McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices


Published on

Learn the latest trends and protections for the mobile workforce, including managing multiple devices. Security risks rise with the addition of more and more devices both in the traditional office and in the teleworking and mobile workforce. Join the interactive discussion on best practices for proactively managing devices across all levels of your agency.

Apollo Group, New York City Health and Hospitals, NJVC, and Physiotherapy Associates: Security in the Age of a Mobile Workforce and Mobile Devices
Scott Carlson, Principal Security Engineer, Apollo Group
Kevin Brownstein, Manager – Systems Engineers, McAfee, Inc.
Egon Rinderer, Chief of Cyber Security, NJVC, Inc., NGA
Corey Cush, Assistant Vice President – Infrastructure Services, NYC Health & Hospitals Corp
Kevin Slate, Vice President – Information Technology, Physiotherapy Associates

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

  1. 1. October 19, 2011 Security in the Age of a Mobile Workforce and Mobile Devices Kevin Brownstein, McAfee Corey Cush, NYC Health & Hospitals Corp Scott Carlson, Apollo Group Kevin Slate, Physiotherapy Associates Egon Rinderer, NJVC
  2. 2. Since FOCUS 2010: Hypergrowth in Mobile Devices Computing Cycles in Perspective (from Morgan Stanley) Devices/Users (MM in Log Scale) 1,000,000 Mobile Internet 100,000 Desktop Internet 10,000 10B+ Units?? 1,000 PC 1B+ Units/ Users 100 Minicomputer 100M Units 10 10M Units Mainframe 1 1M Units 1960 1980 2000 2020 “ The desktop internet ramp was just a warm-up act for what we’re seeing happen on the mobile internet. The pace of mobile innovation is “unprecedented, I think, in world history. ” Mary Meeker, Kleiner Perkins Caufield & Byers The information in this presentation is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance. 2 October 19, 2011
  3. 3. Progress with Enterprise Security and Compliance: Evolution to Mobile • Enterprise IT organizations have made significant progress, past ~6+ years – Optimized IT security operations – Increasing compliance efficiencies • Mobile/consumerization, 2 years (iPhone) • Accelerated past year (iPad, Android…) • Now Mobile… we need “6+ years of management, security, compliance” – in 6 months! 3 October 19, 2011
  4. 4. You already built one security infrastructure… Bring Mobile Devices IN 4 October 19, 2011
  5. 5. McAfee® Mobile Security Integration First Step: ePolicy Orchestrator® Platform EMM EMM DMZ P McAfee ePolicy Orchestrator Platform Enterprise Mobility and Security Management Bring mobile devices into the security management framework for centralized visibility and control. Set policies for all endpoints alike, and report on them all centrally to understand and manage your compliance status and risk profile at any given time. 5 October 19, 2011
  6. 6. McAfee’s Mobile Security Integration Direction Next: McAfee® VirusScan® Mobile Software EMM EMM DMZ Anti-Malware Data Leakage Prevention Application Security Enterprise Mobility and Anti-Malware Protect mobile devices and networks against viruses, spyware, botnets, and even Advanced Persistent Threats. Roll out anti-malware solution and DAT updates to devices and other endpoints alike centrally and in a policy-based way. Prove compliance with corporate and regulatory policy. 6 October 19, 2011
  7. 7. McAfee’s Mobile Security Integration Direction Next: Secure Container and DLP EMM EMM DMZ Anti-Malware Data Leakage Prevention Anti-Malware Application Security Enterprise Mobility and Data Leakage Prevention Safeguard leakage of your corporate data with a secure container, at the host or mobile device, and at the network level. Start with a secure container to prevent data leakage from email, and ultimately extend granular data leakage prevention policies to mobile devices as you do other endpoints. 7 October 19, 2011
  8. 8. McAfee’s Mobile Security Integration Direction Next: Secure Applications Scan Provide Secure Access Aggregate Anti-Malware Certify Monitor Data Leakage Prevention Application Security Enterprise Mobility and the Application Security Lifecycle Start by scanning and certifying mobile applications for vulnerabilities or malware, monitoring their behavior and developing reputations for them, and providing secure access to them via network access control. 8 October 19, 2011
  9. 9. McAfee’s Mobile Security Delivery Direction Today: On Prem Software; Next: SaaS EMM EMM EMM DMZ On Prem Software or SaaS Options Delivering Secure Enterprise Mobility in Multiple Ways Deploy secure enterprise mobility as an on-premise software or cloud-based software-as-a-service solution. 9 October 19, 2011
  10. 10. Public Sector Mobility Proof of Concept 10 October 19, 2011
  11. 11. On-Premise Security Management through ePolicy Orchestrator Platform Compliance Across All Enterprise Endpoints Bringing all endpoints into compliance. Status is critical to assessing risk and prioritizing actions
  12. 12. McAfee ,the McAfee logo and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Copyright © 2011 McAfee, Inc.