Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.

Similar presentations


Presentation on theme: "Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device."— Presentation transcript:

1 Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device and Data Security for the Mobile Enterprise Tim Carter Sales Director tim.carter@ianywhere.com iAnywhere Confidential

2 Agenda Security Needs of Mobile Technology Enterprise Mobile Security Requirements Addressing Mobile Security with Afaria Our "Top 10 Tips" for Making Your Mobile Solution Successful and Secure Summary

3 Security Needs of Mobile Technology Understanding the risk  How sensitive is the data?  What’s the impact if data falls into the wrong hands? Performing risk analyses  Security of all data is not the same Usage and Security Policies  Equip your users to understand the risks

4 Security Needs of Mobile Technology How much security is necessary?  One size does not fit all  Appropriate to users and their applications Why mobile presents significant challenges  Users are outside the firewall  Devices are portable and easily lost

5 Enterprise Requirements for Mobile Security 3. Access to data stored on the device or on storage cards 2. Data transmitted over the network 1. Protection of data in central systems 4. Protection of data on devices lost or stolen Four Key Areas

6 Enterprise Requirements for Mobile Security Power-on password policies, data on device encryption, virus protection, data backup Several encryption methods including 128-bit SSL support, Firewall traversal User authentication and assignments of channels to groups, Admin security Remote wipe of data on lost/stolen devices, data restore, device re- provisioning Central control of security policies Relieve the security burden from the user Minimal user impact

7 Frontline Management

8 Security and Management Are Converging User authentication (password) Data-on-device encryption Device authentication (certificates) Lost or stolen device protection Anti-virus updates Patch Management Backup and Restore Device (Re)Provisioning

9 Security vs. Usability Different settings for different user populations Policy Management Central control, deployment and maintenance of policies SecurityUsability Long alphanumeric passwords Limited password attempts Triple DES Encryption Device lockdown Anti-Virus Protection Patch Management Data Backup/Restore Alphanumeric passwords More password attempts AES Encryption Device lockdown Anti-Virus Protection Data Backup/Restore PIN number passwords Device lockdown Anti-Virus Protection Patch Management Data Backup/Restore

10 Management and Security have Common Requirements Scalability Policy Management Central Control Visibility Remove User Burden Logging, reporting and auditing

11 Afaria Security Management in Action

12 My Top 10 Tips for Making Your Mobility Project Successful and Secure Focus on the right projects Engage your users early Understand the technology differences Make it easy for your users to adopt (focus on usability) Ensure there is clear visibility from headquarters

13 My Top 10 Tips for Making Your Mobility Project Successful and Secure Determine and communicate usage policies to your users (consider tech and non-tech issues) Use security software and infrastructure to implement your policies directly from HQ Allow your top performers to continue to be top performers Analyse the ROI six months after the project has been bedded in Use a management and security framework capable of supporting mobile projects

14 Summary Management and Security together allow enterprises to scale their investments in mobile technology Management and security are converging rapidly iAnywhere leads the market in delivering management, security and all the other elements necessary to allow enterprises to extend business applications to their front lines

15 Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device and Data Security for the Mobile Enterprise Tim Carter Sales Director tim.carter@ianywhere.com iAnywhere Confidential


Download ppt "Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device."

Similar presentations


Ads by Google