16
McAfee Enterprise Mobility Management Securing Mobile Applications

Presentatie mc afee emm 2011

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Presentatie mc afee emm 2011

McAfee Enterprise Mobility ManagementSecuring Mobile Applications

Page 2: Presentatie mc afee emm 2011

2

The User is Evolving

June 1, 2011

2

Page 3: Presentatie mc afee emm 2011

3

The User is Evolving

June 1, 2011

3

Page 4: Presentatie mc afee emm 2011

4

IT’s Challenge with Mobile DevicesWeb 2.0, Apps 2.0, Mobility 2.0

IT

HR

Finance

Sales

IT

Threats Are 60,000 New Pieces ofMalware/day

More than half of all users don’t lock their devices

80% of IT Users Concerned about Device Data Loss

Mobile Devices Predicted to be New Malware Frontier

June 1, 2011

Page 5: Presentatie mc afee emm 2011

5

Customer FacingApps

Enterprise and LOB Apps

Basic Services

Web andSocial Media

Required:

• Data Protection

• Compliance

• Authentication

• Security Policy Management

• Self-Service Provisioning

• Enterprise App Management

June 1, 2011

Requirements for Secure Application Enablement

Page 6: Presentatie mc afee emm 2011

6

Windows

Mobile

• Makes it secure

– Configures, enforces and manages native device security settings

– Enforces device compliance with enterprise policies

– Extends the security infrastructure to include devices via ePO integration today and ultimately via integration with anti-malware, web protection, DLP, and Global Threat Intelligence

– Integrates with the data center: VPN, Wi-Fi, PKI, directories, and LOB applications

• Makes it easy

– Integrates with McAfee ePO for simple administration, reporting

– Enables user self-service provisioning

– Personalizes devices to optimize end-user productivity

• Makes it scalable

– Scales to 10s of 1,000s of devices

– Supports HA and DR configurations

Database

Files

Directory

Applications

Certificate Services

Messaging

Enterprise Environment

Symbian

Android

webOS

BlackBerry

iPhone

iPad

McAfee

EMM

6 June 1, 2011

Empowering Enterprise Mobility

VPN

Page 7: Presentatie mc afee emm 2011

7

The Right Life Cycle for Mobile Device Management

ePO

Provisioning Self-service provisioning sets security policies, configures network connectivity, and automatically personalizes devices for users.

Policy

Management

Compliance

IT Operations

Support

Application

ManagementProvisioning

Security &

AuthenticationePO

Security and AuthenticationEach device is issued a unique digital certificate to strongly authenticate it against Microsoft CA for security and user experience.

Policy ManagementPush security policies, configuration updates, and remote helpdesk tasks (such as lock, wipe, and selective wipe) over-the-air.

ComplianceAutomatically check devices prior to network access to ensure only authorized, secured devices access the network

IT Operations SupportManage policies and devices centrally and get centralized reporting through McAfee ePOintegration.

Enterprise Application Management Make applications available in a secure, role-based way. Offer software for download, links to third-party app stores, and web links.

June 1, 20117

Page 8: Presentatie mc afee emm 2011

8

Self-Service Provisioning for iPhone

Easy, Secure, Automated

Go to the

App Store

1 2

Enter Your Email

Credentials

IT Services are

Auto-Provisioned

4

Agree to

Corporate Policy

3

Easy, Secure, Automated

8 June 1, 2011

Page 9: Presentatie mc afee emm 2011

9

Self-Service Provisioning for Android

9 June 1, 2011

1

Go to the

Marketplace

2

Enter Your Email

Credentials

3

Agree to

Corporate Policy

4

IT Services are

Auto-Provisioned

Easy, Secure, Automated

Page 10: Presentatie mc afee emm 2011

10 June 1, 201110

Benefits:

• Industry-standard security

• Strong authentication for secure

access to communications

services such as Wi-Fi and VPN

• Strong authentication for secure

push email and other applications

• Single sign on for enhanced user

experience

• No impact on battery life

Industry-Standard Security: Microsoft Certificate Authority

Industry Standard PKI for Strong Authentication

Page 11: Presentatie mc afee emm 2011

11

Enterprise Application Store

• Recommend and make applications securely available based on group, role, or device type.

– Custom corporate

applications

– Third-party

applications (Apple

App Store or Android

Marketplace)

– Webclips

• Device applicationinventory, audit, andpolicy management

Page 12: Presentatie mc afee emm 2011

12

Centralized Visibility and Control with ePO

Compliance reports are

based on systems we

know about

Page 13: Presentatie mc afee emm 2011

13

What we don’t

manage is where

compliance status is

unknown

Centralized Visibility and Control with ePO

Page 14: Presentatie mc afee emm 2011

14

Bringing all

endpoints into

compliance status

view is critical to

assessing risk and

prioritizing actions

Centralized Visibility and Control with ePO

Page 15: Presentatie mc afee emm 2011

15

All Part of McAfee Security Connected

Mac, UNIX/Linux AV

Virtual Desktop

Virtual Server

Mobile Devices

Anti-Virus & Anti-Spyware

Host Intrusion Prevention

Endpoint Encryption

Application Whitelisting

Desktop Firewall

Device Control

Policy Auditing

NAC Endpoint

Endpoint Security

Email Server AV & Anti-Spam

SharePoint Protection

Website Reputation

Next Generation Firewall

Network Intrusion Prevention

NAC Gateway

Network User Behavior Analysis

Network Threat Behavior Analysis

Network Threat Response

Network Security

Policy Management

Security Reporting

Mobile Management

Vulnerability Management

Risk Management

Compliance

Security Management

Content Security

Email Gateway

Web Gateway

Data Loss Prevention

Encryption

June 1, 2011

Page 16: Presentatie mc afee emm 2011