Mobility XE meets customers’ needs and, as a result, we have built an impressive base of more than 1,600 world-class customers in Canada and the United States, some of whom you see here. These are great customers, whose ongoing needs kept us growing robustly through one of the worst recessions in decades. This represents license sales for a cumulative total of more than 460,000 individual users, 89 per cent of them are under continuing maintenance contracts. Customers like us and our surveys say that 97 per cent of them would recommend us to others.
Common Mistakes Connectivity Tacoma Power: Consider overtime costs Worker frustration Training
Common Mistakes Visibility Working on the WAN does not work as easy on wireless Many applications don’t perform well in mobile world Mobile VPNs can ensure these apps work well in mobile world POLL IDEA How many applications does your IT dept support? Allow mobile workers to use multiple applications Gives workers more tools to be productive
What mobile VPN can do for IT administration. Gives customers three tools they didn’t have previously: Analytics module gives them the ability to look into their wireless deployments to see what their mobile workers are doing; Network Access Control module gives them the ability to ensure that only devices with the right security, controls and anti-virus protection can connect to their networks; and, Policy Management gives them the ability to control all of this… which applications can be accessed by which workers on which networks. Tools enhance day-to-day management and control, cut down on help desk calls and troubleshooting. Yet more productivity gains… Software easy to install, easy to use. delivered by Internet download– no professional services engagement – most customers get it running by themselves in as little as a couple of hours.
4Functional Expertise• Experience in market research, consulting sales and business development with expertise in theInformation Communications and Technology Network Security sector.• Developing research and analysis in the Network Security industry in areas such as:- Technology and Demand Trends- Market Sizing- Market Forecasting and Strategic AnalysisIndustry Expertise Experience base in the information communication technologies sector, leveraging long-standingworking relationships with leading industry participants’ Senior Executives- Mobile Security- Endpoint Security- Managed Security Service Providers (MSSPs)- Content FilteringWhat I bring to the Team Expertise in managing executive level relationships In-depth understanding of the network security market Experience in understanding market trends and forecastingCareer Highlights Sales Consultant in several leading Wireless firms:- AT&T- Verizon WirelessEducation• Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas• Bachelor of Science from Texas State University, San Marcos, TexasMartha VazquezIndustry AnalystFrost & SullivanNorth AmericaSan Antonio, TXToday’s Presenter
5Focus Points• The rise in mobile field workers• The needs and challenges for the remote worker• The evolving security landscape• Security solutions used to support the mobile field worker• Defining a Mobile VPN• The future outlook for the Mobile VPN market• The Last Word
6Poll Question• What is the status of your mobile security strategy in place?1. In place today2. Don’t have one and are assessing what to do.3. To be completed in 3 months4. To be completed in 6 months• Do you believe that remote workers threaten your corporateenvironment?1. Yes, we need to ensure employees securely access ournetwork2. No, we don’t believe the threat is significant
7The Rise in Mobile Field WorkersProliferation of Wireless DevicesProliferation of Wireless DevicesSource: Frost & Sullivan analysis
8The needs and challenges for the remote workerMarketDriversMarketRestraints1-2 years 3-5 years 6-10 yearsIncrease in advanced and complex threats drivesdemand for Mobile VPN solutions to help manage securityon wireless devicesCompliance regulations requires organizations toimplement products such as mobile VPNsBudget Concerns due to the global 2011/12economic slowdown impacts the purchase ofmobile VPN solutionsUse of mobile or wireless devices within organizationsdrives the demand for Mobile VPN solutionsThe need to support multiple operating systemsslows down mobile VPN development and salesNeed for remote accessibility drives theneed for secure and continuous access tocritical dataCustomer confusion about the importance ofmobile security solutions delays spending onproducts including mobile VPNsImpact: High Medium LowMobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020Source: Frost & Sullivan analysis.
92006 2011 Beyond 2012Trojans, Botnets, Rootkits (Zeus)Mobile MalwareAPT & *MaaSThe Evolving Threat Landscape*Malware-as-a-Service (MaaS)*Malware-as-a-Service (MaaS)Malware becomes moresophisticated over time,while malware toolsemerge as a popularcommodity.Source: Frost & Sullivan analysis
10CentralManagementSecurity solutions that support the remote workerData LossPreventionContent SecurityMobile VPNNetwork AccessControlApplication andDevice ControlAnti-malwareComplete Mobile Security SolutionComplete Mobile Security SolutionSource: Frost & Sullivan analysis
11Defining a Mobile VPN• A Mobile VPN is defined as a specific type of VPN that isbased on security standards such as Mobile IP, IPSec orSSL but us built for wireless or mobile coverage.o Securityo Session Persistenceo Application Persistenceo Network Transparencyo Bandwidth OptimizationSource: Frost & Sullivan analysis
12Source: Frost & Sullivan analysisKey Takeaway: An increase in using wireless devices will fuel revenue growththrough 2016Key Takeaway: An increase in using wireless devices will fuel revenue growththrough 2016Global Mobile VPN Market
13<N9B3-74>Global Mobile VPN MarketGrowthrate2009-2010NetMotion WirelessRevenue ($ Million)CiscoBirdstepTechnologiesSmith MicroSoftwareColumbitech> 10% growth 10-20% Growth > 20% GrowthKey Takeaway: The highest penetration rates are expected to come from Cisco,Juniper, and NetMotion WirelessKey Takeaway: The highest penetration rates are expected to come from Cisco,Juniper, and NetMotion WirelessCompetitor Growth AnalysisTotal Mobile VPN Products Market: Global, 2010IBMCheck Point SoftwareTechnologiesRadio IPJuniperNetworksNote: Bubble size represents relative capitalization. Thebase year is 2010. Source: Frost & Sullivan analysis.
14<N9B3-74>The Future Outlook for the Mobile VPN Market22 The value of the mobile VPN market is expected to reach $522M by2017.The value of the mobile VPN market is expected to reach $522M by2017.33 Demand for mobile VPN technologies is increasing as businesses adoptmore mobile devices.Demand for mobile VPN technologies is increasing as businesses adoptmore mobile devices.44 Mobile VPN will be integrated into security solutions suites and will notremain a separate product.Mobile VPN will be integrated into security solutions suites and will notremain a separate product.55 Adoption in the mobile VPN market remains high for telecoms andgovernment markets.Adoption in the mobile VPN market remains high for telecoms andgovernment markets.11 As the need for mobile device security continues to increase, the mobileVPN market will experience a healthy CAGR of 18.4 percentAs the need for mobile device security continues to increase, the mobileVPN market will experience a healthy CAGR of 18.4 percentSource: Frost & Sullivan analysis.
15<N9B3-74>For Additional InformationMireya EspinozaGlobal DirectorCorporate Communications(210) 247-3870Mireya.email@example.comMartha VazquezIndustry AnalystNetwork Security- ICT(210) 247-3864Martha.firstname.lastname@example.orgJennifer BatesDirector of ConsultingInformation and CommunicationTechnologies(940) 455-7475Jennifer.email@example.comCraig HaysVP of Sales, North AmericaInformation and CommunicationsTechnologies(210)firstname.lastname@example.org
The New MobilityAndy Willet, SVP, NetMotion Wireless
AgendaBackgroundCommon Challenges to Mobile DeploymentsConsiderations for Mobile VPN SoftwareQ&A17
BackgroundNetMotion Wireless• Based in Seattle, WA• Software provider focusedon challenges of mobile fieldworkers and wirelessAndy Willett• 11 years at NetMotionWireless• 11 years at AT&T Wirelessand Sprint Wireless18
Common Challenges to Mobile DeploymentsFor Mobile Workers:• Frequent log-ins, coverage dropshurts productivity▪Time taken away from project▪Drain on IT helpdesk▪Application crashes• Complexity of technology leads tolow adoption▪Field workers revert to old methods▪Solution too complex05/14/13 19Case Study:Regional Public UtilityThe math added up:•~ 200 field workers•~ 1 hour per day troubleshootingconnectivity issues/re-logins•Multiplied by hourly rate•Added to IT helpdesk requests•Equaled large amounts of lostproductivity each day
Common Challenges to Mobile DeploymentsFor IT Managers:• Limited visibility, management andcontrol into mobile workforceactivities and devices▪Limited control of data access whilemobile▪Limited insight into bandwidth drains▪No application control• Limited control over at-risk dataand anti-virus support▪Users and networks at greater risk▪Limited ability to enforce policies▪Limited control over device upgrades05/14/13 20
Considerations for Mobile VPN SoftwareManagement• Centralized web-based console• Granular view into all devices and usage• Ability to generate historical reportsSecurity• Advanced encryption and authentication• Ability to quarantine, verify, and controldevices and applications• Ability to create and enforce security policiesProductivity• Low complexity, single sign-on• Application persistence through suspend• Optimization of bandwidth and connections
05/14/1322SummaryOvercoming Common Challenges• Dropped coverage, application freezes hurt productivity• Limited visibility into workforce activities limits policy control• Lack of application level data control creates security risksRequirements you Need• Create granular visibility into your mobile workforceactivities with Management tools• Ensure seamless roaming coverage to increase Productivity• Get complete application level control of data in transitwith stringent Security coverage