The User is Evolving. July 12, 2011



Similar documents
Symantec Mobile Management 7.1

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Symantec Mobile Management 7.2

Athena Mobile Device Management from Symantec

McAfee Enterprise Mobility Management

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Symantec Mobile Management Suite

Systems Manager Cloud Based Mobile Device Management

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

EndUser Protection. Peter Skondro. Sophos

MDM Mobile Device Management

Mobile Device Management for CFAES

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

RFI Template for Enterprise MDM Solutions

McAfee Enterprise Mobility

McAfee Endpoint Protection Products

Cisco Mobile Collaboration Management Service

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Mobile First Government

Ensuring the security of your mobile business intelligence

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

The ForeScout Difference

Mobile Device Management and Security Glossary

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Systems Manager Cloud-Based Enterprise Mobility Management

mobilecho: 5-Step Deployment Plan for Mobile File Management

McAfee Enterprise Mobility Management

ForeScout MDM Enterprise

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Symantec Mobile Security

Feature List for Kaspersky Security for Mobile

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Endpoint protection for physical and virtual desktops

Symantec Endpoint Security Management Solutions Presentation and Demo for:

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

SA Series SSL VPN Virtual Appliances

Why you need. McAfee. Multi Acess PARTNER SERVICES

Addressing NIST and DOD Requirements for Mobile Device Management

Mobile Device Strategy

IBM Endpoint Manager for Mobile Devices

MAM - Mobile Application Management

McAfee Server Security

BYOD: End-to-End Security

Technology Blueprint. Enforcing Endpoint Compliance on the network. Police your managed and unmanaged systems with Network Access Control (NAC)

When enterprise mobility strategies are discussed, security is usually one of the first topics

What We Do: Simplify Enterprise Mobility

IBM United States Software Announcement , dated February 3, 2015

Dell World Software User Forum 2013

Mobile Device Management Glossary.

Top. Enterprise Reasons to Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Kaspersky Security for Mobile

Bitdefender GravityZone Sales Presentation

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

USING GENIE REMOTELY

Chris Boykin VP of Professional Services

ipad in Business Mobile Device Management

How To Manage A Mobile Device Management (Mdm) Solution

iphone in Business Mobile Device Management

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

Microsoft Windows Intune: Cloud-based solution

McAfee Security Architectures for the Public Sector

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

activecho Driving Secure Enterprise File Sharing and Syncing

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Required Software Product List

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Secure Your Mobile Workplace

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Transcription:

McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC

The User is Evolving 2

The User is Evolving 3

IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0 Threats Are 60,000 New Pieces of Malware/day HR More than half of all users don t lock their devices IT IT Sales Mobile Devices Predicted to be New Malware Frontier Finance 80% of IT Users Concerned about Device Data Loss 4

Requirements for Secure Application Enablement Enterprise and LOB Apps Basic Services Customer Facing Apps Web and Social Media Required: Data Protection Compliance Authentication Security Policy Management Self-Service Provisioning Enterprise App Management 5

Empowering Enterprise Mobility Secure Manages native security settings Enforces device compliance Extends the security infrastructure via epo Integrates with the data center Easy Simple administration and reporting via epo User self-service provisioning Device personalization for user productivity Scalable Scales to 10s of 1,000s of devices Supports HA and DR configurations Win 7 & WinMo iphone BlackBerry Android webos ipad Symbian McAfee EMM VPN Enterprise Environment Messaging Database Applications Files Directory Certificate Services 6

The Right Life Cycle for Mobile Device Management Enterprise Application Management Make apps available in a secure, role-based way. Offer apps for download, links to thirdparty app stores, and web links. Provisioning Define security policies, network connectivity, and resources; users self-service provision for automatic device personalization. Application Management Provisioning IT Operations Support Visualize and manage devices centrally through McAfee epo integration. IT Operations Support epo Security & Authentication Security and Authentication Enable devices to strongly authenticate against Microsoft CA. Supports two-factor authentication. Compliance Automatically check devices prior to network access. Compliance Policy Management Policy Management Remotely perform helpdesk tasks and push security policies and configuration updates over-the-air. 7

Self-Service Provisioning for iphone 1 2 3 4 Go to the App Store Enter Your Email Credentials Agree to Corporate Policy IT Services are Auto-Provisioned optional Easy, Secure, Automated Easy, Secure, Automated 8

Self-Service Provisioning for Android 1 2 3 4 Go to the Marketplace Enter Your Email Credentials Agree to Corporate Policy IT Services are Auto-Provisioned Easy, Secure, Automated 9

Industry Standard PKI for Strong Authentication Industry-Standard Security: Microsoft Certificate Authority Benefits: Industry-standard security Strong authentication for secure access to communications services such as Wi-Fi and VPN Strong authentication for secure push email and other applications Single sign on for enhanced user experience No impact on battery life 10 10

Enterprise Application Store Recommend and make applications securely available based on group, role, or device type. Custom corporate applications Third-party applications (Apple App Store or Android Marketplace) Webclips Device application inventory, audit, and policy management 11

Centralized Visibility and Control with epo Compliance reports are based on systems we know about 12

Centralized Visibility and Control with epo What we don t manage is where compliance status is unknown 13

Centralized Visibility and Control with epo Bringing all endpoints into compliance status view is critical to assessing risk and prioritizing actions 14

McAfee WaveSecure for User Device Management Lock Your Phone Remotely to Prevent Unauthorized Access Track your Phone s Location and SIM Changes in the Phone Backup and Restore the Data on Your Phone Remotely Wipe Your Phone Data and Memory Card 15

All Part of McAfee Security Connected Security Management Policy Management Security Reporting Mobile Management Vulnerability Management Risk Management Compliance Network Security Next Generation Firewall Network Intrusion Prevention NAC Gateway Network User Behavior Analysis Network Threat Behavior Analysis Network Threat Response Content Security Email Gateway Web Gateway Data Loss Prevention Encryption Endpoint Security Mac, UNIX/Linux AV Anti-Virus & Anti-Spyware Desktop Firewall Email Server AV & Anti-Spam Virtual Desktop Virtual Server Mobile Devices Host Intrusion Prevention Endpoint Encryption Application Whitelisting Device Control Policy Auditing NAC Endpoint SharePoint Protection Website Reputation 16

Security Solutions for Consumerization of IT Consumerization of IT Mobile Devices Laptops and Desktops Virtualized Desktops BYO IT Issued BYO IT Issued Un-Managed Managed McAfee EMM and WaveSecure McAfee MNAC, Suites, Encryption McAfee MOVE VDI Network Access Control: McAfee NAC Appliance / Network Security Platform Web Applications & DLP: McAfee Firewall / Web Appliance / Network DLP Security Infrastructure: McAfee epo, Endpoint, Network, Content, Compliance Portfolio 17