Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.

Similar presentations


Presentation on theme: "Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive."— Presentation transcript:

1 Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive

2 About Intuitive

3 Intuitive – Simplify IT Symantec Technology Workforce Solutions Automate | Simplify

4 How Intuitive Helps Customers Solution Lifecycle Methodology Procurement Solution JumpStart Implementation Mentoring Services Remote Support Services Solution Health Check

5 Seminar Series: Securing Data in the Era of Pervasive Computing Your Mobile Users, Apps, and Devices (this session) Secure and Enable On Any Device, Anywhere (web) User-Based Application and Content Management Against Threats and Data Theft (local session) Secure Your Mobile Workforce’s Devices With Identity and Trust Management (web) Keep Your Data and Services Safe

6 Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Business Re-imagine business processes Increase profitability More competitive Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize Information Real-time data access & mobile collaboration Device does not matter Data matters most Mobilize People User productivity and flexibility BYOD – Limited device choice Self Service Separate business & personal data Mobilize People User productivity and flexibility BYOD – Limited device choice Self Service Separate business & personal data The Mobility Evolution 6

7 Any Device Any Service Any Location By 2015, over 37% of the global workforce will work outside the corporate firewall 60% of devices are used for both work and personal purposes 35% allow employees to procure apps through App Stores The “Pervasive Computing” Promise

8 User Centric Device Centric Management in a Post-PC world Location Software Patches Device User Apps Data Device Cloud Services Location Mobile Devices Virtual Desktops User

9 Data Is The Key A device is just a piece of hardware. o Most cost just a few hundred dollars o Most are very easy to replace o Increasingly, the company doesn’t own many devices on its network o BYOD o Consultants / contractors But data can be worth millions o Intellectual property loss o Legal liability o Standards compliance o Business downtime

10 Secure Data, Not Devices What’s New in Symantec Data Loss Prevention 50% email business documents using personal accounts 37% use file-sharing apps – like Dropbox – without permission 41% download intellectual property to personal mobile devices

11 Steps to securing your data Secure your services o Database o Authentication / Directory o Applications o Collaboration o File Services Secure your network o Firewalls o VPN o Wireless o Encrypted communication Secure your storage o File encryption o Drive encryption o Physical security Secure your identities o Certificates o Tokens o Authentication standards Secure your devices o Configuration o Encryption o Access

12 Symantec Mobile Information Management (MIM) capability enables full policy management of apps and content at scale

13 Solution Overview: Mobile Management Suite App Management Content ManagementDevice Management App Center Unified Management Platform 13

14 Enterprise App Store Best-in-Class Enterprise App Store – Easy branding – Consumer-style end-user portal – Reviews, screenshots, previews Access to all relevant apps o In-house, third party o Native and web apps o External store apps Support for Popular Mobile OS's o iOS, Android, Blackberry

15 Ability to apply relevant policies to content o Same policies as for apps o Additional content policies such as versioning and expiry Supports diverse content types o PDF’s o Videos o ePub documents o Forms o Others to follow Trusted Content Readers o Wrapped using App Center Policy Manager Enterprise Content Store

16 Same security as Sandboxing, But more flexible Symantec App Center.IPA or.APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 16

17 Business and Personal Apps and Data Co-exist Symantec App Center 17

18 App Security Policies 18 Symantec App Center

19 Policy Manager Apply relevant corporate policies to apps and content o User authentication o Encryption o Offline access o Doc sharing o Etc... Automatic creation of containers for apps and content No costly development cycles to add security o No SDK required

20 Next Steps! David.Clapp@IntuitiveTech.com (262) 424-2061 Todd.Hambrecht@IntuitiveTech.com (952)452-6926 Assessment Workshop Let Us Help You Map security to pervasive computing challenges!


Download ppt "Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive."

Similar presentations


Ads by Google