Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Emoze for Mobile Operators
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
What is Wireless LAN? Mika Setälä Chairman, HiperLAN/2 Global Forum Marketing Working Group And what it is not!
The IT Manager’s Nightmare... “Good morning, the board decided last night that we need to have iPads in order to do our work properly. Can you please.
Meraki Mobile Device Management
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Creating Value Through Innovation The Changing Face of Business Communications Simon Gwatkin VP Strategic Marketing Mitel July 16, 2008.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Protection notice / Copyright notice HiPath MobileConnect Delivering on the Promise of Enterprise FMC February 2007.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Rev BMarch 2004 The ABC Service as a Research Infrastructure Rajesh Mishra Per Johansson Cahit Akin Salih Ergut.
Smith Micro & Wireless Data in 2006 Grove City College October 5, 2006.
Mobile Commerce and Ubiquitous Computing
DAKNET Presented By: rreema.
Grow Your Business with the Mitel Applications Suite PSG Networks Mitel Business Partner.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Mobile Computer Communication Services Daytime Organizer.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Unified. Simplified. Unified Communications Launch 2007.
Large Enterprise with Multiple Locations Source: Avaya.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
UNITRONICS GPRS.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
What is broadband Multiple broadband technologies Advantages DSL and DSLAM Types of DSL transmission Services through broadband Cable Modem Internet Access.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
1 Will there be a wireless standard anytime soon ? Best Of Wireless January 21, 2004.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
IBM Corporation IDATE November 20, 2003 Investment in the Mobile Enterprise Scott Stainken General Manager, Global Pervasive/Wireless e-Business.
Augusto Valdez Senior Product Manager Mobile Communications Business SESSION CODE: WPH202.
Public Key Infrastructures and mCommerce Baltimore’s offerings for wireless technologies.
Randy Kendzior, Dell, Inc. September 24, 2004 Wireless Technology Discussion Massachusetts Digital Government Summit.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Mobile Multimedia for business VMA OrangeMIB – VMA Orange and Mobile Multimedia : already 18 months ! Mobile Internet for Business Mobile.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Winning Wireless Applications Corina Moore PrinterOn Corporation
1 Mobile Services Cellular networks Spectrum The structure of the industry Second & third generation networks Handhelds M-Commerce.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Enabling Converged Services Changing the Way the World Communicates Jim Dondero Vice-President Global Solutions Marketing CANTO, June 21st.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
User and Device Management
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Workshifting Transform your business – empower your people.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 1 Introduction to Networking
Chapter 1: Exploring the Network
Introduction to Computers
IS4550 Security Policies and Implementation
Presentation transcript:

Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor

A Changing Wireless World Source: Yankee Group ApplicationsCustomers TerminalsNetworks Yesterday Tomorrow Voice Phone One- Size Fits All Consumer Business Circuit Limited Public WiFi 2.5 G WWAN 3G WWAN “Wireless Fabric” IP Core Smart Phone PDA Computer Content Gaming Web Browsing Video M-commerce Enterprise Consumer SMB Teen/Youth Vertical(s) Simple Apps Wireless “Access” Photos Vertical- specific Integrated voice/data Data- capable Phone WLAN Camera Phone Increased Device Fragmentation Bluetooth

Distributed Workforce Leads to Data Everywhere “Over 93% of enterprises have outworking employees” “On any given day, over 35% of US workers not in their corporate office” “In 2003, 54% of enterprise employees worked from home on a regular basis, and growing” “75% of enterprises use remote VPN access to support outworkers” “CIO's plan to increase number of remote access users by 10% or more over the next year” Sources: Research Concepts 2003; Routing Technology Group 2004; AT&T/Economist Survey 2003; Network World 2003; UBS Investment Research 2004

Mobile Workforce Challenges Right information at the right time (customer facing & decision support) Multiple devices & data synchronization Security Regulatory compliance TCO of existing solutions Connectivity

Mobile Computing Security Challenges Loss/theft of mobile devices Impersonation Introduction of malware into corporate network Limitations of boundary protection Users do not follow security policies

Route1 Seamless Workspace TM Mobi Interconnect Exchange (MIX) for communications security (PKI SSL), session management, auto update Mobi Relay Proxy (MRP) connects remote devices behind firewalls Any Connection : Cellular, WiFi, WiMax (when available), LAN Designed to meet all outworker requirements without any applications or data in the field:

Route1 Location-Free Desktop MobiBook PRO WinCE.Net device, diskless, wireless, touch-screen, long battery life, semi-ruggedized MobiRemote & MobiHost software for logon, user/device authentication, remote data trace removal MobiNET enabled A complete integrated offering for MS Windows:

Addressing Connectivity Challenge Technology Operating Environment Analog Modem ISDN Cable Modem ADSL GSM CDPD IS-95 IS-136 GPRS EDGE Cdma X UMTS/WCDMA Cdma 3G1X-EV Data Performance Operating Range Landline Mobility 2MB/s 1MB/s 384kbit/s 128kbit/s 64kbit/s 28.8kbit/s 9.6kbit/s Source: Lucent / Route1 Likely Operating Range Peak Rates Minimum Data Throughput Performance (Europe Study) Minimum Data Throughput for Mobi

Addressing Mobile Security Challenges Encrypted IP communications from Desktop to Mobi Device via SSL

Addressing Security Challenges (cont.) Sensitive applications & data are never stored on remote devices Certificates & multi-factor authentication support prevent impersonation Limited nature of information exchange prevents malware introduction End-to-end security from remote to host enables “boundaryless security” Packaged offering increases ease of use & prevent policy circumvention

Work Outside Your Office Just Like You do Inside! All applications & data remain behind the firewall Desktop, Blade PC, Blade Server Any network Any location Real-time Secure Locate/shut down lost or stolen device Route1 Remoting for Seamless Customer Experience.

Summary Mobile workforce can mean increased productivity & revenue Enabled by today’s & tomorrow’s wireless networks Significant challenges, but not insurmountable