Network Access Control is used to control access to enterprise networks. Mobile Device Management is used to manage and secure mobile devices. Put them together and your customers can set network access policies based on knowledge of the device - the Power of Two!
Forescout is global leader in NAC. MobileIron is global leader in MDM/MCM/MAM and Secure Mobile IT.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
As mobile becomes a primary computing platform for the enterprise, every business function will mobilize core operations through apps. These apps live outside the enterprise perimeter and can run on personally-owned or minimally managed devices. Mobile IT must protect the app data while preserving the user experience.
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
The mobile banking and payments opportunity for financial institutions is tremendous, and those who offer the most secure apps will prevail over the competition. But this opportunity is not without hazards, and the effect on revenue and brand caused by hackers can be devastating.
In this webinar, IBM Security Trusteer and Arxan focuson the mobile threat landscape and leading protection techniques to safeguard mobile payments and apps.
Industry experts from IBM Security Trusteer and Arxan review:
The changes in technology that have made mobile applications so vulnerable
Emerging mobile threat vectors and what you can do to mitigate the risks
Musts for the future of your security model
View the on-demand recording: http://arxan.wistia.com/medias/036z0iw7y1
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
Secure Mobile Apps with Virtual Mobile Infrastructure (VMI)
Simple and easy to use remote access for Android Apps. Develop once and publish it on any client including Android, iOS, Blackberry, Firefox OS, Windows Phone and HTML5 clients. Transparent BYOD with no limits.
Understand the requirements for protecting mobile apps, including internally developed apps and third-party apps. This presentation describes security, compliance, and auditing challenges for banking and financial institutions and how virtual mobile infrastructure (VMI) can help solve them.
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
Vijay Pawar, MobileIron, Inc.
Ways to secure data in motion, protect data at rest, and
provide authentication and single sign-on for mobile application sessions in a secure manner.
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
As mobile becomes a primary computing platform for the enterprise, every business function will mobilize core operations through apps. These apps live outside the enterprise perimeter and can run on personally-owned or minimally managed devices. Mobile IT must protect the app data while preserving the user experience.
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
The mobile banking and payments opportunity for financial institutions is tremendous, and those who offer the most secure apps will prevail over the competition. But this opportunity is not without hazards, and the effect on revenue and brand caused by hackers can be devastating.
In this webinar, IBM Security Trusteer and Arxan focuson the mobile threat landscape and leading protection techniques to safeguard mobile payments and apps.
Industry experts from IBM Security Trusteer and Arxan review:
The changes in technology that have made mobile applications so vulnerable
Emerging mobile threat vectors and what you can do to mitigate the risks
Musts for the future of your security model
View the on-demand recording: http://arxan.wistia.com/medias/036z0iw7y1
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
Secure Mobile Apps with Virtual Mobile Infrastructure (VMI)
Simple and easy to use remote access for Android Apps. Develop once and publish it on any client including Android, iOS, Blackberry, Firefox OS, Windows Phone and HTML5 clients. Transparent BYOD with no limits.
Understand the requirements for protecting mobile apps, including internally developed apps and third-party apps. This presentation describes security, compliance, and auditing challenges for banking and financial institutions and how virtual mobile infrastructure (VMI) can help solve them.
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
David McNeely, Centrify
Sumana Annam, Centrify
In-depth discussion that clearly outlines the common challenges faced by enterprises as they attempt to mobilize their existing applications, with explanation of the many
technical considerations that organizations must address, how they can ensure user authentication and productivity by locking mobile users to a single corporate identity across all applications, and code changes that organizations need to consider.
As most people are aware, there has been an expansion in mobile banking applications in recent years. The Czech Republic is no exception to this, as nearly all banks have developed a mobile application for their modern mobile operating systems. Although different banks solve their security concepts in different ways, it is possible to discuss typical situations and problems that inevitably appear while designing mobile banking applications.
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
Mobility is increasing enterprise risk by adding further complexity and fragmentation to existing access management environments. Join us to learn how you can provide employees mobile access to enterprise applications and corporate data without compromising security.
Securing mobile starts by authenticating users and ensuring their mobile devices has not been compromised. When you authenticate a user, it’s not enough to simply confirm the user’s password is correct. You must look at other factors at the time of authentication including: time of day, device type and IP address to name just a few. This is known as risk-based authentication and it’s an important part of mobile security.
In this presentation, we provide an overview of IBM’s Mobile Security Framework and how you can use risk-based authentication to protect your enterprise.
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
View the on-demand recording: http://securityintelligence.com/events/how-to-hack-a-cryptographic-key/
Cryptographic-focused attacks are rapidly growing problems and one of the most difficult risks to minimize. If your organization is not taking appropriate steps to protect these keys, you are giving hackers easy access to your private data and transactions.
Join IBM Security and Arxan Technologies for an important and informative web event where you will learn the techniques employed by the bad guys, the numerous and varied problems key hacking can cause your organization, and how to mitigate this emerging threat.
Watch this webinar to:
- Learn why standard cryptography is no longer sufficient to address the risks posed by advanced key hacking and interception
- View a demonstration of key-hacking techniques and the vulnerabilities they pose
- Gain insight into best practices to stay ahead of hackers and criminals that pose a threat to your organization, customers, employees, brand and reputation
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
Managing access is the issue: too many locks, password sprawl wastes time for IT and users, and user productivity leads to IT inefficiency. Allow IT to provide security, simplicity and control with Samsung SDS IAM & EMM.
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
Virtual Mobile Infrastructure can save upto 75% in BYOD budgets compared to VDI, MDM and other complicated last generation solution. Avoid expensive Microsoft RDSH CAL and Server Licenses by migrating to VMI. Achieve Enterprise Mobility and Mobile Security with a hosted Remote Mobile App. With support for HTML5, iOS, Blackberry and Android cover all your user needs easily.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
Developing, managing and securing mobile apps can be a long and grueling process. This infographic lays out the obstacles that organizations often encounter and explains how Virtual Mobile Infrastructure can provide a shortcut to BYOD success.
Not all virtual mobile infrastructure (VMI) solutions are equal. Learn more about mobile app virtualization and how this architecture delivers better density to reduce hardware costs and streamline operations.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications without a separate VPN connection. Web@Work preserves a native and high-fidelity web browsing experience.
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
David McNeely, Centrify
Sumana Annam, Centrify
In-depth discussion that clearly outlines the common challenges faced by enterprises as they attempt to mobilize their existing applications, with explanation of the many
technical considerations that organizations must address, how they can ensure user authentication and productivity by locking mobile users to a single corporate identity across all applications, and code changes that organizations need to consider.
As most people are aware, there has been an expansion in mobile banking applications in recent years. The Czech Republic is no exception to this, as nearly all banks have developed a mobile application for their modern mobile operating systems. Although different banks solve their security concepts in different ways, it is possible to discuss typical situations and problems that inevitably appear while designing mobile banking applications.
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
Mobility is increasing enterprise risk by adding further complexity and fragmentation to existing access management environments. Join us to learn how you can provide employees mobile access to enterprise applications and corporate data without compromising security.
Securing mobile starts by authenticating users and ensuring their mobile devices has not been compromised. When you authenticate a user, it’s not enough to simply confirm the user’s password is correct. You must look at other factors at the time of authentication including: time of day, device type and IP address to name just a few. This is known as risk-based authentication and it’s an important part of mobile security.
In this presentation, we provide an overview of IBM’s Mobile Security Framework and how you can use risk-based authentication to protect your enterprise.
View on-demand recording: http://securityintelligence.com/events/securing-mobile-access-risk-based-authentication/
View the on-demand recording: http://securityintelligence.com/events/how-to-hack-a-cryptographic-key/
Cryptographic-focused attacks are rapidly growing problems and one of the most difficult risks to minimize. If your organization is not taking appropriate steps to protect these keys, you are giving hackers easy access to your private data and transactions.
Join IBM Security and Arxan Technologies for an important and informative web event where you will learn the techniques employed by the bad guys, the numerous and varied problems key hacking can cause your organization, and how to mitigate this emerging threat.
Watch this webinar to:
- Learn why standard cryptography is no longer sufficient to address the risks posed by advanced key hacking and interception
- View a demonstration of key-hacking techniques and the vulnerabilities they pose
- Gain insight into best practices to stay ahead of hackers and criminals that pose a threat to your organization, customers, employees, brand and reputation
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
Managing access is the issue: too many locks, password sprawl wastes time for IT and users, and user productivity leads to IT inefficiency. Allow IT to provide security, simplicity and control with Samsung SDS IAM & EMM.
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
Virtual Mobile Infrastructure can save upto 75% in BYOD budgets compared to VDI, MDM and other complicated last generation solution. Avoid expensive Microsoft RDSH CAL and Server Licenses by migrating to VMI. Achieve Enterprise Mobility and Mobile Security with a hosted Remote Mobile App. With support for HTML5, iOS, Blackberry and Android cover all your user needs easily.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
Developing, managing and securing mobile apps can be a long and grueling process. This infographic lays out the obstacles that organizations often encounter and explains how Virtual Mobile Infrastructure can provide a shortcut to BYOD success.
Not all virtual mobile infrastructure (VMI) solutions are equal. Learn more about mobile app virtualization and how this architecture delivers better density to reduce hardware costs and streamline operations.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications without a separate VPN connection. Web@Work preserves a native and high-fidelity web browsing experience.
Learn how IBM is using new technologies, applications and mobile devices to enable a smarter, more productive workforce. This short presentation shares IBM's journey enabling a flexible, mobile enterprise.
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
With the rapid growth of smartphones and tablets in the enterprise, CIOs are struggling to secure mobile devices and data across a wide range of mobile platforms. Attend this session to learn best practices around defining a mobile security policy, educating employees about safe computing practices, and deploying a secure technology framework. We'll discuss the benefits of endpoint management solutions like IBM Endpoint Manager in the context of a comprehensive enterprise deployment encompassing smartphones, tablets, PCs and servers.
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
Earlier today IBM announced the intention to acquire Fiberlink, a leader in mobile management and security. Here's the presentation used to brief the worldwide IT analyst community.
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
You are invited to explore the recent developments and announcements of a new portfolio of mobile products and services called IBM MobileFirst. By incorporating mobile capabilities that range from analytics, cloud, security, device management, application development and industry expertise, IBM MobileFirst will help you use mobile in new and unique ways to be more productive and innovative. IBM MobileFirst offers an array of solutions that helps connect, secure, and manage and develop mobile networks, infrastructures, and applications.
Attend this session and learn more about:
The mobile marketplace - trends, insights, future direction
Taking a Mobile First approach - what is involved
Industry use cases
Demo of sample application
Q&A
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
81% of companies have employee owned devices accessing their networks, but only 48% claim to have a well-defined mobile security strategy. To secure today’s mobile workforce businesses must consider adopting a framework to enable the use of mobile technology while minimizing the risks to both their employees and their customers. In this presentation, we review the unique challenges we all face and IBM’s approach to securing and managing the mobile enterprise.
http://securityintelligence.com/events/live-from-impact-2014-ibm-mobile-security-a-comprehensive-approach-to-securing-and-managing-the-mobile-enterprise/#.VMvT2vMo6Mo
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
Les technologies Mobile évoluent rapidement. Les organisations doivent élever le niveau de leur stratégie mobile pour adopter des applications, des contenu, des données, la gestion des identités, la sécurité, et toutes les applications connexes. Adoptez une approche plus globale Enterprise Mobility Management (EMM).
l'EMM offre des capacités de gestion et de sécurité mobiles complètes, cependant passant au revue les caractéristiques techniques et la différenciation entre les fournisseurs peut prendre beaucoup de temps.
Réduire le bruit
Regarder ce webinaire informatif pour apprendre comment mieux votre plan de travail quand il s'agit d'évaluation des fournisseurs et de la façon de réussir une transition en douceur vers l'EMM. Nous révélons les huit domaines les plus critiques pour garantir le succès. Voici les trois premiers pour aiguiser votre appétit, mais vous aurez à regarder le webinar enregistré pour apprendre le reste des principales raisons pour basculer sur l'EMM:
1. Utilisation une plate-forme unique pour gérer une gamme d'appareils, d'applications et les contenu mobiles
2. Intégration avec les systèmes et les ressources existantes de l'entreprise
3. Prendre en charge différents catégories d'utilisateurs, départements, et régions géographiques
Le capacités mobiles avancent plus vite qu'un "guépard geek". Ne restez pas coincé avec un éditeur qui a du mal à suivre le rythme de votre adoption des technologies mobile. Prenez une décision éclairée sur votre migration du MDM à l'EMM.
Ibm solutions for the mobile enterpriseChris Pepin
Presentation from IBM VP of Cloud and Services Marketing, Rich Lechner and IBM CTO of Mobility Bill Bodin. Presented at Gartner Symposium 2012 in Orlando, FL
Similar to DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron) (20)
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
3. 3 MobileIron Confidential3 MobileIron Confidential
Evolution of Personal Computing
SOURCES: Asymco.com, Public Filings, Morgan Stanley Research, Gartner, IDC
The PC/Web Era The Post-PC EraThe Mobile First Era
4. 4 MobileIron Confidential4 MobileIron Confidential
Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by Phillip Redman, John Girard, Terrence Cosgrove, and Monica Basso (May 23, 2013)
This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The
Gartner report is available upon request from MobileIron.
250+ Of Fortune 500 /
Global 2000
97% Customer support
satisfaction
5000+ Customers globally
2007
2009 V1 innovations
• Enterprise app store
• BYOD privacy
• Selective wipe
• Access control
• Real-time cost mgmt
Company founded
• Purpose-built for
multi-OS Mobile IT
• Coined “Mobile First”
Fastest growing global mobile mgmt vendor
2013 Magic Quadrant for Mobile Device Management Software
Reprint available from MobileIron
5. 5 MobileIron Confidential5 MobileIron Confidential
Multi-OS Management
Security
Compliance
Consumer Speed
User Driven
Device Choice
User Experience
Micro-Mobile Apps
Secure and manage mobile apps, documents, and devices
Mobile IT
The Birth of Mobile IT
6. 6 MobileIron Confidential6 MobileIron Confidential
“How do I manage the explosion
of operating systems?”
“How do I distribute apps
and embrace BYOD?”
“How do I secure and
mobilize content?”
“How do I manage security,
identity, and privacy?”
“I need to move at consumer speed,
without sacrificing security and compliance”
7. 7
Definition…
Mobile First organizations
embrace mobility as their primary
IT platform in order to transform
their businesses and increase their
competitiveness
Content of all types is
easily and securely
available on any device
CONTENT
End users choose their
devices
Security is invisible
to end users
User experience is the
#1 design criteria
USER EXPERIENCES
New apps are
developed and delivered
to mobile devices first
Core business
processes can be
performed on any
device
APPLICATIONS
In a Mobile First Company…
8. 8 MobileIron Confidential8 MobileIron Confidential
MOBILE CONTENT
MANAGEMENT
• Secure content hub on device
• DLP for email attachments
• Remote SharePoint access
• Secure intranet browsing
MOBILE APP
MANAGEMENT
• Scalable storefront for delivery
• Data containerization for DLP
• Dynamic policy & configuration
• Secure enterprise app persona
• App-specific tunneling
• … for in-house & public apps
MOBILE DEVICE
MANAGEMENT
• Purpose-built multi-OS security
• Self-service provisioning/config
• BYOD privacy protection
• Certificate-based identity
• Global scale for cloud & premise
Complete
Solution for
Mobile IT
9. 9 MobileIron Confidential9 MobileIron Confidential
Mobility Discussion – Not Just Security
Privacy,
legal, HR
BYOD
CYOD
(tax)
Content
Management
Help
Desk
Costs
Device
Management
App
Management
Complexity
Which OS,
devices
App
Development
User
Enablement
Cost of
Devices
Roaming
Costs
Network
Integration
10. 10 MobileIron Confidential10 MobileIron Confidential10
Enable global companies
to become MOBILE
FIRST organizations…
…by delivering the
MobileIron Mobile IT
Platform to manage
mobile Applications,
Content and Devices
11. 11 MobileIron Confidential11 MobileIron Confidential
MOBILE IT
User-Led
IT at Consumer
Speed
Devices Apps Content
Multi-OS
Device Choice Apps Explosion Content Ubiquity
Separation of Personal
and Corporate
Security and
Compliance
12. 12 MobileIron Confidential12 MobileIron Confidential
Purpose-built for Mobile IT,
the MobileIron Platform
manages and secures
apps, documents, and devices.
Our Platform…
13. 13 MobileIron Confidential13 MobileIron Confidential
MobileIron
Platform
An End-to-End
Solution for Mobile IT
End-User Services
Complete Mobile IT
Management Platform
15. 15 MobileIron Confidential15 MobileIron Confidential
MOBILE CONTENT
MANAGEMENT
• Secure content hub on device
• DLP for email attachments
• Remote SharePoint access
• Secure intranet browsing
MOBILE APP
MANAGEMENT
• Scalable storefront for delivery
• Data containerization for DLP
• Dynamic policy & configuration
• Secure enterprise app persona
• App-specific tunneling
• … for in-house & public apps
MOBILE DEVICE
MANAGEMENT
• Purpose-built multi-OS security
• Self-service provisioning/config
• BYOD privacy protection
• Certificate-based identity
• Global scale for cloud & premise
Complete
Solution for
Mobile IT
16. 16 MobileIron Confidential16 MobileIron Confidential
• Policy-based
access control
• Two-phase
authentication
• Secure tunneling
for email, apps,
docs, and web
MobileIron Sentry:
Security for
Data-in-Motion
17. 17 MobileIron Confidential17 MobileIron Confidential
MobileIron
End-User
Services
Device
Choice
Apps
Content
Email
Native experience
Data separation:
business vs. personal
Shared policy
Browsing
Selective wipe
18. 18
A
End User
Services
Device Configuration
and Docs@Work
(Sharepoint Docs)
Native Email Support
with Secure
Attachment and DLP
Apps@Work
Enterprise App Store
Multi-User Support
Native Device Experience
Single Sign-on
19. 19 MobileIron Confidential19 MobileIron Confidential
MobileIron
Deployment:
Cloud or
On-premise
Global
scalability
Trusted
services
20. 20 MobileIron Confidential20 MobileIron Confidential
Current or
upcoming apps
MobileIron
AppConnect:
Apps Ecosystem
Subject to change.
Logos displayed are the property of
third parties.
21. 21 MobileIron Confidential21 MobileIron Confidential
Journey to the Mobile First Enterprise
Device Security
BYOD (user choice)
Email access (secure ActiveSync)
Multi-OS security (BlackBerry replacement)
App & Content
Enablement
1st gen of mobile apps
Mobile documents
Cloud protections
Business
Transformation
New user & business experiences
22. 22 MobileIron Confidential22 MobileIron Confidential
Going Mobile First with
Purpose-built for Mobile IT
Best at apps and security
Architected for scale
Enterprise-class on-premise
or in the cloud
Best
Technology
97%+ support satisfaction
MobileIron University:
industry’s first training and
certification center
Best practice toolkits
(BYOD, Apps,
Android, Deployment)
Deep investment in
customer success
23. MobileIron Customer Stories
Financial Services
Healthcare, Pharma & Medical Devices
Professional Services
Retail & Consumer Goods
Government & Education
Hospitality
Technology & Manufacturing
Mobile IT transforms the business of our customers
24. 24 MobileIron Confidential24 MobileIron Confidential
Click image for story
Click image for story
Barclays Capital
Creating an internal app storefront
“My iPad is fully secure. I have an internal
app store we deployed with MobileIron and
there is heavy mobile device management
on it. It knows where it is, and what
networks it is allowed to attach to.”
“Obviously, you can’t stick [an internal app]
into Google’s store or Apple’s store, so you
have to be able to deploy it where you want
it, very securely. That’s the basis for an
internal app store.”
Shaygan Kheradpir, COO, Barclays Retail
25. 25 MobileIron Confidential25 MobileIron Confidential
Click image for story
Liberty Mutual
Moving to BYOD
“MobileIron was chosen as the device management
application for the Apple products. The BYOD program
now has about 1,000 users”
“That was more than we expected,”
Chris Moore, Senior Systems Admin
26. 26 MobileIron Confidential26 MobileIron Confidential
Citadele Bank
Security, Choice & Apps
“At our bank, employees are free to choose their work device. Some of
us prefer iOS-based phones, others choose Android-based ones. This
means we have a wide variety of devices from different
manufacturers,”
Citadele Bank CIO Guntars Andersons
The company ultimately chose MobileIron's solution for its data
securing capabilities and its usability. Citadele Bank plans to support
third party apps to increase employee productivity.
27. 27 MobileIron Confidential27 MobileIron Confidential
Creating mobile workstations for employees
who are constantly on the move
Mobile First Case Study
Lidl Mobile Office iPad roll out:
• Streamlined routine tasks
• Apps help the manager with
real-time inventory
management
• Up-to-date and attractive
training material
• Special offers can be
implemented quickly in the
store
• Data is presented on a mobile
device using an intuitive
graphic interface
Results
• Time-savings of 17%
• Paper files have nearly disappeared
• Improved employee satisfaction and
retention
28. 28 MobileIron Confidential28 MobileIron Confidential
Integration with Forescout
NAC Integrated with Mobile Device Knowledge
• MobileIron Device Knowledge
– OS ver
– Jailbroken or Rooted Devices
– Authentication
– App Details
• Forescout Access Policies
– Employee Access
– Visitor Access
– Quarantine (Jailbroken)
– Redirect to internal web page
– Etc.
Editor's Notes
We are in the middle of major transformation from the PC/Web era to what the industry calls the Post-PC Era. It is happening at a phenomenal pace. But since the introduction of the iPhone then Android, the end user computing world has changed dramatically. People now call it the Post-PC era. But we don’t like to define this era in terms of what it is NOT. We believe that in the same way as the web started as a new technology and quickly became the primary platform for end user computing, we believe that mobility will soon become the primary and preferred end user platform in the enterprise. CLICK - Animate This is why we like to call this new era the MOBILE FIRST ERA CLICK – Next Slide Mobile First definition… -------- Alternative narration This chart shows the end user computing platform evolution over the last 30-40 years. End users have been living in the Wintel monopoly for the good part of the last 30 years. PC and Laptops were the primary means to access applications and data. Click Since the advent of the iPhone and then Android, the end user computing platform landscape has changed dramatically. It is happening MUCH faster than ever before and moving forward it is only going to get more heterogeneous and fragmented. All the IT transformations that happened in the past that have a few things in common: 1 – the vendors who drove the innovation in the previous ERA did not drive the next one. There is a change of guard, new pure players emerge that innovate, deliver value to customers and grow. 2 – the customers who see these changes as opportunity and embrace the change, emerge as the leaders in their markets and in many cases create all new businesses that were not possible before 3 – What is the emerging platform at the beginning of the ERA, quickly become the primary and pervasive computing platform The industry has been calling this the Post-PC era, Click but we don't like this term because it describes this new exciting era in terms of what it is NOT, that is why we call it the Mobile First Era. Next slide. Business User Smartphone Shipments (%) SOURCE: IDC
Let me start by introducing our company. Funded in Silicon Valley in 2007 with the sole purpose of building a platform to solve the IT challenges caused by the rapid proliferation of corporate and employee owned mobile devices in the enterprise, we have a history of technology innovation and customer success. MobileIron was the company that originated what the industry calls the Mobile Device Management market, but we did not stop there. We invented the concept of a mobile Enterprise App Storefront, pioneered the field of BYOD and tackled problems like privacy and selective wipe. We ended up building a complete Mobile IT Platform to manage Apps, Documents and Devices in the enterprise. As a result, we have more than 4500 successful customers, 200 of the fortune 500. Our customers are happy with our product and service and over the last 12 months we had a 97% customer satisfaction Industry Analysts Validation Don’t take my word for it, t he industry has recognized MobileIron as well – we have consistently been named as the vendor that 1) can best meet customers current requirements for MobileIT and 2) has the vision and ability to support our customers as the Mobile Era evolves and customer requirements advance Gartner: Leaders Quadrant 2013 MDM Magic Quadrant (graph from May 2013) Three years running. IDC: #1 in market share (amongst pure-plays) and#1 growth overall for Mobile Enterprise Management specialists (Sept 2012) Info-Tech: Champion in 2012 MDM Vendor Landscape (Aug 2012) BusinessWeek: One of five hottest enterprise startups (Sept 2012)
We are at the cusp of the next phase of the mobile tornado that gives birth to a new way of doing IT, mobile IT. In Mobile IT – a new management solution is required – a solution that is designed for the mobile world, sits between users with their favorite devices and back-end enterprise systems, content and applications that they need access to. The mobile IT platform allows IT to focus on Users and the policies that define who gets what when and with what level of security. The good news is that if you, the Mobile IT professional, if you get this right, you can drive this transformation, and become a hero. MobileIron can help you make that happen. This is what MobileIron was built to do.
Main Point : Mobility means big changes and new challenges for IT It used to be so easy! Ok that may be a “slight” overstatement, but the corporate IT environment used to be much more contained and the IT department used to have much more control. IT determined which devices employees could use, and which applications could be installed on those devices. Access to these applications and corporate content was usually done within the corporate firewall or through a secure VPN connection. The network edge was well-defined and well-protected. Now, employees are bringing their own devices to work and are accessing the network from outside the firewall – they are taking those devices, and the access to corporate content and applications wherever they go – the Network Edge is now wherever your employees are – or wherever their devices end up – and it requires a new approach to access and security. Main Point : So IT is now at the center of everything – and is facing both increased challenges due to the explosion of mobile devices in the enterprise combined with increased expectations from employees. We’ll try to qualify some of those challenges here – and I am sure many of these resonate with all of you. How do I manage the explosion of devices, and applications, in a multi-OS environment? IT used to just manage Windows and Blackberry, now we have iOS, Windows Mobile, Android… How do I distribute apps securely? How do enable an employee to use both business and personal apps on their device? How do I make this self-service to the end-user – basically how do I create a corporate app store? How do I mobilize content? And enable me to manage access to the content on the end-user’s personal device? And how do I do this securely? While complying with employer and government mandated security regulations Bottom Line : Corporate IT must meet the standards set by consumer technology while maintaining security compliance. These are the requirements that we hear from our customers that drove the development of our Mobile IT platform.
A company is Mobile First when 1 – all new applications and business processes are available to Mobile devices First CLICK 2 – Corporate documents are securely available on any device CLICK 3 – and most importantly, end users choose the device they want to use and security is enforced by IT without getting in the way of an outstanding user experience This last point is paramount. For the first time in the history of IT, we have an opportunity to allow end users to carry out business processes on a device and with a user experience that they love and they WANT to use.
On top of the VSP we have three main pillars of functionality: Mobile Device management, Mobile Application management and Mobile Content management Mobile Device Management allows IT to embrace modern devices across any mobile OS and provide secure corporate email, automatic device configuration, cert-based security, select wiping for both corporate and employee-owned usage models. - Click Mobile Apps is really the next stage in enabling the workforce to be productive on their mobile devices. It is how to allow them to carry out core business processes. MobileIron Mobile Application Management provides an end-to-end solution to deliver, provision, secure, wipe, mobile apps. It is not just about building an App Storefront, we go beyond that and cover the full lifecycle of mobile apps, from making it available to the storefront for user self-service, to secure apps on the device enforcing authentication and isolating them from other (personal) apps. This process creates secure communication channels between mobile apps managed by our platform on the device so that critical corporate data never escapes from the secure corporate bubble, to create secure communication channels between the apps on the device and the enterprise back end so that data is protected also in motion, without requiring a device-wise VPN. Click The third Pillar is Mobile Content Management. Here we have three main areas of functionality A – The ability to securely mobilize Sharepoint files so that they can be accessed on the devices and securely stored for offline use. B – We secure email attachments so that they are encrypted and can only be viewed with the secure MobileIron Viewer. Native experience for the end user and DLP for the enterprise C – A secure browser that allows user to access HTML content and applications that sits behind the firewall, again without requiring a full blown VPN client on the device. Ease of use for the end user and security for IT.
Our vision to help organization become mobile-first companies and leverage this user-driven technology transformation to their advantage, to emerge the winner in their respective markets.
Main Point : The journey to becoming a Mobile First Organization requires a new IT Platform that is specifically designed to manage Mobile Apps, Content and Devices in the Enterprise. We call this Mobile IT The Mobile IT transformation is driven by end-users and IT moves at consumer’s speed to satisfy increased expectations from employees CLICK Users want: Device choice IT needs to: provide multi-OS management and security CLICK Users want: use personal and business application IT needs to: provide a way to create a clear separation between personal and business assets and application that guarantees enterprise security while preserving user privacy. CLICK Users want: ubiquitous access to their content to be productive on any device IT needs to: enable content access with security and compliance These are the top requirements that we hear from our customers that drove the development of our Mobile IT platform.
MobileIron Mobile IT Platform provides value to both IT, with a solution platform purposely built for Mobile IT, and end users… MobileIron Mobile IT Platform sits between enterprise resources and end user devices and allows IT to define and enforce policies around Apps, documents and Devices and end users to get what they want: device choice, the enterprise apps and data to get the job done without intermixing with their personal stuff.
The VSP is the core of our platform. Think of it as the brain of the operation, where IT defines the management policies for apps, documents and devices that determines which users get what, when, with what level of security across multiple mobile OSs. Policies can be dynamically changed at run-time without redeployment. At runtime, VSP collects and displays analytics about what happens across users, devices, apps and content. In the back-end, MobileIron platform has a rich set of integration technologies to integrate and leverage existing assets within the enterprise namely email systems, content repositories, identity management, certificates and mobile applications. It also include a rich set of APIs for management automation and integration into the existing IT infrastructure.
On top of the VSP we have three main pillars of functionality: Mobile Device management, Mobile Application management and Mobile Content management Mobile Device Management allows IT to embrace modern devices across any mobile OS and provide secure corporate email, automatic device configuration, cert-based security, select wiping for both corporate and employee-owned usage models. - Click Mobile Apps is really the next stage in enabling the workforce to be productive on their mobile devices. It is how to allow them to carry out core business processes. MobileIron Mobile Application Management provides an end-to-end solution to deliver, provision, secure, wipe, mobile apps. It is not just about building an App Storefront, we go beyond that and cover the full lifecycle of mobile apps, from making it available to the storefront for user self-service, to secure apps on the device enforcing authentication and isolating them from other (personal) apps. This process creates secure communication channels between mobile apps managed by our platform on the device so that critical corporate data never escapes from the secure corporate bubble, to create secure communication channels between the apps on the device and the enterprise back end so that data is protected also in motion, without requiring a device-wise VPN. Click The third Pillar is Mobile Content Management. Here we have three main areas of functionality A – The ability to securely mobilize Sharepoint files so that they can be accessed on the devices and securely stored for offline use. B – We secure email attachments so that they are encrypted and can only be viewed with the secure MobileIron Viewer. Native experience for the end user and DLP for the enterprise C – A secure browser that allows user to access HTML content and applications that sits behind the firewall, again without requiring a full blown VPN client on the device. Ease of use for the end user and security for IT.
Sentry is our secure proxy that sits between enterprise system and the devices and enforces the policy that IT defined in the VSP. It encrypts email and attachments and it create a tunnel so that mobile applications can access enterprise data securely.
Finally, end users get what they want: device choice, with access to their enterprise apps and documents with native user experience and complete separation between enterprise and persona data. The best way to show the value we give to the end-user is to show you the product. <Demo if possible>
DEMO – Screenshots of services provided to the end user Call out: - Mobile@work -> automatic device configuration and Doc@Work Support for native Email Out of the box support for Enterprise AppStore SSO for the apps in our secure corporate bubble
The MobileIron platform can be deployed in our cloud that we call the Connected Cloud where we get you set up in less than 30 minutes, or you can host it on-premise as a physical or virtual appliance and start getting value within the first day. Our Connected Cloud has the highest level of security certification in the industry, and our on-premise solution scales to 100k devices on a single appliance giving you the confidence that we can scale with your business without requiring a big investment in hardware infrastructure.
If we go back to the value for end-users, we believe that the biggest gain for them is to get access to a plethora of applications they need to get their job done. This is why we have been working diligently with a number of developers to enable their applications to be managed by the MobileIron platform. This means that end-users will be able to download these apps from the AppStore just like they usually do and IT has peace of mind knowing that they can set security, authentication, and management policies on these apps via the MobileIron VSP console. These are just some of the apps that are coming to market in Q2 that are AppConnect enabled. <<< This information is subject to change. >>>
The journey starts by securing devices and providing end-users with their first level of productivity – usually access to email and device configuration. This allows IT to respond to business challenges like BYOD, securing ActiveSync, and BlackBerry replacement But the real benefit of Enterprise Mobility comes when IT and end-users embrace the management and delivery of mobile apps and content – When IT can enable what users are asking for – access to their apps and content from their mobile device with a native experience - while preserving the appropriate level of security and management. And then an organization can truly make the pivot towards being a Mobile First enterprise, which we define and when the Mobile Platform becomes the primary IT infrastructure for delivery of applications and content. Now mobile is a catalyst for real business transformation, with new user experiences and new business processes and business models. Its just like the web era where companies began to look at the web as their primary IT platform – we’re in the early stages of mobile, but the transition is occurring rapidly – with the MobileIron Platform, we can help you meet you current requirements, and can partner with you through your mobile journey, to ensure that you are able to quickly realize the full potential of a secure, scalable, integrated Mobile IT infrastructure. Now that you can secure the device, deploy mobile apps and data, you can embrace mobile and your primary platform for your end users.
MobileIron is the right choice to embark in your Mobile IT transformation. We have the most innovative technology but also a big investment in the success of our customers On the technology side we have the best technology: Purpose-built for Mobile IT: Other vendors are backing in from legacy businesses, but MobileIron built its platform from scratch with the right long-term architecture. Best at apps : No one else has an architecture than can support an end-to-end mobile apps platform for secure and fast delivery (Apps@Work and App Delivery Network), data-at-rest security (AppConnect), and data-in-motion security (AppTunnel). Best at security : No one else can stop iOS email attachments from being lost to Dropbox. No one else offers integrated security across email DLP, certificate-based identity, app and doc containerization, BYOD privacy protection, and automated closed-loop compliance. No one else has a consistent security and policy framework across enterprise email, apps, docs, and web data. Architected for scale : No one else has single-system scale of 100,000 devices. Enterprise-class on-premise or in the cloud : No one else has the deep installed base on on-premise enterprise along with a trusted SOC 2 audited cloud service. We have also made a deep investment in customer success: MobileIron expertise goes beyond products and technology, we also invest heavily in best practices and education to make our customers successful. Specific program examples Exceptionally high customer support satisfaction, even with the massive customer growth we are experiencing. MobileIron training and certification programs include MobileIron University to train technical staff at our customers on core technologies and the new features of the roadmap as they are launched Best Practice Toolkits to share information that we have consolidated across customers on how they are approaching particular initiatives. We launched our BYOD toolkit in 2011. It contains sample user agreements, security policies, provisioning flows, user surveys, and implementation plans for BYOD rollouts. In 2012 we launched our Apps and Android toolkits. They are available in our support portal at no charge to customers or our systems integration partners. Our Evaluation Companion site brings together all the content necessary to learn MobileIron, prepare for an evaluation, install, and evaluate the software. These are just some of the tools we’ll use to make you successful.
MobileIron customers are focused on enablement and are transforming their businesses through mobility. >>This is a sample of our customers who have publicly talked about MobileIron. [Each of these logos links to the public story (press, case study or video) about that customer – pick one to describe that is appropriate to your sales situation]
Slide added by Nigel
Creating mobile workstations for employees who are constantly on the move Lidl Mobile Office project: equip district managers with iPads to make position more attractive and simplify the business processes with mobile apps: Streamline routine tasks to make more time for focusing on employee development and driving store performance instead of administrative tasks Apps help the manager check inventory and view retail space plans and layouts, and make decisions about what to stock and when Up-to-date and attractive training material helps district manager to teach his staff Special offers can be implemented quickly in the store Data is presented on a mobile device using an intuitive graphic interface Employee Benefits Reduced burden of paperwork through mobile access to all necessary documents using an internally developed mobile app as well as access to key performance indicators Up-to-date information Logistics, product placement in the shops, sales controlling are heavily optimizes by the mobile Lidl apps Results Time-saving of 17% used for employees, store performance, customers and free time Paper files have nearly disappeared Managers really enjoy using the Lidl Mobile Office – employee retention in hard to fill positions More info can be found here: http://www.mobileiron.com/en/company/press-room/press-releases/352-lidl-manages-ipads-and-mobile-apps-conveniently-and-securely-with-mobileiron