Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Paul Roberts – Enterprise Mobility Specialist
Symantec App Center 1 Silvester Drobnič
Proprietary and Confidential Secure Mobile Productivity & Collaboration for the Enterprise Secure mobile productivity Access, sync and edit files.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Help enable mobile productivity. For years, companies have leveraged Microsoft solutions for their productivity needs. In an evolving cloud-first and mobile-first.
Microsoft Certification and IT Professional Tracks Anthony Khan Director of Federal Learning NetCom Learning.
Microsoft Office 4/16/2017 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Unified Logs and Reporting for Hybrid Centralized Management
Do More In Less Time Will Schoen Microsoft Corporation April 12, 2011 Realize the future of government productivity with online and.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Offer Exchange Let your customers pick their preferred version of the world’s most popular business and collaboration platform Lync Secure, business-grade,
Your storage on the ground; Your files in the cloud.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Zentrum für sichere Informationstechnologie - Austria Bojan Suzic Open Identity Summit 2013 September 10th, Kloster Banz Secure Hardware-Based Public Cloud.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Consumerization of IT Microsoft in the Enterprise.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
User and Device Management
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Understanding The Cloud
How to Define a Successful Mobility Strategy
Transforming business
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
SAP Enterprise Digital Rights Management by NextLabs
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
BOMGAR REMOTE SUPPORT Karl Lankford
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Access and Information Protection Product Overview October 2013
Which is right for your business, Office 365 or Microsoft 365?
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Azure, RightsWATCH Help Users Keep Sensitive Information Safe from Security Breaches Resulting from Accidental or Malicious Disclosure MICROSOFT.
Google for Education offering
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Microsoft Virtual Academy
Microsoft Data Insights Summit
Microsoft 365 Business Technical Fundamentals Series
IT Management, Simplified
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive

About Intuitive

Intuitive – Simplify IT Symantec Technology Workforce Solutions Automate | Simplify

How Intuitive Helps Customers Solution Lifecycle Methodology Procurement Solution JumpStart Implementation Mentoring Services Remote Support Services Solution Health Check

Seminar Series: Securing Data in the Era of Pervasive Computing Your Mobile Users, Apps, and Devices (this session) Secure and Enable On Any Device, Anywhere (web) User-Based Application and Content Management Against Threats and Data Theft (local session) Secure Your Mobile Workforce’s Devices With Identity and Trust Management (web) Keep Your Data and Services Safe

Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize People User productivity and flexibility BYOD – Limited device choice Self Service Separate business & personal data Mobilize People User productivity and flexibility BYOD – Limited device choice Self Service Separate business & personal data The Mobility Evolution 6

Any Device Any Service Any Location By 2015, over 37% of the global workforce will work outside the corporate firewall 60% of devices are used for both work and personal purposes 35% allow employees to procure apps through App Stores The “Pervasive Computing” Promise

User Centric Device Centric Management in a Post-PC world Location Software Patches Device User Apps Data Device Cloud Services Location Mobile Devices Virtual Desktops User

Data Is The Key A device is just a piece of hardware. o Most cost just a few hundred dollars o Most are very easy to replace o Increasingly, the company doesn’t own many devices on its network o BYOD o Consultants / contractors But data can be worth millions o Intellectual property loss o Legal liability o Standards compliance o Business downtime

Secure Data, Not Devices What’s New in Symantec Data Loss Prevention 50% business documents using personal accounts 37% use file-sharing apps – like Dropbox – without permission 41% download intellectual property to personal mobile devices

Steps to securing your data Secure your services o Database o Authentication / Directory o Applications o Collaboration o File Services Secure your network o Firewalls o VPN o Wireless o Encrypted communication Secure your storage o File encryption o Drive encryption o Physical security Secure your identities o Certificates o Tokens o Authentication standards Secure your devices o Configuration o Encryption o Access

Symantec Mobile Information Management (MIM) capability enables full policy management of apps and content at scale

Solution Overview: Mobile Management Suite App Management Content ManagementDevice Management App Center Unified Management Platform 13

Enterprise App Store Best-in-Class Enterprise App Store – Easy branding – Consumer-style end-user portal – Reviews, screenshots, previews Access to all relevant apps o In-house, third party o Native and web apps o External store apps Support for Popular Mobile OS's o iOS, Android, Blackberry

Ability to apply relevant policies to content o Same policies as for apps o Additional content policies such as versioning and expiry Supports diverse content types o PDF’s o Videos o ePub documents o Forms o Others to follow Trusted Content Readers o Wrapped using App Center Policy Manager Enterprise Content Store

Same security as Sandboxing, But more flexible Symantec App Center.IPA or.APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 16

Business and Personal Apps and Data Co-exist Symantec App Center 17

App Security Policies 18 Symantec App Center

Policy Manager Apply relevant corporate policies to apps and content o User authentication o Encryption o Offline access o Doc sharing o Etc... Automatic creation of containers for apps and content No costly development cycles to add security o No SDK required

Next Steps! (262) (952) Assessment Workshop Let Us Help You Map security to pervasive computing challenges!