privacy? How do I secure and mobilize content? I need to move at consumer speed, without sacrificing security and compliance

BENEFIT FOR ENTERPRISE MOBILE MANAGEMENT Increase productivity Provide flexibility for enhanced productivity Improve employee satisfaction Reduce the ideal time taken to finish a task Allows employees to make quick and timely decision Greater mobility for employee Keeps work-related information easily accessible Help employee carry out business tasks anywhere and anytime Reduce IT cost Customer-facing apps cut down on the resource deployment Target mobile apps improve internal processes and help reduce cost Improve customer experience Lead to more responsive customer service & interaction

THE EVOLUTION OF MOBILE APP SECURITY

MDM MAM MCM EMM PILLARS SECURITY

EMM PILLARS: SECURITY Enterprise container on the devices Block jail-broken or rooted mobile devices Selective or Full wipe devices Active Directory Integration SECURITY

MDM EMM PILLARS: MOBILE DEVICE MANAGEMENT Device Management capability Multiple OS support Mobile device asset inventory Native end-user experience SECURITY

MAM EMM PILLARS: MOBILE APPLICATION MANAGEMENT App distribution via In-house Enterprise Store App Control: allowed, disallowed, required App configuration over-the-air Tunnelled access to enterprise backend resources Wide partner eco-system for integration SECURITY

MCM EMM PILLARS: MOBILE CONTENT MANAGEMENT Encrypted Mobile App Document viewer Annotation and editing capability Enterprise Dropbox capabilities Per-app tunnelling for access to corporate resources SECURITY

MOBILE DEVICE MANAGEMENT PLATFORM Active Directory Certs Email Apps Content Enterprise Mobility Management Mobile Device Management Mobile Application Management Identity ENTERPRISE And Certs RESOURCES User Self-Service Rules & Reporting

MOBILE DEVICE MANAGEMENT PLATFORM Active Directory Certs Email Mobile App Client Enforces Configuration and Security policies on the device, apps and content at rest and in real time Apps Content Mobile Gateway Provides Access Control by ENTERPRISE Enforcing Security RESOURCES Policies on Apps and Content in-flight

WHAT MOBILE DEVICE MANAGEMENT OFFERING Support multi platform devices Device configuration and security Separation between enterprise and personal data Secure corporate email Enterprise mobile apps Native user experience Secure access to enterprise web apps Secure access to enterprise web content Selective wipe

SECURITY AND PRIVACY BALANCE Enterprise Mobility Management CANNOT do any of the following: Retain copies of your photos Track web browsing usage Monitor your SMS/messages Record phone calls Monitor your personal Email Limit your personal access to websites, location or access points

EMM MAGIC QUADRANT 2013 Magic Quadrant for Mobile Device Management Software Reprint available from MobileIron Source: Magic Quadrant for Enterprise Mobility Management Suite, June 2014

TM EMM PACKAGE MANAGED MOBILITY SERVICES Mobile Device Management (Core) Enterprise App Store (App@Work) Secure Inbox (Sentry) Secure App Tunneling (AppConnect) CLOUD ON PREMISE STANDARD STANDARD ADVANCE Secure Document Sharing (Doc@Work) Secure Browsing (Web@Work)

ENTERPRISE MOBILITY MANAGEMENT: CASE STUDIES Source: 1) www.mobileiron.com/en/customers/case-studies 2) Mobile First Government White Paper

THANK YOU