Risk and threats everywhere, all the time

Similar documents
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec Mobile Management Suite

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

#ITtrends #ITTRENDS SYMANTEC VISION

Mobile App Management:

IT Self Service and BYOD Markku A Suistola

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops

Better Together: Microsoft Office 365 & Symantec Office 365

Best Practices for a BYOD World

Unified Security, ATP and more

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

How To Get A Cloud Service For A Small Business

A number of factors contribute to the diminished regard for security:

Secure Your Mobile Workplace

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Symantec Mobile Management for Configuration Manager 7.2

Kaspersky Security for Mobile

Symantec Managed Security Services The Power To Protect

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

Embracing Complete BYOD Security with MDM and NAC

On and off premises technologies Which is best for you?

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

OVERVIEW. Enterprise Security Solutions

Technical Note. ForeScout MDM Data Security

Symantec Endpoint Security Management Solutions Presentation and Demo for:

If you can't beat them - secure them

Public, Private, Hybrid:

The ForeScout Difference

Symantec Mobile Management 7.2

Symantec Mobile Security

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Countering Insider Threats Jeremy Ho

What We Do: Simplify Enterprise Mobility

Find the needle in the security haystack

Athena Mobile Device Management from Symantec

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Symantec Mobile Management 7.1

Symantec Enterprise Vault.cloud Giovanni Alberici

Mobile Security and Management Opportunities for Telcos and Service Providers

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

AirWatch Solution Overview

ForeScout MDM Enterprise

Marble & MobileIron Mobile App Risk Mitigation

Symantec Consulting Services

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Unified Device Management Allows Centralized Governance of Corporate Network Devices

Imperva Skyfence Secures Office 365 Access for Mobile Employees at Metro Bank

How To Support Bring Your Own Device (Byod)

Symantec Mobile Management 7.1

Comprehensive real-time protection against Advanced Threats and data theft

INFORMATION PROTECTED

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Addressing Evolving Threats & Responses in a MITA 3.0 World Robert Myles, CISSP, CISM

Endpoint Protection Small Business Edition 2013?

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

The Oracle Mobile Security Suite: Secure Adoption of BYOD

The Cloud App Visibility Blindspot

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Reducing the cost and complexity of endpoint management

V1.4. Spambrella Continuity SaaS. August 2

Your is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Transcription:

Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance Advanced Persistent Attacks Symantec Enterprise Security 2

Today s typical strategy has many solutions Endpoint Gateway Data Center Endpoint Protection DLP Encryption IT Management Suite Mobile Security Device Management Application Management Encryption DLP O3 VIP & MPKI Email Security.cloud Messaging Gateway Web Security.cloud Web Gateway Security Services Managed Security Services DeepSight Data Feeds Endpoint Protection Critical System Protection Control Compliance Suite DLP Encryption Multiple Policies and Too many/few FTEs 3

Today s approach needs to be REINVENTED Symantec Enterprise Security 4

Integrated defense Tomorrow s integrated and modular offerings Mobile Virtual Cloud Reporting Endpoint Mngt Automation Common Mngt Experience Endpoint Protection Visibility Context -Based Automated Data Store Security Security Orchestration Platform Dynamic Advanced Threat Protection Web Security & Productivity Messaging Security Mobile Workforce Productivity Information Protection Server Security Network Security Identity Protection Info Protection On Premise Endpoint Management & Security Data Center Security Gateway Security Symantec Enterprise Security 5

Success Requires a Layered Approach Configure, control and manage mobile devices Protect against malware and risky apps Validate user identity with seamless authentication, certificates and single sign-on Implement data protection policies for files and content Devices User & Identity Malicious Threats Protect and distribute mobile apps, including secure productivity tools Data Apps Copyright 2014 Symantec Corporation 6

The New World of Enterprise IT New Platforms, New Devices An App Centric World Data is Everywhere Rising Mobile Threats 2M+ Bring Your Own Device (BYOD) or Company-owned Copyright 2014 Symantec Co 7

The Mobility Challenge Bring Your Own Device (BYOD) Multiple platforms with disparate controls Protect corporate data while leaving personal data untouched Users want the latest technology and apps Mobile Apps Data leaking to unauthorized, cloud-based apps Users adopting personal apps to improve productivity Exposure to malware and risky apps User Experience is Paramount Security that doesn t interfere with the user experience IT becomes the enabler instead of the gatekeeper Demand for convenience and self-service options Copyright 2014 Symantec Co 8

Why MDM [Alone] Doesn t Solve the Problem Mobility is about more than the device Inconsistent controls across platforms No targeted remediation All or nothing policies No user privacy User experience is impacted No protection against malicious threats Copyright 2014 Symantec Corporation 9

Symantec Mobility Suite An integrated, modular solution for multiple use cases Device Management (MDM) Workforce Apps App Management & Protection (MAM) Threat Protection Configure, control and manage mobile devices Distribute apps & content Device-based policies Configure and manage Symantec productivity apps Apps include Work Mail, Work Web and Work File* App and email proxies Configure and manage mobile apps/content App-based policies (app wrapping) Enterprise App Store Includes Workforce Apps Protect against malware and risky apps Centrally manage mobile security Implement policies based on device security posture Web-based Management Console *Work File is planned for an upcoming release Copyright 2014 Symantec Corporation 10

Packaging Options BEST VALUE SaaS On Premise SaaS On Premise SaaS On Premise Symantec Mobility: Workforce Apps SaaS On Premise SaaS On Premise Mobility Device Management Mobility Threat Protection Mobility Workforce Apps Mobility Application Management Mobility Suite Device Management Anti-Malware Risky App Protection Secure productivity apps (email, browser, files) Policies for productivity apps Enterprise App Store App Protection for custom and 3 rd party apps Includes Workforce Apps Device Management Enterprise App Store App Protection Workforce Apps Anti-malware Risky app protection Copyright 2014 Symantec Corporation 11

Why Symantec Copyright 2014 Symantec Corporation 12

We help customers Embrace BYOD Easily Manage Email & Apps Defend Against Mobile Threats Help the organization enable, manage and secure personally-owned smartphones and tablets. Enable enterprise IT to deploy, secure, and manage mobile devices, email, apps and content on corporate and employee-owned devices. Provide powerful and effective protection against mobile malware, greyware, privacy risks and performance risks. Copyright 2014 Symantec Corporation 13

Symantec for Enterprise Mobility Single Platform Simplify with a single console to manage devices, email, apps and more Flexible Approach Support multiple use cases across the extended enterprise with device and app-level controls Layered Protection Implement protection that addresses user/identity, devices, apps and data Copyright 2014 Symantec Corporation 14

Q & A Copyright 2014 Symantec Corporation 15

Thank you! Roderick Brouwer roderick_brouwer@symantec.com +31 6 10000852 Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.