SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Security Threats &
Breaches: Keeping your
Mobile Devices Secure
Here’s what we’ll cover today:
   Welcome & Introduction
   The reality of security breaches AND increasing
    mobility
   Solution overview: Using ZENworks to keep you
    out of the headlines

      Extending Network Security
      Reporting features                Demo
      Ease of Management

   Questions, Discussion & Next Steps
Novell Platinum Partner
            Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina


   Collaboration, Conferencing & Messaging
   Converged IP networking & telephony
   Network Resource Management solutions
   Wireless & Mobile Workforce solutions
   Data Storage, Archiving & Disaster Recovery
   Network Support & Optimization
   Virtualization
   Data Security
   Managed Services
   Training
The Reality of Today’s Security Breaches
Cherry Hill, NJ – October 8, 2012
2 data backup tapes were lost during shipping in late March 2012. The tapes
included customer names, Social Security numbers, addresses, account
numbers, debit card numbers, and credit card numbers.


                                                    Marysville, TN – October 18,
                                                    2012
                                                    A password-protected laptop was
                                                    stolen from an employee's home on
                                                    August 25. It contained two groups of
                                                    patient data. Patient names, dates of
                                                    birth, responsible party names, patient
Scottsdale, AZ – October 19, 2012                   addresses, physician names, and
A vendor working with patient data for digital      billing information for 22,000 patients
conversion from lost a flash drive on or around     were on the laptop. An additional 5,000
July 16. It contained patient names, Social         patients had similar information
Security numbers, dates of birth, addresses,        exposed as well as their Social
telephone numbers, account numbers, diagnoses,      Security numbers and other non-
and other protected health information.             medical information.
SECURING YOUR MOBILE
DATA WITH ZENWORKS
Solutions to help you avoid the headlines
The ZENworks Family: Windows, Mac & Mobile Endpoints


                        Windows, Mac & Mobile Configuration
                                  Management
                                                              Patch Management
      Asset
    Management




     Application                                       End Point Security
    Virtualization                                       Management




                     Service Desk         Full Disk Encryption
Are you just as locked out of your own
devices as any hacker?
Why ZENworks Full
 Disk Encryption?
Centralized Management

One Console. One Agent. One Tool for all your endpoint management
                             tasks




ZENworks also does configuration, patch, asset & endpoint security
                         management
Fully Featured
From a single
console, ZENworks
lets you manage          Manage access, with support for pre-boot auth
your enterprise
remotely:
down the hall, down
the street, across the
country, or around the   Turn encryption on/off
world



                         Troubleshoot passwords



                         Manage hardware & software encryption


Deploy encryption
software across the      Generate reports
enterprise at the push   demonstrating encryption
of a button
Rapid Deployment
Pre-Boot Authentication
Ease of Management
Service Desk Friendly
Control the story


 Know you’re safe.

 Prove you’re safe.




15   © Novell, Inc. All rights reserved.
NEXT STEPS
ALI Consulting & Deployment Services
Highly experienced advisors with diverse & practical technical experience


                                         • Proactive strategy
                                         • Clear roadmap for deployment
                                         • Value driven project analysis
                                         • Limits burden on existing staff
                                         • Saves IT budget
                                         • Speeds time to deployment
               Project &
Consultative                             • Priority access to Novell as
               Resource    Deployment
Assessment
               Planning                    needed
                                         • Option for lab testing
Special Incentives for Webinar Attendees
Act within next 60 days to receive:
   Special product discounts available
   Special rates for project-based ALI services



                                       Call Cindy for more details!
Upcoming Webinar Topics
November 8:        Disaster Recovery & Business
                        Continuity for SMB
 Organizations

In this second webinar in our virtualization series, we'll be
showing some disaster recovery options from VMware that
make business continuity so simple and affordable that no
organization has to continue to take the risk of being
unprepared.

Registration link coming in the follow up email or register
from our event listing at www.ali-inc.com
Questions & Discussion
                                 Cindy DeHart
                                 Practice Manager
                                 cindy@ali-inc.com
                                 540.443.3392

                                Neil Kimberley
                                Sales Engineer
                                nkimberley@novell.com




Sophia Germanides
Novell Account Executive
Sophia.Germanides@novell.com

Más contenido relacionado

La actualidad más candente

Linkedin profile resume
Linkedin profile resumeLinkedin profile resume
Linkedin profile resumejmack232
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplacebpaternoster
 
Jason Leske 2017
Jason Leske 2017Jason Leske 2017
Jason Leske 2017Jason Leske
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overviewdfeldbaum
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overviewcomania
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security TechnologyFlaskdata.io
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Alexis Brown
 
Vdi Wp
Vdi WpVdi Wp
Vdi WpConRes
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelIntel IT Center
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil GodwinClear Technologies
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
WA Technologies Company Profile
WA Technologies Company ProfileWA Technologies Company Profile
WA Technologies Company ProfileMaryan Gallagher
 

La actualidad más candente (19)

Linkedin profile resume
Linkedin profile resumeLinkedin profile resume
Linkedin profile resume
 
Actian/Ingres database
Actian/Ingres database Actian/Ingres database
Actian/Ingres database
 
Its Quick Overview (Itms)
Its Quick Overview (Itms)Its Quick Overview (Itms)
Its Quick Overview (Itms)
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
Jason Leske 2017
Jason Leske 2017Jason Leske 2017
Jason Leske 2017
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overview
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Eezi sign WEB
Eezi sign WEBEezi sign WEB
Eezi sign WEB
 
Vdi Wp
Vdi WpVdi Wp
Vdi Wp
 
W8 client management
W8 client managementW8 client management
W8 client management
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
WA Technologies Company Profile
WA Technologies Company ProfileWA Technologies Company Profile
WA Technologies Company Profile
 

Destacado

BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessMike Brannon
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityBen Quirk
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesKaseya
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threatsRingtoIndia
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthEversheds Sutherland
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
ФМИ Python: Agile & Friends
ФМИ Python: Agile & FriendsФМИ Python: Agile & Friends
ФМИ Python: Agile & FriendsStefan Kanev
 
How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)Sean Si
 
How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)Sean Si
 
Apac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain TimesApac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain TimesMichel Van Woudenberg
 
De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010Joop Koppen
 
Outbound Links (Public)
Outbound Links (Public)Outbound Links (Public)
Outbound Links (Public)Sean Si
 
URL Slugs (Public)
URL Slugs (Public)URL Slugs (Public)
URL Slugs (Public)Sean Si
 
10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media ActivityMiles Austin
 

Destacado (20)

BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threats
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worth
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
ФМИ Python: Agile & Friends
ФМИ Python: Agile & FriendsФМИ Python: Agile & Friends
ФМИ Python: Agile & Friends
 
How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)
 
How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)
 
Internetblindheid Kurt Beheydt Iprospect
Internetblindheid   Kurt Beheydt  IprospectInternetblindheid   Kurt Beheydt  Iprospect
Internetblindheid Kurt Beheydt Iprospect
 
Apac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain TimesApac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain Times
 
De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010
 
Outbound Links (Public)
Outbound Links (Public)Outbound Links (Public)
Outbound Links (Public)
 
URL Slugs (Public)
URL Slugs (Public)URL Slugs (Public)
URL Slugs (Public)
 
Delen
DelenDelen
Delen
 
10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity
 

Similar a Keep Mobile Devices Secure with ZENworks

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforceDell World
 
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDon't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDatapipe
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionKenneth de Brucq
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareRES
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Rakesh Kumar
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?Lori McInnes
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsNovell
 
Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualChris_Robilliard
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better businessDell EMC World
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 

Similar a Keep Mobile Devices Secure with ZENworks (20)

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDon't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Vdi overview
Vdi overviewVdi overview
Vdi overview
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created Equal
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 

Más de Advanced Logic Industries

New Challenges in Email & Communications Archiving
New Challenges in Email & Communications ArchivingNew Challenges in Email & Communications Archiving
New Challenges in Email & Communications ArchivingAdvanced Logic Industries
 
5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOWAdvanced Logic Industries
 
Dickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD FutureDickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD FutureAdvanced Logic Industries
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBAdvanced Logic Industries
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with PlatespinAdvanced Logic Industries
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerAdvanced Logic Industries
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSAdvanced Logic Industries
 

Más de Advanced Logic Industries (14)

New Challenges in Email & Communications Archiving
New Challenges in Email & Communications ArchivingNew Challenges in Email & Communications Archiving
New Challenges in Email & Communications Archiving
 
Making Work from Home (Really) Work
Making Work from Home (Really) WorkMaking Work from Home (Really) Work
Making Work from Home (Really) Work
 
5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Dickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD FutureDickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD Future
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
 
Streamline it & save with virtualization
Streamline it & save with virtualizationStreamline it & save with virtualization
Streamline it & save with virtualization
 
Webinar: Mobile Device Management
Webinar: Mobile Device ManagementWebinar: Mobile Device Management
Webinar: Mobile Device Management
 
Mobile device management
Mobile device management Mobile device management
Mobile device management
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with Platespin
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManager
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
 
Virtualization 101 for Everyone
Virtualization 101 for EveryoneVirtualization 101 for Everyone
Virtualization 101 for Everyone
 

Último

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Keep Mobile Devices Secure with ZENworks

  • 1. Security Threats & Breaches: Keeping your Mobile Devices Secure
  • 2. Here’s what we’ll cover today:  Welcome & Introduction  The reality of security breaches AND increasing mobility  Solution overview: Using ZENworks to keep you out of the headlines  Extending Network Security  Reporting features Demo  Ease of Management  Questions, Discussion & Next Steps
  • 3. Novell Platinum Partner Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina  Collaboration, Conferencing & Messaging  Converged IP networking & telephony  Network Resource Management solutions  Wireless & Mobile Workforce solutions  Data Storage, Archiving & Disaster Recovery  Network Support & Optimization  Virtualization  Data Security  Managed Services  Training
  • 4. The Reality of Today’s Security Breaches Cherry Hill, NJ – October 8, 2012 2 data backup tapes were lost during shipping in late March 2012. The tapes included customer names, Social Security numbers, addresses, account numbers, debit card numbers, and credit card numbers. Marysville, TN – October 18, 2012 A password-protected laptop was stolen from an employee's home on August 25. It contained two groups of patient data. Patient names, dates of birth, responsible party names, patient Scottsdale, AZ – October 19, 2012 addresses, physician names, and A vendor working with patient data for digital billing information for 22,000 patients conversion from lost a flash drive on or around were on the laptop. An additional 5,000 July 16. It contained patient names, Social patients had similar information Security numbers, dates of birth, addresses, exposed as well as their Social telephone numbers, account numbers, diagnoses, Security numbers and other non- and other protected health information. medical information.
  • 5. SECURING YOUR MOBILE DATA WITH ZENWORKS Solutions to help you avoid the headlines
  • 6. The ZENworks Family: Windows, Mac & Mobile Endpoints Windows, Mac & Mobile Configuration Management Patch Management Asset Management Application End Point Security Virtualization Management Service Desk Full Disk Encryption
  • 7. Are you just as locked out of your own devices as any hacker?
  • 8. Why ZENworks Full Disk Encryption?
  • 9. Centralized Management One Console. One Agent. One Tool for all your endpoint management tasks ZENworks also does configuration, patch, asset & endpoint security management
  • 10. Fully Featured From a single console, ZENworks lets you manage Manage access, with support for pre-boot auth your enterprise remotely: down the hall, down the street, across the country, or around the Turn encryption on/off world Troubleshoot passwords Manage hardware & software encryption Deploy encryption software across the Generate reports enterprise at the push demonstrating encryption of a button
  • 15. Control the story Know you’re safe. Prove you’re safe. 15 © Novell, Inc. All rights reserved.
  • 17. ALI Consulting & Deployment Services Highly experienced advisors with diverse & practical technical experience • Proactive strategy • Clear roadmap for deployment • Value driven project analysis • Limits burden on existing staff • Saves IT budget • Speeds time to deployment Project & Consultative • Priority access to Novell as Resource Deployment Assessment Planning needed • Option for lab testing
  • 18. Special Incentives for Webinar Attendees Act within next 60 days to receive:  Special product discounts available  Special rates for project-based ALI services Call Cindy for more details!
  • 19. Upcoming Webinar Topics November 8: Disaster Recovery & Business Continuity for SMB Organizations In this second webinar in our virtualization series, we'll be showing some disaster recovery options from VMware that make business continuity so simple and affordable that no organization has to continue to take the risk of being unprepared. Registration link coming in the follow up email or register from our event listing at www.ali-inc.com
  • 20. Questions & Discussion Cindy DeHart Practice Manager cindy@ali-inc.com 540.443.3392 Neil Kimberley Sales Engineer nkimberley@novell.com Sophia Germanides Novell Account Executive Sophia.Germanides@novell.com