• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Automated Security for iOS and Android Devices
 

Automated Security for iOS and Android Devices

on

  • 837 views

Learn how to secure iOS and Android devices including smartphones and tablets in the enterprise.

Learn how to secure iOS and Android devices including smartphones and tablets in the enterprise.

Learn more at: http://www.maas360.com/products/mobile-device-management/apple-ios/

Statistics

Views

Total Views
837
Views on SlideShare
837
Embed Views
0

Actions

Likes
0
Downloads
34
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Critical Capabilities – Based on conversations with industry exports, these are the starting points for an automated solution
  • Poll Question 1: How are you messaging recommended Apple or Android OS upgrades to your smart device usersA – Not Messaging UsersB – Manually, via EmailC – Manually, via otherD – Automated Process Use Case Examples : iOS Security Vulnerability addressed in 4.3.5 (July 15th)Enforcing Android Tablets that support Encryption 3.0/Honeycomb – manage fragmentation issue with android; IT doesn’t have time to keep up with android ecosystem – this is a way for you to deal with this in a non labor intensive fashion
  • Poll Question 2:What is your corporate policy for Jailbroken iOS or Rooted Android devices?A – Not AllowedB – AllowedC – No Policy Poll Question 3: Are there Jailbroken or Rooted devices gaining access to corporate resources, such as email, today in your environment?A – YesB – NoC – UncertainBetween 8 and 9 percent of iOS-based devices are JailbrokenAbout 34.6% of iOS devices in China are JailbrokenWhile jailbreaking can be used for entirely legal purposes such as themes and unauthorized applications, it can also be used for illegal purposes, such as stealingsoftware from Apple's App Store. That reason, along with security concerns (loading of potentially unsafe applications) and other issues, has caused Apple to fight the practice. Jailbreaking essentially removes all security protections thаt Apple hаѕрυtіnthерƖасе on their devices.
  • Poll Question 4:How are you messaging recommended Apple or Android OS upgrades to your smart device usersA – Not Messaging UsersB – Manually, via EmailC – Manually, via otherD – Automated Process
  • Turn over to JD at this pointJD to CoverToday we talked about MDM basics and showed advanced capabilities around automated compliance and what benefits are – if you want to actually see we encourage you to take free trial – to see this in person free for 30 dayswebinar
  • JD to coverQuotes from article:“MaaS360 is our Clear Choice Winner based on its strong overall performance, particularly its ease of use.”“MaaS360 initially shocked us it was so simple to deploy.”“Everything was easy to set up.”
  • Joe to cover

Automated Security for iOS and Android Devices Automated Security for iOS and Android Devices Presentation Transcript

  • Automated Security for iOS and Android Devices John Nielsen© 2010 Fiberlink Communications MORE Webinar Series © 2010 Fiberlink Communications
  • Agenda> Mobile Device Management Essentials> Automated Security via Real Time Compliance> Essential Features> IT Value> Real World Use Case Review> How to get started MORE Webinar Series © 2010 Fiberlink Communications 2
  • Mobile Device Management EssentialsThe Basics> Single Console Management> Device enrollment> OTA configuration> Security policy management> Real-time reporting> Remote lock & wipe Device Enrollment, Acceptable Use MDM Actions> Self-service PortalAdvanced Management> Corporate App Storefront> Application and Document Management> Event-based Security and Compliance Rules Engine Corp App MaaS360 Event-based Security & Compliance Storefront MORE Webinar Series © 2010 Fiberlink Communications 3
  • Essential Features for Event Based Security> Real time device evaluation  Evaluate device compliance in real time> User/Admin Notification Support  Directly message user and administrators when out of compliance> Automated Action Enforcement and Removal  Take immediate action or provide user a “grace period” to remediate violation  Auto “lift” of enforced action when device returns to compliant state> VIP/Exempt Devices  Mark devices as exempt from automated action> Full Audit History Support  Track action history MORE Webinar Series © 2010 Fiberlink Communications
  • The Basics of Automated Security Compliance> Ensure Devices meet Compliance Requirements  Critical Detection Capabilities: • Enforce MDM Management • Encryption Compliance • Minimum OS Version • Application Restrictions (iOS/Android) • Remote Wipe Compliance • SIM Change • Jailbreak/Root Detection • Roaming State Change> Take Action on Rule Violations  Critical Action Capabilities: • Alert User & Admin • Restrict Device (Email, Wi-Fi, VPN) • Block Email Access • Wipe Device MORE Webinar Series © 2010 Fiberlink Communications 5
  • IT Value> Ensure Devices Meet Compliance Requirements> Proactive Compliance> Mitigate Business and Legal Risk> Give IT peace of mind by automating compliance enforcements policies  Real time alerting & enforcement  Take action without IT admin intervention MORE Webinar Series © 2010 Fiberlink Communications
  • How can MaaS360 Help? One Window. One System. MORE Webinar Series © 2010 Fiberlink Communications 7
  • Use Case: Enforce Minimum Device Version> Ensure devices are running security approved versions of Android or Apple OS> If out of compliance immediately „Restrict Device‟ from connecting to corporate resources (email, VPN, Wi-Fi)> Restore connectivity once upgrade to approved version takes place MORE Webinar Series © 2010 Fiberlink Communications
  • Use Case: Wipe Jailbroken iPhones> Ensure iOS devices have not been Jailbroken> If out of compliance, notify user and wait 2 days for remediation> If not remediated, wipe device to factory default settings MORE Webinar Series © 2010 Fiberlink Communications
  • Use Case: Application Management Enforcement> Ensure unwanted applications are not installed and running on devices> If found, immediately block user from corporate email> Restore connectivity to email when restricted app has been removed MORE Webinar Series © 2010 Fiberlink Communications
  • Take the Free EvaluationSee for yourself…Go towww.maas360.comand click “Get Started” MORE Webinar Series © 2010 Fiberlink Communications 11
  • Network World MDM Product Test MaaS360 is the Clear Choice Winner “Fiberlink’s MaaS360 is our Clear Choice Winner, based on its strong overall performance, particularly its ease of use. The application initially shocked us, as it was comparatively simple to deploy.” MORE Webinar Series © 2010 Fiberlink Communications
  • Questions or follow-up? John Nielsen- jnielsen@fiberlink.com Wrap-up> Up-coming Webinars (http://maasters.maas360.com/webinars/)  August 18th – Optimized Management for iPhones, iPads, and Androids with Exchange 2007 & Exchange 2010  September 1st – Best Practices for Enabling Android Devices in the Enterprise> Past Webinars (http://links.maas360.com/webinars/)  Forrester - Map Your Mobility Strategy to Meet New Demands  Aberdeen – Best Practices for Managing iPhones, iPads, and Androids  Enterprise Mobility Foundation - Managing Personal Mobile Devices In Your Business> Plus lots of How-To content at the MaaSters Center  Mobile Device Management Best Practices • http://links.maas360.com/mdm/  Mobile Device Management Strategy Series from Lopez Research • http://links.maas360.com/mdmstrategy/  Mobile Device Management Glossary • http://links.maas360.com/mdmglossary/ MORE Webinar Series © 2010 Fiberlink Communications 13