IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape.

Slides:



Advertisements
Similar presentations
Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops.
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Dell Compellent and SafeNet KeySecure
The future of Desktops Transform Your Desktop with Virtualization.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Piilo Makes HR Easy for Businesses of Any Size, Thanks to the Convenience of Its Mobile App and the Power of the Microsoft Azure Cloud Platform MICROSOFT.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
New Data Regulation Law 201 CMR TJX Video.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Findly Leads the World in Talent Innovation with Its Enterprise-Cloud for Global Talent Acquisition COMPANY PROFILE: FINDLY Findly is a SaaS ISV founded.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Hosted on the Powerful Microsoft Azure Platform, Advent Countdown Lets Companies Run Reliable and Scalable Holiday Marketing Campaigns MICROSOFT AZURE.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Using the Powerful Microsoft Azure Platform, e-SUAP Properly and Securely Manages All Steps for Customizable Business Activities Permissions MICROSOFT.
Empowering Your Users-Security & Mobility Bil Martin 1.
Rapid Endpoint Data Protection on Microsoft Azure [Insert customer name] [Date}
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
SMALL BUSINESS SERVER 2011 TRAINING WEBINAR. Agenda 1. Market2. Product Overview3. Customer Value Proposition4. SKU Descriptions and Licensing.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Employee Survey Specialists Help Businesses Gain Valuable Insights, Start Organizational Dialogues COMPANY PROFILE: EFFECTORY Effectory is Europe's largest.
Building a Fully Trusted Authentication Environment
Introduction TO Network Administration
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
Connect Applications and Business Partners in Integration Cloud, the Reliable and Transparent Integration Environment Built on Microsoft Azure MICROSOFT.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
1 1 IronKey Features Mapped to Market Segments. 2 2 IronKey Solutions Data protection for compliance Consolidate strong authentication Disaster recovery.
UNM Encryption Services in Development
Dell Compellent and SafeNet KeySecure
Special Promo Valid Until
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
MICROSOFT AZURE ISV PROFILE: ONEBE
DATS International Portfolio.
Special Promo Valid Until
Special Promo Valid Until
Presentation transcript:

IMATION MOBILE SECURITY

MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape

MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape The Mobility Gap

WORKERS DEMAND Flexibility Usability Choice

MACRO TREND—WORKING REMOTELY 40% of IBM employees work remotely 26.2M U.S. employees worked at home at least one day per month in % of Cisco employees telecommute SOURCES: Vancouver Sun, WorldatWork Special Report

MACRO TREND—DATA MOBILITY 91% reported permitting removable storage devices on company networks 66% do NOT enforce data encryption on company issued and personal devices SOURCE: Harris Interactive Survey

MACRO TREND — CHANGING WORKSPACES 69% of organizations have some users working on their own laptops 82% of IT departments worried about use of personal devices SOURCE: Dimensional Research

MACRO TREND—SECURITY DEMANDS 37% of IT decision makers in the U.S. and Canada reported unintentional exposure of company data in the past two years via theft or loss of removable storage devices 75% of organizations have suffered data loss from negligent or malicious insiders SOURCES: Harris Interactive Survey, Ponemon Institute

CLOSING THE GAP

to letting employees work the way they want to work Workforce Needs Enterprise Security to protecting and securing data SAY YES… Yes

BEST OF BREED + + MOBILE SECURITY

FIPS Level 2 validated encrypted USB device USB security device with hardware-based CAC/PIV authentication Multifunction USB security device with PKI functions & encrypted storage Encrypted USB device with hardware-based biometric authentication Hardware- encrypted portable USB hard drive IMATION INNOVATION Imation Firsts USB security device to meet the NIST SP800-56A secure communications standard FIPS Level 3 validated portable security processor CESG CAPS-accredited encrypted USB flash drive Liquid metal enclosure on an encrypted USB device Thixotropic magnesium enclosure on an encrypted USB device

COMPLETE MOBILITY SOLUTION

MOBILE SECURITY The information users need to do their jobs The identities users use to access systems and communicate The tools and applications that make users productive

DATA IN MOTION Financial Data Intellectual Property Legal Data Customer Data HR Information MalwareUnknown Devices Threats Military Intelligence Data Healthcare Patient Data

WHERE WE FIT HOME HOT SPOTS BRANCH OFFICES ENTERPRISE CENTRALIZED MANAGEMENT

MOBILITY & PROTECTION Safeguard your data with highest security levels available Carry files with complete confidence Great user experience Meet and exceed compliance regulations Easy to deploy and use

RUGGED & SECURE…

EASY CLOUD-BASED OR ON-PREMISE MANAGEMENT FIPS Level 3 certified Endpoint application integration Remote administration & policy enforcement Remotely disable or terminate lost or stolen USB drives Administrator device unlock & reset Self-service password recovery Intuitive user control panel available in eight languages

BIOMETRIC SECURITY…

ON-PREMISE MANAGEMENT High capacity portable drives up to 1TB Active Directory support Self-issue devices Remotely block devices or erase data Direct device communication allows policies to be updated anytime Tailor security policies and device behavior based on user needs ACCESS Enterprise

EVERYTHING YOU NEED, NOTHING YOU DON’T Get renowned IronKey quality Affordably comply with storage security mandates that don’t require FIPS certification Durable, quality-tested IronKey hardware to reliably keep data private and secure Ideal cost-effective complement to many FIPS certified members of the IronKey family

MANAGE DRIVES WITH MCAFEE E POLICY ORCHESTRATOR ® Centrally track and manage Imation encrypted USB drives and use policies Proven platform managing more than 58 million enterprise desktops worldwide Set customized policies for authentication, initialization, revocation and backup Remote wipe for lost or stolen devices

TAKE YOUR SECURITY TO THE NEXT LEVEL Improve authentication security levels Consolidate the number of passwords Reduce what users have to carry Reduce implementation cost by blending identity into other efforts Prevent data breaches & meet compliance regulations

MAKE YOUR EXISTING SECURITY STRONGER Hardware-based multifactor authentication One device for secure storage & identity One password unlocks all onboard identities Easy integration other applications o CRYPTOCard o RSA SecurID ® o VeriSign ® Identity Protection (VIP) o o Document Management

TRANSFORM ANY COMPUTER INTO AN IT-MANAGED SYSTEM Give mobile users full-featured work environments Lock down workspaces with high security Reduce desktop image support time & cost Great user experience High user mobility

FULLY-FUNCTIONAL WORKSTATION THAT FITS IN YOUR POCKET

FULL WINDOWS DESKTOP ON A SECURE USB Devices act like laptops—images managed like you do today Boot-from-USB, full host computer isolation No virtualization, fast, full windows desktop Fully hardware encrypted FIPS 140-2, Level 3 validated Centrally-manageable security policies Active Directory integration Dedicated appliance for mass device imaging No install required for end users Microsoft Windows 7

IRONKEY WORKSPACE Provide users with an imaged and fully functioning version of Windows 8 Take advantage of all the performance improvements offered by USB 3.0 Protect portable desktops with 128-bit or 256-bit AES full disk encryption and password authentication Automatically protect data upon device removal Waterproof, dust proof and shock resistant Delivers up to five times the minimum read/write performance requirements for WTG devices BitLocker encryption to protect data Zero client footprint; no network access required Full usage of local hardware and resources

WHY IMATION MOBILE SECURITY Highest security levels available today Rugged solutions deployed in the world’s most demanding organizations Unmatched deployment flexibility –On premise –Cloud-based

IMATION MOBILE SECURITY …TO SECURING THE MOBILE WORKFORCE. Yes