Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Similar documents
BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

Acronis Files Advanced 8.5

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Installation and Upgrade Guide

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

The Device Has Left the Building

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Smart Work Solution for DataStage ETL Job Management. Copyrightc Inwoo Tech, INC. All right reserved

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Hosted Exchange. Presented by Joseph Lee

About us. How we help?

Securing Today s Mobile Workforce

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

RHM Presentation. Maas 360 Mobile device management

Designing Workspace of the Future for the Mobile Worker

Mobile Devices prioritize User Experience

Enabling the Mobile Workforce

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

Secure File Sharing and Real-Time Mobile Access to Business Data with Citrix ShareFile

Enabling the Mobile Professional

Systems Manager Cloud-Based Enterprise Mobility Management

How do I view the online program?

2016 BITGLASS, INC. mobile. solution brief

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Novell. Mobility Solutions. Joe Marton Sales Engineer Novell North America

PrintMe Mobile 3.0 User s Guide

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Phil Schwan Technical

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File

The Future of Mobile Device Management

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Maximize your investment in Microsoft Office 365 with Citrix Workspace

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

XenApp, XenDesktop and XenMobile Integration

Enterprise Mobility Management

2013 InterWorks, Page 1

Quick Heal Mobile Device Management. Available on

Changing IT Landscapes VIP Customer Day. Scott Crenshaw Senior Vice President of Strategy & Chief Marketing Officer

Anchor Competitive Sheet May 2015

OneDrive for Business

MaaS360 Secure Productivity Suite

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Mobile Security using IBM Endpoint Manager Mobile Device Management

Basic. $5/user per mo.

RELATIONSHIP WITH KONICA MINOLTA

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

Workplace Online Using a standard web browser, simply login at us.awp.autotask.net using the credentials you ve been given.

KONICA MINOLTA MOBILE PRINTING SOLUTIONS

Managing Devices and Corporate Data on ios

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Six steps to control the uncontrollable

Make security part of your client systems refresh

Delivering versatile A3 print and scan*

Why Nomadesk is the right product! for your reseller!!

Vendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics CRM Online Deployment. Version: Demo

Delivering fast, professional and reliable print performance to small offices and business workgroups. at your side = à vos côtés

BYOD: BRING YOUR OWN DEVICE.

Why is Office 365 the right choice?

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

Securing Office 365 with MobileIron

Veritas Desktop and Laptop Option 9.2 Compatibility Matrix

OFFICE 365 AT A GLANCE

Nighthawk AC2600 Smart WiFi Router

STREAM Integrated Risk Manager Multi-user Deployment Options

How to find your IP address information

Evolved Backup and Recovery for the Enterprise

PCI DSS Compliance. White Paper Parallels Remote Application Server

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

Veritas Desktop and Laptop Option 9.0 Compatibility Matrix

NetSupport Manager v11

Box Competitive Sheet January 2014

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Identity Management as a Service

System requirements for Qlik Sense. Qlik Sense September 2017 Copyright QlikTech International AB. All rights reserved.

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Going Mobile at Northwestern

Apple ios Enterprise Mobility Management (cloud based)

High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

Team Advanced VC Services. Cisco WebEx Services

Veritas Desktop and Laptop Option 9.3 Software Compatibility List

NWEA MAP Technology Readiness Audit Catholic Schools Office

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

System requirements for Qlik Sense. Qlik Sense June 2018 Copyright QlikTech International AB. All rights reserved.

How to Access Protected Health Information from Anywhere and Stay Compliant

Colligo Briefcase. for Good Technology. Administrator Guide

Symantec Endpoint Protection Family Feature Comparison

Nighthawk AC2400 Smart WiFi Router

Office 365 Business The Microsoft Office you know, powered by the cloud.

Mobile Security Trends in the Workplace

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

Remote Access Installation

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Need Instructions On How To Setup Ipad 2 Wifi Printer >>>CLICK HERE<<<

Cover heading. Maximizer CRM 12 Winter system requirements Cover introduction. Group and Enterprise Editions

BYOD Business year of decision!

Transcription:

Webinar: Mitigating the risks of uncontrolled content access from mobile devices Presented By: Brian Ulmer, Product Management Director 2013 1

Employees are going mobile Mobile devices are being used for an increasing number of day-to-day tasks Employees today expect to use these same, convenient tools to get their work done 66% of users surveyed even take their smartphones to lunch in order to get work done* This is a great opportunity for productivity improvements *Qualcomm survey 6/18/2013 *Qualcomm survey 6/18/2013 2013 2

Many enterprises are lagging Some enterprises are developing bring-your-owndevice (BYOD) and mobility strategies Many have yet to institute formal policies 58% of businesses have no BYOD policy in place* 80% of businesses have not trained employees to understand BYOD privacy risks* *Ponemon Institute - 2013 *Ponemon Institute - 2013 2013 3

Bring-your-own-cloud (BYOC) Mobile devices do not include capabilities for secure access to most corporate content They also lack traditional central file management Users take it upon themselves to find a solution Free, public, consumer-oriented file syncing and sharing solutions are available and become the answer 2013 4

The problem with BYOC Corporate content becomes spread between multiple, disparate solutions, introducing inefficiencies and disjointing workflows Sensitive files are moved into public cloud storage and can be shared with anyone Content cannot be audited or backed up Compliance requirements are not met 2013 5

Acronis Mobility Overview We provide anytime, anywhere content access, sync and share from any PC, Mac or mobile device, with the security and visibility and manageability required by enterprise IT Control. Secure. Simple. 2013 6

Over 7,000 Customers Over 8,000 Customers 2013 7

Addressing Emerging Enterprise Needs Enterprise Mobility Secure access to enterprise file servers, SharePoint and NAS devices for mobile device users Enterprise File Sharing Secure syncing, sharing and collaboration on content Apple in the Enterprise Seamlessly integrates Macs in enterprise environments 2013 8

What Today s Enterprise Users Want Access, Share & Collaborate on Files with Different Constituents and on Multiple Devices Access to corporate file resources on servers, NAS and SharePoint. Sharing and collaborating on files with both internal and external people. Accessing and syncing files between devices laptops, desktops, smart phones and tablets. Laptop Desktop Tablet Smartphone 2013 9

Comprehensive Secure File Access, Syncing and Sharing Access to corporate file resources on servers, NAS and SharePoint. Accessing and syncing files on user devices laptops, desktops, smart phones and tablets. Secure access to enterprise file servers, SharePoint and NAS devices for mobile device users Sharing and collaborating on files with both internal and external constituents. Secure syncing, sharing and collaboration on files 2013 10

Secure Mobile Access To Corporate Content Requirement: Access to corporate content on servers, NAS and SharePoint. Secure access to content on file servers, NAS and SharePoint. Secure, embedded editing of Office documents, spreadsheets and presentations. Policy engine for ease of management. Active Directory integration - Support for certificate and Smart Card auth. Corporate Content VPN, HTTPS Reverse Proxy or Firewall Route Key security features encryption, remote wipe, etc Simple, easy to use interface and navigation for end users 2013 11

Securely Accessing Files Across All Devices Requirement: Anytime, anywhere access to your own files on all your devices Support for most popular mobile devices, desktop/laptops, browsers Secure, embedded editing of Office documents, spreadsheets and presentations on mobile device Policy engine for ease of management. Active Directory integration. Key security features encryption, remote wipe, etc. Simple, easy to use interface and navigation for end users 2013 12

Securely Sharing Files Inside And Outside Your Company Requirement: Sharing files with internal and external constituents Management of authorized and unauthorized users Policy engine for ease of management Auditing Free basic sharing with external users Key security features AD integration, encryption, remote wipe, etc. Simple, easy to use interface and navigation for end users 2013 13

Acronis mobilecho and activecho: Driving Value with Common Technologies Control Enterprise is in control - mobilecho and activecho run on-premise Single Management console to easily manage both solutions Acronis Policy Engine Secure Active Directory integration In-App mobile Office editing and PDF annotation Audit logging Remote wipe of mobile devices Encryption Simple Single mobile client Intuitive user interface and navigation Single, common server installer 2013 14

Demo mobilecho 5.1 & activecho 3.1 2013 15

mobilecho & activecho Server Requirements Windows server platforms: 2012, 2008 (inc. R2), 2003 (inc. R2) Windows workstation platforms: Windows 8, 7, Vista 2013 16

mobilecho & activecho Client Requirements activeecho Desktop Client Windows XP, Vista, 7, 8 Mac OS X 10.6 or later mobilecho ios Client Application Supported Devices: ipad, ipad 2, ipad 3, ipad 4, ipad mini, ipad Air iphone 3GS, 4, 4S, 5, 5C, 5S ipod Touch mobilecho ios Client Application Supported OS's: ios 5.0 or later mobilecho Android Client Supports smartphones and tablets Android 2.2 or later 2013 17

Questions?? Control. Secure. Simple. www.acronis.com www.grouplogic.com 2013 18

www.acronis.com @acronis 2013 19