22
The Platform for Mobile IT Daan Hakaart EMEA Sales Director

DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Embed Size (px)

DESCRIPTION

Presentation from Riga, Latvia. "Data Security Solutions" Ltd. ITSEC Conference.

Citation preview

Page 1: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

The Platform for Mobile IT Daan Hakaart

EMEA Sales Director

Page 2: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Mobile drives a fundamental shift in behavior

2

Desktop as primary Mobile as primary

Salesforce

Task workers

Knowledge workers

Industry-specific roles

Page 3: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

The birth of Mobile IT

3

IT Mobile

User-led Cross-functional Consumer speed

Security,

management,

and apps are

intertwined

Multi-OS

UX-driven

Innovation-centric

Consumerization

Short lifecycles

Micro apps

“The more the CIO says no, the less secure the organization becomes.”

Vivek Kundra, U.S. Federal CIO

Page 4: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Mobile IT transforms business

4

Financial Services

Healthcare, Pharma & Medical Devices

Professional Services

Retail & Consumer Goods

Government & Education

Travel and Hospitality

Technology & Manufacturing

Page 5: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Mobile IT requirements in the post-PC era

5

Mobilize apps and documents

Support mobile OS and device evolution

Deploy at scale across global organizations

Prevent data loss

Preserve user experience and privacy

Page 6: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Inte

llig

en

t G

ate

way

(Tu

nn

eli

ng

an

d A

cc

es

s C

on

tro

l)

2

En

terp

ris

e In

fra

str

uc

ture

6

is …

1 End-User Services

3 Mobile Policy & Configuration Engine

RULES &

REPORTING

CERTS &

DIRECTORY

APP

STOREFRONT

DEVICES CONTENT USER

SELF-SERVICE

Page 7: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

7

Best at security

Best at apps

Architected for

scale

Most trusted

cloud

Purpose-built for

Mobile IT

Focused on

customer success

MobileIron advantage

3,000 customers in 24 months

97% customer support satisfaction

60+ customers in print

Page 8: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Industry recognition

Gartner:

Info-Tech:

IDC:

BusinessWeek:

8

Leaders Quadrant of 2012 MDM Magic Quadrant (May 2012)

Champion in 2012 MDM Vendor Landscape (Aug 2012)

Largest and fastest growing mobile enterprise management specialist (Sept 2012)

One of five hottest enterprise startups (Sept 2012)

(Reprint available from MobileIron)

Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by Philip Redman, John Girard,

and Monica Basso (May 17, 2012). This graphic was published by Gartner, Inc. as part of a larger research

document and should be evaluated in the context of the entire document. The Gartner document is available

upon request from https://info.mobileiron.com/gartner-magic-quadrant.html.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not

advise technology users to select only those vendors with the highest ratings. Gartner research publications

consist of the opinions of Gartner's research organization and should not be construed as statements of fact.

Gartner disclaims all warranties, expressed or implied, with respect to this research, including any

warranties of merchantability or fitness for a particular purpose

2012 Magic Quadrant for Mobile

Device Management Software

AirWatch

BoxTone

Fiberlink

Good McAfee

MobileIron

RIM

SOTI

SAP

Symantec

Zenprise

Sophos

Info-Tech Research Group, Inc., Vendor Landscape: Mobile Device Management Suites, August

2012. Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in

the technology marketplace. Assessing vendors by the strength of their offering and their

strategy for the enterprise, Info-Tech Research Group Vendor Landscapes pay tribute to the

contribution of exceptional vendors in a particular category.

2012 MDM Vendor Landscape

August 2012

Page 9: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron across the Mobile IT lifecycle

9

4 Roll out at scale

Group-based

User self-service

Multi-tier management

Email

AD/LDAP

Certificates

BES

2 Integrate tightly

Email and apps

Policy and identity

Connectivity (Wi-Fi, VPN)

By group, individual, or ownership

1 Configure securely

3 Protect privacy

BYOD programs

Regional regulations

Across OS

For apps and devices

For BYOD and corporate programs

5 Manage inventory

Wipe corporate data 15 Limit roaming costs 14

Deliver apps at scale

Protect app container 12

11

Tunnel app data 13 Apps

6 Monitor risk

8 Enforce identity

9 Automate workflow

7 Control access

Security

Access and protect docs 10

Docs

Page 10: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron architecture: Deployment

10

Inte

rne

t D

MZ

C

orp

ora

te N

etw

ork

Note: MobileIron VSP, Sentry, and Atlas can be deployed

behind the corporate firewall if desired

Certificate

Authority LDAP

Security

Enterprise

Applications

Apps/Content

Administrators End Users

Users Email/PIM

VSP (Publishing, policy, config, identity, automation)

Atlas (Central console, reporting, multi-tier mgmt)

(Physical, virtual, or cloud)

Google MobileIron Apple

Datacenter

Multi-OS

Apps@Work

Docs@Work

Secure data

Trusted apps

(Enterprise app storefront)

(Secure document container)

(Privacy, identity, compliance)

(Secure app containers)

Delivery Network

App Delivery Network

(High volume delivery)

Sentry (Intelligent gateway)

(Physical or virtual)

Page 11: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Mobile IT challenge: Two unstoppable forces

11

Content Wave

App Storm

Create value

Protect data

Move fast

CIO mandate:

Page 12: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron across the apps lifecycle

12

Distribute

Private

Storefront

App

Delivery

Network

App

Control

Apps@Work

App

Tunnel

AppTunnel

Protect data-in-motion

Tunnel Containerize

App

SDK

App

Wrapping

AppConnect

Protect data-at-rest

Dynamic Policy

Authentication

Authorization

Configuration

Usage Tracking

Deletion

Page 13: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron architecture: Full app lifecycle

13

Components

Apps@Work

• Private app storefront

• Tied to device identity and posture

• Selective wipe of app data

• Industry-leading user experience

App Delivery Network (AppDN)

• Highly scalable app distribution

App Control

• Blacklist and whitelist

AppConnect

• Data protection: encryption, single sign-on

• DLP: secure app-to-app communications

• App-specific data wipe

• Security wrapper or SDK

AppTunnel

• Secure tunnel for app traffic through Sentry

App requirements:

• Secure app distribution

• Scalable downloads

• Data loss prevention for data-at-rest

• Data loss prevention for data-in-motion

• Protection from rogue apps

Page 14: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron architecture: Content management

14

Content security requirements:

• Data loss prevention for email attachments

• Secure distribution of SharePoint

• … without new repository or storage cost

Components

Intelligent gateway (Sentry)

• Protection of email attachments

Secure content hub (Docs@Work)

• Secure viewing of email attachments

• Secure access to SharePoint docs

• Secure on-device storage

• Cut/copy/paste restrictions

• No “Open in” access for rogue apps

• Doc selective wipe if out of compliance

Context-aware policy and identity

• Tight integration with existing group-based

security and remediation polices

Enterprise architecture

• Tight integration with existing content systems

• No new content repository required

• No new storage required

Page 15: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron architecture: Layered security

15

Multiple layers of security requirements:

• Email access and attachments

• Apps and docs

• BYOD data separation and privacy

• Rogue app access

• Compromised devices

• Lost devices

… without damaging user experience

Components

Intelligent gateway

• Email access and attachment control

• Secure tunnel for email, apps, docs

Secure containers for apps and docs

• Distribution, deletion, data protection

BYOD groups and controls

• Privacy policy and selective wipe

Compliance and automated remediation

• Posture detection: OS, apps, encryption

• Workflow: notification, access, quarantine, wipe

Identity

• AD/LDAP integration (group, OU, user)

• On-board or external certificate authority

• Secure multi-user with fast switching

Baseline security and configuration

• Lock, wipe, password, secure Wi-Fi/VPN

Page 16: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron architecture: Real-world scale

16

Large enterprise requirements: • Deploy 100,000+ devices • Deploy 100MB+ sized apps • Deploy 100,000+ certificates • Manage with low total cost of ownership

Components

Operational scale (on-premise and cloud)

• 100,000 devices per appliance

• 20,000 registrations per hour

• Biggest single certs site: 150,000 certs deployed

Apps scale (App Delivery Network)

• No limit on app size

• No impact on corporate network

• Fast download performance for user

Low total cost of ownership

• Easy installs and upgrades

• No DBA, Windows patching, server licenses

• 1 FTE can manage 10,000 to 20,000 devices

Scale testing

• TRUST – Test Reliability Under STress –

automation system – unique in industry

• MDM/MAM loads of 100,000+ devices

Page 17: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron investment in customer success

17

World-class global technical support and services

Domain expertise around mobility best practices

BYOD, Apps, Android,

Large Deployments

Prepare

Develop

Roll out

Sustain

Training and certification

Best practice toolkits

Evaluation companion

Peer community

Page 18: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

What customers are saying …

18

As the Director of Information Technology, I have been working with technology solutions providers and their associated vendor support personnel for many years. Ms. B’s knowledge, professionalism, client relationship skills, and mentoring capabilities far surpassed the abilities of the technical representatives from other vendors. My staff and I were extremely impressed with Ms. B’s performance and believe that her capabilities and those of her team help distinguish the MobileIron solutions from the competition.

MobileIron University in general is just awesome— it's been an incredible resource for me

In this day and age of bad customer service, my experience with MobileIron has been consistently great and this last request for help was the best yet.

MobileIron provides great support and actually listens to customer feedback.

The MobileIron team is extremely responsive to customer needs. I have seen the platform growing from Beta all the way to become a leader in the Gartner Quadrant. That happens because MobileIron listens to its customers.

I learned more during the sessions than I did during the last 6 months running our mobility project

This is hands-down the most comprehensive set of BYOD

documentation I have seen from a single source to date.

Page 19: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Companies are building a new Mobile IT stack

19

App dev

Distribution (app store)

Data security

Apps

Authoring

Distribution (content hub)

Data security Collaboration

Content

Voice Data Wi-Fi VPN CDN

Network services

Credentials SSO Persona

Identity

Access

Security & mgmt

Global mgmt Security

Page 20: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

MobileIron focus

20

Voice Data Wi-Fi VPN CDN

Access

App dev

Distribution (app store)

Data security

Authoring

Distribution (content hub)

Data security Collaboration

Credentials SSO Persona

Network services

Security & mgmt

Apps

Content

Identity

Global mgmt Security

Page 21: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Next set of Mobile IT challenges

21

Boundaries blur: Content vs. app, mobile vs. desktop

Shadow IT explodes for apps: Innovation or chaos?

Identity becomes strategic: Glue for mobile enterprise

“I am my own CIO”: Help-yourself-desk

OS turbulence is the norm: Must support 3+ OS

Page 22: DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security