Cloud, security and the mobile enterprise: An end-to-end manageability challenge



Similar documents
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Enterprise Mobility Services

AirWatch Solution Overview

Mobile Access Software Blade

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

MDM and beyond: Rethinking mobile security in a BYOD world

Mobile device and application management. Speaker Name Date

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

What We Do: Simplify Enterprise Mobility

Module 1: Facilitated e-learning

A CIO s Guide To Mobility Management

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Total Enterprise Mobility

ForeScout MDM Enterprise

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

How To Secure Your Mobile Device

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

IBM United States Software Announcement , dated February 3, 2015

IBM MobileFirst Managed Mobility

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Dell World Software User Forum 2013

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BENEFITS OF MOBILE DEVICE MANAGEMENT

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

The ForeScout Difference

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Statement of Direction

Kony Mobile Application Management (MAM)

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Securing Office 365 with MobileIron

Total Enterprise Mobility. Norbert Elek

CHOOSING AN MDM PLATFORM

Hands on, field experiences with BYOD. BYOD Seminar

Solve BYOD with! Workspace as a Service!

Ben Hall Technical Pre-Sales Manager

How To Protect Your Mobile Devices From Security Threats

Embracing Complete BYOD Security with MDM and NAC

Dell World Software User Forum 2013

Mobile App Containers: Product Or Feature?

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Data Protection Act Guidance on the use of cloud computing

Enterprise mobility management: Embracing BYOD through secure app and data delivery

Technical Note. ForeScout MDM Data Security

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

trends and audit considerations

Middleware- Driven Mobile Applications

Choosing an MDM Platform

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

ADDING STRONGER AUTHENTICATION for VPN Access Control

CA Enterprise Mobility Management MSO

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

RFI Template for Enterprise MDM Solutions

Feature List for Kaspersky Security for Mobile

How to Get to Single Sign-On

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

SaaS, PaaS & TaaS. By: Raza Usmani

Cloud Services from MedNautilus Greece. D. Kapetanakis Commercial Director. 16 Infocom Athens October 21

Enterprise Mobility as a Service

B2E and B2B Mobile Apps: Capturing opportunities while avoiding traps

Fundamental Concepts and Models

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Systems Manager Cloud Based Mobile Device Management

BYOD: End-to-End Security

When enterprise mobility strategies are discussed, security is usually one of the first topics

IT Self Service and BYOD Markku A Suistola

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

MAM - Mobile Application Management

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Transcription:

GreHack-2012 19 th October, Grenoble France Cloud, security and the mobile enterprise: An end-to-end manageability challenge Boris Balacheff Dave Penkler seamless, secure, context-aware experiences for a connected world

Outline Enterprise mobility context User requirements IT requirements Tools The Management Challenge Conclusion

Enterprise Mobility Context Mobility defined: Mobility of data and applications Consumerization of IT drives technology designed for the consumer market into the enterprise through better price/performance ratios. Not initially designed with enterprise IT in mind Bring Your Own Device personal smartphone, tablets and PC s used for accomplishing work related tasks. Enterprise IT perimeter expanding; Outsourced suppliers: CRM, HCM, cloud services Applications on devices: consumer and partner Multiple access networks Evolving HW, SW and networking technologies RFID, Sensors, Surveillance Increasing challenge to maintain control while embracing progress 3

BYOD 4

User Requirements Boundary between work, private, family, and home contexts blurring. Access ICT tools for all contexts through appropriate available devices Ease of use Assurance Control over the stuff they own Privacy 5

Enterprise IT requirements Manage cost of B2C, B2E and B2B application and data delivery Improve productivity Secure data in motion and at rest Compliance and audit User, Group, Application and device based policy management and enforcement Users can be employees, contractors, partners and customers 6

IT Perimeter Client Devices Users Management Private DC Site N Corporate Network Private DC Site 1 Private DC Site 2 Corporate IT Infrastructure VPN Remote Managed Sites Public Internet Unmanaged Sites SaaS Provider SaaS 1 Provider SaaS 1 Providers Provider 1 Provider App 1 Stores Public Cloud 7

Client side Enterprise IT tools Mobile device management Protecting content on end-user devices without taking over the device is hard Needs device specific agent with admin rights Functionality Registration / Inventory Configuration management Remote device wipe, lock, pin reset Connectivity control Restrictions: Apps, Camera, screen capture etc Mobile Application Management Container, SDK or wrapper based Container needs large set of permissions Functionality Storage and network encryption Cross app data protection (cut & paste) Access control Auto-disable / wipe when device compromised Usage control: Location, time, duration, connectivity 8

Mobile Application Architectures 1. Remote application delivery Application runs on server remote screen on mobile (Thin Client) 2. Server based mobile web applications (web 1.0) Application runs on server uses browser on mobile 3. Client based mobile web applications Developed using HTML5/CSS/JavaScript, runs on client browser or web container 4. Native mobile applications Developed with native SDK, deployed in app store 5. Hybrid mobile applications Combination of 3 and 4: Native / client based web app 6. Container deployed applications Container deployed as native app, contained apps deployed via custom app store 7. Client side virtualisation Applications are deployed into separate virtual machines; VMs managed by deployer 9

Infrastructure Tools Enterprise Application Store App screening App mapping App management MDM/MAM VPN Security gateways (BlueCoat, Layer7, ) Policy User management Federated Identity mangement (Ping, Symplified) 10

Endpoint security challenge Multi-tenant administration is becoming expected of a client device New devices will support better containerization Enable user to grant IT policy control for just a set of apps, not the entire device Enable one or more stakeholders to manage their own content on a personal device Protection of personal device TCB while respecting each stakeholder needs (personal privacy, IT control, ) 11

Management Challenge Feasibility of federated management of extended IT perimeter New Devices with emerging capabilities Enterprise Applications Private and Public app stores Outsourced SaaS applications (CMR, HCM, etc) Public applications User communities covering multiple administrative domains Content security management 12

Conclusion Corporate IT landscape expanding Full control not possible in most cases How much control is good enough To maintain control, IT will need to outsource some control Ergo they will need trust relationships with application and content channels Device manufacturers Service providers Carriers One web to rule them all 13

Questions?