Symantec Mobile Security
-
Upload
arrow-ecs-uk -
Category
Technology
-
view
820 -
download
4
Transcript of Symantec Mobile Security
Symantec Mobile Solutions Overview
Presenters:
Andrew Blackham - Symantec Presales Specialist
Agenda
– The Mobile Landscape
– 5 Pillars of Enterprise Mobility
– Supporting BYOD
– Summary
– Q&A
2
Mobile Landscape
Exploding Number of Mobile DevicesPave the Way for “Bring Your Own Device” (BYOD)
2010 177M corp PCs
2015 246M corp PCs
2010 173 M personal PCs
2015 293M personal PCs
2010 300M smartphones
2015 1017M smartphones
39% 69% 340% 2,170%
2010 15M tablets
2015 326M tablets
Changes in Working Style
New applications deployed
in the cloud
Enterprises allow mobile access to
their network
Workers use threeor more devices
80% 65% 52%1 2 3
Sources:1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 20112. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 20123. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
Freedom, Privacy and ProductivityEasy access to files, applications, emailUse the latest technology and applicationsPersonal stuff is untouchedDo it themselves (i.e. Self-Service)
Simple, Secure and ReliableProtect company informationOnly let authorized users inEasy to work with and reliableReporting, audit and monitor
User IT Staff
The Desires of Users Versus IT Staff
Company Controls applications and Data Only
Company Controls Personal DeviceCompany Controls Standard Device
32
1
Unm
anagedM
anaged
Company Owned Personally Owned
Company Owns an Unmanaged Device
BYOD
User and App Access
Management
ThreatProtection
Secure File Sharing
Device Management
App and DataProtection
User and App Access
Management.
ThreatProtection
Secure File Sharing
Device Management
App and DataProtection
User and App Access
Management
Secure File Sharing
App and DataProtection
2
4
Evolving Endpoint Adoption Map
The 5 Pillars of Enterprise Mobility
Success = Mastering Control Points
Devices Applications Data
…without disrupting user experience
5 Pillars of Enterprise Mobility Co
ntro
l Poi
nts
User & App Access
App & Data Protection
Device Management
Threat Protection
Secure File Sharing
Device
Application
Data
Company credentials extended to both public and private
cloud services
Corporate data separation and
delivery of IT services
Configuration, control and
management of mobile devices
Mobile SecurityThreat
detectionand removal
Enterprise-gradefile sharing and collaboration in
the cloud
Symantec’s Comprehensive Solution
Symantec O3™
App Center
Mobile Management
Mobile Security
Content Center
Primary Products
User and App Access
App and Data Protection
Device Management
Threat Protection
Secure File Sharing
Symantec Managed PKI
Symantec Validation and ID
Protection Service (VIP)
Symantec Data Loss Prevention for
Mobile
Symantec Mobile Encryption
Altiris™ Client Management Suite
from Symantec
Altiris™ IT Management Suite
from Symantec
Symantec Endpoint Protection
Symantec O3™Complementary Products
Competitive Matrix
User and App Access
App and Data Protection
Device Management
Threat Protection
Secure File Sharing
Fiberlink
Airwatch MobileIron
Good
Zenprise
Symantec
McAfee
SAP/Sybase
Mobility Solutions Breakdown
Use Case #1:Access SaaS Applications From Any Device
Symantec O3
A Cloud Information Protection Platform
Symantec O3
Private Cloud / Data Center
Symantec O3
GatewayIdentity and Access BrokerInformation Gateway
Symantec O3 Intelligence CenterContext-based PoliciesStatus MonitoringLog and Audit Services
Layered Protection
2F AuthenticationData Loss PreventionEncryption
Public Cloud
End-UserAny
Device
Why Symantec O3
• Proven InfrastructureWorks with federated and non-federated applications
1..2..3
2
3
• Highly ScalableLeverages existing infrastructure
• Capture Security Events
Correlation of security intelligence
Use Case #2:Access Company and Personal Email
Mobile Protection
VPNWi-Fi
CA
Network Access
17
18
Symantec Mobile ManagementStandalone or Plug into SMP and SCCM
EnableActivate enterprise access, applications and data easily and automatically> iOS®, Android™, Microsoft®, Blackberry®, Symbian™
SecureProtect enterprise data and infrastructure from attack and theft> Detect JB, ensure passcodes, …
ManageControl inventory and configuration with massive scalability> Integrated with SMP and SCCM
19
Comprehensive Device Management
Configure Devices
Self-service enrollmentConfigure Email, VPN, Wi-FiIdentity Certificates
Distribute applications
In-house applications or public-store applicationsDocs, videos – any active content Group based management
Manage Assets
Centralized visibility and controlAutomated workflowsScalable to 20,000+ devices
Apply Policies
Passwords, App restrictionsCompliance with JailbreakSelective wipe and Full wipe
20
Why Symantec Mobile Device Management
1..2..3
2
3 • Integrated Mobile Device Management
Unified management with Macs and PCs
21
Use Case #3:Secure iOS/Android/HTML5 applications and Content
Enterprise App Store
Personal
CRM
Corporate applicatio
ns
Corp AppACME
Public application
s
Documents
Containerized Application
22
Mobile Application ManagementComprehensive Application-Wrapping Technology
App StoreRepository for internal and external mobile applications
App PolicyProtect application against data loss through encryption, removal control and separation of corporate data
Content CenterData Loss Prevention policy to control confidential data access
23
Comprehensive Mobile App Management
Deploy applications
Enterprise app store for internal applicationsRecommendations from public application storeGroup based targeting
Deploy Content
Enterprise content store for docs, videos Containerize data with per object policiesGroup based targeting
Manage Lifecycle
Revoke and update applications selectivelyCentralized visibility and controlMDM features for policy management
Protect Data
Security and Management layer around dataPasswords, encryption, offline access, rootingSeparate corproate and personal data
24
• Application deployment and provisioning• User authentication across applications• Copy and paste prevention • Per-application file encryption• Remote data/app wipe• iOS, Android, and HTML5 support
SYMANTEC APP CENTER
Symantec App Center Mobile App and Data Protection
25
Same Security as Sandboxing, but More Flexible
.IPA or .APK file with standard
libraries
App wrapped with App Centerlibraries and policy controlsready for deployment
26
Business and Personal Applications and Data Co-exist
27
Why Symantec for Mobile applications
• Quick and Easy Expedite deployment of applications with an easy-to-use SaaS app store
1..2..3
• Scalable and Seamless
Enable any number of applications with no source-code changes
• Independent of Mobile Device Management
Address mobile application needs without managing the complete device
Personal
CRM
Corp applications
Corp AppACME
Email Documents
Use Case #4:Secure Email and Prevent Malware
28
28
Android Has Malware Problem
29
– More Than 50% Of Mobile Malware Is On Android
0
500
1000
1500
2000
2500Android Malware Family
67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey
29
Symantec Mobile Security
30
AntimalwareAnti-TheftWeb Protection
Centralized ManagementAdvanced Protection
Comprehensive Protection
Management
30
Why Symantec for Mobile Security
32
– High efficacy
Monitors 70+ application stores, analyzes 3 million+ applications, information from 7 million+ active devices.
1..2..3
• Enterprise Grade SecurityMost applications are freeware, consumer editions. Symantec Mobile Security provides centralized management including LiveUpdates.
• Enterprise IntegrationAnti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with Mobile Device Management.
32
Bringing It All Together
33
Devices. Applications. Data.
Mobile Protection 33
Summary
Summary
• No business is safe from attack – regardless of its size or industry
• Attackers are being more selective in who they target
• Obtaining information is key – if an attacker could make money from it, it’s a potential target
Below are some qualifying questions that can help you determine a security solution requirement:
• What are you currently doing to safeguard your data?
• How are your emails protected?
• Do you use mobile devices in your organisation?
• What industry regulations do you have to comply with?
• How are you protecting your end users workstations?
Any Questions?