SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
McAfee Enterprise Mobility Management
Securing Mobile Applications
The User is Evolving




                       June 1, 2011
2
2
The User is Evolving




                       June 1, 2011
3
3
IT’s Challenge with Mobile Devices
   Web 2.0, Apps 2.0, Mobility 2.0




                                                       More than half of all
Threats Are 60,000                                     users don’t lock their
New Pieces of                          HR              devices
Malware/day



                               IT              Sales
                                      IT
                                                        80% of IT Users
                                                        Concerned about
                                     Finance            Device Data Loss
Mobile Devices
Predicted to be New
Malware Frontier




   4                                                               June 1, 2011
Requirements for Secure Application Enablement

                         Enterprise and
                           LOB Apps


               Basic                       Customer Facing
              Services                          Apps




          Web and
         Social Media




    Required:
    • Data Protection
                                          • Security Policy Management
    • Compliance
                                          • Self-Service Provisioning
    • Authentication
                                          • Enterprise App Management


5                                                              June 1, 2011
Empowering Enterprise Mobility
• Makes it secure
  – Configures, enforces and manages native
    device security settings                                               Enterprise Environment
                                                              iPad
  – Enforces device compliance with enterprise
    policies                                                                      Messaging
                                                      Android
  – Extends the security infrastructure to
    include devices via ePO integration today                                               Applications
    and ultimately via integration with anti-
                                                 iPhone
    malware, web protection, DLP, and Global
    Threat Intelligence
                                                                                                Directory
  – Integrates with the data center: VPN, Wi-Fi,
    PKI, directories, and LOB applications Windows                     McAfee
• Makes it easy                                Mobile                   EMM                     Certificate
                                                                                                Services
  – Integrates with McAfee ePO for simple
    administration, reporting                  BlackBerry
  – Enables user self-service provisioning                                                  Files
  – Personalizes devices to
                                                        webOS
    optimize end-user productivity                                               Database
• Makes it scalable
  – Scales to 10s of 1,000s of devices                       Symbian
  – Supports HA and DR configurations
                                                                         VPN
  6                                                                                             June 1, 2011
The Right Life Cycle for Mobile Device Management

Enterprise Application Management                                                Provisioning
Make applications available in a secure, role-                                   Self-service provisioning sets security policies,
based way. Offer software for download, links                                    configures network connectivity, and
to third-party app stores, and web links.                                        automatically personalizes devices for users.


                                                    Application   Provisioning
                                                   Management
IT Operations Support                                                                           Security and Authentication
Manage policies and devices                                                                     Each device is issued a unique digital
centrally and get centralized                                                                   certificate to strongly authenticate it
reporting through McAfee ePO                                                                    against Microsoft CA for security and
integration.                                                                                    user experience.
                                          IT Operations
                                             Support       ePO
                                                           ePO           Security &
                                                                        Authentication




Compliance                                                                                    Policy Management
Automatically check devices prior to              Compliance        Policy                    Push security policies, configuration
network access to ensure                                          Management                  updates, and remote helpdesk tasks
only authorized, secured devices                                                              (such as lock, wipe, and selective
access the network                                                                            wipe) over-the-air.




    7                                                                                                                     June 1, 2011
Self-Service Provisioning for iPhone

1                 2                  3                   4




    Go to the    Enter Your Email      Agree to         IT Services are
    App Store      Credentials      Corporate Policy   Auto-Provisioned


                Easy, Secure, Automated
                Easy, Secure, Automated

8                                                               June 1, 2011
Self-Service Provisioning for Android

1                   2                  3                  4




     Go to the     Enter Your Email      Agree to         IT Services are
    Marketplace      Credentials      Corporate Policy   Auto-Provisioned



                  Easy, Secure, Automated

9                                                                   June 1, 2011
Industry Standard PKI for Strong Authentication


     Industry-Standard Security:
     Microsoft Certificate Authority   Benefits:

                                       • Industry-standard security
                                       • Strong authentication for secure
                                         access to communications
                                         services such as Wi-Fi and VPN
                                       • Strong authentication for secure
                                         push email and other applications
                                       • Single sign on for enhanced user
                                         experience
                                       • No impact on battery life




10   10                                                                June 1, 2011
Enterprise Application Store

• Recommend and make
  applications securely
  available based on
  group, role, or device
  type.
      – Custom corporate
        applications
      – Third-party
        applications (Apple
        App Store or Android
        Marketplace)
      – Webclips
• Device application
  inventory, audit, and
  policy management

 11
Centralized Visibility and Control with ePO




                                        Compliance reports are
                                        based on systems we
                                        know about




 12
Centralized Visibility and Control with ePO




                                              What we don’t
                                              manage is where
                                              compliance status is
                                              unknown




 13
Centralized Visibility and Control with ePO




               Bringing all
           endpoints into
      compliance status
        view is critical to
      assessing risk and
      prioritizing actions




 14
All Part of McAfee Security Connected
                                            Security Management
                                   Policy Management        Vulnerability Management
                                   Security Reporting       Risk Management
                                   Mobile Management        Compliance




Network Security
Next Generation Firewall
                                                                                 Content Security
Network Intrusion Prevention                                                     Email Gateway
NAC Gateway                                                                      Web Gateway
Network User Behavior Analysis                                                   Data Loss Prevention
Network Threat Behavior Analysis                                                 Encryption

Network Threat Response




                                              Endpoint Security
  Mac, UNIX/Linux AV       Anti-Virus & Anti-Spyware    Desktop Firewall      Email Server AV & Anti-Spam
  Virtual Desktop          Host Intrusion Prevention    Device Control        SharePoint Protection
  Virtual Server           Endpoint Encryption          Policy Auditing       Website Reputation
  Mobile Devices           Application Whitelisting     NAC Endpoint

  15                                                                                                        June 1, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications

Más contenido relacionado

La actualidad más candente

Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Enterprise Mobility Suite- Azure RMS
Enterprise Mobility Suite- Azure RMSEnterprise Mobility Suite- Azure RMS
Enterprise Mobility Suite- Azure RMSLai Yoong Seng
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Shafaq Abdullah
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Shafaq Abdullah
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
Mobile device and application management
Mobile device and application managementMobile device and application management
Mobile device and application managementAmplexor
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Consumerization 5 Steps Ds
Consumerization 5 Steps DsConsumerization 5 Steps Ds
Consumerization 5 Steps DsPaul Crone
 

La actualidad más candente (20)

Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Enterprise Mobility Suite- Azure RMS
Enterprise Mobility Suite- Azure RMSEnterprise Mobility Suite- Azure RMS
Enterprise Mobility Suite- Azure RMS
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
Mobile device and application management
Mobile device and application managementMobile device and application management
Mobile device and application management
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Consumerization 5 Steps Ds
Consumerization 5 Steps DsConsumerization 5 Steps Ds
Consumerization 5 Steps Ds
 

Destacado

Jacqueline Klaassen - Statement of Attainment Inscope
Jacqueline Klaassen - Statement of Attainment InscopeJacqueline Klaassen - Statement of Attainment Inscope
Jacqueline Klaassen - Statement of Attainment InscopeJacqui Klaassen
 
T-Mobile Case Study: Looking to Build a Foundation for DevOps
T-Mobile Case Study: Looking to Build a Foundation for DevOpsT-Mobile Case Study: Looking to Build a Foundation for DevOps
T-Mobile Case Study: Looking to Build a Foundation for DevOpsCA Technologies
 
Week9 Define And Document Business Problems
Week9 Define And Document Business ProblemsWeek9 Define And Document Business Problems
Week9 Define And Document Business Problemshapy
 

Destacado (6)

Retail Environments by Foreman & Company
Retail Environments by Foreman & Company Retail Environments by Foreman & Company
Retail Environments by Foreman & Company
 
Jacqueline Klaassen - Statement of Attainment Inscope
Jacqueline Klaassen - Statement of Attainment InscopeJacqueline Klaassen - Statement of Attainment Inscope
Jacqueline Klaassen - Statement of Attainment Inscope
 
Pci Req
Pci ReqPci Req
Pci Req
 
Six sigma define - v1.0
Six sigma   define - v1.0Six sigma   define - v1.0
Six sigma define - v1.0
 
T-Mobile Case Study: Looking to Build a Foundation for DevOps
T-Mobile Case Study: Looking to Build a Foundation for DevOpsT-Mobile Case Study: Looking to Build a Foundation for DevOps
T-Mobile Case Study: Looking to Build a Foundation for DevOps
 
Week9 Define And Document Business Problems
Week9 Define And Document Business ProblemsWeek9 Define And Document Business Problems
Week9 Define And Document Business Problems
 

Similar a McAfee Enterprise Mobility Management Securing Mobile Applications

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaLeigh Williamson
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end reviewLeigh Williamson
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
Whitepaper: Connected Office Enterprise
Whitepaper: Connected Office EnterpriseWhitepaper: Connected Office Enterprise
Whitepaper: Connected Office Enterpriseframeworksem
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAvinash Birnale
 

Similar a McAfee Enterprise Mobility Management Securing Mobile Applications (20)

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
Whitepaper: Connected Office Enterprise
Whitepaper: Connected Office EnterpriseWhitepaper: Connected Office Enterprise
Whitepaper: Connected Office Enterprise
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 

Último

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

McAfee Enterprise Mobility Management Securing Mobile Applications

  • 1. McAfee Enterprise Mobility Management Securing Mobile Applications
  • 2. The User is Evolving June 1, 2011 2 2
  • 3. The User is Evolving June 1, 2011 3 3
  • 4. IT’s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0 More than half of all Threats Are 60,000 users don’t lock their New Pieces of HR devices Malware/day IT Sales IT 80% of IT Users Concerned about Finance Device Data Loss Mobile Devices Predicted to be New Malware Frontier 4 June 1, 2011
  • 5. Requirements for Secure Application Enablement Enterprise and LOB Apps Basic Customer Facing Services Apps Web and Social Media Required: • Data Protection • Security Policy Management • Compliance • Self-Service Provisioning • Authentication • Enterprise App Management 5 June 1, 2011
  • 6. Empowering Enterprise Mobility • Makes it secure – Configures, enforces and manages native device security settings Enterprise Environment iPad – Enforces device compliance with enterprise policies Messaging Android – Extends the security infrastructure to include devices via ePO integration today Applications and ultimately via integration with anti- iPhone malware, web protection, DLP, and Global Threat Intelligence Directory – Integrates with the data center: VPN, Wi-Fi, PKI, directories, and LOB applications Windows McAfee • Makes it easy Mobile EMM Certificate Services – Integrates with McAfee ePO for simple administration, reporting BlackBerry – Enables user self-service provisioning Files – Personalizes devices to webOS optimize end-user productivity Database • Makes it scalable – Scales to 10s of 1,000s of devices Symbian – Supports HA and DR configurations VPN 6 June 1, 2011
  • 7. The Right Life Cycle for Mobile Device Management Enterprise Application Management Provisioning Make applications available in a secure, role- Self-service provisioning sets security policies, based way. Offer software for download, links configures network connectivity, and to third-party app stores, and web links. automatically personalizes devices for users. Application Provisioning Management IT Operations Support Security and Authentication Manage policies and devices Each device is issued a unique digital centrally and get centralized certificate to strongly authenticate it reporting through McAfee ePO against Microsoft CA for security and integration. user experience. IT Operations Support ePO ePO Security & Authentication Compliance Policy Management Automatically check devices prior to Compliance Policy Push security policies, configuration network access to ensure Management updates, and remote helpdesk tasks only authorized, secured devices (such as lock, wipe, and selective access the network wipe) over-the-air. 7 June 1, 2011
  • 8. Self-Service Provisioning for iPhone 1 2 3 4 Go to the Enter Your Email Agree to IT Services are App Store Credentials Corporate Policy Auto-Provisioned Easy, Secure, Automated Easy, Secure, Automated 8 June 1, 2011
  • 9. Self-Service Provisioning for Android 1 2 3 4 Go to the Enter Your Email Agree to IT Services are Marketplace Credentials Corporate Policy Auto-Provisioned Easy, Secure, Automated 9 June 1, 2011
  • 10. Industry Standard PKI for Strong Authentication Industry-Standard Security: Microsoft Certificate Authority Benefits: • Industry-standard security • Strong authentication for secure access to communications services such as Wi-Fi and VPN • Strong authentication for secure push email and other applications • Single sign on for enhanced user experience • No impact on battery life 10 10 June 1, 2011
  • 11. Enterprise Application Store • Recommend and make applications securely available based on group, role, or device type. – Custom corporate applications – Third-party applications (Apple App Store or Android Marketplace) – Webclips • Device application inventory, audit, and policy management 11
  • 12. Centralized Visibility and Control with ePO Compliance reports are based on systems we know about 12
  • 13. Centralized Visibility and Control with ePO What we don’t manage is where compliance status is unknown 13
  • 14. Centralized Visibility and Control with ePO Bringing all endpoints into compliance status view is critical to assessing risk and prioritizing actions 14
  • 15. All Part of McAfee Security Connected Security Management Policy Management Vulnerability Management Security Reporting Risk Management Mobile Management Compliance Network Security Next Generation Firewall Content Security Network Intrusion Prevention Email Gateway NAC Gateway Web Gateway Network User Behavior Analysis Data Loss Prevention Network Threat Behavior Analysis Encryption Network Threat Response Endpoint Security Mac, UNIX/Linux AV Anti-Virus & Anti-Spyware Desktop Firewall Email Server AV & Anti-Spam Virtual Desktop Host Intrusion Prevention Device Control SharePoint Protection Virtual Server Endpoint Encryption Policy Auditing Website Reputation Mobile Devices Application Whitelisting NAC Endpoint 15 June 1, 2011