Extending Secure Enterrpise Content and Apps to Mobile Devices - ionGrid and RSA Webinar

Preview:

DESCRIPTION

A few years ago, only the laptop had remote access to internal applications and secure file stores. Today, employees want ubiquitous access to job-critical content and applications on ANY device, and if IT doesn't support mobile devices just the same as laptops, they will often use personal email and cloud storage accounts to get what they need. This slide presentation is from a webinar hosted by ionGrid and RSA, and it covers new options on how companies can securely extend firewalled content and enterprise applications to mobile devices to make employees more productive.

Citation preview

1© Copyright 2011 EMC Corporation. All rights reserved.

RSA and ionGrid WebinarSecurely Extending the

Information Infrastructure

2© Copyright 2011 EMC Corporation. All rights reserved.

The Panel

Kurt Foeller, Moderator

Michael Rothrock, ionGrid

Co-founder, VP Product

Donald Weller, RSA

Sales Leader - Authentication

Robert Petersen, RSA

Product Manager, SecurID

3© Copyright 2011 EMC Corporation. All rights reserved.

Agenda

1.Mobile trends

2.Mobile content requirements

3.Stratos highlights

4.Stratos-RSA solution

5.RSA highlights

4© Copyright 2011 EMC Corporation. All rights reserved.

Let’s start with some fresh data

Tablets are booming - 119M in 2012, up 140%

Android sales eclipsed iPhone in 2012

Mobile workers carry 3+ devices

25% of mobile workers bypass IT controls

5© Copyright 2011 EMC Corporation. All rights reserved.

Mobile Trends in 2013

1. Increased Mobilization

2. Advanced Persistent Threats

3. Universal Information Access

6© Copyright 2011 EMC Corporation. All rights reserved.

Mobile Trend #1:

Increased Mobilization

7© Copyright 2011 EMC Corporation. All rights reserved.

BIG PICTURE: BY 2011, THE DIGITAL UNIVERSE SURPASSED

1.8 ZETTABYTES1,800,000,000,000,000,000,000

8© Copyright 2011 EMC Corporation. All rights reserved.

$

9© Copyright 2011 EMC Corporation. All rights reserved.

Mobile Trend #2:

Advanced Persistent Threats

10© Copyright 2011 EMC Corporation. All rights reserved.

11© Copyright 2011 EMC Corporation. All rights reserved.

855

174,000,000

Source: Verizon RISK Team: 2012 Data Breach Investigations Report

12© Copyright 2011 EMC Corporation. All rights reserved.

Mobile Trend #3:

Universal Information Access

13© Copyright 2011 EMC Corporation. All rights reserved.

What employees want• To do ‘real work’ on smartphones and tablets

just the same as laptops

14© Copyright 2011 EMC Corporation. All rights reserved.

Secure mobile content access is easier said than done

User Access Control

Authentication

Data Loss Prevention

Overhead CostsIT Resources

Regulatory Compliance

Chief Concerns

15© Copyright 2011 EMC Corporation. All rights reserved.

Baseline requirements for secure mobile access

For the User

Single sign-on and seamless connectivity

Two-factor auth on mobile devices

Information protection, not device protection

Containerized information approach

For IT and Compliance

16© Copyright 2011 EMC Corporation. All rights reserved.

Introducing ionGrid Stratos

Stratos allows users to easily and securely access business files and applications on iPad & iPhone

17© Copyright 2011 EMC Corporation. All rights reserved.

The Stratos Platform

Docs Web

StratosCore

Apps iOS Native or

HTML 5

Auth & security

Compliant HTML5, CSS3

Single sign-on

Pixel-perfect rendering

Annotation SharePoint,

file servers, ECMs

Core provides single sign on and secure

access

18© Copyright 2011 EMC Corporation. All rights reserved.

Use Cases in Brief

• Increased security strength with two-factor authentication

• Integrated solution for banking customers

• Fast deployment time

19© Copyright 2011 EMC Corporation. All rights reserved.

Two-Factor Authentication

20© Copyright 2011 EMC Corporation. All rights reserved.

Increased content security with two-factor authentication

21© Copyright 2011 EMC Corporation. All rights reserved.

Authenticator Options

22© Copyright 2011 EMC Corporation. All rights reserved.

Key Features & Solution Benefits

Solution Benefit

Solution and Feature Detail

Meet compliance regulations

Direct integration to RSA ensures that 2-factor authentication policies are consistently applied to all devices

Ease of integration

Support for multi-factor authentication to address user requirements

Increased security

Expanded security model covering highly regulated industries

Scalable infrastructure

Scalable security model and architecture

Comprehensive content solution

Complete mobile security solution: application, information, and document protection

23© Copyright 2011 EMC Corporation. All rights reserved.

THANK YOUTHANK YOUTHANK YOUFor more information:

Donald WellerDonald.WellerIII@rsa.com

Stephen Bulferstephen@iongrid.com

Recommended