Your SlideShare is downloading. ×
Symantec Mobile Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Symantec Mobile Security

809

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
809
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
48
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Symantec Mobile Solutions Overview Presenters: Andrew Blackham - Symantec Presales Specialist
  • 2. Agenda – The Mobile Landscape – 5 Pillars of Enterprise Mobility – Supporting BYOD – Summary – Q&A 2
  • 3. Mobile Landscape
  • 4. Exploding Number of Mobile Devices Pave the Way for “Bring Your Own Device” (BYOD) 2010 177M corp PCs 2015 246M corp PCs 2010 173 M personal PCs 2015 293M personal PCs 2010 300M smartphones 2015 1017M smartphones 39% 69% 340% 2,170% 2010 15M tablets 2015 326M tablets
  • 5. Changes in Working Style New applications deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices 80% 65% 52% 1 2 3 Sources: 1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011 2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012 3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
  • 6. Freedom, Privacy and Productivity Easy access to files, applications, email Use the latest technology and applications Personal stuff is untouched Do it themselves (i.e. Self-Service) Simple, Secure and Reliable Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit and monitor User IT Staff The Desires of Users Versus IT Staff
  • 7. Company Controls applications and Data Only Company Controls Personal DeviceCompany Controls Standard Device 32 1 UnmanagedManaged Company Owned Personally Owned Company Owns an Unmanaged Device BYOD User and App Access Management Threat Protection Secure File Sharing Device Management App and Data Protection User and App Access Management. Threat Protection Secure File Sharing Device Management App and Data Protection User and App Access Management Secure File Sharing App and Data Protection 2 4 Evolving Endpoint Adoption Map
  • 8. The 5 Pillars of Enterprise Mobility
  • 9. Success = Mastering Control Points Devices Applications Data …without disrupting user experience
  • 10. 5 Pillars of Enterprise Mobility ControlPoints User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Application Data Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile Security Threat detection and removal Enterprise-grade file sharing and collaboration in the cloud
  • 11. Symantec’s Comprehensive Solution Symantec O3™ App Center Mobile Management Mobile Security Content Center Primary Products User and App Access App and Data Protection Device Management Threat Protection Secure File Sharing Symantec Managed PKI Symantec Validation and ID Protection Service (VIP) Symantec Data Loss Prevention for Mobile Symantec Mobile Encryption Altiris™ Client Management Suite from Symantec Altiris™ IT Management Suite from Symantec Symantec Endpoint Protection Symantec O3™ Complementary Products
  • 12. Competitive Matrix User and App Access App and Data Protection Device Management Threat Protection Secure File Sharing Fiberlink  Airwatch   MobileIron   Good   Zenprise   Symantec    McAfee  SAP/Sybase 
  • 13. Mobility Solutions Breakdown
  • 14. Use Case #1: Access SaaS Applications From Any Device
  • 15. Symantec O3 A Cloud Information Protection Platform Symantec O3 Private Cloud / Data Center Symantec O3 Gateway Identity and Access Broker Information Gateway Symantec O3 Intelligence Center Context-based Policies Status Monitoring Log and Audit Services Layered Protection 2F Authentication Data Loss Prevention Encryption Public Cloud End-User Any Device
  • 16. Why Symantec O3 • Proven Infrastructure Works with federated and non- federated applications 2 3 • Highly Scalable Leverages existing infrastructure • Capture Security Events Correlation of security intelligence
  • 17. Use Case #2: Access Company and Personal Email Mobile Protection VPNWi-Fi CA Network Access 17
  • 18. 18 Symantec Mobile Management Standalone or Plug into SMP and SCCM Enable Activate enterprise access, applications and data easily and automatically > iOS®, Android™, Microsoft®, Blackberry®, Symbian™ Secure Protect enterprise data and infrastructure from attack and theft > Detect JB, ensure passcodes, … Manage Control inventory and configuration with massive scalability > Integrated with SMP and SCCM
  • 19. 19 Comprehensive Device Management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute applications In-house applications or public-store applications Docs, videos – any active content Group based management Manage Assets Centralized visibility and control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe and Full wipe
  • 20. 20 Why Symantec Mobile Device Management 2 3 • Integrated Mobile Device Management Unified management with Macs and PCs
  • 21. 21 Use Case #3: Secure iOS/Android/HTML5 applications and Content Enterprise App Store Personal CRM Corporate applicatio ns Corp AppACME Public application s Documents Containerized Application
  • 22. 22 Mobile Application Management Comprehensive Application-Wrapping Technology App Store Repository for internal and external mobile applications App Policy Protect application against data loss through encryption, removal control and separation of corporate data Content Center Data Loss Prevention policy to control confidential data access
  • 23. 23 Comprehensive Mobile App Management Deploy applications Enterprise app store for internal applications Recommendations from public application store Group based targeting Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Manage Lifecycle Revoke and update applications selectively Centralized visibility and control MDM features for policy management Protect Data Security and Management layer around data Passwords, encryption, offline access, rooting Separate corproate and personal data
  • 24. 24 • Application deployment and provisioning • User authentication across applications • Copy and paste prevention • Per-application file encryption • Remote data/app wipe • iOS, Android, and HTML5 support SYMANTEC APP CENTER Symantec App Center Mobile App and Data Protection
  • 25. 25 Same Security as Sandboxing, but More Flexible .IPA or .APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment
  • 26. 26 Business and Personal Applications and Data Co-exist
  • 27. 27 Why Symantec for Mobile applications • Quick and Easy Expedite deployment of applications with an easy-to-use SaaS app store • Scalable and Seamless Enable any number of applications with no source-code changes • Independent of Mobile Device Management Address mobile application needs without managing the complete device
  • 28. Personal CRM Corp applications Corp AppACME Email Documents Use Case #4: Secure Email and Prevent Malware 2828
  • 29. Android Has Malware Problem 29 – More Than 50% Of Mobile Malware Is On Android 0 500 1000 1500 2000 2500 Jul-10 Sep-10 Nov-10 Jan-11 Mar-11 May-11 Jul-11 Sep-11 Nov-11 Jan-12 Mar-12 Android Malware Family 67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey 29
  • 30. Symantec Mobile Security 30 Antimalware Anti-Theft Web Protection Centralized Management Advanced Protection Comprehensive Protection Management 30
  • 31. Why Symantec for Mobile Security 32 – High efficacy Monitors 70+ application stores, analyzes 3 million+ applications, information from 7 million+ active devices. • Enterprise Grade Security Most applications are freeware, consumer editions. Symantec Mobile Security provides centralized management including LiveUpdates. • Enterprise Integration Anti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with Mobile Device Management. 32
  • 32. Bringing It All Together 33 Devices. Applications. Data. Mobile Protection 33
  • 33. Summary
  • 34. Summary • No business is safe from attack – regardless of its size or industry • Attackers are being more selective in who they target • Obtaining information is key – if an attacker could make money from it, it’s a potential target Below are some qualifying questions that can help you determine a security solution requirement: • What are you currently doing to safeguard your data? • How are your emails protected? • Do you use mobile devices in your organisation? • What industry regulations do you have to comply with? • How are you protecting your end users workstations?
  • 35. Any Questions?

×