Download presentation
Presentation is loading. Please wait.
Published byBuck Porter Modified over 9 years ago
1
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive
2
About Intuitive
3
Intuitive – Simplify IT Symantec Technology Workforce Solutions Automate | Simplify
4
How Intuitive Helps Customers Solution Lifecycle Methodology Procurement Solution JumpStart Implementation Mentoring Services Remote Support Services Solution Health Check
5
Seminar Series: Securing Data in the Era of Pervasive Computing Your Mobile Users, Apps, and Devices (this session) Secure and Enable On Any Device, Anywhere (web) User-Based Application and Content Management Against Threats and Data Theft (local session) Secure Your Mobile Workforce’s Devices With Identity and Trust Management (web) Keep Your Data and Services Safe
6
Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize People User productivity and flexibility BYOD – Limited device choice Self Service Separate business & personal data Mobilize People User productivity and flexibility BYOD – Limited device choice Self Service Separate business & personal data The Mobility Evolution 6
7
Any Device Any Service Any Location By 2015, over 37% of the global workforce will work outside the corporate firewall 60% of devices are used for both work and personal purposes 35% allow employees to procure apps through App Stores The “Pervasive Computing” Promise
8
User Centric Device Centric Management in a Post-PC world Location Software Patches Device User Apps Data Device Cloud Services Location Mobile Devices Virtual Desktops User
9
Data Is The Key A device is just a piece of hardware. o Most cost just a few hundred dollars o Most are very easy to replace o Increasingly, the company doesn’t own many devices on its network o BYOD o Consultants / contractors But data can be worth millions o Intellectual property loss o Legal liability o Standards compliance o Business downtime
10
Secure Data, Not Devices What’s New in Symantec Data Loss Prevention 50% email business documents using personal accounts 37% use file-sharing apps – like Dropbox – without permission 41% download intellectual property to personal mobile devices
11
Steps to securing your data Secure your services o Database o Authentication / Directory o Applications o Collaboration o File Services Secure your network o Firewalls o VPN o Wireless o Encrypted communication Secure your storage o File encryption o Drive encryption o Physical security Secure your identities o Certificates o Tokens o Authentication standards Secure your devices o Configuration o Encryption o Access
12
Symantec Mobile Information Management (MIM) capability enables full policy management of apps and content at scale
13
Solution Overview: Mobile Management Suite App Management Content ManagementDevice Management App Center Unified Management Platform 13
14
Enterprise App Store Best-in-Class Enterprise App Store – Easy branding – Consumer-style end-user portal – Reviews, screenshots, previews Access to all relevant apps o In-house, third party o Native and web apps o External store apps Support for Popular Mobile OS's o iOS, Android, Blackberry
15
Ability to apply relevant policies to content o Same policies as for apps o Additional content policies such as versioning and expiry Supports diverse content types o PDF’s o Videos o ePub documents o Forms o Others to follow Trusted Content Readers o Wrapped using App Center Policy Manager Enterprise Content Store
16
Same security as Sandboxing, But more flexible Symantec App Center.IPA or.APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 16
17
Business and Personal Apps and Data Co-exist Symantec App Center 17
18
App Security Policies 18 Symantec App Center
19
Policy Manager Apply relevant corporate policies to apps and content o User authentication o Encryption o Offline access o Doc sharing o Etc... Automatic creation of containers for apps and content No costly development cycles to add security o No SDK required
20
Next Steps! David.Clapp@IntuitiveTech.com (262) 424-2061 Todd.Hambrecht@IntuitiveTech.com (952)452-6926 Assessment Workshop Let Us Help You Map security to pervasive computing challenges!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.