Www.mobylla.com© MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.
Security for Mobile Devices
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
The IT Manager’s Nightmare... “Good morning, the board decided last night that we need to have iPads in order to do our work properly. Can you please.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing the BYOD Management Gap: the evolution of enterprise mobility.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Security for Today’s Threat Landscape Kat Pelak 1.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
© Copyright RES Software. v2012-Mar30. RES HyperDrive Patrik Zander, Product Manager 1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
by Evolve IP Managed Services
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Smart Mail lets you send and receive s from your mobile phone in a quick and easy way using your favorite mail account.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
Best-in-Class Productivity for the Modern SMB Office solutions when and where you need them with Microsoft Office 365. Belston Technologies is a Certified.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Analysis And Research Of System Security Based On.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
UNIFED COMMUNICATIONS MANAGEMENT
The time to address enterprise mobility is now
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Mobilize your Enterprise Today Enterprise Mobile Device Management
Mobile device Management & BYOD in a mobile world
How to Define a Successful Mobility Strategy
Mobilize your Enterprise Today Enterprise Mobile Device Management
A Winning Combination !! and Good afternoon…
Mobile Data Solutions Inc
Mobilize your Enterprise Today Enterprise Mobile Device Management
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Mobile Device Management
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
MICROSOFT AZURE ISV PROFILE: ONEBE
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012

MOBYLLA 2012 MOBYLLA - Enterprise Mobility Solutions Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Stavros KARAGULOGLOU Chief Executive Officer

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Android, Google|C,C++, Java BlackBerry, RIM|Java iOS, Apple|C,C++, Objective-C Mobile Linux, Open source |C++ Palm OS/Hp WebOS, HP|C Symbian, Nokia|C++ Windows Mobile 5,6|C++ Windows Phone 7| Many [28],.Net, (Silverlight /XNA ) Some DIED already ??

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Essential steps in order to avoid D.... ! THE RIGHT WAY

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Mobile SalesForce “Greek Logistics Co.” example Mobilize Your Business Processes !

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Field Engineering Management Example Mobilize Your Business Processes !

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Mobile Device/Data Management Mobylla – We can Do All this HOW ?

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 The NEW COMPUTERS: Phones have become computers. Must be Secure Must be Managed The mobile workforce enables  Communication  Knowledge sharing  Access to data Regardless of time and place.

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 (Im)Possible SOLUTION VERBOTEN KINDERGARDEN Unprofessional Not for Business

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Mobile Device/Data Management Mobylla – We can Do All this So, let’s FOCUS on:

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Key Words: BYOD IP -> UTM, NAC, SSL-VPN SandBoxing DLP Device Management CLOUD -> Acceleration Virtual Machine on Device Managed !

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 IP -> UTM, NAC, SSL-VPN Mobile EndPoint Security

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Antivirus Real-time protection Auto updates Scan all files Scan all connections Personal Firewall Personal Firewall Inbound and outbound filtering Alerts and logging Customizable Anti Spam Block SMS and voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Loss & Theft Protection Remote lock and wipe Backup and restore GPS locate SIM change notification Device Control Device Control App inventory and control Content monitoring MobileSecurity Junos Pulse Mobile Security Gateway

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 How can Enterprise data be secure on Personal devices? Enterprise Data User clicks on Good app to enter Secure Container Enterprise Data Lockdown – Data encryption – Password policies – Remote wipe Only Good application can access Enterprise data – , attachments & PIM – Intranets, web apps – Document repositories – Corporate IM Personal Data Devices remain personal  Untouched by enterprise  Justifies shared employee expense Use native device applications for personal stuff:   Contacts  Calendar  Applications  Pictures  Videos etc When an employee leaves an organisation only the corporate data is wiped leaving all personal data intact No data leakage from Good container to personal device

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 “Containerize” Apps & Messaging Manage the Whole Device. Whole device Containerized applications and data Security and management policies can be restricted to selected applications or applied to the functionality of the entire device.

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 There are three key stages of the device lifecycle Mobile Device Management

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Manage Re-Provision/Re-Image device – Replacement device-same user – Repurposed device Redeploy software assets Restore data (after device kill) Production Manage Track Asset Updates Monitoring Modify Device Configuration Files Distribution License usage and tracking Scheduled/automate activities Remote Control of devices Cost Control Localization Secure Back-up Data Patches/Security Updates Enforce Security Policies Monitor/Track Violations/Threats Logging Provision Manage Company Policies Connectivity Settings OTA Management Software deployment Secure Security policies Power-On Password Data Encryption AV, firewall Decommission Secure Disable Lost/Stolen device – Remote Kill/Lock – Access Violation Lock – “Data fading” Provision Production Decommission Mobile Device Management

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Mobile EndPoint Virtualization Driver: CONSUMERIZATION

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Mobile EndPoint Virtualization

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Cloud- & VM-Security is not automatic !!

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Notebook Netbook Smartphone Tablet HQ Local Office Global High-Performance Network Secure Mobile Devices Enable Productivity Control Access The New mobile IT

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 The New mobile IT. All applications first on smartphones, pads. MOBILE FIRST ! Applications SaaS Mobility SaaS NaaS (Network as a Service) already in practice Security aaS Corporate & Personnel-owned end user terminals DATA: THE ONLY corporate asset show me YOUR Mobile Strategy

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, years experience in mobility services and consultancy

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 We offer complete Mobility Solutions with our renown Technology Partners:

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Thank you ! We hope to see you all here: Barcelona February 27  March 1 Hannover March 6  10

MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012 Stand up !... Get ready !... because business is getting mobile! MOBYLLA HELLAS Gerakas, Athens Greece Stavros KARAGULOGLOU Chief Executive Officer Thank You For Your Attention!