Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Similar documents
Copyright 2011 Trend Micro Inc.

Securing Today s Mobile Workforce

Mobile Security using IBM Endpoint Manager Mobile Device Management

Securing the SMB Cloud Generation

Consumerization: What It Means to IT Operations

Hosted Exchange. Presented by Joseph Lee

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Enterprise Mobility Management

Enabling the Mobile Workforce

Six steps to control the uncontrollable

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

EM L01 Introduction to Mobile

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Office 365 Business The Microsoft Office you know, powered by the cloud.

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

Mobile Device Management: A Real Need for the Mobile World

2013 InterWorks, Page 1

The Future of Mobile Device Management

Securing Enterprise or User Brought mobile devices

Phil Schwan Technical

Enterprise Mobility Management Buyers Guide

Your World Is on the Move

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Securing Your Journey to the Cloud. CEO Eva Chen

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Stopping Advanced Persistent Threats In Cloud and DataCenters

Why Nomadesk is the right product! for your reseller!!

RHM Presentation. Maas 360 Mobile device management

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Mobile Devices prioritize User Experience

Make security part of your client systems refresh

Commercial Product Matrix

Go mobile. Stay in control.

About us. How we help?

Microsoft Office 365 Enterprise from Vodafone. The power to collaborate

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

Symantec Endpoint Protection Family Feature Comparison

Encryption Vision & Strategy

ModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific

Mobile Security / Mobile Payments

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

XenApp, XenDesktop and XenMobile Integration

Securing the Modern Data Center with Trend Micro Deep Security

INDIA The Changing Face of the Workplace: Going Light and Mobile

Google Identity Services for work

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

SEPARATING WORK AND PERSONAL

Quick Heal Mobile Device Management. Available on

Enterprise Security Solutions by Quick Heal. Seqrite.

device management solution

Kaspersky Small Office Security 5. Product presentation

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Details on Integration Features

MICROSOFT APPLICATIONS

Protecting Health Information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

IBM Lotus Notes Traveler

Basic. $5/user per mo.

Why is Office 365 the right choice?

Trend Micro and IBM Security QRadar SIEM

Security Challenges: Integrating Apple Computers into Windows Environments

Why the cloud matters?

A Guide to Closing All Potential VDI Security Gaps

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

ENTERPRISE MOBILITY TRENDS

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

MORE THAN AN IT COMPANY. Click to Start YOUR BUSINESS IT SOLUTIONS PARTNER. When and where you need us since 2001

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Streamline IT with Secure Remote Connection and Password Management

PROTECTION SERVICE FOR BUSINESS. Datasheet

Powerful, affordable Unified Endpoint Management. Fusion UEM. Web:

UNCLASSIFIED. Mimecast UK Archiving Service Description

BIG IDEAS FOR SmAll BuSInESS:

Top. Reasons Legal Teams Select kiteworks by Accellion

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Mitel MiCollab. Keeping People Connected and Productive Anytime, Anywhere, on Any Device

1 Introduction Requirements Architecture Feature List... 3

Microsoft Office 365 for Business. Your office-on-the-go. Get more work done virtually anytime, anywhere, on any device.

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

ProteggereiDatiAziendalion-premises e nel cloud

OFFICE 365 AT A GLANCE

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Junos Pulse Supported Mobile Platforms

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Details on Integration Features

Transcription:

Trend Micro Guide and solution to help embrace Consumerization and BYOD James Walker EMEA Product Marketing Manager 26 September 2012

Agenda Consumerization What is it? What should I do? Mobile Security is Real! How does it work? Customer Pain What is Trend Micro Mobile Security? Value proposition SafeSync - Data Access, Sync and Sharing for Enterprises 9/26/2012 2 Confidential Copyright 2012 Trend Micro Inc.

Consumerization The Driver! 9/26/2012 3 Confidential Copyright 2012 Trend Micro Inc.

Consumerization of IT Consumerization will be the most significant trend affecting IT during the next 10 years Gartner Popular new consumer technology spreads into business organizations IT and consumer electronics converge as the same devices are used for work and play Power shifts from corporate IT and enterprise vendors (IBM, HP) to end users and innovative consumer vendors (Apple, Google)

Not just mobile devices ocial Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice ver IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi ile Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Email ideoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices ocial Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice ver IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi ile Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Email ideoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices ocial Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice ver IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi ile Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Email ideoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices ocial Networking Email Voice over IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice ver IP Cloud Applications Wi-Fi File Transfer/Sharing Videoconference Mobile devices Social Networking Email Voice over IP Cloud Applications Wi-

The IT View: Current Pain Points ipad 6

What s Really Happening The current pain points are simply the leading edge of a bigger wave. Tactical solutions will always remain reactive and be susceptible to disruption by the next wave. iphone ipad Windows phone 7

Embrace Is the Optimal Approach 1 2 3 Strategy: Create a plan Say YES but not to everything for everyone Deploy an enterprise-grade infrastructure

Mobile Threats They are real and growing!! 9/26/2012 9 Confidential Copyright 2012 Trend Micro Inc.

Mobile OS Shipments - Android and ios Dominate for Now! Q1 2011 the combined share was only 54.4% of all devices shipped 1 year later (Q1 2012) its 82%! ios and Android now the dominant Smartphone and Tablet OS s Q1 2012 (WW) Android 59% ios 23% 152.9M Units Source - IDC

Android is where the action is.. Estimated number of unique Android malware samples by end of 2012 11

The reality of mobile malware! 9/26/2012 12 Confidential Copyright 2012 Trend Micro Inc.

Malicious Marketplace Social Engineering March 2011-58 malicious apps (approx 250,000 victims) Actually reads Mobiie the l is a capital i May 2011-24 malicious apps (up to 120,000 victims) December 2011-27 malicious apps (approx 14,000 victims). February 2012 37 Fan Apps stealing handset information and aggressive advertising

Customers Challenges 9/26/2012 14 Confidential Copyright 2012 Trend Micro Inc.

Three Main Customer Challenges How can I? Minimize the cost and effort associated with managing these devices My executives all showed up with ipads, what do I do now? Financial services firm - Fortune 500 Protect corporate data, especially if the device is lost or stolen Who knows what could happen when our corporate data is on all of these personal devices?" Aerospace company Global How do I separate corporate data from personal data on the user s device?" Agribusiness Ensure the device is safe to access my networks, applications and data [Android and ipads], it s like unprotected PCs Bank Mid-Sized

The Solution! Trend Micro Mobile Security 8.0 9/26/2012 16 Confidential Copyright 2012 Trend Micro Inc.

The Complete Endpoint Security Solution OfficeScan Windows Anti-Malware Device Control Data Leak Prevention Virtual Desktop Security Mobile Security Intrusion defence Firewall Virtual Patching Mac Anti-Malware 9/26/2012 17 Confidential Copyright 2012 Trend Micro Inc.

What is Trend Micro Mobile Security? Trend Micro Mobile Security helps businesses embrace Consumerization and BYOD by addressing their concerns and giving them the control and visibility they need to manage a diverse mobile device estate. Providing the business with improved productivity and flexibility of the workforce, as well as cost savings Mobile Security has the following functionality: Data Protection Mobile Application Management Mobile Device Management Mobile Device Security 9/26/2012 18 Confidential Copyright 2012 Trend Micro Inc.

Trend Micro Mobile Security 8.0 Mobile Device Management Device Discovery Device Enrollment Device Provisioning S/W Management Remote Control Reporting Inventory Man. Remote Locate Summary Views Summery Reports Data Protection Encryption Enforcement Remote Wipe Selective Wipe Remote Lock SIM Change/ Watch Feature Control / Lock Password Policy Mobile Device Security Anti-Malware Firewall Web Threat Protection Call Filtering SMS/WAP Anti-Spam Jail break detection Application Management App Black Listing App White Listing App Push Required Optional App Inventory Centralised Policy Management Single Platform Integrates directly into OfficeScan as a Plug in Note: Hosted version of TMMS coming in November 2012

SafeSync for Business / Enterprise? Enables businesses to easily and securely access, share and sync their company data and files from any place any anytime and from any device SYNC and PROTECT Synchronizes all desired data to the cloud and personal devices, automatically, instantly and continuously Keeps data safe in case of hardware failure or loss Sync data between Mac and Windows PCs Restore deleted files Restore and view previous versions of files. SHARING Secure and simple sharing for colleagues and external parties Instant secure shareable file and folder link Team folders controlled internal folder for team collaboration - File server as a service (Team Folder is accessible through local SafeSync folder) STORE and MANAGE Gives each employee / user their own personal storage space Pooled storage for whole company No complicated quotas Web console for each user to control storage and access files from the web Centralized admin console for account control Data Files and folders ACCESS ANYWHERE Access files and folders from anywhere, anytime from any device Access data in the cloud from any web browser (Internet Explorer, Firefox, Chrome and Safari) Access all files and folders directly from any personal devices. Supports Windows, Mac, ios (iphone and ipad), and Android devices.

Functionality SafeSync Family Coming November 2012 SafeSync for consumer Trend Hosted No Customisation SafeSync for Business Trend Hosted No Customisation SafeSync for Enterprise Customer on premises only - Limited Customisation SafeSync for Service Providers Service Provider Hosted Full customisation Available In Development Time 9/26/2012 21 Confidential Copyright 2012 Trend Micro Inc.

Trend Micro Solutions for the Consumerization of IT Achieve the ideal balance of control and freedom to embrace consumerization and unlock opportunity Trend Micro Mobile Security is one of many solutions from Trend Micro that help businesses tackle consumerization Regain visibility & control Mobile Security 8 OfficeScan Deep Security Titanium Titanium for Android Share with confidence DLP for OfficeScan OfficeScan VDI Deep Security SafeSync for Business SecureCloud Protect data anywhere Endpoint Encryption DLP for OfficeScan SafeSync for Business SecureCloud CONTROL Company-owned, fully managed Employee-owned, full BYOIT

Thank You! 9/26/2012 Confidential Copyright 2012 Trend Micro Inc. 23