Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
|
|
- April Nicholson
- 6 years ago
- Views:
Transcription
1 SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE
2 Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern security architecture for today s workforce Content: Not for publication 2
3 Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally available product. Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind. Technical feasibility and market demand will affect final delivery. Pricing and packaging for any new technologies or features discussed or presented have not been determined. 3
4 Session Agenda 1 Modern Security Requirements 2 Securing your Windows 10 Deployments 3 Securing your Office 365 Apps and Data 4 Customer Spotlight CONFIDENTIAL 4
5 Modern Security Requirements 5
6 The Old World 6
7 The New World Devices Apps Infrastructure Traditional Apps Cloud-Native Apps SaaS Apps Private Clouds Hybrid Clouds Public Clouds Typical App Connects to 7 Cloud Services Virtualized Compute, Storage, Networking, Security 7
8 Securing Interactions is Increasingly Complex We have a large and growing surface area that needs to be secured 8
9 Why Your Security Team is Concerned 34% REPORTED 56% INCREASE 250% INCREASE EMPLOYEES cited as source of compromise in 2015 INTELLECTUAL PROPERTY theft in 2015 RANSOMWARE ATTACKS increase in
10 VMware s Approach to Security Proliferating and diverse endpoints access Protect a Identity range of apps and and Endpoints IT services. TRANSFORM SECURITY New apps and delivery models can t be easily protected Secure with perimetercentric and Data network Applications security. Increasingly complex threat ecosystem and slow Streamline to identify non-compliance. Compliance Intrinsic Security from Device to Data Center 10
11 The whole IT Security journey Federated Identity, Biometric, Two-Factor Authentication Conditional Access, Secure App Token SSO, Threat Analytics VMworld 2017 Endpoint Security, DLP, App Scanning, Malware Detection Per App VPN, Intelligent Networking, Network Scanning and Security Secure micro VPN, Limited Cyber Attack Footprint, Threat Analytics Content: Not for publication Audit Network and Data Center Traffic Audit Logs for All Infrastructure Components Same Security and Policies work for Public, Private, Hybrid Clouds Self-Encrypt Drives, Analyze Environment for Anomalies Secure OS, Secure Hypervisor, Secure Data at Rest/Transit Sandbox Data Center Application, Limit Cyber Attack Vector 11
12 Securing your Windows 10 Deployments VMworld 2017 Content: Not for publication 12
13 Traditional PC Management Falls short for your modern security demands Traditional Systems Management GPO Policy Servers (AD) Software Distribution Servers OS Update Servers (WSUS) Modern Workforce Increasingly mobile and off-network Limited Visibility Policies and updates pending Compromised Security Slow to identify non-compliance Data Proliferation New ownership models; cloud apps / services 2017 VMware Inc. All rights reserved. Confidential Not for Distribution
14 Unified Endpoint Management Enables a modern approach to Windows security Unified Endpoint Management Configuration, Apps, Store Updates, B Security Modern IT Instant, cloud-based management Real-time Visibility Policy and updates in seconds, not months Security Across Networks Backed by a powerful compliance engine Data Loss Prevention Protect data at rest, in use, in transit 2017 VMware Inc. All rights reserved. Confidential Not for Distribution
15 Protect Identity and Endpoints Safeguard user identities and endpoints Across any user, application and device Establish user trust with new identity features; multifactor authentication based on context Ensure desired OS state with over the air configuration of hardware and OS Harden OS with real-time device and OS health data; block access for compromised endpoints or distribution 15
16 Secure Apps and Data Gain transformative insights into application infrastructure VMworld 2017 Content: Not for Secure access to any app with context of identity, endpoint and app interactions Lock down access to unapproved and un-trusted apps and malware publication Protect data with encryption, native DLP, per-app tunneling, and traffic filtering Across any app, app type, and location Remote wipe company data from admin console or self-service portal 16
17 #VMworld #SIE3197BE
18
19 #VMworld #SIE3197BE
20
21 Office 365 CONFIDENTIAL 21
22 Managing and Securing Office 365 Today s evolving workforce requires a new Simplified identity and user Authentication trust model. TRANSFORM SECURITY Traditional access control methods based on network and Conditional perimeter security are Access no longer useful. Providing Holistic Support for Office 365 Mobile and BYOD adoption present new data Data security Loss challenges. Prevention 22
23 Federated Identity and SSO Ensure Single Version of Truth VMworld 2017 Content: Not for Works across Office 365 and all other app investments Integrates with existing identity solutions publication Automatic SSO based on native OS APIs, certificates and Kerberos authentication Password-less authentication for Modern Authentication clients 23
24 Workspace ONE Conditional Access Remote Apps Web Apps Native Apps OS DEVICE COMPLIANCE Managed AUTHENTICATION MODULE DEVICE POSTURE USER AUTH Workspace ONE Jail Broken IDENTITY CONTEXT Authentication Strength Authentication Provider APP SERVICE 3rd Party MSA Malware Trust Location Blacklist Apps Session Time Network Scope Per Application 24
25 Conditional Access For Office 365 Browser OWA Client App Modern Auth. Clients Client App Active Sync & Legacy Clients VMworld 2017 Conditional Access Policy Content: Not for publication 25
26 Conditional Access Example: Restrict Office 365 Access to Managed and Compliant Devices Only Unmanaged X Access Denied Access Granted SSO to Apps VMware Identity Manager Validates User Identity Managed by AirWatch 26
27 Data Loss Prevention Controls for Office 365 Office 365 App Settings Copy / Paste Blocking App-level PIN / Passcode DLP Settings (save data in personal OneDrive) OS MAM Settings Open-with controls SSO, remote wipe Intune Graph MAM API Workspace Intune MDM ONE Configure Intune DLP policies from Workspace ONE console 27
28 #VMworld #SIE3197BE
29
30 DB Systel Deutsche Bahn's digitalisation partner DB Systel takes an integrative and value-enhancing approach to its work for the Group. 3,600 employees Revenues: 838 Million (2016) It offers a range of solutions and consulting services that are holistic and customer-specific. They meet the highest IT standards and make use of innovative developments in the sector. DB Systel combines this expertise with its outstanding knowledge of the rail sector and IT industry. It is a business partner that always takes the long view of a project and follows supplier-neutral strategies as it works towards the collective goals that everyone at DB AG shares. 30
31 DB Systel services all kind of workspaces Office worker (Mobile Mail) Train driver (Rail in Motion) Maintenance worker (e.g. Puma) 31
32 What we have achieved so far moved from MDM to Airwatch EMM in 2015 migration of 30,000 devices up to 700 per day currently serving 75,000 throughout Europe (ios, Android) Empower Digital Workspaces VMworld 2017 implemented SSO for mobile 2 factor authentication of device during rollin per app VPN Content: Not for publication Transform Security 32
33 DB Systel current challenges Modernize Data Centers Integrate Public Clouds Empower Digital Workspaces Transform Security DB Systel is moving all kind of workloads into cloud services like AWS oder SaaS The own datacenter will be sold O365 is being implemented as hybrid cloud service replacing Lotus Notes infrastructure as well as other products e.g. storage move from EMM to UEM (Unified Endpoint Management) gain market share within the imaged desktop environment currently 90k Desktops with our basic Workplace (Win10, Mac) SSO 2 factor authentication of device during rollin per app VPN 33
34 Ways to Learn More Sessions UEM1359BE - Best Practices in Migrating Windows 7 to Windows 10 13/ PM SAAM2291BE - Securing Access and Protecting Information in Office 365 with Workspace ONE 13/09 12 PM Content VMworld 2017 Content: Not for Hands-on Labs Stop by our hands on labs at VMworld publication ASK THE EXPERTS 34
35 Questions? 35
36
37
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAAM2291BE Securing Access and Protecting Information in Office 365 with Workspace ONE Camilo Lotero Senior Technical Marketing Manager Adarsh Kesari Senior Systems Engineer #VMworld #SAAM2291BE Disclaimer
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
ADV1591BU Delivering Virtual Desktops and Apps via the Digital Workspace with Workspace ONE and VMware Horizon VMworld 2017 Content: Not for publication Peter Bjork @thepeb & Matt Coppinger @mcopping #VMworld
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAAM1150BU Enabling Simple, Secure Access to Your Horizon and Citrix Virtual Desktops and Apps with Workspace ONE VMworld 2017 Content: Not for publication Greg Armanini & Matt Coppinger #VMWORLD #ADV1591BU
More informationAddressing Today s Endpoint Security Challenges
Addressing Today s Endpoint Security Challenges Protect apps and data across every endpoint to complete your enterprise security posture. Citrix.com White Paper Mobile and endpoint security is a complex
More informationCSP 2017 Network Virtualisation and Security Scott McKinnon
CSP 2017 Network Virtualisation and Security Scott McKinnon smckinnon@vmware.com Security Lead, Northern EMEA Network & Security, VMware Disclaimer This presentation may contain product features that are
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
UEM2205BE Get Up to Speed on Innovations in the Mobile Ecosystem: ios, macos, Android, and Chrome OS VMworld 2017 Content: Not for publication Sascha Warno #Vmworld #UEM2205BE Disclaimer This presentation
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
ADV1591BE Delivering Virtual Desktops and Apps via the Digital Workspace with Workspace ONE and VMware Horizon VMworld 2017 Content: Not for publication Johan van Amersfoort & Stephane Padique #VMWORLD
More informationOffice 365: Modern Workplace
Office 365: Modern Workplace November 8, 2018 Bruce Ward, VP of Business Strategy Helping you grow your business with scalable IT services & solutions for today s challenges & tomorrow s vision. 2018 Peters
More informationAdaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia
Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES
More informationVälkommen. VMware S4C VMware Workspace ONE ger full mobilitet för alla andvändare. Föreläsare: Christian Nilsson, VMware
Välkommen VMware S4C VMware Workspace ONE ger full mobilitet för alla andvändare Föreläsare: Christian Nilsson, VMware VMware: Orädd innovatör av Software-Defined Server Virtualisering 2000 Software-Defined
More informationMaximize your investment in Microsoft Office 365 with Citrix Workspace
White Paper Maximize your investment in Microsoft Office 365 with Citrix Workspace Maximize your investment in Microsoft Office 365 with Citrix Workspace Accelerate migration, simplify maintenance, and
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationHow Microsoft s Enterprise Mobility Suite Provides helps with those challenges
2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationWORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong
Data Leak Prevention: Keeping your sensitive out of the public domain Frans Oudendorp Ronny de Jong Session objectives & takeaways Session objectives: Overview of information protection solutions How to
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationA tale of Modern Management Part 1
A tale of Modern Management Part 1 Speaker introduction @JankeSkanke @okieselb jan.ketil.skanke@cloudway.no oliver.kieselbach@glueckkanja.com Principal Cloud Architect - CloudWay Lead Cloud Architect Glück
More informationTransforming Security Part 2: From the Device to the Data Center
SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationIntroducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer
Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?
More informationVMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1
VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationFencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1
Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.
More informationMaximize your move to Microsoft in the cloud
Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationRHM Presentation. Maas 360 Mobile device management
RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationNext-Gen CASB. Patrick Koh Bitglass
Next-Gen CASB Patrick Koh Bitglass pkoh@bitglass.com www.cloudsec.com WW Cloud Service Adoption https://www.gartner.com/newsroom/id/3815165 "As of 2016, approximately 17 percent of the total market revenue
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationDigital Workspace SHOWDOWN
Digital Workspace SHOWDOWN Why Citrix Workspace is a better choice than VMware Workspace ONE Take a closer look at the dozen ways that Citrix Workspace outperforms VMware Workspace ONE. Today s workers
More informationBRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT
WHITE PAPER DECEMBER 2016 BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT Unified endpoint management brings together traditional client management with a modern enterprise mobility management
More informationMastering the Move to Modern Management using ConfigMgr
Mastering the Move to Modern Management using ConfigMgr Josué Negrón Sr. Solutions Architect VMware Brooks Peppin EUS Systems Engineer VMware Agenda Challenges with PCLM Solutions What are your Options?
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2673BU Clearing Cloud Confusion Nick King and Neal Elinski #VMworld #LHC2673BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationThe security challenge in a mobile world
The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario
More informationRedefine Windows 10 Management. Embrace True Business Mobility
Redefine Windows 10 Management Embrace True Business Mobility Table of Contents Introduction...3 VMware Solution...4 Reduce Cost and Complexity of Management...5 Secure and Control Windows 10 Devices...17
More informationMaaS360 Secure Productivity Suite
MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity
More information8 CRITICAL CAPABILITIES FOR DIGITAL WORKSPACE SECURITY
G E T S TA R T E D 8 CRITICAL CAPABILITIES FOR DIGITAL WORKSPACE SECURITY Table of Contents INTRODUCTION SINGLE AND OPEN PLATFORM APPROACH DATA LOSS PREVENTION POLICIES CONTEXTUAL POLICIES PROTECTING APPLICATIONS
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationVMware AirWatch and Office 365 Application Data Loss Prevention Policies
VMware AirWatch and Office 365 Application Data Loss Prevention Policies Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationSecure Access - Update
Secure Access - Update for people, devices, things and services Jonas Gyllenhammar Senior Consultant Engineer - Specialist The New Reality All Major OSs One Client On-the-go Home network Untrusted LAN
More informationMD-101: Modern Desktop Administrator Part 2
Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has
More informationARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018
REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MGT3166BU A Simplified Approach to Lifecycle Management for vrealize Suite Ganesh Subramaniam Group Product Line Manager, VMware Gopal Srinivasan Director Engineering, VMware #VMworld #MGT3166BU Disclaimer
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More informationCrash course in Azure Active Directory
Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.
More informationRelated Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)
PRESENTED BY: Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) One of the main problems that customers face with the adoption of SaaS and cloud-based apps is how to deliver the
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationHybrid Identity de paraplu in de cloud
EXPERTS LIVE SUMMER NIGHT Hybrid Identity de paraplu in de cloud Robbert van der Zwan TSP EM+S Netherlands EXPERTS LIVE SUMMER NIGHT Robbert van der Zwan Robbert works as an Enterprise Mobility and Security
More informationThe Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies
The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies Daniel Yeung Technical Manager, Hong Kong & Taiwan AUG 2017 2017 Citrix Why Worry? Security needs to be top-of-mind
More informationSAS and F5 integration at F5 Networks. Updates for Version 11.6
SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify
More informationAirWatch Container. VMware Workspace ONE UEM
VMware Workspace ONE UEM You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback
More informationEnterprise Product Guide
Enterprise Product Guide BlackBerry Enterprise Software April 2018 Published: 2018-06-06 SWD-20180606124626584 Contents BlackBerry enterprise products... 5 The BlackBerry Infrastructure...6 BlackBerry
More informationHCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY
PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize
More informationThe Oracle Trust Fabric Securing the Cloud Journey
The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline
More informationVMware AirWatch Google Sync Integration Guide Securing Your Infrastructure
VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationWindows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft
Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business
More informationDatasheet. Only Workspaces delivers the features users want and the control that IT needs.
Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationVMware Horizon Suite:
VMware Horizon Suite: The Platform for Workforce Mobility Ralf von Gunten Sr. Systems Systems Engineer 2010 VMware Inc. All rights reserved Disclaimer This presentation may contain product features that
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationVMworld 2018 Call for Papers
VMworld 2018 Call for Papers Submission Template Session Information *Which VMworld event are you submitting for? - US - Both events - Europe *Session Title A compelling title that clearly and concisely
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationSafeguard Application Uptime and Consistent Performance
Safeguard Application Uptime and Consistent Performance A software-first approach to delivering applications across hybrid and multi-cloud architectures. 1 Safeguard Application Uptime and Consistent Performance
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationSecure Access for Microsoft Office 365 & SaaS Applications
Best Practices Guide Secure Access for Microsoft Office 365 & SaaS Applications Implement Robust Compliance for All Users, All Devices, and All Data This guide illustrates best practices for secure Office
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationTrust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved
Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted
More informationGoogle Sync Integration Guide. VMware Workspace ONE UEM 1902
Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI1303BU Security with NSX. Greater Security in the Digital Business Age Alex Berger, NSX Product Marketing #VMworld #SAI1303BU Disclaimer This presentation may contain product features that are currently
More informationMicrosoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity
2x 50% 5x Microsoft 365 A complete, intelligent, secure solution to empower employees Unlocks creativity Built for teamwork Integrated for simplicity Intelligent security Inner Loop Files Sites Content
More informationGlobalSign Integration Guide. GlobalSign Enterprise PKI (EPKI) and VMware Workspace ONE UEM (AirWatch)
GlobalSign Integration Guide GlobalSign Enterprise PKI (EPKI) and VMware Workspace ONE UEM (AirWatch) 1 Table of Contents Table of Contents... 2 Introduction... 3 GlobalSign Enterprise PKI (EPKI)... 3
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC1753BU Case Study: How VMware NSX Is Empowering a Service Provider to Help Customers Achieve and Maintain Industry Compliance VMworld 2017 Content: Not for publication #VMworld #LHC1753BU Disclaimer
More informationMicrosoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811
Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware
More informationIDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO
IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO (US) @BEN_SMITH IDENTITY = THE MOST CONSEQUENTIAL ATTACK VECTOR Confirmed data breaches involving weak, default
More informationQuick Heal Mobile Device Management. Available on
Available on Infinite Devices. One Unified Solution. Quick Heal A simple yet powerful solution, Quick Heal is a unified platform for managing and monitoring multiple mobile devices within your enterprise
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationSecuring Enterprise or User Brought mobile devices
Securing Enterprise or User Brought mobile devices Wilfried Baeten Business Line Director Projects&Consulting Econocom Managed Services 20/09/2013 WWW.ECONOCOM.COM Agenda Introduction The mobile security
More informationThe Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions
The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:
More informationGuide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1
Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationREVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS
REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS Table of Contents Executive Summary VMware Reference Architectures Audience Reference Architecture Design Methodology
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SER2779BE What s New in vcenter Server Madhup Gulati Director, Product Management VMware VMworld 2017 Content: Not for publication #VMworld #SER2779BE Disclaimer This presentation may contain product features
More informationWHITEPAPER. How to secure your Post-perimeter world
How to secure your Post-perimeter world WHAT IS THE POST-PERIMETER WORLD? In an increasingly cloud and mobile focused world, there are three key realities enterprises must consider in order to move forward
More informationThomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017
Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than
More informationSECURITY SERVICES SECURITY
SECURITY SERVICES SECURITY SOLUTION SUMMARY Computacenter helps organisations safeguard data, simplify compliance and enable users with holistic security solutions With users, data and devices dispersed
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
ADV1582BE Solve your Citrix Problems with VMware Technologies Nick Jeffries, Senior Solutions Architect, VMware Sebastian Brand, Lead Systems Engineer, VMware #VMworld #ADV1582BE Disclaimer This presentation
More informationModern BIOS Management from the Cloud
Modern BIOS Management from the Cloud Josué Negrón Sr. Solutions Architect VMware Brooks Peppin EUS Systems Engineer VMware Agenda Modern Management Challenges Cloud Architecture Microsoft BIOS & Firmware
More informationInside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1
Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to
More informationPROTECTION SERVICE FOR BUSINESS. Datasheet
PROTECTION SERVICE FOR BUSINESS Datasheet Protection Service For Business is one of the world s leading multi-endpoint security solutions. It is the only endpoint security solution on the market that combines
More informationTable of Contents HOL VWS
Table of Contents Lab Overview - - VMware Workspace ONE Getting Started...2 Lab Guidance... 3 Module 1 - Workspace ONE Overview(15 minutes)... 9 Introduction... 10 Workspace ONE Features... 12 Workspace
More informationConsumerization: What It Means to IT Operations
Consumerization: What It Means to IT Operations Scott Hardie, Sr Princ Systems Engineer Justin Ware, Technical Director, Intuitive Consumerization: What It Means to IT Operations 1 Agenda 1 Consumerization
More informationXenApp, XenDesktop and XenMobile Integration
XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility
More information