Delivering the Promise of MobileGiGi SchummVice President & General Manager, Public Sector, Symantec                      ...
Answering the Government’ Call – Mobility at the center of VanRoekel’s   2012 Digital Government Strategy – Core challenge...
More Mobile Data = More Risk                               3
4
Common Wisdom: Protect the Device                                 – What’s a “device-centric” security                    ...
Just One Problem -- BYOD                                                                                           BYOD   ...
Mobile Devices in the Agency – Defining Your Journey                                                                      ...
The Breakthrough: Information-Centric Security                                                                Privat      ...
Thank you!                     Twitter: @gschummCopyright © 2011 Symantec Corporation. All rights reserved. Symantec and t...
Upcoming SlideShare
Loading in...5
×

Delivering the Promise of Mobile

608

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
608
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Welcome.
  • Thank You.
  • Delivering the Promise of Mobile

    1. 1. Delivering the Promise of MobileGiGi SchummVice President & General Manager, Public Sector, Symantec 1
    2. 2. Answering the Government’ Call – Mobility at the center of VanRoekel’s 2012 Digital Government Strategy – Core challenge: “enabling secure access to digital government information and services anywhere, anytime, on any device” – Government to open up federal data, encourage external mobile app developers – Agencies themselves to mobilize two customer-facing services within 12 months – The result: massive Influx of sensitive public data entering the mobile environment 2
    3. 3. More Mobile Data = More Risk 3
    4. 4. 4
    5. 5. Common Wisdom: Protect the Device – What’s a “device-centric” security posture? • Comprehensive Mobility Management (MDM) • DLP for mobile • Anti-Malware, Web Protection, Anti- Theft for mobile • Extreme cases: NSA-specified secure mobile environment – personal electronic devices (SME-PED) SME-PED: The Way of the Past 5
    6. 6. Just One Problem -- BYOD BYOD Desired Info/App Access Only State App-Centric 2015 Unmanaged 246M Corp PCs 293M Personal PCs 1017M Smartphones 326M Tablets 2010 Device-Centric 177M Corp PCs Full Control Managed 300M Smartphones 15M Tablets Current State Organization-owned Personally owned Devices Data Sources: Gartner, & IDC 6
    7. 7. Mobile Devices in the Agency – Defining Your Journey BYOD Agency Owns an Unmanaged Device Agency Controls Relevant Apps & Data Only App-Centric Control Authentication Information App Distribution & Access Protection & Collaboration 3 Agency Controls Standard Device Agency Controls Personal Device Device-Centric ControlAuthentication Information Device Control App Distribution Authentication Information Device Control App Distribution & Access Protection & Management & Collaboration & Access Protection & Management & Collaboration Agency 1 Personall 2 Owned y Owned Symantec Total Mobile Story 7
    8. 8. The Breakthrough: Information-Centric Security Privat Private e Cloud Cloud Device Protection App/Data Protection Access Enable, Secure, App Store, App Protect Identities, Manage Devices Policy, Content Center Access SaaS Apps Enterprise Mobility Management 8
    9. 9. Thank you! Twitter: @gschummCopyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates inthe U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 9
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×