1 / 11

The New World of Security for Business Travellers

The New World of Security for Business Travellers. Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development Summit, Milan 26 th October 2005. Workforce Productivity. On-Demand Enterprise. Business Process Optimization. Corporate Agility.

early
Télécharger la présentation

The New World of Security for Business Travellers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development Summit, Milan 26th October 2005

  2. Workforce Productivity On-Demand Enterprise Business Process Optimization Corporate Agility Global Reach User Identities Regulatory Compliance Trade Secrets Device Integrity Network Operations IP on Devices Customer Privacy THE SECURE MOBILITY DILEMMA: Painful Business Compromises DEMAND FOR ACCESS Availability Usability Security Control NEED TO PROTECT

  3. THE MOBILE RISK Vulnerability Means Expense

  4. EVOLUTION OF THREATS SECURITY: #1 issue for Broadband Mobility

  5. SECURITY SOLUTIONS TODAY • Piecemeal processes through “bundled” solutions • Security tools and connectivity service operate in silos • Danger from inconsistent or improper use of these tools • Endpoint protection only when touching enterprise • During Internet-only sessions, pre-VPN window, and during VPN session • Accelerate remediation once new threat/antidote discovered • Inability to combine best-of-breed point solutions • No security vendor are strong across the board • “Forklift upgrade” of existing security components

  6. TRUSTED CONNECTIONS. NO COMPROMISE. • Coordinated protection of identities, endpoints, networks and data that ties together authentication, compliance and network authorization. Device Identity Automated Assessment & Remediation User and Device Authentication Data Enforced VPN Network Role-Based Network Security

  7. Internet Access Restricted VPN Access Policies Enforced SECURING THE CONNECTION PROCESS INTERNET CONNECTION LAN CONNECTION Dynamic Policy Retrieval Remote Vulnerability Remediation Coordinated Network Enforcement Endpoint Lockdown Securing the Connection Trusted Networks Policy Orchestration Platform Single point of control for managing and enforcing policies

  8. Protection of information Username / Password (single factor) authentication is not secure enough in current environment. Connection paradigm driving two factor authentication to enable trusted computing. Mechanism for “digital fingerprinting” and policy enforcement that ONLYallows corporate authorized devices to attach to the corporate LAN remotely. DEVICE SECURITY Almost 2,000 mobile phones are lost every day in the UK (Source: Metropolitian Police, UK) 49% of organizations experienced laptop or mobile phone theft(Source: CSI/FBI 2004 Computer Crime and Security Survey)

  9. SUMMARY • Mobility is rapidly evolving but it is not just about connectivity • Security must be addressed from a holistic point of view in order for gaps to be identified and closed • Policy Orchestration services tie internet and VPN access to both strong device/user authentication and endpoint policy compliance

  10. Q&A Securing Mobile Data Sessions Anurag Lal Senior Vice President Strategic Services & Business Development alal@ipass.com

More Related