Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Symantec Mobile Security


Published on

Published in: Technology
  • Be the first to comment

Symantec Mobile Security

  1. 1. Symantec Mobile Solutions Overview Presenters: Andrew Blackham - Symantec Presales Specialist
  2. 2. Agenda – The Mobile Landscape – 5 Pillars of Enterprise Mobility – Supporting BYOD – Summary – Q&A 2
  3. 3. Mobile Landscape
  4. 4. Exploding Number of Mobile Devices Pave the Way for “Bring Your Own Device” (BYOD) 2010 177M corp PCs 2015 246M corp PCs 2010 173 M personal PCs 2015 293M personal PCs 2010 300M smartphones 2015 1017M smartphones 39% 69% 340% 2,170% 2010 15M tablets 2015 326M tablets
  5. 5. Changes in Working Style New applications deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices 80% 65% 52% 1 2 3 Sources: 1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011 2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012 3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
  6. 6. Freedom, Privacy and Productivity Easy access to files, applications, email Use the latest technology and applications Personal stuff is untouched Do it themselves (i.e. Self-Service) Simple, Secure and Reliable Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit and monitor User IT Staff The Desires of Users Versus IT Staff
  7. 7. Company Controls applications and Data Only Company Controls Personal DeviceCompany Controls Standard Device 32 1 UnmanagedManaged Company Owned Personally Owned Company Owns an Unmanaged Device BYOD User and App Access Management Threat Protection Secure File Sharing Device Management App and Data Protection User and App Access Management. Threat Protection Secure File Sharing Device Management App and Data Protection User and App Access Management Secure File Sharing App and Data Protection 2 4 Evolving Endpoint Adoption Map
  8. 8. The 5 Pillars of Enterprise Mobility
  9. 9. Success = Mastering Control Points Devices Applications Data …without disrupting user experience
  10. 10. 5 Pillars of Enterprise Mobility ControlPoints User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Application Data Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile Security Threat detection and removal Enterprise-grade file sharing and collaboration in the cloud
  11. 11. Symantec’s Comprehensive Solution Symantec O3™ App Center Mobile Management Mobile Security Content Center Primary Products User and App Access App and Data Protection Device Management Threat Protection Secure File Sharing Symantec Managed PKI Symantec Validation and ID Protection Service (VIP) Symantec Data Loss Prevention for Mobile Symantec Mobile Encryption Altiris™ Client Management Suite from Symantec Altiris™ IT Management Suite from Symantec Symantec Endpoint Protection Symantec O3™ Complementary Products
  12. 12. Competitive Matrix User and App Access App and Data Protection Device Management Threat Protection Secure File Sharing Fiberlink  Airwatch   MobileIron   Good   Zenprise   Symantec    McAfee  SAP/Sybase 
  13. 13. Mobility Solutions Breakdown
  14. 14. Use Case #1: Access SaaS Applications From Any Device
  15. 15. Symantec O3 A Cloud Information Protection Platform Symantec O3 Private Cloud / Data Center Symantec O3 Gateway Identity and Access Broker Information Gateway Symantec O3 Intelligence Center Context-based Policies Status Monitoring Log and Audit Services Layered Protection 2F Authentication Data Loss Prevention Encryption Public Cloud End-User Any Device
  16. 16. Why Symantec O3 • Proven Infrastructure Works with federated and non- federated applications 2 3 • Highly Scalable Leverages existing infrastructure • Capture Security Events Correlation of security intelligence
  17. 17. Use Case #2: Access Company and Personal Email Mobile Protection VPNWi-Fi CA Network Access 17
  18. 18. 18 Symantec Mobile Management Standalone or Plug into SMP and SCCM Enable Activate enterprise access, applications and data easily and automatically > iOS®, Android™, Microsoft®, Blackberry®, Symbian™ Secure Protect enterprise data and infrastructure from attack and theft > Detect JB, ensure passcodes, … Manage Control inventory and configuration with massive scalability > Integrated with SMP and SCCM
  19. 19. 19 Comprehensive Device Management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute applications In-house applications or public-store applications Docs, videos – any active content Group based management Manage Assets Centralized visibility and control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe and Full wipe
  20. 20. 20 Why Symantec Mobile Device Management 2 3 • Integrated Mobile Device Management Unified management with Macs and PCs
  21. 21. 21 Use Case #3: Secure iOS/Android/HTML5 applications and Content Enterprise App Store Personal CRM Corporate applicatio ns Corp AppACME Public application s Documents Containerized Application
  22. 22. 22 Mobile Application Management Comprehensive Application-Wrapping Technology App Store Repository for internal and external mobile applications App Policy Protect application against data loss through encryption, removal control and separation of corporate data Content Center Data Loss Prevention policy to control confidential data access
  23. 23. 23 Comprehensive Mobile App Management Deploy applications Enterprise app store for internal applications Recommendations from public application store Group based targeting Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Manage Lifecycle Revoke and update applications selectively Centralized visibility and control MDM features for policy management Protect Data Security and Management layer around data Passwords, encryption, offline access, rooting Separate corproate and personal data
  24. 24. 24 • Application deployment and provisioning • User authentication across applications • Copy and paste prevention • Per-application file encryption • Remote data/app wipe • iOS, Android, and HTML5 support SYMANTEC APP CENTER Symantec App Center Mobile App and Data Protection
  25. 25. 25 Same Security as Sandboxing, but More Flexible .IPA or .APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment
  26. 26. 26 Business and Personal Applications and Data Co-exist
  27. 27. 27 Why Symantec for Mobile applications • Quick and Easy Expedite deployment of applications with an easy-to-use SaaS app store • Scalable and Seamless Enable any number of applications with no source-code changes • Independent of Mobile Device Management Address mobile application needs without managing the complete device
  28. 28. Personal CRM Corp applications Corp AppACME Email Documents Use Case #4: Secure Email and Prevent Malware 2828
  29. 29. Android Has Malware Problem 29 – More Than 50% Of Mobile Malware Is On Android 0 500 1000 1500 2000 2500 Jul-10 Sep-10 Nov-10 Jan-11 Mar-11 May-11 Jul-11 Sep-11 Nov-11 Jan-12 Mar-12 Android Malware Family 67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey 29
  30. 30. Symantec Mobile Security 30 Antimalware Anti-Theft Web Protection Centralized Management Advanced Protection Comprehensive Protection Management 30
  31. 31. Why Symantec for Mobile Security 32 – High efficacy Monitors 70+ application stores, analyzes 3 million+ applications, information from 7 million+ active devices. • Enterprise Grade Security Most applications are freeware, consumer editions. Symantec Mobile Security provides centralized management including LiveUpdates. • Enterprise Integration Anti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with Mobile Device Management. 32
  32. 32. Bringing It All Together 33 Devices. Applications. Data. Mobile Protection 33
  33. 33. Summary
  34. 34. Summary • No business is safe from attack – regardless of its size or industry • Attackers are being more selective in who they target • Obtaining information is key – if an attacker could make money from it, it’s a potential target Below are some qualifying questions that can help you determine a security solution requirement: • What are you currently doing to safeguard your data? • How are your emails protected? • Do you use mobile devices in your organisation? • What industry regulations do you have to comply with? • How are you protecting your end users workstations?
  35. 35. Any Questions?