Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Meraki Mobile Device Management
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Security Controls – What Works
Barracuda Backup Service Data Backup and Disaster Recovery.
Secure Data Transmission James Matheke Information Security Architect Ohio Department of Job and Family Services.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Critical Business Issue – Mobile Device Management “Afaria OnDemand from TPC” provides customers with the ability to leverage the full capabilities of.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Video Communication Market Trends Rafi Anuar Director, Product Management.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Eliza de Guzman HTM 520 Health Information Exchange.
ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Chapter 2 Securing Network Server and User Workstations.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
Managed IT Services JND Consulting Group LLC
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
DATA SECURITY FOR MEDICAL RESEARCH
Tim Carter Sales Director Sybase Confidential Propriety.
Tim Carter Sales Director Sybase Confidential Propriety.
Session 1 – Introduction to Information Security
Presentation transcript:

Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device and Data Security for the Mobile Enterprise Tim Carter Sales Director iAnywhere Confidential

Agenda Security Needs of Mobile Technology Enterprise Mobile Security Requirements Addressing Mobile Security with Afaria Our "Top 10 Tips" for Making Your Mobile Solution Successful and Secure Summary

Security Needs of Mobile Technology Understanding the risk  How sensitive is the data?  What’s the impact if data falls into the wrong hands? Performing risk analyses  Security of all data is not the same Usage and Security Policies  Equip your users to understand the risks

Security Needs of Mobile Technology How much security is necessary?  One size does not fit all  Appropriate to users and their applications Why mobile presents significant challenges  Users are outside the firewall  Devices are portable and easily lost

Enterprise Requirements for Mobile Security 3. Access to data stored on the device or on storage cards 2. Data transmitted over the network 1. Protection of data in central systems 4. Protection of data on devices lost or stolen Four Key Areas

Enterprise Requirements for Mobile Security Power-on password policies, data on device encryption, virus protection, data backup Several encryption methods including 128-bit SSL support, Firewall traversal User authentication and assignments of channels to groups, Admin security Remote wipe of data on lost/stolen devices, data restore, device re- provisioning Central control of security policies Relieve the security burden from the user Minimal user impact

Frontline Management

Security and Management Are Converging User authentication (password) Data-on-device encryption Device authentication (certificates) Lost or stolen device protection Anti-virus updates Patch Management Backup and Restore Device (Re)Provisioning

Security vs. Usability Different settings for different user populations Policy Management Central control, deployment and maintenance of policies SecurityUsability Long alphanumeric passwords Limited password attempts Triple DES Encryption Device lockdown Anti-Virus Protection Patch Management Data Backup/Restore Alphanumeric passwords More password attempts AES Encryption Device lockdown Anti-Virus Protection Data Backup/Restore PIN number passwords Device lockdown Anti-Virus Protection Patch Management Data Backup/Restore

Management and Security have Common Requirements Scalability Policy Management Central Control Visibility Remove User Burden Logging, reporting and auditing

Afaria Security Management in Action

My Top 10 Tips for Making Your Mobility Project Successful and Secure Focus on the right projects Engage your users early Understand the technology differences Make it easy for your users to adopt (focus on usability) Ensure there is clear visibility from headquarters

My Top 10 Tips for Making Your Mobility Project Successful and Secure Determine and communicate usage policies to your users (consider tech and non-tech issues) Use security software and infrastructure to implement your policies directly from HQ Allow your top performers to continue to be top performers Analyse the ROI six months after the project has been bedded in Use a management and security framework capable of supporting mobile projects

Summary Management and Security together allow enterprises to scale their investments in mobile technology Management and security are converging rapidly iAnywhere leads the market in delivering management, security and all the other elements necessary to allow enterprises to extend business applications to their front lines

Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device and Data Security for the Mobile Enterprise Tim Carter Sales Director iAnywhere Confidential