1 / 16

Strategic Approach to Mobile Security & BYOD Enablement

Strategic Approach to Mobile Security & BYOD Enablement. The Good Old Days of Mobility…. Fully integrated security, encryption and policy stacks Business Email, Calendar and Contacts only on BlackBerry IT command-and-control, no personal apps allowed Predictable and controlled.

arion
Download Presentation

Strategic Approach to Mobile Security & BYOD Enablement

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Strategic Approach to Mobile Security & BYOD Enablement

  2. The Good Old Days of Mobility… • Fully integrated security, encryption and policy stacks • Business Email, Calendar and Contacts only on BlackBerry • IT command-and-control, no personal apps allowed • Predictable and controlled

  3. Today’s Mobility Environment Work / Play Camera Banking Bluetooth GPS Social NFC Apps BYOD WiFi Consumerization Life-Changing Personal Computing & Communications Extremely Powerful Business Productivity Tools Highly Portable & Highly Vulnerable Consumer-Grade Devices

  4. New Enterprise Mobility Challenge IT Organization End User “Give me the apps and data I need on the devices I want. Without restricting my personal use.” “How do we protect our assets if we can’t trust or control the device? How do we manage compliance?” Business “We need productive employees and maximum returns on mobility without sacrificing security and compliance!”

  5. Enterprise Mobility ChallengeEmbracing the Next Wave of Mobility Company Owned Business Only (COBO) Company Owned, Business Only Devices Company Owned Personal Enabled (COPE) Employee Owned Business Enabled (BYOD) Choice of Device and OS Command and Control, Lock it Down Mix of Personal and Business Use Greater Admin Privileges to User Empower Employees to Do Their Job The real challenge isn’t “bringing devices to work”. The real challenge is bringing work to devices, without compromising security or compliance.

  6. What Makes BYOD a Unique Challenge for Enterprise IT? Consumer-grade OS’s susceptible to rooting and malware Devices in an unknown and unverified starting state Unencrypted corporate data mixed with personal Unverified 3rd party apps with access to open APIs Restrictions on strong device-level policies and wiping Accidental data leakage through end-user actions Heightened risk of corporate data leakage and cyber attacks

  7. What Makes BYOD a Unique Challenge for Enterprise IT? React & Restrict Approach We’ll allow BYOD by imposing greater restrictions on what employees can do if they “bring devices to work”. Embrace & Extend Approach We’ll embrace BYOD by securely “bringing work to devices” (BWTD!) without restricting personal use or access to key business applications.

  8. Evolution of EMM (MDM) Technology to Address Challenges Mobile App Management Encryption & “Containerization” of Corporate Apps & Data MobileApps & Private Data Mobile Device Management (MDM) Mobile Devices Integrity Verification Compliance OS Hardening Security & Compliance Provisioning & Management

  9. Secure ContainerizationKey Considerations and Approaches The Mobile Device THEIR Personal Apps/Data YOUR Business Apps/Data

  10. Secure ContainerizationKey Considerations and Approaches What Security Do I Need to Add? Access Control Policies Authentication & Conditional Policies Data Encryption Data At-Rest + Data-In-Transit Compliance Considerations Data Leakage Prevention Restrict Copy/Paste Restrict Direct Sharing to Internet Jailbreak/Root Detection Containment from Personal Apps/Data Selective Lock/Wipe Wipe Business Data, Not Personal

  11. Secure ContainerizationKey Considerations and Approaches Which Apps & Data Do I Need to Protect? Email & PIM Email, Calendar, Contacts Browser Intranet Access Separation of Business Browser Cache Documents Email Attachments Documents Created On-Device Documents Downloaded from Intranet Microsoft SharePoint Custom Apps In-House Built and/or 3rd Party Apps

  12. Fixmo Mobile SecurityEmbrace Mobility Without Compromise What We Do Enable trusted and protected mobile computing in the age of consumerization and hyper connectivity. How We Do It • Products that help IT organizations in public and private sector proactively: • Contain and protect their private data and assets on increasingly personal devices • Detect & prevent anomalies and attacks • Monitor and maintain system integrity • Maintain & prove compliance

  13. Fixmo Enterprise Mobility PlatformModular Platform for Security and Compliance [MAM] [Secure Containerization] Mobile Apps & Private Data Mobile Devices [MDM] [Integrity] Security & Compliance Provisioning & Management

  14. Fixmo SafeZoneSecure Workspace and App Containerization • Secure workspace and containerization solution that keeps ALL business data and apps encrypted, contained and under IT control independent of the device or who owns it • Full suite of secure business productivity apps pre-built to run inside the secure workspace including Email/PIM, Browser, Documents, PDF Annotation, Camera, SharePoint • High assurance security and DLP for iOS and Android – no matter who owns the device

  15. Does your company need to consider a “Beyond MDM” mobility strategy? What are the requirements and expectations of your employees for how they will use mobile devices? Do you want to allow Email? Intranet Browsing? Document access? SharePoint access? Custom business apps? Do you need to be able to wipe all business data (email, apps, documents, etc.) without wiping the entire device? Do you have regulatory compliance requirements related to DLP and encryption of data-at-rest / in-transit? To what degree will your company be embracing BYOD policies within the next 12 months?

  16. Thank You! Michael Dennehy, Fixmo Michael.Dennehy@fixmo.com www.fixmo.com

More Related