1 / 40

Mobile Protection Driving Productivity Without Compromising Protection

Mobile Protection Driving Productivity Without Compromising Protection. Jon Baker, Jason Kataila . Endpoint Management & Mobility Specialist. Mobile Device Explosion Paves Way for BYOD. 39%. 69%. 340%. 2,170%. 2010 177M corp PCs 2015 246M corp PCs. 2010 173 M personal PCs

irisa
Download Presentation

Mobile Protection Driving Productivity Without Compromising Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile ProtectionDriving Productivity Without Compromising Protection Jon Baker, Jason Kataila Endpoint Management & Mobility Specialist

  2. Mobile Device ExplosionPaves Way for BYOD 39% 69% 340% 2,170% 2010177M corp PCs 2015246M corp PCs 2010173 M personal PCs 2015 293M personal PCs 2010 300M smartphones 2015 1017M smartphones 2010 15M tablets 2015 326M tablets Mobile Protection

  3. Changes In Working Style 80% 65% 52% 1 2 3 New apps deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices • Mobile Protection 3

  4. The Desires of the User Versus IT Staff User IT Staff Freedom, Privacy & Productivity Easy access to files, apps, email Use the latest technology & apps Personal stuff is untouched Do it themselves (i.e. Self-Service) Simple, Secure & Reliable Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit & monitor Mobile Protection 4

  5. Success = Mastering Control Points Devices Apps Data …without disrupting user experience Mobile Protection 5

  6. Evolving Endpoint Adoption Map BYOD Unmanaged Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Managed Company Controls Personal Device Company Controls Standard Device Company-owned Personally-owned Mobile Protection 6

  7. Use Case #1:Access SaaS Apps From Any Device Mobile Protection 7

  8. Symantec O3A Cloud Information Protection Platform Symantec O3 Intelligence Center Context-based Policies Status Monitoring Log and Audit Services End-User Any Device Private Cloud / Data Center Symantec O3 Gateway Identity and Access Broker Information Gateway Public Cloud Layered Protection 2F Authentication DLP Encryption Symantec O3™ Cloud, SaaS and Web Applications Mobile Protection 8

  9. Cloud & mobile:Opportunity And Challenge Private Cloud Cloud “We should embrace BYOD, BYOA and the new mobile platform to augment productivity and innovate new business models” Mobile “How do we layer common protection across cloud and mobile without undermining the convenience of the mobile experience?” Challenge Mobile Protection 9

  10. Solving the Cloud-mobileProtection Challenge Mobile Protection • A single control point: • for all cloud applications and services • for all users • for all devices • for compliance 10

  11. Symantec O3 Key Features Cloud Identity and Access Control Cloud Information Security • DLP Classification and Enforcement • Encryption and Key Management • Unstructured Data Encryption • Mobile Sandbox • Security Event Log • Identity Integration, Single ID • Federation, Password Management, SSO • Context-based Authorization and Policy • Strong Authentication • Access Event Log • Deployment Choices Available 2H 2012 Mobile Protection 11

  12. Why Symantec O3 1..2..3 2 3 • Highly Scalable • Leverages existing infrastructure • Capture Security Events • Correlation of security intelligence Mobile Protection • Proven Infrastructure Works with federated and non-federated apps 12

  13. Use Case #2:Access Company & Personal Email Wi-Fi VPN CA Network Access Mobile Protection 13

  14. Symantec Mobile Management Standalone or Plug into SMP and SCCM Enable Activate enterprise access, apps and data easily and automatically > iOS, Android, MSFT, BB, Symbian Secure Protect enterprise data and infrastructure from attack and theft > Detect JB, ensure passcodes, … Manage Control inventory and configuration with massive scalability > Integrated with SMP & SCCM Mobile Protection 14

  15. Comprehensive Device Management Distribute Apps In-house apps or public-store apps Docs, videos – any active content Group based management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Manage Assets Centralized visibility & control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe & Full wipe Mobile Protection 15

  16. Device Management For Your Enterprise Symantec Mobile Management (stand-alone) Symantec Mobile Management for Symantec ITMS Symantec Mobile Management for Microsoft SCCM • Built-on a widely deployed system managements platform • In-built automation and workflow modules • Integration with Symantec DLP, MPKI products • Mature & Scalable • Integrates with Symantec Endpoint Management suite • iOS + Android + Windows Phone + Macs + PCs + Linux • Integrates with Symantec DLP and MPKI products • Integrated & Efficient • Integrates with Microsoft System Center Config Mgr • iOS + Android + Windows Phone + PCs • Leverages existing investments resources & processes • Faster time to value, Lower TCO Mobile Protection 16

  17. iPhone + Android + PCs Unified Management with SCCM Mobile Protection 17

  18. iPhones + Android + Macs + PCs Unified Management with SMP Mobile Protection 18

  19. Why Symantec MDM 1..2..3 2 3 • Reliable & Scalable MDM • Proven to support 20,000+ devices • Integrated MDM • Unified management with Macs & PCs Mobile Protection • Fully functional MDM iOS, Android and Windows Phone 19

  20. Use Case #3:Secure iOS/Android/HTML5 Apps & Content Enterprise App Store Containerized Application Personal ACME Corp App CRM Public Apps Corp Apps Documents Mobile Protection 20

  21. Mobile Application Management Comprehensive App Wrapping Tech App Store Repository for internal and external mobile applications App Policy Protect app against data loss through encryption, removal control and separation of corporate data Content Center DLP policy to control confidential data access Mobile App Management

  22. Symantec App Center Mobile App & Data Protection SYMANTEC App Center • App deployment & provisioning • User authentication across apps • Copy & paste prevention • Per app file encryption • Remote data/app wipe • iOS & Android support Mobile Protection 22

  23. Comprehensive Mobile App Management Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Deploy Apps Enterprise app store for internal apps Recommendations from public appstore Group based targeting Manage Lifecycle Revoke and update apps selectively Centralized visibility & control MDM features for policy management Protect Data Security and Management layer around data Passwords, encryption, offline access, rooting Separate corproate and personal data Mobile Protection 23

  24. Same security as Sandboxing,But more flexible App wrapped with App Center libraries and policy controls ready for deployment .IPA or .APK file with standard libraries Mobile Protection 24

  25. Business and PersonalApps and Data Co-exist Mobile Protection 25

  26. iOS & MDM Enhancements • MDM Enhancements • Ability to upload config profiles • Additional iOS MDM restrictions • “Badge” wrapped apps • … FIPS 140-2 Level 1 Encryption for apps & data on iOS devices • Customers in regulated verticals can confidently use App Center data protection • Customers can comply with regulatory requirements with App Center • Customers can use App Center for additional MDM capabilities Mobile Protection 26

  27. Why Symantec for Mobile Apps 1..2..3 • Scalable & Seamless • Enable any number of apps with no source code changes • Independent of MDM • Address mobile application needs without managing the complete device Mobile Protection • Quick & Easy Expedite deployment of apps with an easy-to-use SaaS app store 27

  28. Use Case #4:Secure Email and Prevent Malware Personal ACME Corp App CRM Email Corp Apps Documents Mobile Protection 28

  29. More Than 50% Of Mobile Malware Is On Android Android Has Malware Problem 67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey Mobile Protection 29

  30. Symantec Mobile Security Comprehensive Protection Management Antimalware Anti-Theft Web Protection Centralized Management Advanced Protection Mobile Protection 30

  31. Comprehensive Protection 1 App Profiles Mobile Client Collectors Metadata from Norton mobile clients 3 2 APK Data Extraction Advanced Data Analytics Mobile App Analysis System Perform ance Resource Usage Privacy Trust Android Marketplace Crawlers • Static code analysis • Dynamic analysis • Heuristics Security APKs from over 70 Android appstores Reputation Systems • Safe Web Domain Reputation • Insight File Reputation • Trusted Signer DB • IP / Network Reputation 3rd-Party Feeds Mobile malware sample exchange Symantec Mobile Security for Android Mobile Protection 31

  32. 1. On-device Anti-Malware Scanning Symantec Mobile Security for Android Google Play Amazon ExternalSources 2 to 10 seconds Background, ScheduledORManual Browser 3rd Party Markets Mobile Protection 32

  33. 2. Additional Device Protections… 3. Central Enterprise Management Symantec Mobile Security …continued & All Policy-based, centrallymanaged… …and all Enterprise Integrated, alongsideMobile Management (Altiris / SMP) Mobile Protection 33

  34. Why Symantec for Mobile Security 1..2..3 • Enterprise Grade Security • Most apps are freeware, consumer editions. SMS provides centralized mgmt including LiveUpdates • Enterprise Integration • Anti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with MDM Mobile Protection • High efficacy Monitors 70+ appstores, analyzes 3 million+ apps, information from 7 million+ active devices 34

  35. 5 Pillars for Enterprise Mobility Device App & Data Protection Device Management User & App Access Threat Protection Secure File Sharing Apps Data Control Points Mobile Protection 35

  36. Symantec’s Comprehensive Solution App & Data Protection Device Management User & App Access Threat Protection Secure File Sharing App Center Mobile Management Symantec O3 Mobile Security Content Center Primary Products Norton Zone Mobile Management Suite DLP for Mobile PGP Encryption ITMS CMS MPKI VIP SEP O3 Complementary Products App Center O3 Mobile Protection 36

  37. Competitive Matrix Symantec Good App & Data Protection Device Management User & App Access Threat Protection Secure File Sharing Zenprise MobileIron McAfee        SAP/Sybase Airwatch Fiberlink          Mobile Protection 37

  38. Symantec Total Mobile Story BYOD Company Owns an Unmanaged Device Company Controls Apps & Data Only 3 2 1 Unmanaged User & App Access Mgmt. App& Data Protection Secure File Sharing Company Controls Standard Device Company Controls Personal Device Managed User & App Access App & Data Protection Threat Protection Secure File Sharing User & App Access Mgmt. App& Data Protection Threat Protection Secure File Sharing Device Management Device Management Company Owned Personally Owned Mobile Protection 38

  39. Bringing It All Together Devices. Apps. Data. • Mobile Protection 39

  40. Jon Baker, Jason Kataila www.Symantec.com Mobility Specialist Group Mobile Protection 40

More Related