SlideShare a Scribd company logo
Security Threats &
Breaches: Keeping your
Mobile Devices Secure
Here’s what we’ll cover today:
   Welcome & Introduction
   The reality of security breaches AND increasing
    mobility
   Solution overview: Using ZENworks to keep you
    out of the headlines

      Extending Network Security
      Reporting features                Demo
      Ease of Management

   Questions, Discussion & Next Steps
Novell Platinum Partner
            Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina


   Collaboration, Conferencing & Messaging
   Converged IP networking & telephony
   Network Resource Management solutions
   Wireless & Mobile Workforce solutions
   Data Storage, Archiving & Disaster Recovery
   Network Support & Optimization
   Virtualization
   Data Security
   Managed Services
   Training
The Reality of Today’s Security Breaches
Cherry Hill, NJ – October 8, 2012
2 data backup tapes were lost during shipping in late March 2012. The tapes
included customer names, Social Security numbers, addresses, account
numbers, debit card numbers, and credit card numbers.


                                                    Marysville, TN – October 18,
                                                    2012
                                                    A password-protected laptop was
                                                    stolen from an employee's home on
                                                    August 25. It contained two groups of
                                                    patient data. Patient names, dates of
                                                    birth, responsible party names, patient
Scottsdale, AZ – October 19, 2012                   addresses, physician names, and
A vendor working with patient data for digital      billing information for 22,000 patients
conversion from lost a flash drive on or around     were on the laptop. An additional 5,000
July 16. It contained patient names, Social         patients had similar information
Security numbers, dates of birth, addresses,        exposed as well as their Social
telephone numbers, account numbers, diagnoses,      Security numbers and other non-
and other protected health information.             medical information.
SECURING YOUR MOBILE
DATA WITH ZENWORKS
Solutions to help you avoid the headlines
The ZENworks Family: Windows, Mac & Mobile Endpoints


                        Windows, Mac & Mobile Configuration
                                  Management
                                                              Patch Management
      Asset
    Management




     Application                                       End Point Security
    Virtualization                                       Management




                     Service Desk         Full Disk Encryption
Are you just as locked out of your own
devices as any hacker?
Why ZENworks Full
 Disk Encryption?
Centralized Management

One Console. One Agent. One Tool for all your endpoint management
                             tasks




ZENworks also does configuration, patch, asset & endpoint security
                         management
Fully Featured
From a single
console, ZENworks
lets you manage          Manage access, with support for pre-boot auth
your enterprise
remotely:
down the hall, down
the street, across the
country, or around the   Turn encryption on/off
world



                         Troubleshoot passwords



                         Manage hardware & software encryption


Deploy encryption
software across the      Generate reports
enterprise at the push   demonstrating encryption
of a button
Rapid Deployment
Pre-Boot Authentication
Ease of Management
Service Desk Friendly
Control the story


 Know you’re safe.

 Prove you’re safe.




15   © Novell, Inc. All rights reserved.
NEXT STEPS
ALI Consulting & Deployment Services
Highly experienced advisors with diverse & practical technical experience


                                         • Proactive strategy
                                         • Clear roadmap for deployment
                                         • Value driven project analysis
                                         • Limits burden on existing staff
                                         • Saves IT budget
                                         • Speeds time to deployment
               Project &
Consultative                             • Priority access to Novell as
               Resource    Deployment
Assessment
               Planning                    needed
                                         • Option for lab testing
Special Incentives for Webinar Attendees
Act within next 60 days to receive:
   Special product discounts available
   Special rates for project-based ALI services



                                       Call Cindy for more details!
Upcoming Webinar Topics
November 8:        Disaster Recovery & Business
                        Continuity for SMB
 Organizations

In this second webinar in our virtualization series, we'll be
showing some disaster recovery options from VMware that
make business continuity so simple and affordable that no
organization has to continue to take the risk of being
unprepared.

Registration link coming in the follow up email or register
from our event listing at www.ali-inc.com
Questions & Discussion
                                 Cindy DeHart
                                 Practice Manager
                                 cindy@ali-inc.com
                                 540.443.3392

                                Neil Kimberley
                                Sales Engineer
                                nkimberley@novell.com




Sophia Germanides
Novell Account Executive
Sophia.Germanides@novell.com

More Related Content

What's hot

Linkedin profile resume
Linkedin profile resumeLinkedin profile resume
Linkedin profile resume
jmack232
 
Actian/Ingres database
Actian/Ingres database Actian/Ingres database
Actian/Ingres database
Actian Corporation
 
Its Quick Overview (Itms)
Its Quick Overview (Itms)Its Quick Overview (Itms)
Its Quick Overview (Itms)
michellesynergyze
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
bpaternoster
 
Jason Leske 2017
Jason Leske 2017Jason Leske 2017
Jason Leske 2017
Jason Leske
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overview
dfeldbaum
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
comania
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
Flaskdata.io
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
CloudTechnology
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009
Alexis Brown
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
Ron Nath Mukherjee
 
Eezi sign WEB
Eezi sign WEBEezi sign WEB
Eezi sign WEB
Incognate Limited
 
Vdi Wp
Vdi WpVdi Wp
Vdi Wp
ConRes
 
W8 client management
W8 client managementW8 client management
W8 client management
Jaroslav Karlik
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
Intel IT Center
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
Clear Technologies
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
SHC
 
WA Technologies Company Profile
WA Technologies Company ProfileWA Technologies Company Profile
WA Technologies Company Profile
Maryan Gallagher
 

What's hot (19)

Linkedin profile resume
Linkedin profile resumeLinkedin profile resume
Linkedin profile resume
 
Actian/Ingres database
Actian/Ingres database Actian/Ingres database
Actian/Ingres database
 
Its Quick Overview (Itms)
Its Quick Overview (Itms)Its Quick Overview (Itms)
Its Quick Overview (Itms)
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
Jason Leske 2017
Jason Leske 2017Jason Leske 2017
Jason Leske 2017
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overview
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Eezi sign WEB
Eezi sign WEBEezi sign WEB
Eezi sign WEB
 
Vdi Wp
Vdi WpVdi Wp
Vdi Wp
 
W8 client management
W8 client managementW8 client management
W8 client management
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
WA Technologies Company Profile
WA Technologies Company ProfileWA Technologies Company Profile
WA Technologies Company Profile
 

Viewers also liked

BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
Mike Brannon
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
Resilient Systems
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Rahul Neel Mani
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Ben Quirk
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
Kaseya
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threats
RingtoIndia
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worth
Eversheds Sutherland
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
Fabio Pietrosanti
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
Eversheds Sutherland
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
NowSecure
 
ФМИ Python: Agile & Friends
ФМИ Python: Agile & FriendsФМИ Python: Agile & Friends
ФМИ Python: Agile & Friends
Stefan Kanev
 
How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)
Sean Si
 
How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)
Sean Si
 
Apac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain TimesApac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain Times
Michel Van Woudenberg
 
De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010
Joop Koppen
 
Outbound Links (Public)
Outbound Links (Public)Outbound Links (Public)
Outbound Links (Public)
Sean Si
 
URL Slugs (Public)
URL Slugs (Public)URL Slugs (Public)
URL Slugs (Public)
Sean Si
 
Delen
DelenDelen
10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity
Miles Austin
 

Viewers also liked (20)

BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threats
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worth
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
ФМИ Python: Agile & Friends
ФМИ Python: Agile & FriendsФМИ Python: Agile & Friends
ФМИ Python: Agile & Friends
 
How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)
 
How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)
 
Internetblindheid Kurt Beheydt Iprospect
Internetblindheid   Kurt Beheydt  IprospectInternetblindheid   Kurt Beheydt  Iprospect
Internetblindheid Kurt Beheydt Iprospect
 
Apac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain TimesApac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain Times
 
De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010
 
Outbound Links (Public)
Outbound Links (Public)Outbound Links (Public)
Outbound Links (Public)
 
URL Slugs (Public)
URL Slugs (Public)URL Slugs (Public)
URL Slugs (Public)
 
Delen
DelenDelen
Delen
 
10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity
 

Similar to Security Threats & Breaches with Mobile Devices

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
Motty Ben Atia
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
Dell World
 
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDon't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Datapipe
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Kenneth de Brucq
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
RES
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
Rakesh Kumar
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
Lori McInnes
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Novell
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
UL Transaction Security
 
Vdi overview
Vdi overviewVdi overview
Vdi overview
Isa Pangestu
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
Logicalis Australia
 
Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created Equal
Chris_Robilliard
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
Dell EMC World
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
Gabe Schurman
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 

Similar to Security Threats & Breaches with Mobile Devices (20)

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDon't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Vdi overview
Vdi overviewVdi overview
Vdi overview
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created Equal
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 

More from Advanced Logic Industries

New Challenges in Email & Communications Archiving
New Challenges in Email & Communications ArchivingNew Challenges in Email & Communications Archiving
New Challenges in Email & Communications Archiving
Advanced Logic Industries
 
Making Work from Home (Really) Work
Making Work from Home (Really) WorkMaking Work from Home (Really) Work
Making Work from Home (Really) Work
Advanced Logic Industries
 
5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW
Advanced Logic Industries
 
FILR Demo
FILR DemoFILR Demo
Dickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD FutureDickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD Future
Advanced Logic Industries
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
Advanced Logic Industries
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Advanced Logic Industries
 
Streamline it & save with virtualization
Streamline it & save with virtualizationStreamline it & save with virtualization
Streamline it & save with virtualization
Advanced Logic Industries
 
Webinar: Mobile Device Management
Webinar: Mobile Device ManagementWebinar: Mobile Device Management
Webinar: Mobile Device Management
Advanced Logic Industries
 
Mobile device management
Mobile device management Mobile device management
Mobile device management
Advanced Logic Industries
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with Platespin
Advanced Logic Industries
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManager
Advanced Logic Industries
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
Advanced Logic Industries
 
Virtualization 101 for Everyone
Virtualization 101 for EveryoneVirtualization 101 for Everyone
Virtualization 101 for Everyone
Advanced Logic Industries
 

More from Advanced Logic Industries (14)

New Challenges in Email & Communications Archiving
New Challenges in Email & Communications ArchivingNew Challenges in Email & Communications Archiving
New Challenges in Email & Communications Archiving
 
Making Work from Home (Really) Work
Making Work from Home (Really) WorkMaking Work from Home (Really) Work
Making Work from Home (Really) Work
 
5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Dickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD FutureDickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD Future
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
 
Streamline it & save with virtualization
Streamline it & save with virtualizationStreamline it & save with virtualization
Streamline it & save with virtualization
 
Webinar: Mobile Device Management
Webinar: Mobile Device ManagementWebinar: Mobile Device Management
Webinar: Mobile Device Management
 
Mobile device management
Mobile device management Mobile device management
Mobile device management
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with Platespin
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManager
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
 
Virtualization 101 for Everyone
Virtualization 101 for EveryoneVirtualization 101 for Everyone
Virtualization 101 for Everyone
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Security Threats & Breaches with Mobile Devices

  • 1. Security Threats & Breaches: Keeping your Mobile Devices Secure
  • 2. Here’s what we’ll cover today:  Welcome & Introduction  The reality of security breaches AND increasing mobility  Solution overview: Using ZENworks to keep you out of the headlines  Extending Network Security  Reporting features Demo  Ease of Management  Questions, Discussion & Next Steps
  • 3. Novell Platinum Partner Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina  Collaboration, Conferencing & Messaging  Converged IP networking & telephony  Network Resource Management solutions  Wireless & Mobile Workforce solutions  Data Storage, Archiving & Disaster Recovery  Network Support & Optimization  Virtualization  Data Security  Managed Services  Training
  • 4. The Reality of Today’s Security Breaches Cherry Hill, NJ – October 8, 2012 2 data backup tapes were lost during shipping in late March 2012. The tapes included customer names, Social Security numbers, addresses, account numbers, debit card numbers, and credit card numbers. Marysville, TN – October 18, 2012 A password-protected laptop was stolen from an employee's home on August 25. It contained two groups of patient data. Patient names, dates of birth, responsible party names, patient Scottsdale, AZ – October 19, 2012 addresses, physician names, and A vendor working with patient data for digital billing information for 22,000 patients conversion from lost a flash drive on or around were on the laptop. An additional 5,000 July 16. It contained patient names, Social patients had similar information Security numbers, dates of birth, addresses, exposed as well as their Social telephone numbers, account numbers, diagnoses, Security numbers and other non- and other protected health information. medical information.
  • 5. SECURING YOUR MOBILE DATA WITH ZENWORKS Solutions to help you avoid the headlines
  • 6. The ZENworks Family: Windows, Mac & Mobile Endpoints Windows, Mac & Mobile Configuration Management Patch Management Asset Management Application End Point Security Virtualization Management Service Desk Full Disk Encryption
  • 7. Are you just as locked out of your own devices as any hacker?
  • 8. Why ZENworks Full Disk Encryption?
  • 9. Centralized Management One Console. One Agent. One Tool for all your endpoint management tasks ZENworks also does configuration, patch, asset & endpoint security management
  • 10. Fully Featured From a single console, ZENworks lets you manage Manage access, with support for pre-boot auth your enterprise remotely: down the hall, down the street, across the country, or around the Turn encryption on/off world Troubleshoot passwords Manage hardware & software encryption Deploy encryption software across the Generate reports enterprise at the push demonstrating encryption of a button
  • 15. Control the story Know you’re safe. Prove you’re safe. 15 © Novell, Inc. All rights reserved.
  • 17. ALI Consulting & Deployment Services Highly experienced advisors with diverse & practical technical experience • Proactive strategy • Clear roadmap for deployment • Value driven project analysis • Limits burden on existing staff • Saves IT budget • Speeds time to deployment Project & Consultative • Priority access to Novell as Resource Deployment Assessment Planning needed • Option for lab testing
  • 18. Special Incentives for Webinar Attendees Act within next 60 days to receive:  Special product discounts available  Special rates for project-based ALI services Call Cindy for more details!
  • 19. Upcoming Webinar Topics November 8: Disaster Recovery & Business Continuity for SMB Organizations In this second webinar in our virtualization series, we'll be showing some disaster recovery options from VMware that make business continuity so simple and affordable that no organization has to continue to take the risk of being unprepared. Registration link coming in the follow up email or register from our event listing at www.ali-inc.com
  • 20. Questions & Discussion Cindy DeHart Practice Manager cindy@ali-inc.com 540.443.3392 Neil Kimberley Sales Engineer nkimberley@novell.com Sophia Germanides Novell Account Executive Sophia.Germanides@novell.com