SlideShare una empresa de Scribd logo
1 de 22
BYOD – Security Challenges
gary.mcconnell@clever-consulting.com
Twitter: @garyclever

Audio: +39 02 30410 440 Meeting Number 840 929 852
Agenda

•   The Mobile explosion
•   Consumer Vs Enterprise
•   Mobile Device Management
•   Application Security
•   Communication Security
•   Content Security
•   Security Checklist




                          2
The Mobile Explosion                                              2B Devices
                                                                  <5 Years

THE PC ERA                     THE WEB ERA                       THE MOBILE ERA
• A PC on every desk           • A Browser on any desk           • Multiple Devices for Each User
                               • Ubiquitous Access to Apps and   • Ubiquitous Access to Apps and
                                 Data from any Browser             Data from any Device




      600M              30          600M           15
        PCs            Years        Users        Years




                                                                               ?
Shipment Tablets + Smartphone > PC in 2010
                                                                                       Tablets

                                                                                       Smartphones




                                                                                       Notebook PCs




                                                                                       Desktop PCs




                                                        Global shipments




                                                                      1.3M
                                                                           Sept 2012




113        Smartphones lost
           every minute in the US

That’s 5   Million / month
                                                  Android activations per day
Consumer Expectations Meet Enterprise

 “I want to use                            “I want to be
    whatever                               able to work
  device I like”                            anywhere”




                                             “I want an
   “I do my own                              awesome
IT now, thank you                           experience”
    very much!”


      “I want to access my APPS and DATA anywhere
                 on the device of my choice.”
“How do I                                Multi-OSdo
                                               “How     I
   distribute apps                            manage the
    and embrace                               explosion of
       BYOD?”                                 applications
       App Stores
                                               and OSs?”




    “How do I
 manage security
                                               “How do I
and identity across
                                            mobilize content?”
     all this?”                               File Sharing


                “I need to move at consumer speed,
 Identity, security compliance, DLP
                  yet with security and compliance”
User Driven      Multi-OS Management
    Device Choice            Security
  Micro-Mobile Apps      Consumer Speed
   User Experience         Compliance




“The more the CIO says no, the less secure
       the organization becomes.”
         Vivek Kundra, U.S. Federal CIO
Consumer Services




 Great user experience
  Easy to use
  Multi device


 Security
  Where are my files?
                               * for
  Who can access my files?   Corporate
  Compliance?                  Data
A complete MDM Platform Enables…

        A                    B

     End User        Complete IT Mobile
     Services          Management




     To secure and manage mobile
    apps, documents, and devices
A

     End User
     Services




Device        Secure Email   Apps            Content
Choice


 Native             Secure          Separation Between
 Experience                         Enterprise & Personal
Cloud Deployment Flexibility
     The Mobile Iron
        Platform
100K devices per Appliance
   10Ks of certificates




        Secure
     Cloud Service
                             On-Premise
                             Deployment
Introducing:
 AppConnect Security Layer




AppConnect
Unique Value:
             AppTunnel per App VPN




                                FIREWALL
Traditional                        VPN




                                           AppTunnel


                                           AppTunnel




AppTunnel
                                SENTRY




                                           AppTunnel




      MobileIron Confidential
Enterprise Persona

• Application Single Sign On
  (App SSO)

• Password Protects all the
  Enterprise Apps

• Logon / Logoff from the
  Enterprise Container

• Limit “open in”, “copy/paste”

 But the user wants the semplicity of ....
15
16
* for
     Corporate
       Data


17
Enterprise File Sharing

• Securely browse, view, edit, send, and share files on a mobile device.
• Works with Word, Excel, PowerPoint, PDF, JPEG, PNG, just about
  any type of file.
• Save files securely on a mobile device for offline use.
• Upload files securely from the device to a secure workspace.
• Share secure links to files or share folders with internal and external
  users.
• Collaborate in real-time by adding or replying to comments.
• Subscribe to notifications to learn who has added files or commented
  on files.
• Log in using LDAP credentials.



                                  18
Enterprise File Sharing Features

• Cloud Choice
    – Private Cloud (in-house)
    – Public Cloud
    – Hybrid
•   Auditable File Tracking and Reporting
•   Sharepoint Integration
•   Integration with Notes and Outlook
•   Ldap/AD integration
•   DLP Integration
•   MultiSite deployment




                                  19
BYOD Security Preparation

1.    Multiple platform support
2.    Seamless access to existing ECM stores
3.    Enhanced encryption for apps and data
4.    Centralized management
5.    Proactive file protection
6.    Complete device control
7.    Required enterprise integrations
8.    File sharing visibility
9.    Deployment choice
10.   Say “no” to consumer-class services




                                 20
Q&A
www.clevermobile.it
 info@clevermobile.it

Más contenido relacionado

Más de Clever Consulting

Black berry è ora di migrare
Black berry è ora di migrareBlack berry è ora di migrare
Black berry è ora di migrareClever Consulting
 
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Clever Consulting
 
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...Clever Consulting
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile WebinarClever Consulting
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013Clever Consulting
 
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar Clever Consulting
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Clever Consulting
 
Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Clever Consulting
 
Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Clever Consulting
 
Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting
 
Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting
 
Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting
 
Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting
 
Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting
 
Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting
 
Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting
 
Clever Consulting Newsletter > Novembre 2011
Clever Consulting Newsletter >  Novembre 2011Clever Consulting Newsletter >  Novembre 2011
Clever Consulting Newsletter > Novembre 2011Clever Consulting
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityClever Consulting
 
Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011Clever Consulting
 

Más de Clever Consulting (20)

Black berry è ora di migrare
Black berry è ora di migrareBlack berry è ora di migrare
Black berry è ora di migrare
 
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
 
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
 
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012
 
Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012
 
Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012
 
Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012
 
Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012
 
Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012
 
Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012
 
Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012
 
Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011
 
Clever Consulting Newsletter > Novembre 2011
Clever Consulting Newsletter >  Novembre 2011Clever Consulting Newsletter >  Novembre 2011
Clever Consulting Newsletter > Novembre 2011
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
 
Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011
 

Último

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Último (20)

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 

Come affrontare le sfide del BYOD - Bring Your Own Device | CleverMobile Webinar

  • 1. BYOD – Security Challenges gary.mcconnell@clever-consulting.com Twitter: @garyclever Audio: +39 02 30410 440 Meeting Number 840 929 852
  • 2. Agenda • The Mobile explosion • Consumer Vs Enterprise • Mobile Device Management • Application Security • Communication Security • Content Security • Security Checklist 2
  • 3. The Mobile Explosion 2B Devices <5 Years THE PC ERA THE WEB ERA THE MOBILE ERA • A PC on every desk • A Browser on any desk • Multiple Devices for Each User • Ubiquitous Access to Apps and • Ubiquitous Access to Apps and Data from any Browser Data from any Device 600M 30 600M 15 PCs Years Users Years ?
  • 4. Shipment Tablets + Smartphone > PC in 2010 Tablets Smartphones Notebook PCs Desktop PCs Global shipments 1.3M Sept 2012 113 Smartphones lost every minute in the US That’s 5 Million / month Android activations per day
  • 5. Consumer Expectations Meet Enterprise “I want to use “I want to be whatever able to work device I like” anywhere” “I want an “I do my own awesome IT now, thank you experience” very much!” “I want to access my APPS and DATA anywhere on the device of my choice.”
  • 6. “How do I Multi-OSdo “How I distribute apps manage the and embrace explosion of BYOD?” applications App Stores and OSs?” “How do I manage security “How do I and identity across mobilize content?” all this?” File Sharing “I need to move at consumer speed, Identity, security compliance, DLP yet with security and compliance”
  • 7. User Driven Multi-OS Management Device Choice Security Micro-Mobile Apps Consumer Speed User Experience Compliance “The more the CIO says no, the less secure the organization becomes.” Vivek Kundra, U.S. Federal CIO
  • 8. Consumer Services Great user experience Easy to use Multi device Security Where are my files? * for Who can access my files? Corporate Compliance? Data
  • 9. A complete MDM Platform Enables… A B End User Complete IT Mobile Services Management To secure and manage mobile apps, documents, and devices
  • 10. A End User Services Device Secure Email Apps Content Choice Native Secure Separation Between Experience Enterprise & Personal
  • 11. Cloud Deployment Flexibility The Mobile Iron Platform 100K devices per Appliance 10Ks of certificates Secure Cloud Service On-Premise Deployment
  • 13. Unique Value: AppTunnel per App VPN FIREWALL Traditional VPN AppTunnel AppTunnel AppTunnel SENTRY AppTunnel MobileIron Confidential
  • 14. Enterprise Persona • Application Single Sign On (App SSO) • Password Protects all the Enterprise Apps • Logon / Logoff from the Enterprise Container • Limit “open in”, “copy/paste” But the user wants the semplicity of ....
  • 15. 15
  • 16. 16
  • 17. * for Corporate Data 17
  • 18. Enterprise File Sharing • Securely browse, view, edit, send, and share files on a mobile device. • Works with Word, Excel, PowerPoint, PDF, JPEG, PNG, just about any type of file. • Save files securely on a mobile device for offline use. • Upload files securely from the device to a secure workspace. • Share secure links to files or share folders with internal and external users. • Collaborate in real-time by adding or replying to comments. • Subscribe to notifications to learn who has added files or commented on files. • Log in using LDAP credentials. 18
  • 19. Enterprise File Sharing Features • Cloud Choice – Private Cloud (in-house) – Public Cloud – Hybrid • Auditable File Tracking and Reporting • Sharepoint Integration • Integration with Notes and Outlook • Ldap/AD integration • DLP Integration • MultiSite deployment 19
  • 20. BYOD Security Preparation 1. Multiple platform support 2. Seamless access to existing ECM stores 3. Enhanced encryption for apps and data 4. Centralized management 5. Proactive file protection 6. Complete device control 7. Required enterprise integrations 8. File sharing visibility 9. Deployment choice 10. Say “no” to consumer-class services 20
  • 21. Q&A

Notas del editor

  1. Main Point:The Mobile Tornado is our term for the situation IT faces today – specifically the rapid influx of Mobile Devices – and Applications – into the workplace. No longer are employees using only the standard corporate issued laptop and the corporate approved/mandated applications. Employees are using whatever devices they want – often a personal smartphone or tablet – and they are using apps, such as DropBox or Evernote that are available in the AppStore or android marketplace, to perform work activities. We are in the early stages of the Mobile Era, but this Era is larger and is moving more quickly that any other phase of IT evolution before it. The time to start preparation is now. (or you’ll be swept up…by the tornado….)If the Web revolution has thought us anything is that companies who get on top of these trends and leverage the resulting technology innovations become the winners in their marketWe are now finding that mobile workers can have multiple devices – laptop pc (windows), Ipad table and an android phone!
  2. Main Point: Here we show some statistics to articulate how rapidly mobile devices are entering the workplaceThe past of mobility was RIM, then in 2009 Apple iOS started to chenge the game, going forward the market is going to be more and more fragmented and heterogeneous Combined shipments of Smartphones and Tablets surpassed shipments of PCs in 2010. Now in 2012, only two years later, shipments of Tablets and Smartphones are almost double that of PCs! – the mobile device is becoming the industry standard! The PC is dead!As of September 2012, there were 1.3MM Android activations – PER DAY – and a lot of those devices are being used for both personal and business use – business applications and data are sitting right next to employees’ vacation photos and Angry Birds…or Bad Piggies…And mobile devices are easily lost…or stolen…here we see a stat that 113 million smartphones are lost EVERY MINUTE– that’s 5 million a month – in the US alone. Mobility combined with multiple devices does mean greater risk – we as IT professions will need to mitigate that risk
  3. Main Point: The Mobile Tornado combined with IT Consumerization – changes everything – your employees expect from their employer the same IT choice, flexibility, and ease of use that they experience at home.Concept - Consumerization of IT: [or IT-ization of the consumer] Wikipedia defines consumerization as “The growing tendency for new information technology to emerge first in the consumer market and then spread into business and government organizations. The emergence of consumer markets as the primary driver of information technology innovation is seen as a major IT industry shift, as large business and government organizations dominated the early decades of computer usage and development. (and of course wikipedia is always right!) This consumerization is changing employees’ expectations of corporate ITThey want to use whatever device they want to – often multiple devices that will of course then need to syncThey want to work anywhere, which means you need to supply easy and secure access to work applications and data from multiple devices and multiple access pointsThe number of wifi hotspots in the US nearly doubled in 2011 – mobile workers are connecting everywhere – unsecure hotspots in hotels, airports, conference centers, cafes, trains etc…. And of course home officesThey want to handle their own IT – deploy apps – connect to the corporate network – access contentAnd – it all has to be fun – and easy – like the with the iPhone or with the Android device.It is a consumer driven transformation. It is cultural, it is a change and it is here.And secured mobile devices are more exposed
  4. Main Point: Mobility means big changes and new challenges for ITIt used to be so easy! Ok that may be a “slight” overstatement, but the corporate IT environment used to be much more contained and the IT department used to have much more control. IT determined which devices employees could use, and which applications could be installed on those devices. Access to these applications and corporate content was usually done within the corporate firewall or through a secure VPN connection. The network edge was well-defined and well-protectedUsers once used to navigate the web, now they use cloud based services for task such as contact management to booking travel to expense management.Communication used to be limited to email, file exchange between companies was either via email attachments or ftp or other controlled methods.The type of files have also changed – now with smartphones we have video, audio anc pictures being exchanged - word and excel are still there but the content being distributed has changedNow, employees are bringing their own devices to work and are accessing the network from outside the firewall – they are taking those devices, and the access to corporate content and applications wherever they go – the Network Edge is now wherever your employees are – or wherever their devices end up – and it requires a new approach to access and security Main Point:So IT is now at the center of everything – and is facing both increased challenges mixed with increased expectations from employeesWe’ll try to qualify some of those challenges here – and I am sure many of these resonate with all of you.How do I manage the explosion of devices, and applications, in a multi-OS environment?How do I distribute apps securely? How do enable an employee to use both business and personal apps on their device? How do I make this self-service to the end-user – basically how do I create a corporate app store?How do I mobilize content? And enable me to manage access to the content on the end-user’s personal device?And how do I do this securely?? Which complying with employer and government mandated security regulationsBottom Line: Corporate IT must meet the standards set by consumer technology while maintaining security compliance.
  5. Main Point: This summarizes the new IT reality – the new tension between the wishes of the employee and the requirements of the employerEmployees - want their work IT to be just like what they experience at home – and they want to use whatever device they choose to bring to workEmployers – need their data, their content, their valuable intellectual property protected – while at the same time empowering their employees to be as productive as possibleIT – needs to meet the demands of bothAnd as we all know if we try to contain our “consumers” they’ll just go around us – and that just leads to big problems – dropbox anyone?This is the first phase of the mobile tornado. It does not have to be this way., MobileIron has the solution…
  6. Here we need to Just say no!Byofss?
  7. Main Point: The MobileIron platform provides value to everyone – End-users are provided with a set of services that enable them to utilize their mobile devices to access business apps and content and – IT is given a single, integrated mobile platform to manage the enterprise mobile environment in a scalable, extensible, and secure manner.
  8. Main Point: Here we want to introduce specific end user services that we enable– and define the value that we provide to the business employee. Most importantly, when it comes to the end user, we give them what they’re asking for –access to their apps and their data to get their job done on a mobile device – starting from email, to secure browsing, and including other third party and internally-developed mobile applications – and all business content a user requires. Its also important to note that we do all this while preserving the native user experience – because if the mobile platform gets in the way of the native experience – productivity and acceptance will sufferBut again point back to how we support IT, while delivering End User Services – we enable these mobile services in a secure environment, that maintains clean separation between enterprise applications and data and anything the user has on the device from a personal standpoint.
  9. Main Point: The MobileIron Mobility Platform can be deployed in two ways – either as a secure cloud service, Our Connected Cloud solution, or as an on-premise deployment. Highest scalability in the industry, running up to 100K devices on a single appliance
  10. The first innovation is MobileIron’sAppConnect security layer.Itprovides a comprehensive solution to the challenges we’ve seen first hand from out customers. The challenge is how to they secure applications and data at rest on the mobile device. [Advance animation]We tackle this in six core areas. [Advance animation]The first one is User Authentication. This ensures that only an authorized user is able to access an application and any data stored inside it. [Example did the user put in the right AppConnect passcode to access the application] [Advance animation]The second is App Authorization, which ensures that a device meets minimum security criteria for an application to be executed. [For example make sure the device isn’t jail broken] [Advance animation]The third is Access Policy, which defines the behavior of an application from a security and data loss prevention standpoint. Including attributes such as whether a user can copy and paste information, or open information into other external apps. [Advance animation]Fourth is Encryption, which ensures that data at rest on Android is secure even if the version of Android does not support encryption. With 50% of Android devices still running version 2.3, which does not support encryption, AppConnect and its secure storage is critical to ensuring data within enterprise applications is kept secure. [Advance animation]Fifth is Usage and Analytics, which provides visibility into what applications are being used and how much. [Advance animation]Sixth is Selective Wipe, which ensures that enterprise data can be reliably deleted, leaving personal data, such as pictures, music, and videos in tact. [Advance animation]Together this proprietary MobileIron technology is the AppConnect security layer. [Advance Animation]These are innovations we are bringing to both iOS and Android.We developed this solution in house to ensure stability, no third party dependencies, and rapid innovations to meet customer needs.
  11. Our second of three innovations is AppTunnel. [Advance animation]AppTunnel provides secure connections behind the corporate firewall that are unique to each application.AppTunnel ensures that only authorized devices, users, and applications are able to establish connections behind the firewall.Certificates embedded in each application, and validated by MobileIron Sentry, ensure that application sessions are secured and trusted.Customers can have confidence in AppTunnel as it builds upon MobileIron’s proven technology for securing mobile mail. [Advance animation]Furthermore AppConnect applications are only able to communicate with other AppConnect applications. This protects the data in each AppConnect container from being accessed except by authorized AppConnect Apps.Review AppConnect FAQ Page for answers to:https://atlas.mobileiron.com/wiki/display/PRDM/AppConnect+FAQ2) Will AppConnect wrapped iOS apps that use AppTunnel require any special app development or changes?No. An AppConnect wrapped iOS app can take advantage of AppTunnel without special development.
  12. Multiple platform support: Even if you’re a Blackberry shop today, you don’t know what the future holds, so you need to be able to support iOS, Android and Blackberry devices should the need arise.Seamless access to existing ECM stores: Allow users to gain anytime, anywhere access to data – whether stored in SharePoint or another ECM system – and share files with internal or external audiences, without a VPN.Enhanced encryption: To lower data breach risks, your solution of choice should encrypt data both in transit and at rest, across all devices – whether in the cloud or on-premise.Centralized management: Easily configure user permissions and manage user policies and profiles, including role-based access controls – ideally from a single, web-based interface.Proactive file protection: Extend your organization’s established content/file monitoring policies to all file sharing activities by integrating with commercially available DLP and anti-virus solutions.Complete device control: Ask about remote monitoring, logging, and wiping capabilities, to provide much-needed visibility and control should a device be lost or stolen.Required enterprise integrations: Ensure that the solution you’re evaluating will support your existing infrastructure, applications, and security processes, such as LDAP, Active Directory, single sign-on, authentication, FTP, and SMTP.File sharing visibility: With evolving regulatory requirements, you need granular reporting capabilities, real-time file tracking, and automated audit trails to maintain compliance standings.Deployment choice: Whether a public cloud, private cloud, or hybrid environment, evaluate which deployment provides maximum data security and availability and will have your users up and running quickly.Say “no” to consumer-class services: Prohibit users from seeking out their own consumer-based solutions, such as Dropbox, to prevent being left in the dark about where files have been sent and to whom.