SlideShare a Scribd company logo
1 of 24
Mobility XE Overview June 2010
Agenda Company Why a Mobile VPN Mobility XE Features Productivity  Security  Management  Evaluation and Deployment 6/14/2010 2
NetMotion Wireless Software company focused on mobile field workers Headquartered in Seattle, Washington Formed in 2001. Sales Offices throughout N. America, Frankfurt, Paris and London 100+ employees 25+ industry awards for VPN technology 1600+ highly satisfied customers +97% maintenance renewal rate +98% satisfaction rate +50% revenue from add-on sales
Government Enterprise Healthcare Utilities Insurance
Challenges Mobile Workers Coverage and connectivity challenges Moving from location to location Poor application performance Complexity w/ limited access to support resources Business/IT Security when outside corporate network Visibility and management of field resources Extending legacy applications into a mobile and wireless environment Support costs – keeping it simple for end-users 6/14/2010 5
6/14/2010 6 Mobile VPNsNew Category Emerges to Address Mobile Challenges "From our vantage point, NetMotion Wireless is the clear leader in the space“— Tony Rizzo, Director, Mobile Research with The 451 Group Like Legacy IPSec and SSL VPNs…. Uses standards based security for authentication and encryption Unlike Legacy IPSec and SSL VPNs…. Designed for organizations with mobile field workers Addresses productivity pain points Security and management platform independent of network and applications Supports smart phones, handhelds, ultra mobiles, tablets and lap tops. Removes common barriers to a successful mobile deployment
6/14/2010 7 Mobility XE – the industry leading Mobile VPN Removes common barriers to successful mobile deployments Client and server software Support for all Microsoft devices Productivity ,[object Object],Security ,[object Object]
Built with mobile field workers in mindManagement ,[object Object],Productivity Security Management
SQL Productivity Application Server Corporate Office NetMotion Server InterNetwork Roaming ,[object Object],  VPN or applications  ,[object Object],where they left off Network Optimizations ,[object Object],throughput ,[object Object],Best Bandwidth Selection Automatically builds the tunnel over the fastest available interface Application Session Persistence No lost data or application crashes caused by coverage gaps or suspend & resume operations VPN Operates as a Service Eliminates the step of launching a VPN  6/14/2010
6/14/2010 9 Productivity Only security product that enhances mobile worker productivity.  Saves time … … eliminates VPN and application disconnects … replaces “shut-down” with “suspend” … eliminates need to launch a VPN … speeds up applications … eliminates need for multiple VPN profiles … provides real-time access to more applications Improves IT productivity Straight forward installation and maintenance Eliminates VPN client configuration issues Enables over-the-air device management Fewer support calls Unified security & mobility platform for internally developed applications.
Jan 2009 Mobility XE – Compression on Cellular Data Networks 6/14/2010 10 Download Speed in Kbps Laptop copying 10 MB DAT file. AMD 2800+ NMS w/ 2GB RAM running Win2K3
6/14/2010 11 Security – Industry Standards Encryption  FIPS 140-2  Validated  128, 192 or 256-bit AES Encryption Authentication Methods MS Active Directory RADIUS RSA SecurID Smartcards Digital Certificates FIPS 140-2 Inside* *TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments
6/14/2010 12 Enhanced Security Lock-down clients Ensure traffic is routed through the corporate network Access to & from device ONLY through encrypted tunnel Complimentary to client firewall Validate user identity throughout the day Configure periodic user reauthentication without disrupting application sessions Verify device identity  Stop foreign devices from accessing corporate network Enables a low cost form of multi-factor authentication The MACHINE is something you have Users log in from approved machines only
Enhanced Security Quarantine Devices and/or Users  Quarantine NEW Devices – keeps unapproved devices off the network Prevent lost or stolen devices from accessing the enterprise Control application access by user group or device  Keep devices in the field current on patches Unattended over-the-air management of mobile devices Extend the reach of existing device and patch management utilities.  Supports Active Directory scripting & objects Network Access Control  Prevents or allows user connection based on client’s compliance to corporate policies Client evaluates  Server enforces Allow | Warn | Remediate | Disconnect | Quarantine Integrates with Policy Module for ‘smart’ remediation 6/14/2010 13
Centralized web-based view Access console from anywhere See and manage entire pool of servers from a single console All configurations centralized No need to touch clients Granular view into all device connections Same view regardless of the device type Same view regardless of the network connected to Status of all device connections Battery status, operating system version, etc. Processes running on the device 6/14/2010 14 ManagementMobility Console – Session Details
6/14/2010 15 ManagementMobility Console – Session Details
ManagementAnalytics Module Enables visibility into how mobile deployment is performing Users Networks Devices  Applications Automated notifications for proactive management 6/14/2010 16
Connection Status 6/14/2010 17
Network Usage by Application 6/14/2010 18
Without QoS Policy With QoS Policy Mobility VPN tunnel Mobility VPN tunnel ManagementPolicy Management Module Rule 1 -  Accelerate Web on WAN Rule 2 – Block Web on Handheld Application Server NetMotion Server Quality of Service (QoS)- Prioritize applications to ensure    optimum performance Policy Management - Created Centrally- Enforced on the device- Application-level control ,[object Object],6/14/2010
    Checks: ,[object Object]
     Antispyware
     Firewall
     OS Version

More Related Content

What's hot

Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAdvantec Distribution
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing ModelIvanti
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringwwwally
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...eG Innovations
 

What's hot (20)

Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheet
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoring
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
 
scom
scomscom
scom
 

Similar to Mobile VPN Overview for Mobility and Productivity

System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsGGR Communications
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Microsoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John DelizoMicrosoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John DelizoQuek Lilian
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12mjamesvoyss
 

Similar to Mobile VPN Overview for Mobility and Productivity (20)

System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Embrace network
Embrace networkEmbrace network
Embrace network
 
Knox Manage Tech Sheet
Knox Manage Tech SheetKnox Manage Tech Sheet
Knox Manage Tech Sheet
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Microsoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John DelizoMicrosoft Direct Access (part 1)_John Delizo
Microsoft Direct Access (part 1)_John Delizo
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Mobile VPN Overview for Mobility and Productivity

  • 2. Agenda Company Why a Mobile VPN Mobility XE Features Productivity Security Management Evaluation and Deployment 6/14/2010 2
  • 3. NetMotion Wireless Software company focused on mobile field workers Headquartered in Seattle, Washington Formed in 2001. Sales Offices throughout N. America, Frankfurt, Paris and London 100+ employees 25+ industry awards for VPN technology 1600+ highly satisfied customers +97% maintenance renewal rate +98% satisfaction rate +50% revenue from add-on sales
  • 4. Government Enterprise Healthcare Utilities Insurance
  • 5. Challenges Mobile Workers Coverage and connectivity challenges Moving from location to location Poor application performance Complexity w/ limited access to support resources Business/IT Security when outside corporate network Visibility and management of field resources Extending legacy applications into a mobile and wireless environment Support costs – keeping it simple for end-users 6/14/2010 5
  • 6. 6/14/2010 6 Mobile VPNsNew Category Emerges to Address Mobile Challenges "From our vantage point, NetMotion Wireless is the clear leader in the space“— Tony Rizzo, Director, Mobile Research with The 451 Group Like Legacy IPSec and SSL VPNs…. Uses standards based security for authentication and encryption Unlike Legacy IPSec and SSL VPNs…. Designed for organizations with mobile field workers Addresses productivity pain points Security and management platform independent of network and applications Supports smart phones, handhelds, ultra mobiles, tablets and lap tops. Removes common barriers to a successful mobile deployment
  • 7.
  • 8.
  • 9.
  • 10. 6/14/2010 9 Productivity Only security product that enhances mobile worker productivity. Saves time … … eliminates VPN and application disconnects … replaces “shut-down” with “suspend” … eliminates need to launch a VPN … speeds up applications … eliminates need for multiple VPN profiles … provides real-time access to more applications Improves IT productivity Straight forward installation and maintenance Eliminates VPN client configuration issues Enables over-the-air device management Fewer support calls Unified security & mobility platform for internally developed applications.
  • 11. Jan 2009 Mobility XE – Compression on Cellular Data Networks 6/14/2010 10 Download Speed in Kbps Laptop copying 10 MB DAT file. AMD 2800+ NMS w/ 2GB RAM running Win2K3
  • 12. 6/14/2010 11 Security – Industry Standards Encryption FIPS 140-2 Validated 128, 192 or 256-bit AES Encryption Authentication Methods MS Active Directory RADIUS RSA SecurID Smartcards Digital Certificates FIPS 140-2 Inside* *TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments
  • 13. 6/14/2010 12 Enhanced Security Lock-down clients Ensure traffic is routed through the corporate network Access to & from device ONLY through encrypted tunnel Complimentary to client firewall Validate user identity throughout the day Configure periodic user reauthentication without disrupting application sessions Verify device identity Stop foreign devices from accessing corporate network Enables a low cost form of multi-factor authentication The MACHINE is something you have Users log in from approved machines only
  • 14. Enhanced Security Quarantine Devices and/or Users Quarantine NEW Devices – keeps unapproved devices off the network Prevent lost or stolen devices from accessing the enterprise Control application access by user group or device Keep devices in the field current on patches Unattended over-the-air management of mobile devices Extend the reach of existing device and patch management utilities. Supports Active Directory scripting & objects Network Access Control Prevents or allows user connection based on client’s compliance to corporate policies Client evaluates  Server enforces Allow | Warn | Remediate | Disconnect | Quarantine Integrates with Policy Module for ‘smart’ remediation 6/14/2010 13
  • 15. Centralized web-based view Access console from anywhere See and manage entire pool of servers from a single console All configurations centralized No need to touch clients Granular view into all device connections Same view regardless of the device type Same view regardless of the network connected to Status of all device connections Battery status, operating system version, etc. Processes running on the device 6/14/2010 14 ManagementMobility Console – Session Details
  • 16. 6/14/2010 15 ManagementMobility Console – Session Details
  • 17. ManagementAnalytics Module Enables visibility into how mobile deployment is performing Users Networks Devices Applications Automated notifications for proactive management 6/14/2010 16
  • 19. Network Usage by Application 6/14/2010 18
  • 20.
  • 21.
  • 22. Antispyware
  • 23. Firewall
  • 24. OS Version
  • 25. Windows Updates
  • 26. Registry Keys
  • 27. Process & Files
  • 28. Mobility Client Version NAC Compliance ManagementNetwork Access Control + Policy Corporate Network  Policy Allow App Block All Else Application Server Mobility Servers         
  • 29. 6/14/2010 21 ManagementPolicy Management Module Conditions BSSID DNS server address DNS server name Connection name Mobility client version Interface name Interface speed Local address NAC status OS Version Registry value Schedule (date, time) SSID NMS un/reachable for X seconds Externally-set condition WINS server address Target Actions Allow (Apps/Addresses/Ports) Block (Apps/Addresses/Ports) Disconnect (Apps/Addresses/Ports) Pass through (Apps/Addresses/Ports) QoS (Apps/Addresses/Ports) DSCP Traffic Shaping Queuing Real-time Protocol (Packet Loss Recovery) Balloon notification Other Actions Start application (command line) Local networking Override Interface Speed Hide interface Disable roaming Add Static Route to address Web image acceleration (Apps/Addr/Ports)
  • 31. 6/14/2010 23 Mobility XE Evaluation Program Qualified customers or partners can download full production software for lab testing and field pilots 30-day time period, up to 100 mobile devices (can be modified as appropriate) NetMotion Wireless Systems Engineer works with customer throughout the process Technical notes, phone support and in many cases on-site support provided Temporary keys are converted to permanent license keys following a purchase No contracts or fees associated with evaluation program
  • 32. SummaryDelivering on ROI Greater Productivity Completely transparent to mobile field workers Shields mobile field workers from challenges created by wireless networks and mobility Reduce calls into help desk Easy to deploy and maintain Enhanced Security Industry standard encryption and authentication Lock-down clients Device Authentication NAC Module Gain Visibility and Control Detail reporting on users, devices, networks and applications Complete application level control of data in transit 24 6/14/2010