Security Threats & Breaches with Mobile Devices

357
-1

Published on

This session reviews Novell ZENworks and its Full Disk Encryption as a solution to address some of the challenges of data that is now increasingly mobile.

Access the session on-demand at: http://www.ali-inc.com/info-resource-center.html

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
357
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security Threats & Breaches with Mobile Devices

  1. 1. Security Threats &Breaches: Keeping yourMobile Devices Secure
  2. 2. Here’s what we’ll cover today:  Welcome & Introduction  The reality of security breaches AND increasing mobility  Solution overview: Using ZENworks to keep you out of the headlines  Extending Network Security  Reporting features Demo  Ease of Management  Questions, Discussion & Next Steps
  3. 3. Novell Platinum Partner Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina Collaboration, Conferencing & Messaging Converged IP networking & telephony Network Resource Management solutions Wireless & Mobile Workforce solutions Data Storage, Archiving & Disaster Recovery Network Support & Optimization Virtualization Data Security Managed Services Training
  4. 4. The Reality of Today’s Security BreachesCherry Hill, NJ – October 8, 20122 data backup tapes were lost during shipping in late March 2012. The tapesincluded customer names, Social Security numbers, addresses, accountnumbers, debit card numbers, and credit card numbers. Marysville, TN – October 18, 2012 A password-protected laptop was stolen from an employees home on August 25. It contained two groups of patient data. Patient names, dates of birth, responsible party names, patientScottsdale, AZ – October 19, 2012 addresses, physician names, andA vendor working with patient data for digital billing information for 22,000 patientsconversion from lost a flash drive on or around were on the laptop. An additional 5,000July 16. It contained patient names, Social patients had similar informationSecurity numbers, dates of birth, addresses, exposed as well as their Socialtelephone numbers, account numbers, diagnoses, Security numbers and other non-and other protected health information. medical information.
  5. 5. SECURING YOUR MOBILEDATA WITH ZENWORKSSolutions to help you avoid the headlines
  6. 6. The ZENworks Family: Windows, Mac & Mobile Endpoints Windows, Mac & Mobile Configuration Management Patch Management Asset Management Application End Point Security Virtualization Management Service Desk Full Disk Encryption
  7. 7. Are you just as locked out of your owndevices as any hacker?
  8. 8. Why ZENworks Full Disk Encryption?
  9. 9. Centralized ManagementOne Console. One Agent. One Tool for all your endpoint management tasksZENworks also does configuration, patch, asset & endpoint security management
  10. 10. Fully FeaturedFrom a singleconsole, ZENworkslets you manage Manage access, with support for pre-boot authyour enterpriseremotely:down the hall, downthe street, across thecountry, or around the Turn encryption on/offworld Troubleshoot passwords Manage hardware & software encryptionDeploy encryptionsoftware across the Generate reportsenterprise at the push demonstrating encryptionof a button
  11. 11. Rapid Deployment
  12. 12. Pre-Boot Authentication
  13. 13. Ease of Management
  14. 14. Service Desk Friendly
  15. 15. Control the story Know you’re safe. Prove you’re safe.15 © Novell, Inc. All rights reserved.
  16. 16. NEXT STEPS
  17. 17. ALI Consulting & Deployment ServicesHighly experienced advisors with diverse & practical technical experience • Proactive strategy • Clear roadmap for deployment • Value driven project analysis • Limits burden on existing staff • Saves IT budget • Speeds time to deployment Project &Consultative • Priority access to Novell as Resource DeploymentAssessment Planning needed • Option for lab testing
  18. 18. Special Incentives for Webinar AttendeesAct within next 60 days to receive:  Special product discounts available  Special rates for project-based ALI services Call Cindy for more details!
  19. 19. Upcoming Webinar TopicsNovember 8: Disaster Recovery & Business Continuity for SMB OrganizationsIn this second webinar in our virtualization series, well beshowing some disaster recovery options from VMware thatmake business continuity so simple and affordable that noorganization has to continue to take the risk of beingunprepared.Registration link coming in the follow up email or registerfrom our event listing at www.ali-inc.com
  20. 20. Questions & Discussion Cindy DeHart Practice Manager cindy@ali-inc.com 540.443.3392 Neil Kimberley Sales Engineer nkimberley@novell.comSophia GermanidesNovell Account ExecutiveSophia.Germanides@novell.com

×