Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

Similar documents
The State of the Trust Gap in 2015

BYOD Business year of decision!

Mobile Security using IBM Endpoint Manager Mobile Device Management

Purchase Intentions Spring 2013 EMEA

Mobile Devices prioritize User Experience

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

MaaS360 Secure Productivity Suite

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Embracing the Mobile Imperative

MaaS360 Unified Mobility Management

Bring Your Own Device. Peter Silva Technical Marketing Manager

Transforming Security Part 2: From the Device to the Data Center

Next Generation Authentication

3-Part Guide to Developing a BYOD Strategy

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

2015 IT Priorities Survey. France Results

BYOD Secure Zoning Between Enterprise and Personal Data on Mobile Devices. 14 November 2013 Rozana Rusli Meling Mudin

The Future of Mobile Device Management

The Device Has Left the Building

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

2016 BITGLASS, INC. mobile. solution brief

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

RHM Presentation. Maas 360 Mobile device management

Beyond BYOD Mobility, Cloud and the Internet of Everything

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

The erosion of the perimeter in higher education. Why IAM is becoming your first line of defence.

Getting in Gear with the Service Catalog

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Consumerization: What It Means to IT Operations

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Bring Your Own Device (BYOD) Best Practices & Technologies

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date

Bring Your Own TVH. Kalman Tiboldi CBIO

Google Identity Services for work

10 Cloud Myths Demystified

2015 IT Priorities Survey. DACH Report

Managing BYOD Networks

Changing face of endpoint security

IBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers

Solution. Imagine... a New World of Authentication.

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.

Taking Back Control of Your Network With SD-LAN

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Securing Today s Mobile Workforce

SIEM: Five Requirements that Solve the Bigger Business Issues

Securing Enterprise or User Brought mobile devices

Google on BeyondCorp: Empowering employees with security for the cloud era

Docker and HPE Accelerate Digital Transformation to Enable Hybrid IT. Steven Follis Solutions Engineer Docker Inc.

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

Mobile App Security and Malware in Mobile Platform

Securing Office 365 with MobileIron

UNCLASSIFIED. Mimecast UK Archiving Service Description

Information Security BYOD Procedure

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

IT Security: Managing a New Reality

Enterprise Mobility Management

IPHONE DEP REGISTRATION... 4 IPHONE DEP REGISTRATION... 3

Enterprise Mobility Management Buyers Guide

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Sichere Applikations- dienste

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

XenApp, XenDesktop and XenMobile Integration

A Panel Discussion 1

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

IC B01: Internet Security Threat Report: How to Stay Protected

CLOSING IN FEDERAL ENDPOINT SECURITY

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Why is Office 365 the right choice?

The collaboration app that keeps you connected to everyone and everything

Citrix XenMobile and Windows 10

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

SAS and F5 integration at F5 Networks. Updates for Version 11.6

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

October 2016 Issue 07/16

ACHIEVING FIFTH GENERATION CYBER SECURITY

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

AdMob Mobile Metrics. Metrics Highlights. May 2010

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

What BYOD and CYOD mean for workplace transformation

TRANSFORMING TO IT-AS-A- SERVICE

Securing the SMB Cloud Generation

What It Takes to be a CISO in 2017

Modern Database Architectures Demand Modern Data Security Measures

AT&T Endpoint Security

Mobilize with Enterprise Security and a Productive User Experience

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Five Tips to Mastering Enterprise Mobility

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

CCISO Blueprint v1. EC-Council

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Governance for the Public Sector Cloud

MOBILITY ACCESS. SITA/iPass WiFi. By: Viraj Suralia 03 Feb 2017

Transcription:

Say Goodbye to Enterprise IT: Welcome to the Mobile First World Sean Ginevan, Senior Director, Strategy Infosecurity Europe - 2015

Sean Ginevan Sr. Director, Strategy, MobileIron Linkedin.com/in/sginevan @SGinevan Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy

Mobile is the new Industrial Revolution.

2015 MobileIron Gen M Survey: How is mobile changing our work style? More than 3,500 professionals Across six countries: France, Germany, Japan, Spain, UK, USA Conducted by Harris Poll from Dec. 2014 to Jan. 2015

64% (at least once a day outside of work hours) does 26% of its work on smartphones and tablets. 82% (at least once a day during work hours) relies on mobile for business activity outside of work and personal activity at work.

30% 29% 28% 26% 25% 19% % of work done on smartphones and tablets Professionals around the world blend their work and personal lives Spain France Germany UK USA Japan Spanish the most likely to do mobile work while using public transportation French the most likely to do mobile work while driving Germans the most likely to feel guilty receiving personal communications at work British the most likely to use mobile to monitor their home during the work day Americans the most likely to do mobile work while using the bathroom Japanese the least likely to do mobile work while watching TV

The more the CIO says no the less secure the organization becomes. Vivek Kundra CIO, US Federal Government, February 2011

Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy

Mobile is a shift in central focus Centered on device Centered on individual

I think my employer is tracking my personal information but I don t REALLY know what. * Represents visibility on ios, but will vary by mobile operating system and employer policy.

Traditional model of enterprise security

Old security model (IT led) System image Anti-malware agents Software/patch distribution VPN VDI Perimeter controls Firewall

New security model (user led) User experience: CONTROLLED CONSUMERIZED Information architecture: DATA CENTER INFORMATION FABRIC Personal cloud System image Anti-malware agents Software/patch distribution VPN VDI Perimeter controls Firewall Business cloud

New security model (user led) User experience: CONTROLLED CONSUMERIZED Information architecture: DATA CENTER INFORMATION FABRIC Personal cloud Trusted per-app gateway Business cloud Trusted relationship Trusted integration & authorization Secure enterprise information wherever it lives In the app In the network In the cloud

Next generation laptops and desktops All require EMM for enterprise security

Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy

Operating System Launches Windows XP Windows Vista Windows 7 Windows 8 Windows 10 2000-2004 2005-2009 2010-2014 2015+ iphon e OS 1 ios 4 ios 8 ios 9+ iphon e OS 2 iphon e OS 3 ios 5 ios 6 ios 7 Plus Android!

Agility is the new security What factors would most contribute to your organization s ability to maintain an effective mobile strategy over time? Source: Ponemon Institute, March 2014 Most important factors for mobile success (7 = most important to 1 = least important) Agility and preparedness for change Ample resources Enabling technologies Knowledgeable or expert staff Collaboration among business units Effective leadership A strong mobile security posture 6.58 6.01 5.60 5.13 4.24 3.97 2.61

Building a mobile strategy

Today s Discussion Market overview New architectures from PC to Mobile The pace of change in mobile Building a mobile strategy

Mobility will happen by you, with you, or to you.

What Do Your Employees Want? Get Their Jobs Done Use The Best Tools Do The Right Thing

People Make Mobile Happen Team Policies Comms Support

Stakeholder Map InfoSe c Security Policy Certificate Mgmt. Incident Response Personas Existing Tools Biz Processes Competitive Needs Lines of Busine ss IT HR Benefits Recruiting Works Councils SP Plans Spend Mgmt. Vendor Mgmt. Financ e Legal EUA Privacy Contracts Discovery

Entitlement Policy Role-Based Entitlement Device Ownership Corporate Only COPE BYOD Cellular Service Corporate Paid Stipend Expense

Trust-Based Security Endpoint Enrollment PIN / Passcode Automatic Lock Remote Wipe of Corporate Data Encryption Minimum OS Version Jailbreak/Root Prevention

Defining Rules of Use Rules of Use 1) We reserve the right to remote wipe your device. 2) We will enforce a PIN and auto timeout. 3) Please call the helpdesk if you lose your device. Click here for more details.

Typical Comms-Worthy Mobile Events Wearables OS Upgrade Smartphone s Tablets Wearables OS Upgrade Beta Operating Systems Smartphone s New OS Tablets New OS Holidays Jan-Mar Apr-Jun Jul-Sep Oct-Dec

Business Transformation New user & business experiences App & Content Enablement 1 st gen of mobile apps Mobile documents Cloud protections Device Security BYOD (user choice) Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement)

An example of agility: MI Case Study Over 1,700 Downloads 3,406 Changes in 14 Months 25% HR Case Load Reduction

Conclusions Define your mobile projects now What business processes will benefit most from mobilization? Understand the data your users will interact with And the risk and compliance issues that go with it Align your key stakeholders Build your mobile architecture

MobileIron secures enterprise information wherever it lives. We are building the security foundation for the modern enterprise.