EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1
Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2
Leading Concerns In Enterprise Mobility Discussions Consumerization Apps Corp/Personal Buying Center AV, FW, SMS Antispam Asset/ Inventory Mgmt ios & Android Risk of Using Apps Data Loss Concerns Organization 3
Full Control Info/App Access Only Managed Unmanaged Consumerization is Driving Disruption Embracing the Personally-Owned & Unmanaged BYOD Data Sources: Gartner, & IDC Evolving Focus 246M Corp PCs 293M Personal PCs 819M Smartphones 116M Tablets Relevent Devices Today Future Devices 177M Corp PCs 300M Smartphones 15M Tablets Traditional Focus Corporate-Owned Personally-Owned Devices 4
Understanding Managed & Unmanaged Mobility Customers need to provide a solution for both the managed and unmanaged use cases within the enterprise Managed MDM enables device management & compliance MDM is a foundation for policy management Data separation solutions evolve through APIs Enterprise Use Cases Unmanaged Applications must be protected individually Data between applications must be secure Corporate / Personal separation becomes a non-issue Manage The Device Secure Apps & Data
Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 6
Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 7
Symantec Solutions Agents Management, Security & Identity Control Point Management Portal SMP (Altiris) / SCCM 8
Management Comprehensive Enterprise Mobility Management - MDM Enable Activate enterprise access, apps and data easily and automatically Secure Protect enterprise data and infrastructure from attack and theft Manage Control inventory and configuration with massive scalability 9
Enterprise Integration Single console and infrastructure for desktop, mobile and server management Role based Administration Reports Endpoint Admin Help Desk Enterprise Scalability Business Process Automation Flexibility x 20k+ 10
Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 11
2010/11 Trends Threats Documented new vulnerabilities on the rise 42% Most malware for mobiles are Trojans posing as legitimate apps s will be targeted more when used for financial transactions 12
Security for Android Android Security Agent Jun 12 Add to existing stable of Windows and Symbian device security Reputation based security Scheduled/Manual Anti-malware scanning App blacklist/whitelist enforcement Uninstall protection, resilience Basic locate/lock/passcode reset/wipe and anti-theft features managed centrally Single console mgmt/licensing/reporting, integrated with Management 13
Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 14
Personal App Center s Approach to Protecting Apps Symantec Apps Enterprise Mobility Console Mexico io-zone Internal Apps FORD Kaiser JPMC App Store Apps App Secure App Center Feature-set App deployment & provisioning User authentication across apps Copy & paste prevention Per app file encryption Remote data/app wipe ios & Android support 15
How It Works: Policy Management.IPA or.apk application file with standard libraries Wrapped with App Center libraries and policy controls ready for deployment
Next-Gen Enterprise App Store To Deliver Symantec Secured Apps
Lab Exercises 18
EMEA Vision Sessions Course Title Day Time EM IS PS Strategies for Security and Management in a and Virtual World Tuesday 01:30 PM Tuesday 02:45 PM ST B07 Beyond Management - The Complete Solution to Enterprise Mobility Tuesday 04:15 PM EM B09 Solving BYOD - Securing Apps and Enterprise Data on Personal Devices Wednesday 03:45 PM EM L12 Symantec Management and VeriSign Managed PKI Wednesday 05:15 PM EM L05 Managing ios and Android Devices with Symantec Management Thursday 10:30 AM ST B07 Beyond Management - The Complete Solution to Enterprise Mobility Thursday 10:30 AM EM B20 Apple ios and Google Android Technical Overview Thursday 11:45 AM EM B15 Deploying Management and Security Agents to Devices Thursday 01:45 PM 19
Thank you! Scott Jareo Scott_jareo@symantec.com 781-530-2464 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 20