Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

Similar documents
Mobile First Era with MobileIron. MobileIron Japan

MobileIron and Samsung Value Proposition

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Making the Enterprise Mobile First

AirWatch Solution Overview

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Jits Langedijk Sr. Consultant

Embracing Complete BYOD Security with MDM and NAC

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

How To Improve Your Network Security

How to Successfully Roll Out an Android BYOD Program

XenMobile Live Front to Back Demo

Technical Note. ForeScout MDM Data Security

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Solve BYOD with! Workspace as a Service!

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

Mobile First: Securing Information Sprawl

Mobilize your Enterprise in 60 Minutes!

Securing Office 365 with MobileIron

The Future of Mobile Device Management

Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility

IT Enterprise Services

Amazon.com, Inc. and its affiliates. All rights reserved.

Mobile Security: Threats and Countermeasures

ForeScout MDM Enterprise

MobileIron Cloud Pricing Packaging

The ForeScout Difference

MobileIron Product Packaging

Enterprise Mobility Security Solution. Date: 20 th November 2014 Presented By: Ng Yaw Choo Product Management Security & End User Computing

MobileIron Product Packaging

Mobile First Government

The Ultimate Guide to Enterprise Mobility Management

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

VMware End-User Computing May 8, VMware Inc. All rights reserved.

Sophos Mobile Control

MAM - Mobile Application Management

CWSI Service Definition for Mobile Device Management and Security

Total Enterprise Mobility

Top 10 Reasons why VDI is not a good solution for BYOD

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

6 Things To Think About Before Implementing BYOD

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Mobile App Management:

Amazon Web Services. Steve Spano, Brig Gen (Ret), USAF GM, Defense and National Security AWS, Worldwide Public Sector

Mobile App Containers: Product Or Feature?

Reshaping the enterprise for the future of work. Are you ready?

Gartner Magic Quadrant Sources and Disclaimer

MDM Mobile Device Management

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

#ITtrends #ITTRENDS SYMANTEC VISION

EMC AND VIRTUSTREAM MAY 26, Copyright 2015 EMC Corporation. All rights reserved.

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Total Enterprise Mobility. Norbert Elek

Mobile Security Mobile Device Management Mobile Application Management

Mobile device Management mit NAC

How To Secure Your Mobile Device

Amazon Web Services (AWS) A Secure and Scalable Platform for Global Enterprises. Tim Bixler Sr. Manager, Solutions Architecture

The Maximum Security Marriage:

How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

Building your Big Data Architecture on Amazon Web Services

Salient Managed Services. Hosting and Support

Roadmap to Solving Enterprise Mobility

RPM Business Unit Jürgen Strapko Regional Sales Manager Germany Midmarket

Enterprise Archiving Simplified

Deliver Desktops as a Service! With VDI 2.0!

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Critical Capabilities for Mobile Device Management

Good for Enterprise Good Dynamics

Top. Enterprise Reasons to Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Managing and Securing the Mobile Device Invasion IBM Corporation

Transcription:

Data Loss Prevention and Secure Access for Mobile Content Ojas Rege VP Strategy

Agenda Problem definition Enterprise requirements MobileIron Docs@Work solution Architecture and user experience

Traditional enterprise security Firewall & VPN

Mobile data ignores the perimeter Copy/Paste Forward Open-in

Secure and manage mobile apps, documents, and devices for global organizations Purpose-built for Best at apps Best at security Architected for Leaders Quadrant of 2012 Gartner MDM Magic Quadrant 3,000+ customers in 24 months 97% customer support satisfaction Focused on customer success 7 of top 10 global pharmaceutical companies 4 of top 5 global automotive manufacturers 3 of top 5 global retailers 5 of top 10 global law firms Gartner, Inc: Magic Quadrant for Mobile Device Management Software by Philip Redman, John Girard, and Monica Basso (May 17, 2012). This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://info.mobileiron.com/gartner-magic-quadrant.html. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

The MobileIron platform delivers A B End User Services Complete Mobile IT Management

It starts with End User Services Email Native experience Apps Secure data Content Browsing Separation between work & personal

Two primary document repositories Email attachments View Copy Save Open In SharePoint documents View Copy Save Open In

Data Loss Prevention (DLP) requirements Provide secure access to email attachments Provide secure access to SharePoint documents Solve open in problem for native ios email attachments Store documents securely on device Control cut / copy / paste actions Selectively wipe documents Prevent unauthorized distribution of documents Control end-to-end with policy Leverage existing on-premise content repositories

Docs@Work: Secure attachments ios Native Mail App MobileIron Client REMOVE Email with Attachment

Docs@Work: Secure SharePoint MobileIron Client REMOVE REMOVE SharePoint

Secure Attachments Demonstration

Secure SharePoint Demonstration

Closed-loop actions when compromised Closed-loop actions Notifies user and admin Prevents user from accessing Docs@Work Removes all local files, including attachments Removes SharePoint site configurations as part of protecting enterprise persona

Moving forward Policy-based document access for 3rd party solutions (e.g., Accellion, Box, GroupLogic) Secure tunneling on non-vpn BYOD devices Platform expansion

DLP best practices for ios Closed-loop compliance Continuous management Inbox protection OS integrity Attachment protection OS versioning Identity Passcode / encryption Role of icloud Auto-wipe Threat blacklist Trusted app development guidelines

The journey to mobile productivity Pivot to Mobile Platform Mobile First Deliver Apps & Content Adopt Devices Transformation New business processes New user experiences BYOD Email access Multi-OS device security Users Enterprise IT

Thank you info@mobileiron.com