1 / 20

Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices

Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices. David Clapp – Intuitive. About Intuitive. Intuitive – Simplify IT. Workforce Solutions. Symantec Technology. Automate | Simplify. How Intuitive Helps Customers.

starbuck
Télécharger la présentation

Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobility Without Vulnerability:Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive

  2. About Intuitive

  3. Intuitive – Simplify IT Workforce Solutions Symantec Technology Automate | Simplify

  4. How Intuitive Helps Customers

  5. Seminar Series:Securing Data in the Era of Pervasive Computing

  6. The Mobility Evolution • Mobilize People • User productivity and flexibility • BYOD – Limited device choice • Self Service • Separate business & personal data • Mobilize Business • Re-imagine business processes • Increase profitability • More competitive • Mobilize Information • Real-time data access & mobile collaboration • Device does • not matter • Data matters • most

  7. The “Pervasive Computing” Promise Any Device Any Service Any Location 60% of devices are used for both work and personal purposes 35% allow employees to procure apps through App Stores By 2015, over37% of the global workforce will work outside the corporate firewall

  8. Management in a Post-PC world User Centric Device Centric Device Software Cloud Services User Location User Device MobileDevices Data Patches Location Virtual Desktops Apps

  9. Data Is The Key • A device is just a piece of hardware. • Most cost just a few hundred dollars • Most are very easy to replace • Increasingly, the company doesn’t own many devices on its network • BYOD • Consultants / contractors • But data can be worth millions • Intellectual property loss • Legal liability • Standards compliance • Business downtime

  10. Secure Data, Not Devices 50% 37% 41% email business documents using personal accounts use file-sharing apps – like Dropbox – without permission download intellectual property to personal mobile devices What’s New in Symantec Data Loss Prevention

  11. Steps to securing your data • Secure your storage • File encryption • Drive encryption • Physical security • Secure your identities • Certificates • Tokens • Authentication standards • Secure your devices • Configuration • Encryption • Access • Secure your services • Database • Authentication / Directory • Applications • Collaboration • File Services • Secure your network • Firewalls • VPN • Wireless • Encrypted communication

  12. Symantec Mobile Information Management (MIM)capability enables full policy management of apps and content at scale

  13. Solution Overview: Mobile Management Suite App Center Unified Management Platform • App Management • Content Management • Device Management

  14. Enterprise App Store • Best-in-Class Enterprise App Store • Easy branding • Consumer-style end-user portal • Reviews, screenshots, previews • Access to all relevant apps • In-house, third party • Native and web apps • External store apps • Support for Popular Mobile OS's • iOS, Android, Blackberry

  15. Enterprise Content Store • New generation of app-centric devices emerged • BYOD and employee-liable device trend accelerating • Co-mingled business / personal data on all devices • Device selection driven by consumer choice, not IT • New generation of mobile corporate apps being deployed • Ability to apply relevant policies to content • Samepolicies as for apps • Additional content policiessuch asversioning and expiry • Supports diverse content types • PDF’s • Videos • ePub documents • Forms • Others to follow • Trusted Content Readers • Wrapped using App Center Policy Manager

  16. Same security as Sandboxing,But more flexible App wrapped with App Center libraries and policy controls ready for deployment .IPA or .APK file with standard libraries Symantec App Center 16

  17. Business and PersonalApps and Data Co-exist Symantec App Center 17

  18. App Security Policies Symantec App Center

  19. Policy Manager • Apply relevant corporate policies to apps and content • User authentication • Encryption • Offline access • Doc sharing • Etc... • Automatic creation of containers for apps and content • No costly development cycles to add security • No SDK required

  20. Next Steps! Assessment Workshop Let Us Help You Map security to pervasive computing challenges! David.Clapp@IntuitiveTech.com(262) 424-2061Todd.Hambrecht@IntuitiveTech.com(952)452-6926

More Related