Presentation is loading. Please wait.

Presentation is loading. Please wait.

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Similar presentations


Presentation on theme: "Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security."— Presentation transcript:

1 Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security & BYOD Enablement

2 Fully integrated security, encryption and policy stacks Business Email, Calendar and Contacts only on BlackBerry IT command-and-control, no personal apps allowed Predictable and controlled The Good Old Days of Mobility…

3 Todays Mobility Environment

4 End User IT Organization Business Give me the apps and data I need on the devices I want. Without restricting my personal use. How do we protect our assets if we cant trust or control the device? How do we manage compliance? We need productive employees and maximum returns on mobility without sacrificing security and compliance! New Enterprise Mobility Challenge

5 Enterprise Mobility Challenge Embracing the Next Wave of Mobility

6 What Makes BYOD a Unique Challenge for Enterprise IT? 6 Devices in an unknown and unverified starting state Unencrypted corporate data mixed with personal Consumer-grade OSs susceptible to rooting and malware Heightened risk of corporate data leakage and cyber attacks Restrictions on strong device-level policies and wiping Accidental data leakage through end-user actions Unverified 3 rd party apps with access to open APIs

7 React & Restrict Approach Well allow BYOD by imposing greater restrictions on what employees can do if they bring devices to work. What Makes BYOD a Unique Challenge for Enterprise IT? Embrace & Extend Approach Well embrace BYOD by securely bringing work to devices (BWTD!) without restricting personal use or access to key business applications.

8 Evolution of EMM (MDM) Technology to Address Challenges Mobile Devices Mobile Apps & Private Data Security & Compliance Provisioning & Management Mobile App Management Encryption & Containerization of Corporate Apps & Data Integrity Verification Compliance OS Hardening Mobile Device Management (MDM) Mobile Device Management (MDM)

9 Secure Containerization Key Considerations and Approaches

10

11

12 Fixmo Mobile Security Embrace Mobility Without Compromise Enable trusted and protected mobile computing in the age of consumerization and hyper connectivity. Products that help IT organizations in public and private sector proactively: Contain and protect their private data and assets on increasingly personal devices Detect & prevent anomalies and attacks Monitor and maintain system integrity Maintain & prove compliance

13 Fixmo Enterprise Mobility Platform Modular Platform for Security and Compliance 13 Mobile Devices Mobile Apps & Private Data Security & Compliance Provisioning & Management [MDM] [MAM][Secure Containerization] [Integrity]

14 Fixmo SafeZone Secure Workspace and App Containerization Secure workspace and containerization solution that keeps ALL business data and apps encrypted, contained and under IT control independent of the device or who owns it Full suite of secure business productivity apps pre-built to run inside the secure workspace including Email/PIM, Browser, Documents, PDF Annotation, Camera, SharePoint High assurance security and DLP for iOS and Android – no matter who owns the device

15 Does your company need to consider a Beyond MDM mobility strategy? 1.What are the requirements and expectations of your employees for how they will use mobile devices? 2.Do you want to allow Email? Intranet Browsing? Document access? SharePoint access? Custom business apps? 3.Do you need to be able to wipe all business data (email, apps, documents, etc.) without wiping the entire device? 4.Do you have regulatory compliance requirements related to DLP and encryption of data-at-rest / in-transit? 5.To what degree will your company be embracing BYOD policies within the next 12 months?

16 Mobility Without Compromise 16 Thank You! Michael Dennehy, Fixmo Michael.Dennehy@fixmo.com www.fixmo.com


Download ppt "Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security."

Similar presentations


Ads by Google