Symantec Mobile Solutions
Overview
Presenters:
Andrew Blackham - Symantec Presales Specialist
Agenda
– The Mobile Landscape
– 5 Pillars of Enterprise Mobility
– Supporting BYOD
– Summary
– Q&A
2
Mobile Landscape
Exploding Number of Mobile Devices
Pave the Way for “Bring Your Own Device” (BYOD)
2010 177M corp PCs
2015 246M corp PCs
2010 173 M personal PCs
2015 293M personal PCs
2010 300M smartphones
2015 1017M smartphones
39% 69% 340% 2,170%
2010 15M tablets
2015 326M tablets
Changes in Working Style
New applications
deployed
in the cloud
Enterprises allow
mobile access to
their network
Workers use three
or more devices
80% 65% 52%
1 2 3
Sources:
1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011
2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012
3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
Freedom, Privacy and
Productivity
Easy access to files, applications, email
Use the latest technology and applications
Personal stuff is untouched
Do it themselves (i.e. Self-Service)
Simple, Secure and
Reliable
Protect company information
Only let authorized users in
Easy to work with and reliable
Reporting, audit and monitor
User IT Staff
The Desires of Users Versus IT Staff
Company Controls applications and
Data Only
Company Controls Personal DeviceCompany Controls Standard Device
32
1
UnmanagedManaged
Company Owned Personally Owned
Company Owns an Unmanaged
Device
BYOD
User and App
Access
Management
Threat
Protection
Secure File
Sharing
Device
Management
App and Data
Protection
User and App
Access
Management.
Threat
Protection
Secure File
Sharing
Device
Management
App and Data
Protection
User and App
Access
Management
Secure File
Sharing
App and Data
Protection
2
4
Evolving Endpoint Adoption Map
The 5 Pillars of Enterprise Mobility
Success = Mastering Control Points
Devices Applications Data
…without disrupting user experience
5 Pillars of Enterprise Mobility
ControlPoints
User & App
Access
App & Data
Protection
Device
Management
Threat
Protection
Secure File
Sharing
Device
Application
Data
Company credentials
extended to both
public and private
cloud services
Corporate data
separation and
delivery of IT
services
Configuration,
control and
management of
mobile devices
Mobile Security
Threat
detection
and removal
Enterprise-grade
file sharing and
collaboration in
the cloud
Symantec’s Comprehensive Solution
Symantec
O3™
App
Center
Mobile
Management
Mobile
Security
Content
Center
Primary
Products
User and App
Access
App and Data
Protection
Device
Management
Threat
Protection
Secure File
Sharing
Symantec Managed
PKI
Symantec
Validation and ID
Protection Service
(VIP)
Symantec Data Loss
Prevention for
Mobile
Symantec Mobile
Encryption
Altiris™ Client
Management Suite
from Symantec
Altiris™ IT
Management Suite
from Symantec
Symantec Endpoint
Protection
Symantec O3™
Complementary
Products
Competitive Matrix
User and App
Access
App and Data
Protection
Device
Management
Threat
Protection
Secure File
Sharing
Fiberlink 
Airwatch  
MobileIron  
Good  
Zenprise  
Symantec   
McAfee 
SAP/Sybase 
Mobility Solutions Breakdown
Use Case #1:
Access SaaS Applications From Any Device
Symantec O3
A Cloud Information Protection Platform
Symantec O3
Private Cloud / Data Center
Symantec O3
Gateway
Identity and Access
Broker
Information Gateway
Symantec O3
Intelligence Center
Context-based Policies
Status Monitoring
Log and Audit Services
Layered
Protection
2F Authentication
Data Loss
Prevention
Encryption
Public Cloud
End-User
Any
Device
Why Symantec O3
• Proven Infrastructure
Works with federated and non-
federated applications
2
3
• Highly Scalable
Leverages existing infrastructure
• Capture Security
Events
Correlation of security intelligence
Use Case #2:
Access Company and Personal Email
Mobile Protection
VPNWi-Fi
CA
Network Access
17
18
Symantec Mobile Management
Standalone or Plug into SMP and SCCM
Enable
Activate enterprise access,
applications and data easily
and automatically
> iOS®, Android™, Microsoft®,
Blackberry®, Symbian™
Secure
Protect enterprise data
and infrastructure from
attack and theft
> Detect JB, ensure passcodes, …
Manage
Control inventory and
configuration with
massive scalability
> Integrated with SMP and
SCCM
19
Comprehensive Device Management
Configure Devices
Self-service enrollment
Configure Email, VPN, Wi-Fi
Identity Certificates
Distribute applications
In-house applications or public-store
applications
Docs, videos – any active content
Group based management
Manage Assets
Centralized visibility and control
Automated workflows
Scalable to 20,000+ devices
Apply Policies
Passwords, App restrictions
Compliance with Jailbreak
Selective wipe and Full wipe
20
Why Symantec Mobile Device Management
2
3 • Integrated Mobile
Device Management
Unified management with Macs and
PCs
21
Use Case #3:
Secure iOS/Android/HTML5 applications and
Content
Enterprise App Store
Personal
CRM
Corporate
applicatio
ns
Corp AppACME
Public
application
s
Documents
Containerized Application
22
Mobile Application Management
Comprehensive Application-Wrapping Technology
App Store
Repository for internal
and external mobile
applications
App Policy
Protect application against
data loss through encryption,
removal control and
separation of corporate data
Content Center
Data Loss Prevention
policy to control
confidential data access
23
Comprehensive Mobile App Management
Deploy applications
Enterprise app store for internal applications
Recommendations from public application
store
Group based targeting
Deploy Content
Enterprise content store for docs, videos
Containerize data with per object policies
Group based targeting
Manage Lifecycle
Revoke and update applications selectively
Centralized visibility and control
MDM features for policy management
Protect Data
Security and Management layer around data
Passwords, encryption, offline access, rooting
Separate corproate and personal data
24
• Application deployment and provisioning
• User authentication across applications
• Copy and paste prevention
• Per-application file encryption
• Remote data/app wipe
• iOS, Android, and HTML5 support
SYMANTEC APP CENTER
Symantec App Center
Mobile App and Data Protection
25
Same Security as Sandboxing, but More
Flexible
.IPA or .APK file
with standard
libraries
App wrapped with App
Center
libraries and policy controls
ready for deployment
26
Business and Personal Applications and Data
Co-exist
27
Why Symantec for Mobile applications
• Quick and Easy
Expedite deployment of
applications with an easy-to-use
SaaS app store
• Scalable and
Seamless
Enable any number of applications
with no source-code changes
• Independent of Mobile
Device Management
Address mobile application needs
without managing the complete device
Personal
CRM
Corp applications
Corp AppACME
Email Documents
Use Case #4:
Secure Email and Prevent Malware
2828
Android Has Malware Problem
29
– More Than 50% Of Mobile Malware Is On Android
0
500
1000
1500
2000
2500
Jul-10
Sep-10
Nov-10
Jan-11
Mar-11
May-11
Jul-11
Sep-11
Nov-11
Jan-12
Mar-12
Android Malware Family
67% of enterprises are concerned with malware
attacks spreading from mobile devices to internal
networks.
- Symantec 2012 State of Mobility Survey
29
Symantec Mobile Security
30
Antimalware
Anti-Theft
Web Protection
Centralized Management
Advanced Protection
Comprehensive
Protection
Management
30
Why Symantec for Mobile Security
32
– High efficacy
Monitors 70+ application
stores, analyzes 3 million+
applications, information from 7
million+ active devices.
• Enterprise Grade Security
Most applications are freeware, consumer
editions. Symantec Mobile Security
provides centralized management
including LiveUpdates.
• Enterprise Integration
Anti-malware is one-piece of mobile
security. Symantec Mobile Security
is integrated with Mobile Device
Management.
32
Bringing It All Together
33
Devices. Applications.
Data.
Mobile Protection 33
Summary
Summary
• No business is safe from attack – regardless of its size or industry
• Attackers are being more selective in who they target
• Obtaining information is key – if an attacker could make money from it, it’s a potential
target
Below are some qualifying questions that can help you determine a security solution
requirement:
• What are you currently doing to safeguard your data?
• How are your emails protected?
• Do you use mobile devices in your organisation?
• What industry regulations do you have to comply with?
• How are you protecting your end users workstations?
Any Questions?

Symantec Mobile Security

  • 1.
    Symantec Mobile Solutions Overview Presenters: AndrewBlackham - Symantec Presales Specialist
  • 2.
    Agenda – The MobileLandscape – 5 Pillars of Enterprise Mobility – Supporting BYOD – Summary – Q&A 2
  • 3.
  • 4.
    Exploding Number ofMobile Devices Pave the Way for “Bring Your Own Device” (BYOD) 2010 177M corp PCs 2015 246M corp PCs 2010 173 M personal PCs 2015 293M personal PCs 2010 300M smartphones 2015 1017M smartphones 39% 69% 340% 2,170% 2010 15M tablets 2015 326M tablets
  • 5.
    Changes in WorkingStyle New applications deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices 80% 65% 52% 1 2 3 Sources: 1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011 2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012 3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
  • 6.
    Freedom, Privacy and Productivity Easyaccess to files, applications, email Use the latest technology and applications Personal stuff is untouched Do it themselves (i.e. Self-Service) Simple, Secure and Reliable Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit and monitor User IT Staff The Desires of Users Versus IT Staff
  • 7.
    Company Controls applicationsand Data Only Company Controls Personal DeviceCompany Controls Standard Device 32 1 UnmanagedManaged Company Owned Personally Owned Company Owns an Unmanaged Device BYOD User and App Access Management Threat Protection Secure File Sharing Device Management App and Data Protection User and App Access Management. Threat Protection Secure File Sharing Device Management App and Data Protection User and App Access Management Secure File Sharing App and Data Protection 2 4 Evolving Endpoint Adoption Map
  • 8.
    The 5 Pillarsof Enterprise Mobility
  • 9.
    Success = MasteringControl Points Devices Applications Data …without disrupting user experience
  • 10.
    5 Pillars ofEnterprise Mobility ControlPoints User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Application Data Company credentials extended to both public and private cloud services Corporate data separation and delivery of IT services Configuration, control and management of mobile devices Mobile Security Threat detection and removal Enterprise-grade file sharing and collaboration in the cloud
  • 11.
    Symantec’s Comprehensive Solution Symantec O3™ App Center Mobile Management Mobile Security Content Center Primary Products Userand App Access App and Data Protection Device Management Threat Protection Secure File Sharing Symantec Managed PKI Symantec Validation and ID Protection Service (VIP) Symantec Data Loss Prevention for Mobile Symantec Mobile Encryption Altiris™ Client Management Suite from Symantec Altiris™ IT Management Suite from Symantec Symantec Endpoint Protection Symantec O3™ Complementary Products
  • 12.
    Competitive Matrix User andApp Access App and Data Protection Device Management Threat Protection Secure File Sharing Fiberlink  Airwatch   MobileIron   Good   Zenprise   Symantec    McAfee  SAP/Sybase 
  • 13.
  • 14.
    Use Case #1: AccessSaaS Applications From Any Device
  • 15.
    Symantec O3 A CloudInformation Protection Platform Symantec O3 Private Cloud / Data Center Symantec O3 Gateway Identity and Access Broker Information Gateway Symantec O3 Intelligence Center Context-based Policies Status Monitoring Log and Audit Services Layered Protection 2F Authentication Data Loss Prevention Encryption Public Cloud End-User Any Device
  • 16.
    Why Symantec O3 •Proven Infrastructure Works with federated and non- federated applications 2 3 • Highly Scalable Leverages existing infrastructure • Capture Security Events Correlation of security intelligence
  • 17.
    Use Case #2: AccessCompany and Personal Email Mobile Protection VPNWi-Fi CA Network Access 17
  • 18.
    18 Symantec Mobile Management Standaloneor Plug into SMP and SCCM Enable Activate enterprise access, applications and data easily and automatically > iOS®, Android™, Microsoft®, Blackberry®, Symbian™ Secure Protect enterprise data and infrastructure from attack and theft > Detect JB, ensure passcodes, … Manage Control inventory and configuration with massive scalability > Integrated with SMP and SCCM
  • 19.
    19 Comprehensive Device Management ConfigureDevices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute applications In-house applications or public-store applications Docs, videos – any active content Group based management Manage Assets Centralized visibility and control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe and Full wipe
  • 20.
    20 Why Symantec MobileDevice Management 2 3 • Integrated Mobile Device Management Unified management with Macs and PCs
  • 21.
    21 Use Case #3: SecureiOS/Android/HTML5 applications and Content Enterprise App Store Personal CRM Corporate applicatio ns Corp AppACME Public application s Documents Containerized Application
  • 22.
    22 Mobile Application Management ComprehensiveApplication-Wrapping Technology App Store Repository for internal and external mobile applications App Policy Protect application against data loss through encryption, removal control and separation of corporate data Content Center Data Loss Prevention policy to control confidential data access
  • 23.
    23 Comprehensive Mobile AppManagement Deploy applications Enterprise app store for internal applications Recommendations from public application store Group based targeting Deploy Content Enterprise content store for docs, videos Containerize data with per object policies Group based targeting Manage Lifecycle Revoke and update applications selectively Centralized visibility and control MDM features for policy management Protect Data Security and Management layer around data Passwords, encryption, offline access, rooting Separate corproate and personal data
  • 24.
    24 • Application deploymentand provisioning • User authentication across applications • Copy and paste prevention • Per-application file encryption • Remote data/app wipe • iOS, Android, and HTML5 support SYMANTEC APP CENTER Symantec App Center Mobile App and Data Protection
  • 25.
    25 Same Security asSandboxing, but More Flexible .IPA or .APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment
  • 26.
    26 Business and PersonalApplications and Data Co-exist
  • 27.
    27 Why Symantec forMobile applications • Quick and Easy Expedite deployment of applications with an easy-to-use SaaS app store • Scalable and Seamless Enable any number of applications with no source-code changes • Independent of Mobile Device Management Address mobile application needs without managing the complete device
  • 28.
    Personal CRM Corp applications Corp AppACME EmailDocuments Use Case #4: Secure Email and Prevent Malware 2828
  • 29.
    Android Has MalwareProblem 29 – More Than 50% Of Mobile Malware Is On Android 0 500 1000 1500 2000 2500 Jul-10 Sep-10 Nov-10 Jan-11 Mar-11 May-11 Jul-11 Sep-11 Nov-11 Jan-12 Mar-12 Android Malware Family 67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey 29
  • 30.
    Symantec Mobile Security 30 Antimalware Anti-Theft WebProtection Centralized Management Advanced Protection Comprehensive Protection Management 30
  • 31.
    Why Symantec forMobile Security 32 – High efficacy Monitors 70+ application stores, analyzes 3 million+ applications, information from 7 million+ active devices. • Enterprise Grade Security Most applications are freeware, consumer editions. Symantec Mobile Security provides centralized management including LiveUpdates. • Enterprise Integration Anti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with Mobile Device Management. 32
  • 32.
    Bringing It AllTogether 33 Devices. Applications. Data. Mobile Protection 33
  • 33.
  • 34.
    Summary • No businessis safe from attack – regardless of its size or industry • Attackers are being more selective in who they target • Obtaining information is key – if an attacker could make money from it, it’s a potential target Below are some qualifying questions that can help you determine a security solution requirement: • What are you currently doing to safeguard your data? • How are your emails protected? • Do you use mobile devices in your organisation? • What industry regulations do you have to comply with? • How are you protecting your end users workstations?
  • 35.