200 likes | 319 Views
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices. David Clapp – Intuitive. About Intuitive. Intuitive – Simplify IT. Workforce Solutions. Symantec Technology. Automate | Simplify. How Intuitive Helps Customers.
E N D
Mobility Without Vulnerability:Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive
Intuitive – Simplify IT Workforce Solutions Symantec Technology Automate | Simplify
Seminar Series:Securing Data in the Era of Pervasive Computing
The Mobility Evolution • Mobilize People • User productivity and flexibility • BYOD – Limited device choice • Self Service • Separate business & personal data • Mobilize Business • Re-imagine business processes • Increase profitability • More competitive • Mobilize Information • Real-time data access & mobile collaboration • Device does • not matter • Data matters • most
The “Pervasive Computing” Promise Any Device Any Service Any Location 60% of devices are used for both work and personal purposes 35% allow employees to procure apps through App Stores By 2015, over37% of the global workforce will work outside the corporate firewall
Management in a Post-PC world User Centric Device Centric Device Software Cloud Services User Location User Device MobileDevices Data Patches Location Virtual Desktops Apps
Data Is The Key • A device is just a piece of hardware. • Most cost just a few hundred dollars • Most are very easy to replace • Increasingly, the company doesn’t own many devices on its network • BYOD • Consultants / contractors • But data can be worth millions • Intellectual property loss • Legal liability • Standards compliance • Business downtime
Secure Data, Not Devices 50% 37% 41% email business documents using personal accounts use file-sharing apps – like Dropbox – without permission download intellectual property to personal mobile devices What’s New in Symantec Data Loss Prevention
Steps to securing your data • Secure your storage • File encryption • Drive encryption • Physical security • Secure your identities • Certificates • Tokens • Authentication standards • Secure your devices • Configuration • Encryption • Access • Secure your services • Database • Authentication / Directory • Applications • Collaboration • File Services • Secure your network • Firewalls • VPN • Wireless • Encrypted communication
Symantec Mobile Information Management (MIM)capability enables full policy management of apps and content at scale
Solution Overview: Mobile Management Suite App Center Unified Management Platform • App Management • Content Management • Device Management
Enterprise App Store • Best-in-Class Enterprise App Store • Easy branding • Consumer-style end-user portal • Reviews, screenshots, previews • Access to all relevant apps • In-house, third party • Native and web apps • External store apps • Support for Popular Mobile OS's • iOS, Android, Blackberry
Enterprise Content Store • New generation of app-centric devices emerged • BYOD and employee-liable device trend accelerating • Co-mingled business / personal data on all devices • Device selection driven by consumer choice, not IT • New generation of mobile corporate apps being deployed • Ability to apply relevant policies to content • Samepolicies as for apps • Additional content policiessuch asversioning and expiry • Supports diverse content types • PDF’s • Videos • ePub documents • Forms • Others to follow • Trusted Content Readers • Wrapped using App Center Policy Manager
Same security as Sandboxing,But more flexible App wrapped with App Center libraries and policy controls ready for deployment .IPA or .APK file with standard libraries Symantec App Center 16
Business and PersonalApps and Data Co-exist Symantec App Center 17
App Security Policies Symantec App Center
Policy Manager • Apply relevant corporate policies to apps and content • User authentication • Encryption • Offline access • Doc sharing • Etc... • Automatic creation of containers for apps and content • No costly development cycles to add security • No SDK required
Next Steps! Assessment Workshop Let Us Help You Map security to pervasive computing challenges! David.Clapp@IntuitiveTech.com(262) 424-2061Todd.Hambrecht@IntuitiveTech.com(952)452-6926