20
Security Threats & Breaches: Keeping your Mobile Devices Secure

Security Threats & Breaches with Mobile Devices

Embed Size (px)

DESCRIPTION

This session reviews Novell ZENworks and its Full Disk Encryption as a solution to address some of the challenges of data that is now increasingly mobile. Access the session on-demand at: http://www.ali-inc.com/info-resource-center.html

Citation preview

Page 1: Security Threats & Breaches with Mobile Devices

Security Threats & Breaches: Keeping your Mobile Devices Secure

Page 2: Security Threats & Breaches with Mobile Devices

Here’s what we’ll cover today: Welcome & Introduction The reality of security breaches AND increasing

mobility Solution overview: Using ZENworks to keep you

out of the headlines

Extending Network Security Reporting features Demo Ease of Management

Questions, Discussion & Next Steps

Page 3: Security Threats & Breaches with Mobile Devices

Novell Platinum Partner Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina

Collaboration, Conferencing & Messaging Converged IP networking & telephony Network Resource Management solutions Wireless & Mobile Workforce solutions Data Storage, Archiving & Disaster Recovery Network Support & Optimization Virtualization Data Security Managed Services Training

Page 4: Security Threats & Breaches with Mobile Devices

The Reality of Today’s Security Breaches

Scottsdale, AZ – October 19, 2012A vendor working with patient data for digital conversion from lost a flash drive on or around July 16. It contained patient names, Social Security numbers, dates of birth, addresses, telephone numbers, account numbers, diagnoses, and other protected health information.

Marysville, TN – October 18, 2012A password-protected laptop was stolen from an employee's home on August 25. It contained two groups of patient data. Patient names, dates of birth, responsible party names, patient addresses, physician names, and billing information for 22,000 patients were on the laptop. An additional 5,000 patients had similar information exposed as well as their Social Security numbers and other non-medical information.

Cherry Hill, NJ – October 8, 20122 data backup tapes were lost during shipping in late March 2012. The tapes included customer names, Social Security numbers, addresses, account numbers, debit card numbers, and credit card numbers.

Page 5: Security Threats & Breaches with Mobile Devices

SECURING YOUR MOBILE DATA WITH ZENWORKSSolutions to help you avoid the headlines

Page 6: Security Threats & Breaches with Mobile Devices

The ZENworks Family: Windows, Mac & Mobile Endpoints

Asset Management

ApplicationVirtualization

End Point Security Management

Patch Management

Windows, Mac & Mobile ConfigurationManagement

Service Desk Full Disk Encryption

Page 7: Security Threats & Breaches with Mobile Devices

Are you just as locked out of your own devices as any hacker?

Page 8: Security Threats & Breaches with Mobile Devices

Why ZENworks Full Disk Encryption?

Page 9: Security Threats & Breaches with Mobile Devices

Centralized Management

One Console. One Agent. One Tool for all your endpoint management tasks

ZENworks also does configuration, patch, asset & endpoint security management

Page 10: Security Threats & Breaches with Mobile Devices

Generate reportsdemonstrating encryption

Manage hardware & software encryption

Troubleshoot passwords

Turn encryption on/off

Manage access, with support for pre-boot auth

Fully FeaturedFrom a single console, ZENworks lets you manage your enterprise remotely:

down the hall, down the street, across the country, or around the world

Deploy encryption software across the enterprise at the push of a button

Page 11: Security Threats & Breaches with Mobile Devices

Rapid Deployment

Page 12: Security Threats & Breaches with Mobile Devices

Pre-Boot Authentication

Page 13: Security Threats & Breaches with Mobile Devices

Ease of Management

Page 14: Security Threats & Breaches with Mobile Devices

Service Desk Friendly

Page 15: Security Threats & Breaches with Mobile Devices

© Novell, Inc. All rights reserved.15

Control the story

Know you’re safe.

Prove you’re safe.

Page 16: Security Threats & Breaches with Mobile Devices

NEXT STEPS

Page 17: Security Threats & Breaches with Mobile Devices

ALI Consulting & Deployment ServicesHighly experienced advisors with diverse & practical technical experience

Consultative Assessment

Project & Resource Planning

Deployment

• Proactive strategy• Clear roadmap for deployment• Value driven project analysis• Limits burden on existing staff• Saves IT budget• Speeds time to deployment• Priority access to Novell as

needed• Option for lab testing

Page 18: Security Threats & Breaches with Mobile Devices

Special Incentives for Webinar AttendeesAct within next 60 days to receive:Special product discounts availableSpecial rates for project-based ALI services

Call Cindy for more details!

Page 19: Security Threats & Breaches with Mobile Devices

Upcoming Webinar TopicsNovember 8: Disaster Recovery & Business

Continuity for SMB Organizations

In this second webinar in our virtualization series, we'll be showing some disaster recovery options from VMware that make business continuity so simple and affordable that no organization has to continue to take the risk of being unprepared.

Registration link coming in the follow up email or register from our event listing at www.ali-inc.com

Page 20: Security Threats & Breaches with Mobile Devices

Questions & DiscussionCindy DeHartPractice [email protected]

Neil KimberleySales [email protected]

Sophia GermanidesNovell Account [email protected]