Mobility Challenges & Trends The Financial Services Point Of View



Similar documents
Thanks for joining We ll start at 10am

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Kaspersky Security for Mobile

AirWatch Solution Overview

The ForeScout Difference

ForeScout MDM Enterprise

BYOD: End-to-End Security

If you can't beat them - secure them

Cloud Service Providers Overcoming security and compliance barriers

Systems Manager Cloud Based Mobile Device Management

Feature List for Kaspersky Security for Mobile

Mobile Device Management for CFAES

Tuesday, June 5, 12. Mobile Device Usage

Symantec Mobile Management 7.2

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Symantec Mobile Management 7.1

How To Manage A Mobile Device Management (Mdm) Solution

Symantec Mobile Management for Configuration Manager 7.2

Addressing NIST and DOD Requirements for Mobile Device Management

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Guideline on Safe BYOD Management

trends and audit considerations

Symantec Mobile Management 7.2

Systems Manager Cloud-Based Enterprise Mobility Management

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Symantec Mobile Management 7.1

Mobile First Government

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Embracing Complete BYOD Security with MDM and NAC

Mobile device and application management. Speaker Name Date

Meraki: Introduction to Cloud Networking

Ben Hall Technical Pre-Sales Manager

Cyber Security. John Leek Chief Strategist

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

VMware End User Computing

Hosted Virtual Desktops (VDI)

Securing Corporate on Personal Mobile Devices

Cisco Mobile Collaboration Management Service

Managing and Securing the Mobile Device Invasion IBM Corporation

Symantec Mobile Security

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

WHITE PAPER. The CIO s guide. management

Managing Mobility in the BYOD Era:

How To Make Your Computer System More Secure And Secure

Jonas Vercruysse Technical Pre-sales February Endpoint Management IBM Corporation

Evaluating Mobile Device Management

Mobile Security: The good, the bad, the way forward

BYOD & MOBILE SECURITY

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Endpoint protection for physical and virtual desktops

Hands on, field experiences with BYOD. BYOD Seminar

Mobile Device Security Is there an app for that?

Secure Your Mobile Workplace

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Dell World Software User Forum 2013

How To Support Bring Your Own Device (Byod)

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Security and Compliance challenges in Mobile environment

M a as3 6 0 fo r M o bile D evice s

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT

GREEN HOUSE DATA. 4 Steps to Secure BYOD. Using Virtual Desktops To Increase Productivity Without Increasing Risk. Built right. Just for you.

Transform EMC Object Storage Into Enterprise Storage Services

Security Architecture Guide

Mobile Security & BYOD Policy

Codeproof Mobile Security & SaaS MDM Platform

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY

IBM United States Software Announcement , dated February 3, 2015

IBM Endpoint Manager for Mobile Devices

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

How To Secure Your Mobile Devices

Desktops in the Cloud: Beyond the Hype

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

LabTech Mobile Device Management Overview

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Chris Boykin VP of Professional Services

Soonr Workplace Enterprise Plan Overview

What We Do: Simplify Enterprise Mobility

Mobile and BYOD Strategy

SECURING TODAY S MOBILE WORKFORCE

Healthcare Buyers Guide: Mobile Device Management

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Deliver Desktops as a Service! With VDI 2.0!

The User is Evolving. July 12, 2011

Enterpise Mobility Lexicon & Terminology

Protection & control across all your mobile devices

The Maximum Security Marriage:

Microsoft Windows Intune: Cloud-based solution

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Enterprise Mobility as a Service

PULSE SECURE FOR GOOGLE ANDROID

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Athena Mobile Device Management from Symantec

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

VMware s Virtualization & Cloud Computing Solutions for Enterprise

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Transcription:

Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer

The New World

Agenda The Mobile World The Challenges The Solutions

The Mobile World

The Business Challenges

The End User Computing Challenges

The BYOD Challenges Applications Management Inability Invisibility of installed applications on mobile devices Inability to push company s applications to mobile devices No control of rogue applications Company s Assets in Danger Inability to find a lost or stolen device No way to erase company s data on the mobile device

The Branch Office Challenges Centralized Management Give IT the ability to manage all the branch infrastructure from one single location Localized Execution The user experience must be on par with local desktops at the branches Security Must be lightweight yet strong

Solutions Virtual Workspace Infrastructure (VDI+) Workspace Mobility Enablement Desktop As a Service (DaaS) Capex Savings Through VDI As a Service Security MDM DLP NAC "By enabling employees to securely and easily access corporate data on their own device or mobile workspace, productivity levels will naturally increase.

Hosted Virtual Desktops Growth by Vertical Penetration of Hosted Virtual Desktop (HVD) by Verticals -2016 50% 40% 30% 20% 10% 0% 2013 HVD Growth Rate = 49.9% 2014 HVD Growth Rate = 35.7% *HVD Market Forecast Gartner Nov, 2012

Desktop & Application Delivery (VDI) Central Management Growth and speed to market Security and compliance No Data To Endpoint Two Factor Authentication Employee Mobility and device adoption Business Better unique experience continuity TCO than traditional PC

Desktop as a Service Corporate Network DaaS = (Desktop as a Service) VDI managed as a Cloud-based service by a 3rd party vendor or service providers Remote Office Mobile Office Home Desktops in the Cloud! Leverage as a Service Lower Cost, no Cap-Ex Centralized Management Turn-key Services Datacenter proximity Elastic, scalable 1990 Desktop in PC 2008 Desktop in Datacenter Virtual Desktops 2010 Desktops in Cloud

Keeping the Complexity Below the Surface Applications Desktop Management Access Devices Customer Enviroment [OS License] VDI Software Windows Server License Software SQL Server / Data Store SW Patching and Administration Support and Maintenance Servers Storage (RAID Protected) Hardware Networking Infrastructure Hardware Administration Support and Maintenance Racks Facilities Power and Cooling Service Provider Class Data Center ICOM Provides

Hybrid Cloud for EUC Apps Desktops Local Local Hosted Hosted Apps Desktops Cloud Cloud Hosted Hosted Consistent User Experience

Orchestration of BYOD MDM means Mobile Device Management but goes way beyond to cover Applications MDM software secures, monitors, manages and supports mobile devices MDM is deployed in both employee-owned and company-owned devices

What MDM can do? Security Management Real-time protection / GPS Locate & Track / Device Backup/Restore / Remote Alarm/Notification and SIM Change Notification Software Distribution Control Unapproved Apps / Track installed Apps / Company s Internal App store / Rogue App protection / Inventory of installed Apps Policy Management Require Passcode / Number of failed attempts before wipe / Password Complexity requirements / Data Roaming Settings (On/Off) Inventory Management Detailed reporting of asset information / Model name and number / Device s holder name / Serial Numbers / Device s IP Address Service Management Roaming Usage / SMS Usage / Report Most Active Users / Report Data used / WiFi/Cell data speeds

Benefits of MDM Device Management Enforce company s policies across diverse operating platforms (ios, Android etc) Push company s applications to managed devices over-the-air Compliance Workers have both personal and company data on their mobile devices Data and Service security People are using an unsecured mobile device to access secured company data Mobile devices are easily lost or stolen

Data Leakage Prevention Requirements Data identification & classification User roles and responsibilities Regulatory requirements Manage authorizations and actions on data Enforce controls governing What data user can access What user can do with the data Whether user can share data Data access from mobile devices Leakage prevention is an issue that requires a holistic approach

Solutions to Meet Diverse Needs Data leakage cannot be prevented by point solutions Network access control Mobility Web/Email Controlling admin access to systems and data Network Managing smart devices and the BYOD hype Endpoint Controlling Internet access and Email capabilities Endpoint protection mechanisms Virtual Desktop infrastructure

What NAC can do NAC means Network Access/Admission Control When a device tries to connect to a network NAC identifies the device and its type Identifies and authenticates the user of the device Scans device s configuration in order to determine if it is compliant to corporate policies NAC gives full, restricted or prohibited access

Benefits of NAC Mitigation of zero-day attacks The key value of NAC is to prevent computers without Antivirus, patches, OS updates etc to access the network and place other computers & resources at risk Policy Enforcement NAC solutions allow network operators to define policies such as types of computers or roles of users allowed to access corporate resources Identity and access management Where conventional IP networks enforce access policies based on the IP of the system, NAC enforces policies based on the authenticated user identity

Intracom Telecom Data Center Optimization Solutions Infrastructure Services Facilities Management

Intracom Telecom Datacenter Solutions Facilities Management Converged Networking Consolidation & Optimization Security & Compliance Cloud Builder Cloud Based Solutions Cloud Security Private, Public, Hybrid Innovative cloud services Assuring Services delivery Cloud Planning & Design Cloud Implementation Operations organization consulting Backup as a Service Storage as a Service Desktop as a Service Security as a Service Intracom Telecom Strategy Engineering Services Solution Integration Audit & Validation