SlideShare a Scribd company logo
SAMSUNG. CLOUD. MANAGEMENT. SECURITY WHY AND WHAT 
MICHAILAS TRAUBAS SAMSUNG ELECTRONICS BALTICS 
B2B SOLUTIONS PRE-SALES
AGENDA 
•MOBILITY IN EUROPE 
•THE PLAN FOR 2014 
•MOBILITY IN THE BALTICS 
•HOW DO WE WORK AND HOW DO WE LIVE? 
•SECURITY AND MOBILITY IN THE CLOUD – SAMSUNG SOLUTIONS
ENTERPRISE MOBILITY IN EUROPE – 2013/14
ENTERPRISE MOBILITY – WHAT IT IS?
ENTERPRISE MOBILITY TODAY 
•A set of solutions, enabling mobile technologies in the organizations 
Mobile device 
Horizontal enablers: 
Email 
Web 
security 
Vertical solutions
MOBILE DEVICES IN EUROPEAN ORGANIZATIONS 
0,0 
20,0 
40,0 
60,0 
80,0 
100,0 
120,0 
2012 
2013 
2014 
2015 
2016 
Millions 
Smartphones 
Featurephones 
Tablets 
Source: Canalys European BYOD Market Landscape Analysis (April 2013)
IT MANAGERS ABOUT MOBILITY REQUIREMENTS 
E-MAIL 
CALENDAR AND CONTACTS 
VPN ACCESS 
IMPROVED DATA SECURITY 
FASTER ACCESS TO CONTENT 
MORE STABLE ACCESS TO CONTENT 
WORKFLOW OPTIMIZATION 
MUST HAVE 
WISH LIST 
Source: KAE Enterprise Mobility ITDMs Research (April 2013) 
VOICE AND TEXT
ENTERPRISE MOBILITY 2014: TRANSITION FROM REQUIREMENTS TO SOLUTIONS 
33% 
33% 
34% 
35% 
36% 
36% 
36% 
37% 
37% 
40% 
40% 
41% 
51% 
MOBILE APPLICATIONS 
IAM SOLUTIONS 
VIRTUAL NETWORKS AND … 
NETWORK BASED SECURITY 
NETWORK MANAGEMENT AND … 
CUSTOM APPLICATION … 
BACKUP FOR VIRTUAL SERVERS 
MOBILITY 
BI/BA/DATA WAREHOUSING 
SMARTPHONES 
DR/BC 
TABLET PCS 
SERVER VIRTUALIZATION 
•36% OF THE COMPANIES PLANNED MOBILITY BROAD INITIATIVES 
•MORE THAN 25% OF RESPONDENTS WERE DOING MOBILE ENDPOINT SECURITY, MOBILE DEVICE MANAGEMENT, MOBILE SECURITY PROJECTS 
•MOBILITY-RELATED PROJECTS MADE 4 OUT OF 14 HIGHEST PROFILE PROJECTS PLANNED 
2014 Priorities Europe. TechTarget/Computer Weekly, 2014
THE BALTIC OUTLOOK
SAMSUNG LIVING BUSINESS 
•RESEARCH COMPLETED IN AUGUST 2014 
•TARGET GROUP: 
•EMPLOYED PEOPLE IN THE AGE FROM 18 TO 65 
•INTERNET USERS 
ESTONIA: 545 RESPONDENTS 
LATVIA: 559 RESPONDENTS 
LITHUANIA: 565 RESPONDENTS
WORK WITHIN PRIVATE LIFE 
EE 
LV 
LT 
66% 
78% 
77%
WORK/LIFE BLEND 
58% 
48% 
43% 
47% 
TRAVELING TO/FROM WORK 
ON HOLIDAYS (FOR EXAMPLE, CHRISTMAS, EASTER) 
IN THE SUPERMARKET 
SPENDING TIME WITH FRIENDS 
45% 
ON A TRIP
HIGHER POSITION = MORE WORK 
84% 
60% 
MANAGERS 
SPECIALISTS 
WORKERS 
53% 
91% 
76% 
71% 
91% 
76% 
67% 
EE 
LV 
LT
PERSONAL TASKS DURING WORK TIME 
EE 
LV 
LT 
88% 
86% 
86% 
INTERNET 
BANKING 
NEWS 
READING 
NEWS 
PERSONAL 
E-MAILS/ 
MESSAGES
SMARTPHONE IS THE WORK/LIFE BLENDER 
78%
ORGANIZATIONS ARE EMBRACING NEW TECHNOLOGIES SLOWER THAN CONSUMERS 
EE 
LV 
LT 
41% 
31% 
32%
ORGANIZATIONS SEEM NOT TO BE READY 
FOR PERSONAL DEVICES 
38% 62% 
Don’t know or there 
is no security policy 
Know security 
policy
SECURITY OFTEN UNDERSTOOD AS RESTRICIONS 
EST 
LV 
LT 
20% 
30% 
30%
PERCEIVED SECURITY 
62% 
61% 
42% 
SMARTPHONE 
PC 
TABLET
MOST COMPANY DATA IS JUST A PASSWORD AWAY 
********* 
44%
SINGLE DEVICE || MULTIPLE USERS 
42% 
somebody else uses devices, which I 
also use for work
EVERY 10TH EMPLOYEE IS A ‘HIRED HACKER’ 
10% 
17% 
17% 
EST 
LV 
LT
KEY FINDINGS
MOBILE WORK – THE NEW REALITY 
~70% OF RESPONDENTS CAN USE THEIR PRIVATE DEVICES FOR WORK 
BYOD HAS COME TO BALTIC STATES
MOBILE WORK – THE NEW REALITY 
~70% OF RESPONDENTS WORK DURING THEIR PERSONAL TIME EVERYDAY 
THE HIGHER THE POSITION AND SALARY – THE MORE WE WORK 
USUALLY THIS IS PROFILE OF THE EMPLOYEE, WORKING WITH SENSITIVE AND CONFIDENTIAL DATA – OUR RISK EXPOSURE GROUP
MOBILE WORK – THE NEW REALITY 
45% OF RESPONDENTS STATE, THAT THEY ARE SHARING THEIR DEVICES, USED FOR WORK 
ARE WE SECURED FROM UNSANCTIONED DATA ACCESS?
SECURITY BASICS 
• 62% OF EMPLOYEES DON’T KNOW THE 
SECURITY POLICY OR THERE IS NO 
SECURITY POLICY AT ALL 
• AND HOW MANY % ARE COMPLYING 
WITH THE SECURITY POLICY?
MAJOR THREAT VECTORS 
•STOLEN, LOST OR REPLACED DEVICE 
•DE FACTO REMOTE DATA STORAGE 
•FREE APPLICATIONS AND “INTERESTING” WEB PAGES 
•MALWARE ON THE DEVICE 
•UNSANCTIONED ACCESS 
•UNCONTROLLED NETWORK ACCESS
SAMSUNG SOLUTIONS FOR ENTERPRISE MOBILITY
2013
2014
MOBILE DEVICE MANAGEMENT 
•KNOX EMM – SAMSUNG ENTERPRISE MOBILITY MANAGEMENT SOLUTION 
•USER, DEVICE AND APPLICATION MANAGEMENT 
•INTEGRATION WITH ACTIVEDIRECTORY -> BY UTILIZING AD MANAGEMENT TOOLS 
•ANDROID AND iOS DEVICES SUPPORTED
DEVICE MANAGEMENT IN THE CLOUD 
KNOX EMM CLOUD PROXY SERVER 
FIREWALL 
ADMIN PORTAL 
USER PORTAL
SAMSUNG KNOX EMM KEY USE CASES 
•Provision 
•Monitor 
•Manage 
•Secure
[1] DEVICE ASSIGNMENT AND INVENTORY 
•ASSIGN DEVICE TO THE USER 
•COLLECT DEVICE INVENTORY DATA AND STATUS INFORMATION 
•BYTES SENT/RECEIVED 
•CREATE WIFI PROFILES
[2] ENFORCE SECURITY “BASICS” 
•REQUIRE USING SCREEN PASSWORD OF CERTAIN COMPLEXITY 
•RESET PASSWORD OR FORCE PASSWORD CHANGE 
•TURN ON DEVICE ENCRYPTION 
•LOCK DEVICES AND WIPE DEVICE DATA FROM ADMIN CONSOLE 
*********
[3] APPLICATION MANAGEMENT 
•CENTRALIZED APP DISTRIBUTION IN ANDROID AND IOS 
•REMOTE DEPLOYMENT OF APPLICATIONS TO SELECTED USERS AND USER GROUPS 
•AUTOMATICALLY UPDATE APPS
[4*] SECURE NETWORK AND DATA 
•CREATE WIFI PROFILES 
•MANAGE WIFI SETTINGS 
•CREATE VPN PROFILES 
•MANAGE VPN SETTINGS
[5*] MANAGE MOBILE WORKPLACE 
•APPLICATION MANAGEMENT 
•FIREWALL MANAGEMENT 
•ENCRYPT MICROSD 
•CONFIGURE MICROSOFT EXCHANGE AND IMAP/POP EMAIL PROFILES
[6*] DEVICE SETUP 
•CONFIGURE DEVICE SETTINGS REMOTELY, FOCUS ON SECURITY 
•PREVENT 3RD PARTY APP INSTALLATION 
•STOP WIFI TETHERING 
•DISABLE USB STORAGE AND MICROSD 
•DISABLE FACTORY RESET 
•PREVENT CHANGING SETTINGS 
•SET ROAMING RULES 
•MANAGE BLUETOOTH
[7*] DEDICATED DEVICES 
•KIOSK-MODE DEVICES = SINGLE-PURPOSE DEVICES
DATA SECURITY
DATA SECURITY 
•KNOX WORKSPACE – CORPORATE DATA SECURITY SOLUTION 
•YOUR SOLUTION FOR PRIVATE DEVICE USAGE AND DEVICE SHARING CHALLENGES
THE MOST SECURE SOLUTION FOR ANDROID 
DISA MOS SRG Compliance 
FIPS 140-2 Certification 
Common Criteria Certification 
CESG End User Devices Security Guidance 
DISA MOS SRG Compliance 
CESG End User Devices Security Guidance 
Australian Signals Directorate
KNOX WORKSPACE – WHAT IS IT? 
PRIVATE ENVIRONMENT 
CORPORATE ENVIRONMENT
3 KEY FEATURES 
•SECURE PLATFORM 
•APPLICATION SECURITY 
•MOBILE DEVICE MANAGEMENT
SECURE PLATFORM 
ARM TrustZone Hardware 
Trusted Boot / Secure Boot 
TIMA 
SE for Android 
SE for Android Management Service 
KNOXTM Android Framework 
KNOXTM Workspace
PLATFORM SECURITY: ARM TRUSTZONE® 
•KNOX USES ARM TRUSTZONE® HARDWARE THAT ENABLES HARDWARE ENFORCED ISOLATION. 
•ARM CORTEX-A PROCESSOR LINEUP REQUIRED
PLATFORM SECURITY: TRUSTED BOOT
PLATFORM SECURITY: SE FOR ANDROID 
•SE FOR ANDROID CAN ISOLATE ATTACKS, HOWEVER, IT RELIES ON THE OS KERNEL INTEGRITY
TIMA REAL-TIME KERNEL PROTECTION 
•INTERCEPTS CRITICAL EVENTS HAPPENING INSIDE THE KERNEL, WHICH ARE INSPECTED IN TRUSTZONE.
PLATFORM SECURITY: TIMA REAL-TIME PROTECTION
PLATFORM SECURITY: TIMA PERIODIC PROTECTION
KEY FEATURES OF KNOX WORKSPACE 
PRIVATE ENVIRONMENT 
CORPORATE ENVIRONMENT
DATA PROTECTION 
PRIVATE ENVIRONMENT 
CORPORATE ENVIRONMENT 
•AUTOENFORCED DATA ENCRYPTION 
•AREA INACCESSIBLE BY THE ROOT
SAME BUT DIFFERENT APPS 
ASMENINĖ ERDVĖ 
•ISOLATED APPS WITHIN CONTAINER 
•MANAGED USAGE OF CUSTOM APPS, GOOGLE PLAY AND APPS FROM PRIVATE ENVIRONMENT
CONTROLLED DATA EXCHANGE 
ASMENINĖ ERDVĖ 
•DATA EXCHANGE BETWEEN PRIVATE AND CORPORATE ENVIRONMENT FULLY MANAGED BY ADMINISTRATOR
RESTRICTED WORKING ENVIRONMENT 
ASMENINĖ ERDVĖ 
•APPLICATION RULES 
•FIREWALL 
•SETTINGS MANAGEMENT 
•MAIL ACCOUNT RESTRICTIONS
SECURING DATA IN-TRANSIT: VPN 
•GRANULAR VPN CONTROL 
•DEVICE-LEVEL VPN 
•CONTAINER-LEVEL VPN SETTINGS 
•PER-APPLICATION VPN INSIDE CONTAINER
MANAGEMENT VIA MDM
KNOX WORKSPACE AVAILABILITY 
S5, S5 MINI S4, S4 MINI NOTE 4, NOTE 3, NOTE 3 NEO GALAXY ACE 4 
TAB S 
TAB 4 
TAB 4 ACTIVE 
NOTE 10.1 2014 EDITION 
TAB PRO 
NOTE PRO
DEVICE FOR LIVING BUSINESS
SHOCK RESISTANCE 
IP67 
WATER AND DUST RESISTANCE 
LONG BATTERY LIFE 
+ 60°C 
- 20°C 
WORK IN COLD AND HEAT 
DISPLAY FOR BUSINESS NEEDS
SECURITY 
SIZE AND WEIGHT 
NFC AND BARCODE 
PEN 
SPECIAL 3RD YEAR WARRANTY
BY

More Related Content

What's hot

Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile Slides
Regan McCarthy
 
SFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy FarmSFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy Farm
South Tyrol Free Software Conference
 
Designing Calm Technology
Designing Calm TechnologyDesigning Calm Technology
Designing Calm Technology
Amber Case
 

What's hot (20)

Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile Slides
 
Hidden Cameras
Hidden CamerasHidden Cameras
Hidden Cameras
 
Supporting Elderly Independent Living with IOT devices
Supporting Elderly Independent Living with IOT devicesSupporting Elderly Independent Living with IOT devices
Supporting Elderly Independent Living with IOT devices
 
“Seamless and Batteryless” Creating an Internet of Everything
“Seamless and Batteryless” Creating an Internet of Everything“Seamless and Batteryless” Creating an Internet of Everything
“Seamless and Batteryless” Creating an Internet of Everything
 
IEEE TELEMATICS PROJECT TITLE 2015-16
IEEE TELEMATICS PROJECT TITLE 2015-16IEEE TELEMATICS PROJECT TITLE 2015-16
IEEE TELEMATICS PROJECT TITLE 2015-16
 
SFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy FarmSFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy Farm
 
IoT Trust by Design: Lessons Learned in Wearables and Smart Home Products
IoT Trust by Design: Lessons Learned in Wearables and Smart Home ProductsIoT Trust by Design: Lessons Learned in Wearables and Smart Home Products
IoT Trust by Design: Lessons Learned in Wearables and Smart Home Products
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
 
Se cloud presentations
Se cloud presentationsSe cloud presentations
Se cloud presentations
 
M phasis
M phasis M phasis
M phasis
 
Survivor Watch Brochure
Survivor Watch BrochureSurvivor Watch Brochure
Survivor Watch Brochure
 
Ekahau General Short Deck 2009
Ekahau General Short Deck 2009Ekahau General Short Deck 2009
Ekahau General Short Deck 2009
 
Mobile (in)security ?
Mobile (in)security ?Mobile (in)security ?
Mobile (in)security ?
 
Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14
 
Iot
IotIot
Iot
 
Rocky Mountain Region 11 - Getting Smart About Smart Homes
Rocky Mountain Region 11 - Getting Smart About Smart HomesRocky Mountain Region 11 - Getting Smart About Smart Homes
Rocky Mountain Region 11 - Getting Smart About Smart Homes
 
easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
Designing Calm Technology
Designing Calm TechnologyDesigning Calm Technology
Designing Calm Technology
 

Similar to Primend praktiline konverents - Samsung Cloud. Management. Security

Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testing
mobiangle
 

Similar to Primend praktiline konverents - Samsung Cloud. Management. Security (20)

Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Fog computing
Fog computingFog computing
Fog computing
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
 
Enable your networks to support enterprise mobility
Enable your networks to support enterprise mobilityEnable your networks to support enterprise mobility
Enable your networks to support enterprise mobility
 
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testing
 

More from Primend

More from Primend (20)

Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
Ärikonverents - Eelarvestamise väljakutsed kiiresti arenevas ettevõttes – kui...
 
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
Business Breakfast - Ave Piik esitlus: Kuidas viia ettevõte kooskõlla uue isi...
 
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
Business Breakfast - Kuidas viia ettevõte kooskõlla uue isikuandmekaitse määr...
 
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turulÄrikonverents - Konkurentsivõimeline tegutsemine muutuval turul
Ärikonverents - Konkurentsivõimeline tegutsemine muutuval turul
 
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
Ärikonverents - Kolm aastat turul, kolm aastat turuliider – kuidas?
 
Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...Ärikonverents - Vision for effective internal communication – expectations of...
Ärikonverents - Vision for effective internal communication – expectations of...
 
Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas Ärikonverents - Analüütika infoväljas
Ärikonverents - Analüütika infoväljas
 
Ärikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemusedÄrikonverents - Inspiratsioon ja tulemused
Ärikonverents - Inspiratsioon ja tulemused
 
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
Praktiline Pilvekonverents - Pilvenägemus: kas pilveserveril on tulevikku?
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas? Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
Praktiline Pilvekonverents - Kliendilugu: Lihtsus ja kiirus 29 riigis – kuidas?
 
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
Praktiline Pilvekonverents - Äilahendus Azureis kümme korda odavamalt
 
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
Praktiline Pilvekonverents - Siseveeb – kellele ja kuidas?
 
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseksPraktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
Praktiline Pilvekonverents - Viis sammu krüptoviirusega võitlemiseks
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016
 
Morning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudisedMorning Coffee - Office 365 uudised
Morning Coffee - Office 365 uudised
 
Power BI -The Missing Piece
Power BI -The Missing PiecePower BI -The Missing Piece
Power BI -The Missing Piece
 
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
Morning Coffee - Krüptoviirus; kuidas ettevõtet kaitsta?
 
Primend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduksPrimend Ärikonverents - Viis äppi äri eduks
Primend Ärikonverents - Viis äppi äri eduks
 
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
Primend Ärikonverents - Eelarve 2017 – Kuidas andmete ja Exceliga eelarvestam...
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 

Primend praktiline konverents - Samsung Cloud. Management. Security

  • 1.
  • 2. SAMSUNG. CLOUD. MANAGEMENT. SECURITY WHY AND WHAT MICHAILAS TRAUBAS SAMSUNG ELECTRONICS BALTICS B2B SOLUTIONS PRE-SALES
  • 3. AGENDA •MOBILITY IN EUROPE •THE PLAN FOR 2014 •MOBILITY IN THE BALTICS •HOW DO WE WORK AND HOW DO WE LIVE? •SECURITY AND MOBILITY IN THE CLOUD – SAMSUNG SOLUTIONS
  • 4. ENTERPRISE MOBILITY IN EUROPE – 2013/14
  • 6. ENTERPRISE MOBILITY TODAY •A set of solutions, enabling mobile technologies in the organizations Mobile device Horizontal enablers: Email Web security Vertical solutions
  • 7. MOBILE DEVICES IN EUROPEAN ORGANIZATIONS 0,0 20,0 40,0 60,0 80,0 100,0 120,0 2012 2013 2014 2015 2016 Millions Smartphones Featurephones Tablets Source: Canalys European BYOD Market Landscape Analysis (April 2013)
  • 8. IT MANAGERS ABOUT MOBILITY REQUIREMENTS E-MAIL CALENDAR AND CONTACTS VPN ACCESS IMPROVED DATA SECURITY FASTER ACCESS TO CONTENT MORE STABLE ACCESS TO CONTENT WORKFLOW OPTIMIZATION MUST HAVE WISH LIST Source: KAE Enterprise Mobility ITDMs Research (April 2013) VOICE AND TEXT
  • 9. ENTERPRISE MOBILITY 2014: TRANSITION FROM REQUIREMENTS TO SOLUTIONS 33% 33% 34% 35% 36% 36% 36% 37% 37% 40% 40% 41% 51% MOBILE APPLICATIONS IAM SOLUTIONS VIRTUAL NETWORKS AND … NETWORK BASED SECURITY NETWORK MANAGEMENT AND … CUSTOM APPLICATION … BACKUP FOR VIRTUAL SERVERS MOBILITY BI/BA/DATA WAREHOUSING SMARTPHONES DR/BC TABLET PCS SERVER VIRTUALIZATION •36% OF THE COMPANIES PLANNED MOBILITY BROAD INITIATIVES •MORE THAN 25% OF RESPONDENTS WERE DOING MOBILE ENDPOINT SECURITY, MOBILE DEVICE MANAGEMENT, MOBILE SECURITY PROJECTS •MOBILITY-RELATED PROJECTS MADE 4 OUT OF 14 HIGHEST PROFILE PROJECTS PLANNED 2014 Priorities Europe. TechTarget/Computer Weekly, 2014
  • 11. SAMSUNG LIVING BUSINESS •RESEARCH COMPLETED IN AUGUST 2014 •TARGET GROUP: •EMPLOYED PEOPLE IN THE AGE FROM 18 TO 65 •INTERNET USERS ESTONIA: 545 RESPONDENTS LATVIA: 559 RESPONDENTS LITHUANIA: 565 RESPONDENTS
  • 12. WORK WITHIN PRIVATE LIFE EE LV LT 66% 78% 77%
  • 13. WORK/LIFE BLEND 58% 48% 43% 47% TRAVELING TO/FROM WORK ON HOLIDAYS (FOR EXAMPLE, CHRISTMAS, EASTER) IN THE SUPERMARKET SPENDING TIME WITH FRIENDS 45% ON A TRIP
  • 14. HIGHER POSITION = MORE WORK 84% 60% MANAGERS SPECIALISTS WORKERS 53% 91% 76% 71% 91% 76% 67% EE LV LT
  • 15. PERSONAL TASKS DURING WORK TIME EE LV LT 88% 86% 86% INTERNET BANKING NEWS READING NEWS PERSONAL E-MAILS/ MESSAGES
  • 16. SMARTPHONE IS THE WORK/LIFE BLENDER 78%
  • 17. ORGANIZATIONS ARE EMBRACING NEW TECHNOLOGIES SLOWER THAN CONSUMERS EE LV LT 41% 31% 32%
  • 18. ORGANIZATIONS SEEM NOT TO BE READY FOR PERSONAL DEVICES 38% 62% Don’t know or there is no security policy Know security policy
  • 19. SECURITY OFTEN UNDERSTOOD AS RESTRICIONS EST LV LT 20% 30% 30%
  • 20. PERCEIVED SECURITY 62% 61% 42% SMARTPHONE PC TABLET
  • 21. MOST COMPANY DATA IS JUST A PASSWORD AWAY ********* 44%
  • 22. SINGLE DEVICE || MULTIPLE USERS 42% somebody else uses devices, which I also use for work
  • 23. EVERY 10TH EMPLOYEE IS A ‘HIRED HACKER’ 10% 17% 17% EST LV LT
  • 25. MOBILE WORK – THE NEW REALITY ~70% OF RESPONDENTS CAN USE THEIR PRIVATE DEVICES FOR WORK BYOD HAS COME TO BALTIC STATES
  • 26. MOBILE WORK – THE NEW REALITY ~70% OF RESPONDENTS WORK DURING THEIR PERSONAL TIME EVERYDAY THE HIGHER THE POSITION AND SALARY – THE MORE WE WORK USUALLY THIS IS PROFILE OF THE EMPLOYEE, WORKING WITH SENSITIVE AND CONFIDENTIAL DATA – OUR RISK EXPOSURE GROUP
  • 27. MOBILE WORK – THE NEW REALITY 45% OF RESPONDENTS STATE, THAT THEY ARE SHARING THEIR DEVICES, USED FOR WORK ARE WE SECURED FROM UNSANCTIONED DATA ACCESS?
  • 28. SECURITY BASICS • 62% OF EMPLOYEES DON’T KNOW THE SECURITY POLICY OR THERE IS NO SECURITY POLICY AT ALL • AND HOW MANY % ARE COMPLYING WITH THE SECURITY POLICY?
  • 29. MAJOR THREAT VECTORS •STOLEN, LOST OR REPLACED DEVICE •DE FACTO REMOTE DATA STORAGE •FREE APPLICATIONS AND “INTERESTING” WEB PAGES •MALWARE ON THE DEVICE •UNSANCTIONED ACCESS •UNCONTROLLED NETWORK ACCESS
  • 30. SAMSUNG SOLUTIONS FOR ENTERPRISE MOBILITY
  • 31. 2013
  • 32. 2014
  • 33. MOBILE DEVICE MANAGEMENT •KNOX EMM – SAMSUNG ENTERPRISE MOBILITY MANAGEMENT SOLUTION •USER, DEVICE AND APPLICATION MANAGEMENT •INTEGRATION WITH ACTIVEDIRECTORY -> BY UTILIZING AD MANAGEMENT TOOLS •ANDROID AND iOS DEVICES SUPPORTED
  • 34. DEVICE MANAGEMENT IN THE CLOUD KNOX EMM CLOUD PROXY SERVER FIREWALL ADMIN PORTAL USER PORTAL
  • 35. SAMSUNG KNOX EMM KEY USE CASES •Provision •Monitor •Manage •Secure
  • 36. [1] DEVICE ASSIGNMENT AND INVENTORY •ASSIGN DEVICE TO THE USER •COLLECT DEVICE INVENTORY DATA AND STATUS INFORMATION •BYTES SENT/RECEIVED •CREATE WIFI PROFILES
  • 37. [2] ENFORCE SECURITY “BASICS” •REQUIRE USING SCREEN PASSWORD OF CERTAIN COMPLEXITY •RESET PASSWORD OR FORCE PASSWORD CHANGE •TURN ON DEVICE ENCRYPTION •LOCK DEVICES AND WIPE DEVICE DATA FROM ADMIN CONSOLE *********
  • 38. [3] APPLICATION MANAGEMENT •CENTRALIZED APP DISTRIBUTION IN ANDROID AND IOS •REMOTE DEPLOYMENT OF APPLICATIONS TO SELECTED USERS AND USER GROUPS •AUTOMATICALLY UPDATE APPS
  • 39. [4*] SECURE NETWORK AND DATA •CREATE WIFI PROFILES •MANAGE WIFI SETTINGS •CREATE VPN PROFILES •MANAGE VPN SETTINGS
  • 40. [5*] MANAGE MOBILE WORKPLACE •APPLICATION MANAGEMENT •FIREWALL MANAGEMENT •ENCRYPT MICROSD •CONFIGURE MICROSOFT EXCHANGE AND IMAP/POP EMAIL PROFILES
  • 41. [6*] DEVICE SETUP •CONFIGURE DEVICE SETTINGS REMOTELY, FOCUS ON SECURITY •PREVENT 3RD PARTY APP INSTALLATION •STOP WIFI TETHERING •DISABLE USB STORAGE AND MICROSD •DISABLE FACTORY RESET •PREVENT CHANGING SETTINGS •SET ROAMING RULES •MANAGE BLUETOOTH
  • 42. [7*] DEDICATED DEVICES •KIOSK-MODE DEVICES = SINGLE-PURPOSE DEVICES
  • 44. DATA SECURITY •KNOX WORKSPACE – CORPORATE DATA SECURITY SOLUTION •YOUR SOLUTION FOR PRIVATE DEVICE USAGE AND DEVICE SHARING CHALLENGES
  • 45. THE MOST SECURE SOLUTION FOR ANDROID DISA MOS SRG Compliance FIPS 140-2 Certification Common Criteria Certification CESG End User Devices Security Guidance DISA MOS SRG Compliance CESG End User Devices Security Guidance Australian Signals Directorate
  • 46. KNOX WORKSPACE – WHAT IS IT? PRIVATE ENVIRONMENT CORPORATE ENVIRONMENT
  • 47. 3 KEY FEATURES •SECURE PLATFORM •APPLICATION SECURITY •MOBILE DEVICE MANAGEMENT
  • 48. SECURE PLATFORM ARM TrustZone Hardware Trusted Boot / Secure Boot TIMA SE for Android SE for Android Management Service KNOXTM Android Framework KNOXTM Workspace
  • 49. PLATFORM SECURITY: ARM TRUSTZONE® •KNOX USES ARM TRUSTZONE® HARDWARE THAT ENABLES HARDWARE ENFORCED ISOLATION. •ARM CORTEX-A PROCESSOR LINEUP REQUIRED
  • 51. PLATFORM SECURITY: SE FOR ANDROID •SE FOR ANDROID CAN ISOLATE ATTACKS, HOWEVER, IT RELIES ON THE OS KERNEL INTEGRITY
  • 52. TIMA REAL-TIME KERNEL PROTECTION •INTERCEPTS CRITICAL EVENTS HAPPENING INSIDE THE KERNEL, WHICH ARE INSPECTED IN TRUSTZONE.
  • 53. PLATFORM SECURITY: TIMA REAL-TIME PROTECTION
  • 54. PLATFORM SECURITY: TIMA PERIODIC PROTECTION
  • 55. KEY FEATURES OF KNOX WORKSPACE PRIVATE ENVIRONMENT CORPORATE ENVIRONMENT
  • 56. DATA PROTECTION PRIVATE ENVIRONMENT CORPORATE ENVIRONMENT •AUTOENFORCED DATA ENCRYPTION •AREA INACCESSIBLE BY THE ROOT
  • 57. SAME BUT DIFFERENT APPS ASMENINĖ ERDVĖ •ISOLATED APPS WITHIN CONTAINER •MANAGED USAGE OF CUSTOM APPS, GOOGLE PLAY AND APPS FROM PRIVATE ENVIRONMENT
  • 58. CONTROLLED DATA EXCHANGE ASMENINĖ ERDVĖ •DATA EXCHANGE BETWEEN PRIVATE AND CORPORATE ENVIRONMENT FULLY MANAGED BY ADMINISTRATOR
  • 59. RESTRICTED WORKING ENVIRONMENT ASMENINĖ ERDVĖ •APPLICATION RULES •FIREWALL •SETTINGS MANAGEMENT •MAIL ACCOUNT RESTRICTIONS
  • 60. SECURING DATA IN-TRANSIT: VPN •GRANULAR VPN CONTROL •DEVICE-LEVEL VPN •CONTAINER-LEVEL VPN SETTINGS •PER-APPLICATION VPN INSIDE CONTAINER
  • 62. KNOX WORKSPACE AVAILABILITY S5, S5 MINI S4, S4 MINI NOTE 4, NOTE 3, NOTE 3 NEO GALAXY ACE 4 TAB S TAB 4 TAB 4 ACTIVE NOTE 10.1 2014 EDITION TAB PRO NOTE PRO
  • 63. DEVICE FOR LIVING BUSINESS
  • 64. SHOCK RESISTANCE IP67 WATER AND DUST RESISTANCE LONG BATTERY LIFE + 60°C - 20°C WORK IN COLD AND HEAT DISPLAY FOR BUSINESS NEEDS
  • 65. SECURITY SIZE AND WEIGHT NFC AND BARCODE PEN SPECIAL 3RD YEAR WARRANTY
  • 66. BY