Mobile devices are always on the move, switching from network to network and place to place constantly. The best way to keep your company's information safe is through a unified approach securing at the device, app and network levels.
2. • View Webinar Archive: http://go.mojave.net/webinar-3pronged-
mobile-security
• Learn more about Mojave Networks: http://www.mojave.net
Information
28. Why is Knowing Your Mobile Risk Important?
28
• Protecting company data
• Safeguarding other enterprise infrastructure
• Identifying compliance issues
• Creating better policies with better visibility
38. Health
Evaluate apps,
processes, diagnostics,
and behavior to assess
risk
Native Experience
No wrapping or containers to
interfere with the native experience
Privacy
Wipe corporate information and set
granular employee privacy policies
Policies
Set configurations, deliver
policies, and manage apps
Device – Security without the Hassle
38
39. 39
Monitoring Device Health
• Over 50 data points
collected daily
• Monitor for critical
changes in device
health
• Feeds of data for
other security tools
to analyze
44. Network threats blocked per device
10 per month
120 per year
44** Based on Mojave Networks aggregate customer usage data
45. • Tie mobile events to broader
user profile
• Leverage existing security
tools
• See activity that has never
been available
Real-time Event API Completes the Loop
45
Policy
46. Mojave Connect Real-time API
Common Syslog formats
Better Correlate Mobile Events with Other Enterprise Data
Real-time API’s = Faster Risk Assessment
46
48. • MDM solutions only protect from a small subset of mobile risks
• 4 pillars necessary to provide true mobile security
• Mobile risk should be combined with other threat intelligence
Summary
48
50. Mojave Networks Background
• Founded in 2011 and based in Silicon Valley
• Lead investment from Bessemer Venture Partners & Sequoia Capital
• Veteran team from Symantec, McAfee, Lookout, Palo Alto Networks, Cenzic
• Deep security DNA with patent pending technology
• Customers in Healthcare, Finance, Transportation, Government and more
50
This is information technology (IT)
The old way
How you can be a blocker
This is Business Technology (BT)
- security only as good as weakest link
- matching a solution to the type of risk/problem you have
Transition: Important to quantify now as risks are increasing quickly
Story for this one: Syrian electronic army
Nice diagram of app protection, network, device, and tying back into corporate network, getting the analytics off of it (auth?)
Mobile network activity a BLIND SPOT
Tyler says “No roadblocks” and user experience really important
I think keeping a consistent placement of image (right) and text alignment (left) on each screen gives the deck order and orients the eye through the flow.
I’d talk through our infrastructure here wit the history