Mobile Protection Overview

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Mobile Device Management Timothy Yager SUNY Oswego Labman 2013 – Evergreen State College.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Tips on Securing Mobile Devices October 5, 2012 Preston Wiley, Network Security Manager, CISSP Mike Hill, Project Manager / Systems Analyst, CISSP.
Cortado Corporate Server 6.1 – The Mobile Business Formula for Success
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
29 Oded Moshe, VP Products & IT Official Release May 24, 2011 SysAid 8.0.
IBM Endpoint Manager for Mobile Devices Mobile Device Management
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Corporate File Sharing Solution CORPORATE DROP-BOX.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
The Natural way for Secure Mobile v.1.4
Meraki Mobile Device Management
Nokia Research Center Usable Security for Smartphones Cynthia Kuo Senior Researcher October 26,
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Mobile Data Management (MDM) Customer Overview 1.
Designed By: Technical Training Department
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Sophos Mobile Security
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
AnyShare File Synchronization and Sharing for Enterprise
Open Exchange 7 The Collaborative Suite For All Your Needs.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Security considerations for mobile devices in GoRTT
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
July, 2012 Citrix CloudGateway™ Technical Overview.
Intro to Datazen.
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
User and Device Management
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Kaspersky Small Office Security INTRODUCING New for 2014!
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
#SummitNow Managing Mobile Content Wednesday 13 th November 2013 Mike Hatfield, Lead Engineer Mobile Apps, Alfresco Marc Dubresson, Dir. Mobile Product.
Tech Tuesday.  Dropbox is a big name in cloud storage, having become one of the most frequently used file sharing platforms in the world. With improvements.
What Are the Different Platforms for Enterprise Mobility Solutions?
Total Enterprise Mobility Comprehensive Management and Security
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Sophos Mobile Control Joanna Wziątek-Ładosz Sales Engineer, Sophos.
Mobile Data Management (MDM)
Barracuda Mobile Device Manager
The time to address enterprise mobility is now
Hybrid Cloud Web Filtering Platform
Mobilize your Enterprise Today Enterprise Mobile Device Management
How to Define a Successful Mobility Strategy
Mobilize your Enterprise Today Enterprise Mobile Device Management
Mobile Data Solutions Inc
Modernizing your Remote Access
Mobilize your Enterprise Today Enterprise Mobile Device Management
Introduction to Soonr by ….
Mobile Device Management
Microsoft Data Insights Summit
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Mobile Protection Overview Pedro Pinto Sophos Confidential

Introduction Modern generation of smart phones Challenges Offer broad functionality and great variety of possible applications Can be used as a platform for business applications Challenges The more in function, the more complex the device becomes They become integral part of networks Danger through non-authorized usage They become the "weakest link" in an otherwise well secured IT infrastructure (“backdoor devices")

Deal with lost or stolen devices What we offer today Allow email access Deal with lost or stolen devices Manage apps Make life easier for IT Many organizations are already giving people access to corporate email from a personal device, but how safe is that? What if the phone’s owner decides that having a pin or password on the phone is a hassle, so they’re not going to bother using it? If that phone is lost or stolen then whoever finds it has immediate access to the data on it. It’s also useful to know what a user is doing with their device, how much data they use and what apps they have installed. The last thing IT departments need is more to manage and more helpdesk calls to deal with, so users should be able to manage their mobiles themselves. These our the required capabilities for most standard Sophos midmarket customers today. A customer who has never thought about managing mobiles and needs to make sure that data on them is kept safe, this is step one. And we should be talking about we understand their challenges and are developing solutions to take them up the rest of the steps ...

Sophos Mobile Control A Mobile Device Management solution that provides: Configuration of the phone Addresses concerns regarding loss/theft Supports employees’ personal devices DIY device management with a self service portal For Apple, Android and Windows Mobile

High Level Functionality Matrix Notes Master heading here Enter Date here High Level Functionality Matrix iPhone/iPAD Android Win Mobile 6.x Loss/Theft Protection Y Remote Configuration (Y)* Controlled E-Mail Access Self Service Portal -* Device Status Reporting SMC client apps on Android and Windows Mobile Distributed over-the-air from SMC server Autostart at device boot Minimal user interaction (non intrusive) Apple iPhone and iPad are controlled with the build-in management client * Additional Android functionality will be added with the next versions Enter Footer text here

SMC DEMO https://smc-eval.sophos.com/template/layout.jsf Login credentials: Customer = SE-UK Username = Admin-uk Password = Sophos-uk

Sophos Mobile Control 2011 2012 SMC 2.0 SMC 2.5 SMC 2.0 SMC 2.5 Nov Dec Jan Feb Mar 2012 Jun Jul Aug Sep Oct Apr May SMC 2.0 SMC 2.5 SMC 2.0 Compliance Check Jailbreak detection (iOS) Enterprise App Store (iOS+Android) Dashboard Backup & Restore Task Bundles WebService API C2DM Push for Android New platforms Blackberry, iOS 5, Android Tablets SMC 2.5 GUI Improvements Decommissioning of phones Audit trail Symbian Support Support of vendor specific MDM APIs for Android Phones from Lenovo, Samsung, Motorola, HTC (*) SMC 3.x (*) * Release date not allocated Windows Phone 7 support Management of Mobile Security Management of Mobile Encryption Support of vendor specific MDM APIs for Android Phones from Lenovo, Samsung, Motorola, HTC (*) Sophos Confidential (*) Depending in API and hardware availability

Sophos Mobile Security 2011 Nov Dec Jan Feb Mar 2012 Jun Jul Aug Sep Oct Apr May Mobile Security 1.0 Mobile Security 1.0 - Free Security solution for Android phones and tablets. Loss and Theft Protection: Lock, Wipe, Locate, ... Malicious apps Real time and on demand scan Application white- and blacklisting Cloud based live protection from Sophos Labs Privacy Advisor Mobile Security 2.0 (*) * Release date not allocated Management by Sophos Mobile Control Extended malicious apps protection Scheduled Scan Enterprise white-/blacklists Sophos Confidential

Sophos Mobile Encryption 2011 Nov Dec Jan Feb Mar 2012 Jun Jul Aug Sep Oct Apr May Mobile Encryption 1.0 Mobile Encryption 1.0 Mobile access to encrypted documents stored in the cloud Dropbox Egnyte Integrated into SafeGuard Enterprise 6.0 Platforms: iOS Android Mobile Encryption 2.0(*) * Release date not allocated Managed by Sophos Mobile Control Support more cloud provider Local encryption vault Sophos Confidential

Questions?