S ECURE M OBILE W ORKSPACES – N EXT G ENERATION D ESKTOPS E MPOWERING A GILE G OVERNMENT J EFF P ORTER - D IRECTOR P LATFORM TECHNOLOGY D IVISION D EPARTMENT.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Security for Mobile Devices
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Vodacom Microsoft Hosted Lync
Building Mobile Apps in the Cloud – Comparing Approaches.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Fòmasyon Itilizatè Ayiti Office 365 Fòmasyon. Why the Change? Partners in Health's new hosted Microsoft Office 365 solution allows users to access their.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Cloud Services for Education
Work Better Together Work Better Together Bring Ideas to Life Bring Ideas to Life Use Office Anywhere Use Office Anywhere Collaboration Without Compromise.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
$5 user/month Competitively priced/featured for entry-level cloud services Evolution of Small Business $8.25 user/month For customers who want just the.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
by Evolve IP Managed Services
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
August 2012 Windows 8 Pro Copy Guidance. Audience Microsoft Internal OEMs SMB focused MPN partners Not for use until Windows 8 general availability. This.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Building Hosted Desktop: Expand Your Profits as IT Evolves Microsoft Hosting Service Providers Conversation #4 1.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Harris Schneiderman Account Manager Kloud Solutions.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
1 DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY WARFIGHTER SUPPORT.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Building a Fully Trusted Authentication Environment
The Top 10 Reasons Your Manager is Going to Thank You For Using Microsoft Project Raja Noori Doug Welsby PC244.
IT as a Service (ITaaS) by Evolve IP Managed Services Last Update: May 19, 2015.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved Aruba Networks.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
What Are the Different Platforms for Enterprise Mobility Solutions?
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
The time to address enterprise mobility is now
Office 365 is cloud-based productivity, hosted by Microsoft.
Don Kendrick, VITA Senior Manager, Security Operations
Customer Guide to Limited-Time Offer
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Office 365 September 07, 2016.
BOMGAR REMOTE SUPPORT Karl Lankford
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Microsoft Lync / Skype for Business
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Autoaddress for Office 365 Brings Fast, Accurate and Quality Address and Eircode Capture to Your Organization in a Comprehensive, Simple Manner OFFICE.
Introduction to BYOD EIT, Author Gay Robertson, 2017.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
<Service provider solution name>
Near and Far Where are Feds working from?
Presentation transcript:

S ECURE M OBILE W ORKSPACES – N EXT G ENERATION D ESKTOPS E MPOWERING A GILE G OVERNMENT J EFF P ORTER - D IRECTOR P LATFORM TECHNOLOGY D IVISION D EPARTMENT OF I NFORMATION T ECHNOLOGY F AIRFAX C OUNTY G OVERNMENT

IT I NITIATIVES D RIVING S ECURE M OBILITY Fairfax County continues to evolve in its use of secure mobile technologies which is guided by the following County IT initiatives set by the Department of Information Technology’s CTO in the County’s IT Plan:  Mobility  Teleworking  Bring Your Own Device (BYOD)  Security  Operational Cost Efficiency  Continuity of Operations (COOP) Planning  Environment Stewardship and ‘Green’ IT FOSE 2014 – Fairfax County Government

A VAILABLE IT S ERVICE O FFERINGS TO E ND U SERS -Below are some of the technologies deployed within the County’s enterprise: -Hardware for Promoting Mobile Workspaces  Laptops  Tablets  Windows 8 To-Go (USB device which boots host machine to County’s Windows 8.1 image)  iPads  Secure Mobile Devices (iPhones, Androids, Windows Mobile Phones, Blackberry) FOSE 2014 – Fairfax County Government

A VAILABLE IT S ERVICE O FFERINGS TO E ND U SERS (C ONTINUED ) To enhance the user experiences while working remotely we have deployed the following IT services that are offered to all users. -Applications for Promoting Mobile Workspaces  Microsoft Lync Instant Messaging Desktop Sharing Phone/Conference Calls Video Calls  County App Store County approved applications to use for better business productivity and increased mobility.  Fairfax Remote The County has moved way from tokens to Validation and ID Protection (VIP). Users can access their standard Office Applications, Saved documents in ‘MyDocs’, and enterprise ERP system for accessing time and benefits (i.e. Employee-Self-Service and Manager-Self-Service).  Office 365 (Pending) Provides streamlined, integrated and cloud-based collaboration to the County. FOSE 2014 – Fairfax County Government

C OUNTY IT S ECURITY FOR A S ECURE M OBILE W ORKSPACE -The following applications have been deployed to ensure a secure mobile workspaces while increasing continuing to deliver an agile and scalable IT infrastructure:  Two-Factor Authentication Validation and ID Protection (VIP) for two-factor authentication of County IT systems. VIP implemented in fall of Delivers a second layer of authentication outside of user’s domain ID and password.  Encryption County uses encryption technologies to protect sensitive data being transmitted via electronic messaging.  Data Loss Prevention (DLP) Implementation underway. DLP reduces the risk/chance of loss of protected data or compromise from Outbound threats via hidden malicious attempts to mine county data.  Secure Mobile Device Management (MDM/MAM) Controls the use of mobile devices and addresses the challenges of data loss prevention and security on mobile devices, such as tablets and smartphones, which may access county data from remote networks. FOSE 2014 – Fairfax County Government

U SE C ASES AND H IGH L EVEL S TATISTICS High-Level Stats -At the beginning 2013, 20% of County end users were able to telework and access County services remotely. -Beginning 2014, at least 70% + of County end users are able to telework (given appropriate managerial approvals) and access County IT services securely using the Fairfax Portal with Validation and ID Protection (VIP). -In FY 2014 DIT upgraded the remote access portal to allow employees the ability to access the county’s ERP system ( FOCUS) functions (given their security profile) from anywhere over any device securely. Use Cases  Contractors Contractors providing support remotely off-site, and off-peak hours (i.e. weekends, night-time)  Employee Teleworking County employees are enabled to have flexible work arrangements while continuing to carry out County business functions in a productive, secure, and efficient manner.  BYOD Users can access the County network, systems, and applications from a personal device, allowing them to stay productive whatever their choice of PC or mobile device. FOSE 2014 – Fairfax County Government

N EXT S TEPS -Continue evangelizing IT service offerings (tablets, remote access, Windows 8 To-Go, etc.) which promote an increase to the mobile workforce. -Transition end users to a Single Point of Entry for secure and ease of access to all County IT Services (Fairfax Portal) via workstations and mobile devices. -Promote new hardware devices / standards as part of County PC Replacement Program (laptops and tablets) -Complete implementation of: Microsoft Office 365 Data Loss Prevention (DLP) FOSE 2014 – Fairfax County Government

D EMO OF S ECURE M OBILE W ORKSPACE IT S ERVICES Windows 8.1 To-Go FOSE 2014 – Fairfax County Government

THANK YOU! F OR Q UESTIONS P LEASE C ONTACT : JEFF. FAIRFAXCOUNTY. GOV J EFF P ORTER - D IRECTOR P LATFORM TECHNOLOGY D IVISION D EPARTMENT OF I NFORMATION T ECHNOLOGY