Mobile Device Management

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
To the ISSA Las Vegas Chapter April 13, Definition People Technology Policy.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Security for Mobile Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
IBM Endpoint Manager for Mobile Devices Mobile Device Management
Mobile Protection Overview
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Secure SharePoint mobile connectivity
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
© Copyright RES Software. v2012-Mar30. RES HyperDrive Patrik Zander, Product Manager 1.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
User and Device Management
IS3220 Information Technology Infrastructure Security
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Kaspersky Small Office Security INTRODUCING New for 2014!
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
The time to address enterprise mobility is now
Mobile Operating Systems
Critical Security Controls
Transforming business
Mobile Data Solutions Inc
Cloud-First, Modern Windows Management and Security
Computer Virus and Antivirus
Introduction to Cloud Computing
Matt G change over point ?
BOMGAR REMOTE SUPPORT Karl Lankford
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Microsoft Virtual Academy
Check Point Connectra NGX R60
11/27/ :16 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
MICROSOFT AZURE ISV PROFILE: ONEBE
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
PLANNING A SECURE BASELINE INSTALLATION
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
IT Management, Simplified
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Mobile Device Management !! Are we under attack !! Personal Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management Brian Notes: Class question?? How many people have smart phones, tablets, or PC that connect to a corporate network? What is the impact? How can Mobile Device Management help?

Overview Northwestern University Graduate Team – Praxiteles. 2012 How It Got Here Where It’s Going The main devices for corporate productivity used to be the desktop or laptop computer. RIM’s BlackBerry opened the door for smartphones as business tools. Employees began bringing their own non-BlackBerry devices into work, and demanding that they be able to connect them with corporate resources Mobile device management as a hub for managing a variety of corporate and personal Security is a focus of most MDM vendors. Mobile devices are increasingly application platforms. Mobile technology will continue to change rapidly Brian How it Got Here: The IT department could deploy and maintain tight control over computers and the applications installed on them. - IT continued to maintain control by issuing corporate-owned BlackBerry smartphones, and managing them from the central hub of BES. BES could no longer be the hub for managing this variety of devices. Third-party mobile device management solutions were created to fill this gap. Where is it going: devices from one management interface. A hub is no longer enough. Vendors are rushing to implement features that go above and beyond the native capabilities of the devices and enterprise ActiveSync integration. When both corporate data and personal data reside side by side on consumer devices, a balance between maintaining security and keeping personal data personal is needed. MDM solutions will no longer manage only devices, but the applications installed on them. ; MDM vendors need to not only support today’s devices, but adapt to manage the unexpected challenges of tomorrow. We must continue to focus on solutions that offer us Enforced Passwords, Device Wipe, Remote Lock, Audit trail/logging, Jailbreak detection, Software Distribution with Application downloading, updating and verification support, external memory blocking and configuration change history.

Northwestern University Graduate Team – Praxiteles. 2012 Bring Your Own Device is seen to be complex, expensive, and dangerous especially for Data Security If employees are using their own devices, legitimate questions include: How can IT protect the corporate data from corruption, misuse, or theft? How can efficient use of company-owned applications be supported on a device with non-standard configuration? How can the employee install a needed application even when their device uses a different operating system or operating system version? Who is responsible for taking care of his or her asset; How can the organization protect centrally located data if it can’t ensure that a device is properly secured? 23% 19% Brian In traditional distributed processing, employee applications and data are installed on company owned and managed devices such as PCs. Management of these assets enables the organization to support the efficient use of the applications and protect the data from loss, damage, or theft. And if company owned (or licensed) software and data is on the device, won’t the device owner logically expect the organization to provide support? Northwestern University Graduate Team – Praxiteles. 2012

Bring Your Own Device Opportunity Nathan

Security Network Architecture Typical Network Security Architecture Security Network Architecture Typical Components Gateway firewalls Dual gateway firewalls Internal firewalls Gateway anti-malware Endpoint anti-malware Dual Internet connections Segmented networks Tiered networks Virtual Private Networks (VPN) Intrusion detection & prevention Content filtering Data Leakage Protection (DLP) Network Access Control (NAC) Endpoint encryption Enhanced authentication Security management technologies Nathan Organizations that requires a high level of security protection. Endpoints should be protected with anti-malware and strong authentication and encryption should be used on laptops and sensitive servers. The organization require a granularly segmented network to create security zones and since the organization is an online business, dual Internet connections and firewalls are needed to mitigate website and network downtime. DLP is recommended in the organization to protect sensitive data from loss or theft. Content Filtering is also recommended as it will ensure that no unauthorized websites or other materials are viewed from company endpoints. NAC should be implemented to protect static endpoints on the network. The organization should ensure that An IDP system should be used to prevent unauthorized or malicious access to data. Finally, a Management System should be used to properly track, monitor and maintain security systems. Risk Tolerance: Low Presence of Sensitive Data: Yes Remote Users: Yes Hours of Operation: 24/7 Online Business: Yes Northwestern University Graduate Team – Praxiteles. 2012

Bring Your Own Device – Mobile Security Nathan

Next-Gen Multi-OS Mobile Device Management iPhone/iPad Android Blackberry Windows Mobile Symbian Enterprise Services Real-Time Smartphone Inventory Dashboard – Multi-OS Advanced Security & Management Configure, Secure & Manage Smartphone & iPad (OTA) Application Mgmt & Distribution Real-time inventory, In-house App Store Generate Actionable Alerts based on Policy SIM change, Intl roaming,… Employee Owned phone Data boundary, Self Governance,… Nathan

Competitive Outlook

Solution Three Services of MobileIron Virtual Smartphone Platform Control Chaos (IT) Control Cost (Telecom) Expand Experience (User) Secure and manage mobile devices, data, and apps Reduce wireless bills thru visibility into usage and quality Deliver new services and move accountability to the user Enterprise End-User Advanced Management Mobile Activity Intelligence MyPhone@Work Device management Security Access control Enterprise data boundary (selective wipe, privacy) Remote control Enterprise app store Activity analysis (voice, SMS, data traffic) Int’l roaming monitor Service quality analysis Alerts and actions Activity and quality Privacy controls Enterprise app store Self-management Virtual Smartphone Platform Todd Smartphone Mission Control Proactive Business Intelligence Cooperative Mobility

MobileIron iPhone, iPad & iPod Services Secure at Scale Manage Apps Control Cost Todd Integrate iPhone into IT Operations Provision at scale Configure and secure devices Obtain real-time inventory Determine operational & security state of devices Revoke enterprise resources and settings Manage Enterprise Apps End-to-End Gain real-time visibility into installed apps (iOS 4) Recommend App Store applications to end-users Distribute in-house applications over-the-air (iOS 4) Manage Enterprise Apps End-to-End Determine which devices are internationally roaming (iOS 4) Generate alerts based on IT policy Measure and record connection quality and speed (Cellular and Wi-Fi) Report performance and dropped calls on map

MobileIron Blackberry Value-Added Services Advanced Troubleshooting Control Cost and Quality Employee Self-Governance Todd Advanced Help Desk & App Mgmt tools Provision at scale Configure and secure devices Obtain real-time inventory Determine operational & security state of devices Revoke enterprise resources and settings Real-time Business Intelligence Activity analysis (voice, SMS, data traffic) Generate alerts based on Telecom policy (minutes usage and International roaming) Report performance and dropped calls on map Billing plan integration Employee Self-Portal Employee Self-registration Up-to-date view of usage by end user Enterprise App Store SMS search and history Enterprise sociograph Find-my-phone mapping

MobileIron Full MDM Services for WinMO, & Symbian Smartphone Mission Control Control Cost & Quality Employee Self-governance Next-Gen Mobile Device Management Device Management Remote Control/Access to Blackberry Visibility & Control over Active-Sync devices Generate alerts based on IT Policy (SIM change) Gain real-time visibility into installed apps Distribute in-house applications over-the-air Ability to Selectively Wipe contents Virus scanning connector Real-time Business Intelligence Activity analysis (voice, SMS, data traffic) Generate alerts based on Telecom policy (minutes usage and International roaming) Report performance on map Billing plan integration Employee Self-Portal Employee Self-registration Up-to-date view of usage by end user Enterprise App Store SMS search and history Enterprise sociograph Find-my-phone mapping Todd * Release pending

Bring Your Own Device Security Controls Todd

Cost Analysis Start-up and Termination Savings IT Action and Operation User Action and incident Telecom Usage Bring Your Own Device

Erildo

What Does It All Mean? Erildo

Would you like to see a demonstration: Questions Amit?? Erildo