SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
security in a hybrid mam & Mdm world
                        Carlos Montero-Luque, SVP Engineering




Tuesday, July 31, 12
mobility management
                       •   “It’s appropriate to manage the device if you own that
                           device... If the corporation owns the device, it should
                           manage that device. When is it valid to manage the
                           application? Always”

                              •   Alan Murray, SVP Products, Apperian

                       •   “IT should not manage what it does not own”

                              •   Gartner


Tuesday, July 31, 12
enterprise mobility management

                       •   Enterprise Mobility Management has become a core policy
                           for CIO’s

                       •   Mobile BYOD is no longer a trend, but a way of life for most
                           organizations

                            •   The economics of BYOD, if done properly, are favorable
                                for organizations that manage and embrace it



Tuesday, July 31, 12
mobility and It
                       •   The life of the IT manager has not changed, it simply got
                           more complicated

                       •   Issues that were relegated to management behind a firewall
                           are now extended by two major IT trends:

                            •   Cloud computing

                            •   Mobile computing

                       •   Security, compliance, governance, remediation, those issues
                           are as important as ever
Tuesday, July 31, 12
The dilemma for it

                       •   IT has two key responsibilities:

                            •   Provide expected and certifiable security, protection,
                                compliance

                            •   Provide applications and content required by users




Tuesday, July 31, 12
extending to mobility
                       •   The issues that are relevant in “traditional” client platforms
                           are just as important in mobility:

                            •   Acquiring and deploying applications and content

                            •   Delivering content to users, securely

                            •   Enabling access to internal and external required
                                content

                            •   Managing infrastructure

Tuesday, July 31, 12
CONSTRAINTS
                       •   IT needs to deal with these new requirements:

                            •   Cost-effectively

                            •   From multiple form-factors

                            •   Securely and by policy

                            •   With appropriate management

                            •   Dealing with a new IT experience

                            •   In BYOD environments
Tuesday, July 31, 12
Enterprise mobility management and
                                    security
                       •   Security is a core requirement

                       •   Mobile Application Management provides key elements for security
                           in enterprise mobile environments

                       •   The draft of NIST Special Publication 800-124 defines security
                           objectives:

                            •   Confidentiality of data

                            •   Integrity of data

                            •   Availability of resources

Tuesday, July 31, 12
apperian and enterprise mobile
                                       security
                       •   The Apperian AppBus architecture describes a holistic view
                           for securing enterprise assets in a mobile environment

                            •   Securing access to the mobile environment,
                                applications, and content via Mobile Application
                                Management

                            •   Ensuring the integrity of content and applications

                            •   If needed, securing devices via Mobile Device
                                Management or native device security tools

Tuesday, July 31, 12
apperian appBus
                                          Custom             Market
                                           apps               place                      Admin portal                                     Catalog

                                                   inspect               secure         extend            personalize     Analyze            engage
                                                                                                 AppBus

                                                                      Enterprise App Services Environment (EASE)



                 inspect                 secure                                   extend                  personalize                      analyze              engage
        ✦   Code check &         ✦   Device wipe                        ✦   SDK: notifications,       ✦    Custom EULA               ✦   App Inventory    ✦   App ratings
            reporting            ✦   Device lock                            ver checking &           ✦    Branded catalog           ✦   Usage reports    ✦   Crowdsourcing
                                                                            forced updates
        ✦   Signing validation   ✦   App delete                                                      ✦    App categories            ✦   Device details   ✦   Beta testing
                                                                        ✦   SSO (SAML 2.0)                                                                   segmenting
                                 ✦   App Policies: data                     integration
                                                                                                     ✦    Limit app access by
        ✦   Malware detection
                                     encryption, copy/                                                    role
                                     paste prevention,
                                     required passcode
                                 ✦   App-level VPN


Tuesday, July 31, 12
nist guidelines to improve mobile
                                        security

                       •   Develop models for system threats to devices and corporate
                           assets accessed through them

                            •   Identification, likelihood, impact, analysis, controls




Tuesday, July 31, 12
required security services

                       •   General policy

                       •   Data Communication and storage - Apperian EASE

                       •   User and device authentication - Apperian EASE

                       •   Applications - Apperian EASE




Tuesday, July 31, 12
apperian EASE capabilities
                       MAM#Lifecycle#

                               Source       Prepare      protect        manage       publish




                              ✓   Inspect apps for non-conformance & malware
                              ✓   Apply set of policies to an App file with no coding
                              ✓   Securely install Apps over-air to multiple devices to scale
                              ✓   Provide private app catalog to deliver custom apps
                              ✓   Create analytics on app usage by user/app/group


Tuesday, July 31, 12
mobile device security policy

                       •   Which mobile devices can access enterprise resources

                       •   Which resources are accessible

                       •   Device provisioning

                       •   Administering management software
                       •   Consistency with non-mobile environments



Tuesday, July 31, 12
operational aspects in a mobile
                                     environment

                       •   Implementation and testing of a solution prototype

                       •   Securing devices to allow resource access

                       •   Maintaining the mobile environment security




Tuesday, July 31, 12
SUMMARy
                       •   Enterprise Mobility Management is a core policy and needs to be
                           a core capability for a growing number of CIOs
                       •   Security in a mobile environment has a number of layers to it,
                           sometimes applying to devices, but always applying to corporate
                           assets, including user access, applications, and content
                       •   Standardizing the security in an enterprise mobile environment
                           uses a number of processes, tools, and techniques. MAM provides
                           a comprehensive set of tools to secure corporate assets. MDM can
                           complement those tools by managing device security, if needed


Tuesday, July 31, 12
Thanks




Tuesday, July 31, 12

Más contenido relacionado

La actualidad más candente

IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011IBM Sverige
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseScott K. Wilder
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile securityJ Hartig
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 

La actualidad más candente (20)

IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Windows intune
Windows intuneWindows intune
Windows intune
 
About Acumin
About AcuminAbout Acumin
About Acumin
 

Destacado

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian WebinarApperian
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Ancillaries: Final!
Ancillaries: Final!Ancillaries: Final!
Ancillaries: Final!GeeetarBen
 
Тариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникацииТариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникацииSocialMediaClubCA
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных креселAndreykireenkov
 
презентация фотоомоложения ell
презентация фотоомоложения ellпрезентация фотоомоложения ell
презентация фотоомоложения ellAndreykireenkov
 
2 класс. lesson 33. она может скакать через скакалку
2 класс. lesson 33. она может скакать через скакалку2 класс. lesson 33. она может скакать через скакалку
2 класс. lesson 33. она может скакать через скакалкуshpinat
 
NinjaChix Magazine Proposal
NinjaChix Magazine ProposalNinjaChix Magazine Proposal
NinjaChix Magazine ProposalNicole D.
 
Benvenuto nel più grande progetto Internet
Benvenuto nel più grande progetto InternetBenvenuto nel più grande progetto Internet
Benvenuto nel più grande progetto InternetIvan Baudino
 
News international media briefing december
News international media briefing   decemberNews international media briefing   december
News international media briefing decembermindshareinfectious
 
Be German About Your Frontend
Be German About Your FrontendBe German About Your Frontend
Be German About Your FrontendArush Sehgal
 
Relationship between bribery and economic growth
Relationship between bribery and economic growthRelationship between bribery and economic growth
Relationship between bribery and economic growthNavin Elias
 
Internet
InternetInternet
InternetGhe Jrs
 
Lesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаLesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаshpinat
 

Destacado (20)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Energy Coops
Energy CoopsEnergy Coops
Energy Coops
 
Ancillaries: Final!
Ancillaries: Final!Ancillaries: Final!
Ancillaries: Final!
 
North island college
North island collegeNorth island college
North island college
 
Тариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникацииТариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникации
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных кресел
 
презентация фотоомоложения ell
презентация фотоомоложения ellпрезентация фотоомоложения ell
презентация фотоомоложения ell
 
2 класс. lesson 33. она может скакать через скакалку
2 класс. lesson 33. она может скакать через скакалку2 класс. lesson 33. она может скакать через скакалку
2 класс. lesson 33. она может скакать через скакалку
 
NinjaChix Magazine Proposal
NinjaChix Magazine ProposalNinjaChix Magazine Proposal
NinjaChix Magazine Proposal
 
Benvenuto nel più grande progetto Internet
Benvenuto nel più grande progetto InternetBenvenuto nel più grande progetto Internet
Benvenuto nel più grande progetto Internet
 
Economics and wealth
Economics and wealthEconomics and wealth
Economics and wealth
 
Dakar2012
Dakar2012Dakar2012
Dakar2012
 
News international media briefing december
News international media briefing   decemberNews international media briefing   december
News international media briefing december
 
Be German About Your Frontend
Be German About Your FrontendBe German About Your Frontend
Be German About Your Frontend
 
Relationship between bribery and economic growth
Relationship between bribery and economic growthRelationship between bribery and economic growth
Relationship between bribery and economic growth
 
Internet
InternetInternet
Internet
 
Lesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаLesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школа
 

Similar a Security In A Hybrid MAM and MDM World

Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
Apperian brian day
Apperian brian dayApperian brian day
Apperian brian dayMassTLC
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012Warpcare
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Ed Brill
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochuremartgroot
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 

Similar a Security In A Hybrid MAM and MDM World (20)

Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Apperian brian day
Apperian brian dayApperian brian day
Apperian brian day
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochure
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 

Más de Apperian

Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesApperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 

Más de Apperian (16)

Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Security In A Hybrid MAM and MDM World

  • 1. security in a hybrid mam & Mdm world Carlos Montero-Luque, SVP Engineering Tuesday, July 31, 12
  • 2. mobility management • “It’s appropriate to manage the device if you own that device... If the corporation owns the device, it should manage that device. When is it valid to manage the application? Always” • Alan Murray, SVP Products, Apperian • “IT should not manage what it does not own” • Gartner Tuesday, July 31, 12
  • 3. enterprise mobility management • Enterprise Mobility Management has become a core policy for CIO’s • Mobile BYOD is no longer a trend, but a way of life for most organizations • The economics of BYOD, if done properly, are favorable for organizations that manage and embrace it Tuesday, July 31, 12
  • 4. mobility and It • The life of the IT manager has not changed, it simply got more complicated • Issues that were relegated to management behind a firewall are now extended by two major IT trends: • Cloud computing • Mobile computing • Security, compliance, governance, remediation, those issues are as important as ever Tuesday, July 31, 12
  • 5. The dilemma for it • IT has two key responsibilities: • Provide expected and certifiable security, protection, compliance • Provide applications and content required by users Tuesday, July 31, 12
  • 6. extending to mobility • The issues that are relevant in “traditional” client platforms are just as important in mobility: • Acquiring and deploying applications and content • Delivering content to users, securely • Enabling access to internal and external required content • Managing infrastructure Tuesday, July 31, 12
  • 7. CONSTRAINTS • IT needs to deal with these new requirements: • Cost-effectively • From multiple form-factors • Securely and by policy • With appropriate management • Dealing with a new IT experience • In BYOD environments Tuesday, July 31, 12
  • 8. Enterprise mobility management and security • Security is a core requirement • Mobile Application Management provides key elements for security in enterprise mobile environments • The draft of NIST Special Publication 800-124 defines security objectives: • Confidentiality of data • Integrity of data • Availability of resources Tuesday, July 31, 12
  • 9. apperian and enterprise mobile security • The Apperian AppBus architecture describes a holistic view for securing enterprise assets in a mobile environment • Securing access to the mobile environment, applications, and content via Mobile Application Management • Ensuring the integrity of content and applications • If needed, securing devices via Mobile Device Management or native device security tools Tuesday, July 31, 12
  • 10. apperian appBus Custom Market apps place Admin portal Catalog inspect secure extend personalize Analyze engage AppBus Enterprise App Services Environment (EASE) inspect secure extend personalize analyze engage ✦ Code check & ✦ Device wipe ✦ SDK: notifications, ✦ Custom EULA ✦ App Inventory ✦ App ratings reporting ✦ Device lock ver checking & ✦ Branded catalog ✦ Usage reports ✦ Crowdsourcing forced updates ✦ Signing validation ✦ App delete ✦ App categories ✦ Device details ✦ Beta testing ✦ SSO (SAML 2.0) segmenting ✦ App Policies: data integration ✦ Limit app access by ✦ Malware detection encryption, copy/ role paste prevention, required passcode ✦ App-level VPN Tuesday, July 31, 12
  • 11. nist guidelines to improve mobile security • Develop models for system threats to devices and corporate assets accessed through them • Identification, likelihood, impact, analysis, controls Tuesday, July 31, 12
  • 12. required security services • General policy • Data Communication and storage - Apperian EASE • User and device authentication - Apperian EASE • Applications - Apperian EASE Tuesday, July 31, 12
  • 13. apperian EASE capabilities MAM#Lifecycle# Source Prepare protect manage publish ✓ Inspect apps for non-conformance & malware ✓ Apply set of policies to an App file with no coding ✓ Securely install Apps over-air to multiple devices to scale ✓ Provide private app catalog to deliver custom apps ✓ Create analytics on app usage by user/app/group Tuesday, July 31, 12
  • 14. mobile device security policy • Which mobile devices can access enterprise resources • Which resources are accessible • Device provisioning • Administering management software • Consistency with non-mobile environments Tuesday, July 31, 12
  • 15. operational aspects in a mobile environment • Implementation and testing of a solution prototype • Securing devices to allow resource access • Maintaining the mobile environment security Tuesday, July 31, 12
  • 16. SUMMARy • Enterprise Mobility Management is a core policy and needs to be a core capability for a growing number of CIOs • Security in a mobile environment has a number of layers to it, sometimes applying to devices, but always applying to corporate assets, including user access, applications, and content • Standardizing the security in an enterprise mobile environment uses a number of processes, tools, and techniques. MAM provides a comprehensive set of tools to secure corporate assets. MDM can complement those tools by managing device security, if needed Tuesday, July 31, 12