Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense



Similar documents
Mobile Device Management ios Policies

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.

Websense Solutions. TRITON v7.7 Architecture

PMDP is simple to set up, start using, and maintain

iphone in Business Mobile Device Management

The Centrify Vision: Unified Access Management

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Deploying iphone and ipad Mobile Device Management

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Comprehensive real-time protection against Advanced Threats and data theft

ipad in Business Mobile Device Management

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Systems Manager Cloud-Based Enterprise Mobility Management

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Corporate-level device management for BlackBerry, ios and Android

How To Protect Your Mobile Device From Attack

Deploying iphone and ipad Security Overview

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

TRITON APX. Websense TRITON APX

Introduction to AirWatch and Configurator

EndUser Protection. Peter Skondro. Sophos

LabTech Mobile Device Management Overview

Systems Manager Cloud Based Mobile Device Management

Feature List for Kaspersky Security for Mobile

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Enterprise Mobility as a Service

Hands on, field experiences with BYOD. BYOD Seminar

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Ben Hall Technical Pre-Sales Manager

IBM United States Software Announcement , dated February 3, 2015

System Configuration and Deployment Guide

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Secure Your Mobile Workplace

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Policy and Profile Reference Guide. BES10 Cloud Market Preview

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Securing Corporate on Personal Mobile Devices

Codeproof Mobile Security & SaaS MDM Platform

The User is Evolving. July 12, 2011

Security and Compliance challenges in Mobile environment

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Cyber Security. John Leek Chief Strategist

Mobile Security and Management Opportunities for Telcos and Service Providers

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

McAfee Enterprise Mobility Management

Bell Mobile Device Management (MDM)

Internet threats: steps to security for your small business

MECS: Mobile Enterprise Compliance and Security Server

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Salmon Group, Inc. An 8(a) Certified, Veteran owned company

Default Policy Settings ZENworks Mobile Management 2.7.x

Web Security Gateway Anywhere

Marble & MobileIron Mobile App Risk Mitigation

How To Manage A Mobile Device Management (Mdm) Solution

Mobile Security Solution BYOD

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

CHOOSING AN MDM PLATFORM

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Managing and Securing the Mobile Device Invasion IBM Corporation

Endpoint protection for physical and virtual desktops

Total Enterprise Mobility

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Sophos Mobile Control Startup guide. Product version: 3

Why Encryption is Essential to the Safety of Your Business

Choosing an MDM Platform

Mobile Device Management for CFAES

THE OPEN UNIVERSITY OF TANZANIA

Kaspersky Security for Mobile

Sophos Mobile Control SaaS startup guide. Product version: 6

[BRING YOUR OWN DEVICE POLICY]

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Android support for Microsoft Exchange in pure Google devices

Healthcare Buyers Guide: Mobile Device Management

BYOD: End-to-End Security

Google Identity Services for work

Kaspersky Security 10 for Mobile Implementation Guide

Transcription:

Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense

Consumerization of IT Fast & disruptive Enables business Increases productivity

It s Mine!

THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS OF ACCESS TYPES OF DATA STORAGE OPTIONS APPS USED CORPORATE DATA CENTER CORPORATE DATA CLOUD STORAGE BUSINESS APPS ON-DEVICE STORAGE 3G PERSONAL DATA EXTERNAL STORAGE CONSUMER APPS

THE EMPOWERED USER

Fundamental shift in security needed THE NUMBER OF SUCCESSFUL NETWORK SECURITY BREACHES OVER THE PAST YEAR 10% 21% 59% NONE 1 TIME 2 TO 5 TIMES

WEB EXPOSURE DRIVES INFORMATION THEFT Insider abuse 52% Malicious software download 48% Malware from a website Malware from social media System glitch 43% 29% 19% Do not know 16% Malware from a message 5%

TRENDS Externalization of IT infrastructure Consumerization & virtualization of the end point Windows8 security leaps forward HACKED Business enablement via social web Security consolidation continues Data oriented attacks are an everyday event

It s the Data Not the Device Challenges User owned device You may or may not own the pipe Lives outside your network Primary Risk Secure corporate data on the device If the device is lost Employee leaves the company Prevent data leakage to unauthorized destinations or recipients 9

Examples of Data at Risk 10

Fake Anti-Virus 12

App Analyser 13

App Analyser continued 14

What are we interested in? Who What H Y Where How When 15

What s in the news? 16

The Door to Malware 17

Shortcomings of Current Approaches OPTION #1 ActiveSync for device controls OPTION #3 Tablet as a terminal Provides basic controls such as access to Exchange, password enforcement, remote wipe but no data leakage prevention or threat protection. Run enterprise apps on a server farm and display them on the tablet. Significant investment in infrastructure with limited data protection. OPTION #2 Backhaul traffic over VPN Using a VPN client to backhaul traffic to enterprise network. Results in higher infrastructure and management costs. OPTION #4 Invest in Mobile Device Management (MDM) solutions Provides device level controls but these systems are content unaware and vulnerable to malware & data loss. 18

TRITON Mobile Security Vision Data leakage & Data Theft Prevention Malware Protection Mobile device management Mobile App Categorization Integrated Policy Mgmt & Reporting SaaS Solution The only SaaS solution that will extend your corporate content security policies to mobile devices, protecting them from latest mobile threats and preventing any data leakage * Supported devices: idevice, Android, Windows Mobile, Blackberry 19

Websense and ThreatSeeker Websense Web Security Gateway Threat Detection/Probes Real-Time Security Updates Shared Analytics/Feedback ACE Technology 1 billion pieces of content per day 3-5 billion per day Websense Hosted Customers URL and Security Database Websense Security Labs ACE Technology 400+ million sites per day 10+ million emails per hour 2.5 billion URLs per day ACE Technology Websense Hosted Security 20

TRITON Mobile Security Web Security Mobile Security Mobile Security ACE + ThreatSeeker Network Malicious Mobile App Tracker Management + Reporting VPN** WiFi/3G ** ios, Android

TRITON Mobile Security Mobile Email DLP Web Security Mobile Security Exchange Email Server Mobile Security ACE + ThreatSeeker Network Malicious Mobile App Tracker Management + Reporting Enterprise DLP controls ActiveSync* Enterprise email *Any ActiveSync compatible device VPN** WiFi/3G ** ios, Android

TRITON Mobile Security Mobile Email DLP Web Security Mobile Security Exchange Email Server ActiveSync* Mobile Security ACE + ThreatSeeker Network Malicious Mobile App Tracker Management + Reporting + MDM Enterprise DLP controls Enterprise email *Any ActiveSync compatible device VPN** WiFi/3G ** ios, Android

MDM Capabilities for ios 25

MDM Capabilities for ios Device Functionality Password enforcement Allow app installation Allow use of the camera Allow FaceTime Allow screen capture Allow automatic sync while roaming Allow voice dialing Allow in-app purchases Allow multiplayer gaming Allow addition of game center friends Force encrypted backups Log on to the portal to view more Applications Allow use of YouTube Allow use of itunes Store Allow use of Safari Enable auto fill Force Fraud warnings Enable JavaScript Block popups Allow explicit music and podcasts Set rating region Set content ratings for Movies TV shows Apps 26

Reports Devices per user Device by type Device by user Bandwidth user trends Top bandwidth users Top applications Mobile users per group Administrative actions per device Administrative actions over time Top device per administrative action Administrative action details More to come 27

Live Demo

Thank you! Questions, Remarks, Discussion