EM L01 Introduction to Mobile

Similar documents
EM L05 Symantec Mobile Management Managing ios and Android Devices

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Consumerization: What It Means to IT Operations

The Device Has Left the Building

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

IC B01: Internet Security Threat Report: How to Stay Protected

Intel and Symantec: Improving performance, security, manageability and data protection

Mobile Security using IBM Endpoint Manager Mobile Device Management

IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

Securing Today s Mobile Workforce

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Symantec Enterprise Solution Product Guide

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

BYOD: BRING YOUR OWN DEVICE.

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Mobile Devices prioritize User Experience

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Quick Heal Mobile Device Management. Available on

Enterprise Security Solutions by Quick Heal. Seqrite.

Symantec and VMWare why 1+1 makes 3

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

ProteggereiDatiAziendalion-premises e nel cloud

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

SYMANTEC DATA CENTER SECURITY

NE Administering System Center Configuration Manager and Intune

Mobile Workforce Produc0vity Vision Jon Kuhn

Administer System Center Configuration Manager for Desktop Support

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Enterprise Security Solutions by Quick Heal. Seqrite.

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Software Management Nuts and Bolts

PKI is Alive and Well: The Symantec Managed PKI Service

Securing The Cloud in Today's Threat Landscape. David Dzienciol Vice President, Channels & SMB Asia Pacific Japan Region September 2011

Changing face of endpoint security

2013 InterWorks, Page 1

Securing Enterprise or User Brought mobile devices

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE

To the Designer Where We Need Your Help

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Symantec Network Access Control Starter Edition

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Securing Institutional Data in a Mobile World

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Managing outside the firewall and learn what is new in ITMS 7.5

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Administering System Center Configuration Manager and Intune

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Cybercrime e minacce informatiche: trend emergenti e soluzioni innovative u

Data Insight Feature Briefing Box Cloud Storage Support

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Symantec Endpoint Protection 12

Administering System Center Configuration Manager and Intune

SECURE, CENTRALIZED, SIMPLE

Make security part of your client systems refresh

1 Introduction Requirements Architecture Feature List... 3

The Evolution of Data Center Security, Risk and Compliance

Symantec Protection Engine

: 20696C: Administering System Center Configuration Manager and Intune

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008

Deploying Lookout with IBM MaaS360

Symantec Network Access Control Starter Edition

The Cloud Identity Crisis

Symantec Reference Architecture for Business Critical Virtualization

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Next-Gen CASB. Patrick Koh Bitglass

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

The McAfee MOVE Platform and Virtual Desktop Infrastructure

GlobalPlatform Trusted Execution Environment (TEE) for Mobile

Symantec Network Access Control Starter Edition

Application Virtualization Deep Dive: Taking Virtualization to the Next Level. Presentation Identifier Goes Here

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

1 Introduction Requirements Architecture Feature List... 4

Administering System Center Configuration Manager ( A)

Enterprise Mobility Roadmap Brian Uffelman

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Administrering System Center 2012 Configuration Manager vd

Securing the SMB Cloud Generation

M20696 Administering System Center Configuration Manager and Intune

A: Administering System Center Configuration Manager

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Administering System Center Configuration Manager

Junos Pulse Supported Mobile Platforms

Green IT: Start Saving Money

Transcription:

EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1

Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2

Leading Concerns In Enterprise Mobility Discussions Consumerization Apps Corp/Personal Buying Center AV, FW, SMS Antispam Asset/ Inventory Mgmt ios & Android Risk of Using Apps Data Loss Concerns Organization 3

Full Control Info/App Access Only Managed Unmanaged Consumerization is Driving Disruption Embracing the Personally-Owned & Unmanaged BYOD Data Sources: Gartner, & IDC Evolving Focus 246M Corp PCs 293M Personal PCs 819M Smartphones 116M Tablets Relevent Devices Today Future Devices 177M Corp PCs 300M Smartphones 15M Tablets Traditional Focus Corporate-Owned Personally-Owned Devices 4

Understanding Managed & Unmanaged Mobility Customers need to provide a solution for both the managed and unmanaged use cases within the enterprise Managed MDM enables device management & compliance MDM is a foundation for policy management Data separation solutions evolve through APIs Enterprise Use Cases Unmanaged Applications must be protected individually Data between applications must be secure Corporate / Personal separation becomes a non-issue Manage The Device Secure Apps & Data

Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 6

Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 7

Symantec Solutions Agents Management, Security & Identity Control Point Management Portal SMP (Altiris) / SCCM 8

Management Comprehensive Enterprise Mobility Management - MDM Enable Activate enterprise access, apps and data easily and automatically Secure Protect enterprise data and infrastructure from attack and theft Manage Control inventory and configuration with massive scalability 9

Enterprise Integration Single console and infrastructure for desktop, mobile and server management Role based Administration Reports Endpoint Admin Help Desk Enterprise Scalability Business Process Automation Flexibility x 20k+ 10

Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 11

2010/11 Trends Threats Documented new vulnerabilities on the rise 42% Most malware for mobiles are Trojans posing as legitimate apps s will be targeted more when used for financial transactions 12

Security for Android Android Security Agent Jun 12 Add to existing stable of Windows and Symbian device security Reputation based security Scheduled/Manual Anti-malware scanning App blacklist/whitelist enforcement Uninstall protection, resilience Basic locate/lock/passcode reset/wipe and anti-theft features managed centrally Single console mgmt/licensing/reporting, integrated with Management 13

Symantec s Comprehensive Solution User and App Access App and Data Device Management Threat Secure File Sharing Primary Products Symantec O 3 App Center Management Security App Center (Content Center) Complementary Products Symantec Managed PKI Symantec Validation and ID Service (VIP) Symantec Data Loss Prevention for Symantec Encryption Altiris Client Management Suite from Symantec Altiris IT Management Suite from Symantec Symantec Endpoint Symantec O 3 14

Personal App Center s Approach to Protecting Apps Symantec Apps Enterprise Mobility Console Mexico io-zone Internal Apps FORD Kaiser JPMC App Store Apps App Secure App Center Feature-set App deployment & provisioning User authentication across apps Copy & paste prevention Per app file encryption Remote data/app wipe ios & Android support 15

How It Works: Policy Management.IPA or.apk application file with standard libraries Wrapped with App Center libraries and policy controls ready for deployment

Next-Gen Enterprise App Store To Deliver Symantec Secured Apps

Lab Exercises 18

EMEA Vision Sessions Course Title Day Time EM IS PS Strategies for Security and Management in a and Virtual World Tuesday 01:30 PM Tuesday 02:45 PM ST B07 Beyond Management - The Complete Solution to Enterprise Mobility Tuesday 04:15 PM EM B09 Solving BYOD - Securing Apps and Enterprise Data on Personal Devices Wednesday 03:45 PM EM L12 Symantec Management and VeriSign Managed PKI Wednesday 05:15 PM EM L05 Managing ios and Android Devices with Symantec Management Thursday 10:30 AM ST B07 Beyond Management - The Complete Solution to Enterprise Mobility Thursday 10:30 AM EM B20 Apple ios and Google Android Technical Overview Thursday 11:45 AM EM B15 Deploying Management and Security Agents to Devices Thursday 01:45 PM 19

Thank you! Scott Jareo Scott_jareo@symantec.com 781-530-2464 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 20