Mobile Security Solution BYOD



Similar documents
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

MDM Mobile Device Management

How To Protect Your Mobile Device From Attack

Mobile Device Management for CFAES

The Secure Web Access Solution Includes:

Mobile Security and Management Opportunities for Telcos and Service Providers

The User is Evolving. July 12, 2011

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Cisco Mobile Collaboration Management Service

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Ben Hall Technical Pre-Sales Manager

How To Protect Your Mobile Devices From Security Threats

Ensuring the security of your mobile business intelligence

ForeScout MDM Enterprise

Zenprise Device Manager 6.1.5

curbi for Schools Technical Overview October 2014

The ForeScout Difference

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Securing Office 365 with MobileIron

Secure Mobile Solutions

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Enterprise Mobility as a Service

Chris Boykin VP of Professional Services

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Secure Your Mobile Workplace

Risk and threats everywhere, all the time

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

How To Write A Mobile Device Policy

How To Manage A Mobile Device Management (Mdm) Solution

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

The Cloud App Visibility Blindspot

Mobile Device Management Version 8. Last updated:

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

DUBEX CUSTOMER MEETING

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

GlobalProtect Overview

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Introduction to the Mobile Access Gateway

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Mobile Device Management

Kaspersky Lab Mobile Device Management Deployment Guide

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Top 10 Reasons Enterprises are Moving Security to the Cloud

Copyright 2013, 3CX Ltd.

Kaspersky Security for Mobile

ZSCALER CLOUD SERVICES AND INFRASTRUCTURE: A TECHNICAL OVERVIEW

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Cloud Services MDM. ios User Guide

Simple security is better security Or: How complexity became the biggest security threat

Advanced Configuration Steps

Securing mobile devices in the business environment

Sophos Mobile Control Technical guide

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

What We Do: Simplify Enterprise Mobility

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

TrustDefender Mobile Technical Brief

Smart Givaudan. From BYOD experience to new mobile opportunities

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Kaspersky Security for Mobile Administrator's Guide

MAM - Mobile Application Management

ZSCALER WEB SECURITY CLOUD FOR LARGE & MEDIUM ENTERPRISE

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Workplace-as-a-Service BYOD Management

When enterprise mobility strategies are discussed, security is usually one of the first topics

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Symantec Mobile Management Suite

mobilecho: 5-Step Deployment Plan for Mobile File Management

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

nexus Hybrid Access Gateway

End User Devices Security Guidance: Apple ios 8

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Practical Attacks against Mobile Device Management Solutions

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Parla, Secure Cloud

Securing Corporate on Personal Mobile Devices

Transcription:

Mobile Security Solution BYOD 1

Blending boundaries between devices, apps and users Personal Mobile Devices Unknown Mobile Apps Corporate data on public cloud apps

Zscaler Secure Cloud Gateway Business Applications Mobile & Distributed Workforce On-the-go Enforce Business Policy Web 2.0 and Social Nothing good leaks out, nothing bad comes in HQ Cloud Apps Securely Enable Direct to Internet Home or Hotspot NO HARDWARE NO SOFTWARE Regional Office Mobil Apps Email Services Zscaler was the only one that truly delivered an ultra-low latency experience along with exceptional protection from threats. And best of all, it works exactly as advertised.

Summarizing Mobile Problem Statements Protecting corporate resources and data, even with BYOD Ensuring malware-free environment, while supporting employeeowned devices running personal apps Protecting corporate-issued devices and enforcing compliance Restricting mobile traffic to prevent unauthorized, noncompliant apps apps with poor reputation! Identifying and restricting apps that don t comply to corporate policies Identifying apps that misbehave by leaking sensitive info Visibility into mobile app traffic accessing corporate resources Categorization of mobile traffic patterns into apps Real-time reporting of mobile threats and policy violations Identification of users and associated mobile devices along with threats

Zscaler Mobile App Profiler TM technology Problem statement: Mobile users too trusting of apps distributed via common marketplaces App Permissions often ignored and loosely granted by unsuspecting users Zscaler solution: Fingerprinting technology identifies app based on network traffic pattern Classifies app into appropriate market category, or based on reputation based on app s behavior Try out this technology using the Zscaler App Profiler tool (zap.zscaler.com) Percentages of Top-50 Apple ios apps leaking sensitive information* * http://www.appthority.com/reports/appthority-app_reputation_report_infographic_july_2012.pdf

Zscaler SafeBrowser for Android / ios Alternative to default browser Provides users a safe browsing experience protecting against webbased threats and malware Authenticates user with corporate credentials against LDAP or AD Proxies traffic through Zscaler to provide web security and policy enforcement Facilitates enforcement of secure, protected access to internal web resources via SSL VPN

Zscaler SecureAgent for Apple ios Deployed to Apple iphones and ipads via MDM or directly from App Store Authenticates users to the Zscaler service Notifies the user when actions are taken on app traffic (e.g. security incidents or information leakage) Generates Secure Token for HTTP Digest Authentication with the Global HTTP Proxy Enables Shared Device usage by easy Login/Logout functionality

Real-Time Mobile App Visibility and Analytics View mix of Mobile Devices in the enterprise View mobile traffic pattern by app categories View Mobile traffic per app class

Enabling Mobility: Why MDM is Not Enough Enable BYOD devices Secure access from devices to corporate assets Keep personal use separate Protect road warriors with zerolatency performance No backhauling traffic No latency Protect work from home users from mobile threats Secure direct to Internet connections to corporate applications, assets Keep malware out of corporate network Zscaler Mobile traffic inspection Data traffic policies URL categorization and App Controls Prevention of phishing, XSS etc. Mitigating mobile malware Mobile DLP MDM Authentication Provisioning of device settings and policies Enterprise App Store Remote Lock, Wipe, etc With Zscaler we now can enforce consistent Internet access policies, whether employees are at our office, on the road, or at home.

TE Data Egypt NEXT Jordan ZAJIL Q8 KACST KSA AWAl KSA Etisalat UAE Existing Nodes NourNet KSA