1 / 11

Context-Aware Secure Mobility

Context-Aware Secure Mobility. 2012 SINET 16 Inovator 2012 Winner – INSA’s American Security Challenge 2011 – Top 10 Mobile Security Vendors (InformationWeek). www.airpatrolcorp.com. The Problem. Massive shift to mobile platforms everywhere Acceleration of BYOD => unmanaged network

nayda-parks
Download Presentation

Context-Aware Secure Mobility

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Context-AwareSecure Mobility 2012 SINET 16 Inovator 2012 Winner – INSA’s American Security Challenge 2011 – Top 10 Mobile Security Vendors (InformationWeek) www.airpatrolcorp.com

  2. The Problem • Massive shift to mobile platforms everywhere • Acceleration of BYOD => unmanaged network • Protecting corporate assets huge and growing challenging • Traditional solutions don’t address mobile device attack vectors AirPatrol’s Solution • Augments and enhances endpoint policy managers, e.g., MDM, MAM, MSM,… • Dynamically changes active device policy • Monitors your wireless environment • Detects all mobile devices Continuous Mobile Locationing CognitiveMobile Security Context-Aware Computing Past Present Future Market Dominance by 2015 10/29/2012 AirPatrol Confidential 2

  3. Bring Your Own Device/ Disaster - BYOD • Personal devices connect to the corporate network and access confidential or sensitive information and documents • Pros: Mobility and individual preference of mobile device is allowed • Cons: Security, data breach, malware • In a 2011 survey, nearly 87% of respondents feel their company is at risk for a cyber attack originating from a mobile security lapse 10/29/2012 AirPatrol Confidential 3

  4. AirPatrol’s Product Suite Automate Policies ZoneDefense Manage Endpoints Smart Devices WPM & WEC & Laptops Monitor Wireless Environment Wireless Locator System (WLS) Laptops & Smart Devices Cellular & Wi-Fi 10/29/2012 AirPatrol Confidential 4

  5. ZoneDefense EnforcesPolicies as Devices Move Augments and enhances endpoint policy managers, such as MDM, MAM, MSM,… Unrestricted Area Secure Zone 10/29/2012 AirPatrol Confidential 5

  6. Context-Aware Mobility Platform • WLS - Locationing Engine • ZoneDefense 1.x • Future Integration Points Content Location • AirPatrolCorrelationEngine ERP actions Schedule PolicyModification TravelInformation NetworkConfiguration BackendApplications CRM input Preferences Communications Presence Action APIs Context APIs Alerts Profile ApplicationContent ApplicationContext Enterprise SocialInteractions NearbyResources PurchaseRecommendations EnvironmentalInformation InterfaceModification DeviceInformation More… More… 10/29/2012 AirPatrol Confidential 6

  7. ZoneDefense in an Office • Red Devices: Unknown, potential threat • Locate in real time • Enable prompt security response • Enforce wireless security policies • Blue Devices: Known devices • Enable proper device usage • Facilitate productive wireless device usage Managed Zone Policy Level: Secure 10/29/2012 AirPatrol Confidential 7

  8. Current Customers • Government - Defense • Government - Civilian • Enterprise - Commercial “We feel that the AirPatrol system works with other TSCM technologiesso as to provide a complete, accurate, traceable picture of our wireless environment.” -Agency Director after a demonstration 10/29/2012 AirPatrol Confidential 8

  9. Competitive Advantages • Barrier to entry • 40+ person-years of R&D • Specialized cellular • RF knowledge • Proprietary sensors • Cross domain know-how: RF/Cellular, WIPS, Mobile, MDM, Enterprise • Intellectual Property • 5 patent applications covering a broad range of technologies and capabilities • Context-aware policy management, end-node/networks, RF detection and cellular monitoring technologies • Currently, there are no direct competitors • Estimated head start of 12-18 months • Potential entrants include: • Networking incumbents • Cisco, Juniper • Certain MDMs • AirWatch, Zenprise • Wireless Intrusion Prevention Systems • AirMagnet, AirDefense, AirTight, Aruba 10/29/2012 AirPatrol Confidential 9

  10. Summary • The use of mobile devices is pervasive and demand continues to grow • Think Y2K… but never ending • AirPatrol has the core technology and will become the dominant player in managing and securing the mobile ecosystem AirPatrol delivers the first intelligent enterprise mobility solution that continuously monitors mobile devices and dynamically adapts their capabilities based on your situation. 10/29/2012 AirPatrol Confidential 10

  11. Thank you AirPatrol Video http://www.youtube.com/watch?v=YrQPyaRC4K8 ‘TOP 10 MOBILE SECURITY VENDORS TO WATCH’ 2011 INFORMATIONWEEK INSA AMERICAN SECURITY CHALLENGE WINNER 2012 www.airpatrolcorp.com

More Related