festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi economici

416 views
292 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
416
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi economici

  1. 1. Gastone Nencini Trend Micro Italy Leader and Snr. Technical Manager Trend Micro Southern Europe Trend Micro Mobile Solutions 10/1/2013 Confidential | Copyright 2012 Trend Micro Inc.
  2. 2. 2.4B Internet Users1 1 Trillion+ URLs indexed by Google2 665M Web Sites3 1B Facebook Users4 427M Smart Phones Sold Last Year5 54% of Facebook Access is via Mobile6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012; Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 2
  3. 3. Empower the Business… Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 3
  4. 4. …while Protecting Information Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 4
  5. 5. Consumerization ITEmployees Cyber Threats Attackers Cloud & Virtualization 01/10/2013 5 Confidential | Copyright 2013 Trend Micro Inc.
  6. 6. Consumers Email & Messaging Web Access File/Folder & Removable Media IT Admin Employees Then… 01/10/2013 6 Confidential | Copyright 2013 Trend Micro Inc.
  7. 7. Device Hopping Consumers Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Employees IT Admin Now! 01/10/2013 7 Confidential | Copyright 2013 Trend Micro Inc.
  8. 8. Source: KPCB, Apple Quarterly Results 21.2M iPhones 1.3M iPods Unprecedented Adoption Rates 66.1M iPads 0 1 2 3 4 5 6 7 8 8 Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013
  9. 9. Source: Asymco.com, June 2012 Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 9
  10. 10. IT is exploring solutions MDM / MAM Some baseline security controls, visibility, and settings push, but… Limited data protection Containers / App Wrapping Some separation of work / personal workspace, but… Unfamiliar UX, limited 3rd party apps Users may work around Secure Sync & Share Stays out of employees’ way, familiar apps Often a separate silo, IT controls are weak
  11. 11. 01/10/2013 11Confidential | Copyright 2013 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic A range of device types, company-owned or BYOD Trend Mobile Solutions Mobile Security SafeSync
  12. 12. Device Management & Control 10/1/2013 12Confidential | Copyright 2012 Trend Micro Inc. Employees Trend Micro Mobile Security Email SharePoint Corp Data Web Traffic • Easy onboarding: email, URL, QR code • Apple (iOS), Android, Blackberry, Windows Phone 7 and 8 • Optional Cloud Communication Server • Device Discovery • Device Provisioning • Remote Control • Reporting • Inventory Management Cloud Comm. Server
  13. 13. Threat Protection 10/1/2013 13Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • Android AV and Website Reputation • Leveraging Smart Protection Network • Anti-Malware • Firewall • Web Threat Protection • Call Filtering • SMS/WAP Anti-Spam
  14. 14. Encryption 10/1/2013 14Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • Encryption Enforcement • Remote Wipe • Selective Wipe • Remote Lock • SIM Change/ Watch • Feature Lock • Password Policy
  15. 15. Application Control 10/1/2013 15Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • White Lists, Black Lists • App push • Mobile app inventory • Mobile Application Reputation Service (MARS) • Categorized app control
  16. 16. Mobile App Reputation – How it Works Trend Micro MARS Generates reputation scores and detailed report Trend Micro MARS Generates reputation scores and detailed report Collects Apps and scans them in the cloud Collects Apps and scans them in the cloud Static Analysis: Dissects app code and private data access. Static Analysis: Dissects app code and private data access. Correlates web queries with Smart Protection Network Correlates web queries with Smart Protection Network Dynamic Analysis: Activates app to analyse actual behaviour Dynamic Analysis: Activates app to analyse actual behaviour 1 2 3 4
  17. 17. Without IT Solutions, Employees Improvise Need mobile file access Will email to self or others… …or just install Dropbox …or Google Drive …or iCloud …or SugarSync …or SkyDrive …or…
  18. 18. Secure Sync & Share 10/1/2013 18Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic SafeSync • A corporate alternative to DropBox • Data on premise or in Trend Cloud (future) • Integrated DLP • Sync restrictions • Sharing restrictions • Persistent File Encryption Colleagues
  19. 19. Data Loss Prevention 10/1/2013 19Confidential | Copyright 2012 Trend Micro Inc. Employees SafeSync Colleagues Integrated DLP
  20. 20. ActiveSync Control (future) 10/1/2013 20Confidential | Copyright 2012 Trend Micro Inc. Employees ActiveSync Control • Add-on to ScanMail for Exchange • DLP scans emails • If violation occurs, attachment removed when accessed via mobile device • Require MFA • If device is unhealthy, ActiveSync is restricted
  21. 21. The Trend Advantage • Complete end user protection from a single vendor • Trend Micro Control Manager provides centralized management across all Trend Products – Unified DLP management – Unified Threat management – Unified user management • Mobile security and management that balances enablement with security. 10/1/2013 21Confidential | Copyright 2012 Trend Micro Inc.
  22. 22. Employees Complete End User Protection Device Hopping Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Copyright 2013 Trend Micro Inc.
  23. 23. Thank you 2310/1/2013 Confidential | Copyright 2013 Trend Micro Inc.

×