Securing Today s Mobile Workforce

Similar documents
Mobile Devices prioritize User Experience

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Key Features. DATA SHEET

Quick Heal Mobile Device Management. Available on

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

CA Host-Based Intrusion Prevention System r8

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

A Guide to Closing All Potential VDI Security Gaps

Google Identity Services for work

Mobility, Security Concerns, and Avoidance

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Enterprise Security Solutions by Quick Heal. Seqrite.

Mobile Security / Mobile Payments

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Enterprise Security Solutions by Quick Heal. Seqrite.

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

2013 InterWorks, Page 1

Managing Windows 8.1 Devices with XenMobile

What is a mobile protection product?

BYOD: BRING YOUR OWN DEVICE.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Protecting Health Information

The Device Has Left the Building

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

CA Security Management

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Symantec Client Security. Integrated protection for network and remote clients.

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

About us. How we help?

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Make security part of your client systems refresh

McAfee Embedded Control

Microsoft 365 Business FAQs

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Topics. Ensuring Security on Mobile Devices

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Device Management: A Real Need for the Mobile World

Mobility Advantage: Why Secure Your Mobile Devices?

Integrated Access Management Solutions. Access Televentures

XenApp, XenDesktop and XenMobile Integration

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Best practices with BYOD. Title. Prepared by: Paul Dalton, Security Consultant

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

EM L01 Introduction to Mobile

Enterprise Mobility Management Buyers Guide

The security challenge in a mobile world

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

Secure Access for Microsoft Office 365 & SaaS Applications

Changing face of endpoint security

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

BUFFERZONE Advanced Endpoint Security

Total Threat Protection. Whitepaper

The Future of Mobile Device Management

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Next Generation Privilege Identity Management

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

BUFFERZONE Advanced Endpoint Security

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Symantec Endpoint Protection 14

HP Security Solutions for business PCs. Comprehensive protection measures so you can work smarter and with greater confidence.

white paper SMS Authentication: 10 Things to Know Before You Buy

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

mhealth SECURITY: STATS AND SOLUTIONS

Citrix XenMobile and Windows 10

device management solution

White Paper Securing and protecting enterprise data on mobile devices

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Exclusive Selling Mobility with Security

HPE Intelligent Management Center

McAfee Embedded Control

MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Symantec Endpoint Protection Family Feature Comparison

Comodo Device Manager Software Version 4.0

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Securing Health Data in a BYOD World

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Bring Your Own TVH. Kalman Tiboldi CBIO

Six steps to control the uncontrollable

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Top Network Considerations for Enterprise Mobility and BYOD

MDM and beyond: Rethinking mobile security in a BYOD world

Managing BYOD Networks

McAfee Embedded Control for Healthcare

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Transcription:

WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security

Table of Contents Executive Summary.................................................................................. 3 Introduction......................................................................................... 3 Total Defense Mobile Security......................................................................... 4 Develop Flexible Mobility Policies.......................................................................5 Support the Latest Mobile Devices...................................................................... 5 Loss and Theft Protection............................................................................. 5 Mobile Device Management (MDM)...................................................................... 6 Conclusion.......................................................................................... 6-7 About Total Defense.................................................................................. 7

Executive Summary Businesses today are challenged with deploying mobile security and granular access control on a growing number of diverse mobile platforms, including apple ios, Google Android, and RIM Blackberry. With increasing choices of smartphones, tablets, and other types of mobile devices, employees often bring their personal devices into the enterprise and use them to access corporate resources. This has started the trend of bring your own device to work (or byod ), encouraging employees to use their own personal mobile devices to access the enterprise network and resources. But, byod carries with it issues such as mobile and network security, and it further burdens IT staff with the increasing consumerization of IT. Also, when personal mobile devices used at work are lost or stolen, businesses risk losing sensitive corporate data such as e-mails, critical documents, or even valuable intellectual property (IP). Total Defense Mobile Security creates a comprehensive solution that protects and manages enterprise mobility. The Total Defense solution consists of mobile device security and management. With this solution, businesses can rise above the challenges of a heterogeneous mobile environment, as well as secure mobile devices from malicious attacks and theft. The richness of mobile security is featured in this solution. Overview Many businesses today struggle with the challenges of enabling secure, remote network and application access for mobile device users, while conforming to corporate security policies. This paper describes how Total Defense Mobile Security alleviates today s enterprise mobility challenges. With an enabling interface downloadable from leading mobile operating system application stores, and a web-based management console, Total Defense Mobile Security enables businesses to deploy security, device management, and remote access for mobile devices at scale that create a compelling mobility solution for businesses worldwide. Introduction Users are beginning to utilize their own personal mobile devices smartphones, tablets, and the like to access corporate data and applications. These mobile devices are less cumbersome to carry than laptop computers, and they have the features and applications needed to deliver vital corporate data to mobile or remote users. The concept of corporate issued mobile devices is fading fast, replaced by the trend of byod. But enabling corporate access on personal mobile devices requires businesses to enforce similar corporate policies, including authentication methods, data protection, access and security settings, device management, and endpoint assessment. These are already in place for their corporate managed Windows, Mac OS, and Linux based systems. With the enhanced portability of mobile devices comes the risk of increased loss and theft of these devices. Businesses risk loss of valuable, sensitive corporate data when a mobile device is lost or stolen. Users also risk loss of their personal data on lost or stolen mobile devices, since some applications are designed to store passwords, credit card numbers, bank account information, and other personal data, as well as store passwords for accessing personal apps such as social networking and business apps.

Finally, mobile devices run a variety of operating systems designed specifically for their smaller form factor. Most of the mobile platforms are open for third-party application development, and they support thriving application stores or marketplaces for these independently developed mobile apps. Unfortunately, this also presents a huge opportunity for hackers to build malicious applications for unsuspecting users to download. The number of threats such as viruses, trojans, and malware reported on mobile devices is increasing rapidly. The proliferation of mobile devices presents several challenges to businesses: Adapting mobility policies to align with the current trend of employees using personal mobile devices for corporate use Securing corporate and personal data, and mobile devices from malware, viruses, and malicious applications Mitigating the risk of loss, theft, or exploitation of corporate and personal data residing on mobile devices Providing all of the above for an ever increasing range of mobile devices and platforms, including Apple ios, Google Android, and Blackberry devices Total Defense Mobile Security Total Defense Mobile Security is a comprehensive solution that enables businesses to secure and manage mobile devices at scale. It protects mobile devices against malware, viruses, trojans, spyware, and other threats, as well as malicious attacks on all of today s leading mobile platforms and operating systems. Total Defense Mobile Security also includes mobile device management and configuration features that mitigate the risk of losing corporate as well as personal data on lost or stolen devices; provides device configuration for accounts, policies, and application restrictions; provisions certificates; queries for, collects, and leverages device information, compliance data, and GPS position; assesses application asset management and inventory; and provides device management configuration. Total Defense Mobile Security is available for the following mobile platforms in their respective application stores: Apple ios 4.X or later Google Android 2.X, 3.0 (Honeycomb), and 4.0 (Ice Cream Sandwich) Blackberry 4.2 or later For an administrator to configure and manage mobile security policies, Total Defense Mobile Security also includes the Mobile Security management console. The management console is available as a hosted Software-as-a-Service (SaaS) web-based console, simplifying deployment within an enterprise, without the need to set up and maintain an onsite server. The Total Defense Mobile Security management console keeps all of the Mobile Security-enabled devices automatically updated with the latest emerging threat definitions, and also provides detailed reports on virus infections, updates, and the latest threats detected on mobile devices accessing the enterprise network.

Develop Flexible Mobility Policies Businesses can leverage Total Defense Mobile Security to adapt to the current trend of employees and other authorized individuals using their personal mobile devices to access corporate data. They can meet this challenge by securing the user s mobile device from threats. This allows for a flexible mobility policy, enabling more employee choice, while at the same time not compromising corporate security policies. The solution also enables businesses to support a heterogeneous mobile environment spanning multiple mobile platforms, differing significantly from most current mobile security deployments, only supporting one or two mobile platforms. Support the Latest Mobile Devices Total Defense Mobile Security enables businesses to support new devices and mobile operating systems as soon as they hit the market. The solution supports a broad range of operating system platforms, including Apple ios, Google Android, and RIM Blackberry. These leading mobile operating systems are powering a large majority of smartphones, tablets, and other mobile devices available worldwide. Businesses can remain assured that by deploying Total Defense Mobile Security, they will be able to support new mobile devices available in the market that run any of the supported mobile platforms. When employees replace their personal mobile devices with new devices, the administrator can simply de-provision the older device from the network and provision security on the newer device. This also enables a flexible model of provisioning access to new mobile devices and de-provisioning lost or stolen devices. The Total Defense Mobile Security antimalware service updates its virus signatures in real time over the air (ota). These signatures are downloaded dynamically to every mobile device running Total Defense Mobile Security without requiring intervention by either the user or the enterprise. This enables a low cost, real-time enforcement model for security policies on all supported devices. Loss and Theft Protection Businesses can use Total Defense Mobile Security to retrieve lost or stolen devices by either remotely locating them via the device s GPS, or by remotely setting off alarms. If the device has indeed been stolen, an administrator can remotely lock the device, or even remotely wipe the device s contents through the Total Defense Mobile Security management console. Businesses and users can also remotely back up the content of users mobile devices and restore the backed up data to a new device when the user or businesses replaces the lost or stolen device, regardless whether the replaced device is the same make of smartphone or tablet, or if it uses the same mobile operating system as the lost or stolen device. The loss prevention and control features of Total Defense Mobile Security are easily administered via a web-based management console. This gives administrators the ability and control to proactively protect the business and user from losing valuable data. 5 Geek With Laptop European Study Reveals: Social Networking Increases Productivity, http://www.geekwithlaptop.com/european-study-reveals-social-networking-increases-productivity, December 2008

Mobile Device Management (MDM) Total Defense Mobile Security supports MdM capabilities for most major mobile operating system platforms, enabling businesses to set and enforce granular security and management policies on company-owned and operated devices, as well as personal mobile devices used to access the network and its resources. By supporting MdM capabilities on Apple ios2, which is the mobile operating system platform for Apple iphones, ipads, and ipod touch devices, Total Defense Mobile Security is easing the burden on the IT staff when it comes to the growing consumerization of IT. By empowering an administrator to enable or disable certain features, to allow or disallow specific applications, and to remotely enforce security policies on a user s personal device when it is being used within the enterprise (or to access the enterprise network and its applications and data). Total Defense Mobile Security helps to ensure security for and from personal mobile devices and unapproved mobile apps and functions. The ability to define and enforce security policies and application restrictions protects the user, the device, the business, personal and enterprise data, and intellectual property from exploit, harm, or misuse. Total Defense Mobile Security can also query an iphone or IPad for specific device and compliance information, as well as enable an inventory of apps loaded on the device. It can also capture the GPS location of an Apple ios or Google Android device. By capturing the device s GPS location, a business or employee can locate and track an employee s lost or stolen mobile device regardless if it is a personal or corporate-issued device. The device may also be remotely locked and wiped of data, particularly effective if the mobile device has been stolen for nefarious purposes. For specific Google Android-based mobile devices with the appropriate permissions and access rights, Total Defense Mobile Security can allow businesses to automatically remove apps with no user interaction or user notification of the app s removal. Also, Total Defense Mobile Security will automatically remove identified malware on specific manufacturers Android mobile devices, again without user intervention or knowledge, and only with the proper permissions and rights. If an application is automatically removed from an employee s android device, the application s removal will be noted for an administrator on the Total Defense Mobile Security management console. The MdM capabilities for android-based devices in Total Defense Mobile Security are available with android-based mobile devices from various manufacturers. Please refer to the Total Defense Mobile Security supported platforms document for further details on supported Android devices. Conclusion Total Defense Mobile Security is a comprehensive mobile security solution that protects businesses, their networks, clouds and data by securing mobile devices against a wide range of threats such as viruses, malware, trojans, and worms. It provides businesses with the security tools they need to manage a non-homogenous mobile environment and mitigates the risks of losing sensitive, critical corporate and personal data on lost or stolen mobile devices. These tools include the ability to remotely locate, track, wipe, and lock an employee s or other authorized user s mobile device, as well as the ability to set and manage device passcodes (for Apple ios devices) and set off remote alarms on a lost or stolen device. The deployment of Total Defense Mobile Security as a hosted SaaS offering provides the flexibility businesses need to centrally manage all mobile security policies for their networks. Total Defense Mobile Security as a hosted SaaS environment allows businesses to quickly deploy and secure their network from insecure or ill-secured mobile devices, as well as expedite mitigation when exposed to infection and exploit.

Businesses can also cut their overall security expenses specifically mobile security expenses since a SaaS solution does not require as many resources to deploy and maintain, and can support today s vast array of mobile devices needing secure access to the corporate network environment. Businesses can enable increases to the number of secured mobile devices and users simply and quickly, while allowing the business to add new mobile security features or take advantage of new security features and capabilities remotely. About Total Defense Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 50,000 businesses across a wide spectrum of industries have deployed the Company s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense s products. The Company s solutions include anti-malware, anti-virus, parental controls, intrusion prevention, mobile security, online back-up and PC optimization. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, India and Asia. Contact Total Defense Contact details are available online at: www.totaldefense.com