Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce



Similar documents
AirWatch Solution Overview

Solve BYOD with! Workspace as a Service!

Ben Hall Technical Pre-Sales Manager

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Roadmap to Solving Enterprise Mobility

Risk and threats everywhere, all the time

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service


Endpoint protection for physical and virtual desktops

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Symantec Mobile Management Suite

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Make Your Computer System More Secure And Secure

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Mobile device and application management. Speaker Name Date

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

What We Do: Simplify Enterprise Mobility

IT Resource Management & Mobile Data Protection vs. User Empowerment

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Codeproof Mobile Security & SaaS MDM Platform

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Technology Shifts. Mainframe Windows Desktop Internet

Endpoint protection for physical and virtual desktops

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Mobile Access Software Blade

Feature List for Kaspersky Security for Mobile

BYOD: End-to-End Security

McAfee - Overview. Anthony Albisser

Enterprise Mobility Services

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

How To Secure Your Mobile Device

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

If you can't beat them - secure them

Druva insync vs. Altiris/Symantec DLO. Comparison Guide

W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

Bitdefender GravityZone Sales Presentation

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Centrify Cloud Connector Deployment Guide

***NOTICE***: Proposed Selection Date now 12/16/13

ADDING STRONGER AUTHENTICATION for VPN Access Control

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Netzwerkvirtualisierung? Aber mit Sicherheit!

How To Support Bring Your Own Device (Byod)

The ForeScout Difference

Protection & control across all your mobile devices

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

BYOD Enabling Technologies

Optimizing the Mobile Cloud Era Through Agility and Automation

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Consumerization Survey Report The Consumerization of IT

Symantec Mobile Management for Configuration Manager 7.2

Dell Enterprise Mobility Management

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

Oracle Mobile Security Management

IT Enterprise Services

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Why EMM Is the Future of Mac Management

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Athena Mobile Device Management from Symantec

Martijn Bosschaart Sr Systems Engineer. October 2013

A number of factors contribute to the diminished regard for security:

Simplify VDI and RDS Private Clouds for SMBs

IT Self Service and BYOD Markku A Suistola


Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

ForeScout MDM Enterprise

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

Blank Slide. For additional content

Mobilize your Enterprise in 60 Minutes!

New Features: What s new in Windows Intune?

Device Independence - BYOD -

BYOD & Virtualization: Managing Mobile

Securing Corporate on Personal Mobile Devices

Unified Device Management Allows Centralized Governance of Corporate Network Devices

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

A number of factors contribute to the diminished regard for security:

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

CONVERGED DATA PROTECTION. ITSA Nürnberg

Sophos Mobile Control

Guideline on Safe BYOD Management

The Secure File-Sharing Paradox. Director of Cloud Solutions, EMEA Date: November 7th, 2013

EndUser Protection. Peter Skondro. Sophos

Total Enterprise Mobility

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Making the Enterprise Mobile First

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Deliver Desktops as a Service! With VDI 2.0!

Transcription:

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013 Trend Micro Inc. 1

Mobile: A computing category that did not exist six years ago has come to overtake one that has been around for 38 years! ios & Android PC Source: Asymco.com July 2013

BYOD Work / Life Balance 8/27/2014 3 Copyright 2014 Trend Micro Inc.

User Privacy and Corporate Data under Risk 8/27/2014 4 Copyright 2014 Trend Micro Inc.

Mobile Security Approaches MDM / MAM Focus intrusively on device management Difficulties with data protection Containers Heavy App Wrapping Licensing and management overhead Malware Protection Just one part of the game Gateway Solutions Device agnostic, Incomplete Enterprise Sync & Share Requires opt-in

Trend s Three Point Mobile Strategy 1 2 3 Treat all endpoints equally Choice of solution based on risk Leverage Smart Protection Strategy No Controls Hyper Management SMART SIMPLE SECURITY THAT FITS

Email & Messaging File/Folder & Removable Media Web Access Device Hopping Cloud Sync & Sharing Collaboration Social Networking Employees Anti-Malware Content Filtering Data Loss Prevention Encryption Device Management Application Control Complete User Protection Security IT Admin

Complete Mobile Solutions from Trend Trend Micro Mobile Security Mobile Enablement Mobile Policy Mobile Data Protection Mobile Threat Protection SafeSync for Enterprise Mobile Data Sync & Share Mobile Data Loss Prevention Mobile File Encryption InterScan Web Security as a Service Mobile VPN Gateway threat protection Mobile Application Control Safe Mobile Workforce Highly secure separation of corporate and personal data

What is Safe Mobile Workforce? Hosted Android, similar to VDI Optimized client and server side rendering complete control over how data is accessed and used and what apps are deployed No data on the mobile device

Data Protection All enterprise apps and data are saved on separate, secure corporate servers under IT s control.

Mobile User Experience Multiple Mobile Platforms ios, Android Windows Phone/Windows RT/Windows 8.1 Android-like experience for both smartphones and tablets Efficient Client-Side Rendering high performance and low network utilization

Client and Server Side Rendering Client-Side Rendering (CSR) is a technique for implementing remote display, which means client is responsible for rendering remote graphics by receiving and executing graphics commands and data sent by server. (Patent pending) Client-side Rendering VS. Server-side Rendering Rendering Graphics commands and data Pixels of screen Rendering

Easy Enrollment for Mobile Devices Ready in minutes!

Self Adaptive Keyboard My Soft Keyboard Switch Sample Soft Keyboard 14

Simplified Management IT can centrally manage all users from single web console Active Directory integration Import users from AD AD Authentication when users logging on Single sign-on for Exchange Server access

User-based Profile User based profile management Same virtual workspace from any device Profile - Executive App Doc Syste m Profile Doc - Executive System Profile - Sales App Doc System App Doc Profile - System RD App Doc System App Profile - Sales Doc Syste m App Profile - RD Doc Syste m

Mobile App Reputation Services

Easy Deployment On-premise software appliance Bare-Metal VMware vsphere ESX/ESXi

Trend Micro Integration SafeSync Document Centralized configuration Transparent to user Trend Micro Control Manager integration

System Architecture 20

Key Challenges in BYOD Gartner says: BYOD forces you to wrestle with three operational challenges: Governance & Compliance Mobile Device Management Safe Mobile Workforce Security 21

Danke