Upload
parkerpearson
View
306
Download
1
Tags:
Embed Size (px)
DESCRIPTION
This session reviews Novell ZENworks and its Full Disk Encryption as a solution to address some of the challenges of data that is now increasingly mobile. Access the session on-demand at: http://www.ali-inc.com/info-resource-center.html
Citation preview
Security Threats & Breaches: Keeping your Mobile Devices Secure
Here’s what we’ll cover today: Welcome & Introduction The reality of security breaches AND increasing
mobility Solution overview: Using ZENworks to keep you
out of the headlines
Extending Network Security Reporting features Demo Ease of Management
Questions, Discussion & Next Steps
Novell Platinum Partner Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina
Collaboration, Conferencing & Messaging Converged IP networking & telephony Network Resource Management solutions Wireless & Mobile Workforce solutions Data Storage, Archiving & Disaster Recovery Network Support & Optimization Virtualization Data Security Managed Services Training
The Reality of Today’s Security Breaches
Scottsdale, AZ – October 19, 2012A vendor working with patient data for digital conversion from lost a flash drive on or around July 16. It contained patient names, Social Security numbers, dates of birth, addresses, telephone numbers, account numbers, diagnoses, and other protected health information.
Marysville, TN – October 18, 2012A password-protected laptop was stolen from an employee's home on August 25. It contained two groups of patient data. Patient names, dates of birth, responsible party names, patient addresses, physician names, and billing information for 22,000 patients were on the laptop. An additional 5,000 patients had similar information exposed as well as their Social Security numbers and other non-medical information.
Cherry Hill, NJ – October 8, 20122 data backup tapes were lost during shipping in late March 2012. The tapes included customer names, Social Security numbers, addresses, account numbers, debit card numbers, and credit card numbers.
SECURING YOUR MOBILE DATA WITH ZENWORKSSolutions to help you avoid the headlines
The ZENworks Family: Windows, Mac & Mobile Endpoints
Asset Management
ApplicationVirtualization
End Point Security Management
Patch Management
Windows, Mac & Mobile ConfigurationManagement
Service Desk Full Disk Encryption
Are you just as locked out of your own devices as any hacker?
Why ZENworks Full Disk Encryption?
Centralized Management
One Console. One Agent. One Tool for all your endpoint management tasks
ZENworks also does configuration, patch, asset & endpoint security management
Generate reportsdemonstrating encryption
Manage hardware & software encryption
Troubleshoot passwords
Turn encryption on/off
Manage access, with support for pre-boot auth
Fully FeaturedFrom a single console, ZENworks lets you manage your enterprise remotely:
down the hall, down the street, across the country, or around the world
Deploy encryption software across the enterprise at the push of a button
Rapid Deployment
Pre-Boot Authentication
Ease of Management
Service Desk Friendly
© Novell, Inc. All rights reserved.15
Control the story
Know you’re safe.
Prove you’re safe.
NEXT STEPS
ALI Consulting & Deployment ServicesHighly experienced advisors with diverse & practical technical experience
Consultative Assessment
Project & Resource Planning
Deployment
• Proactive strategy• Clear roadmap for deployment• Value driven project analysis• Limits burden on existing staff• Saves IT budget• Speeds time to deployment• Priority access to Novell as
needed• Option for lab testing
Special Incentives for Webinar AttendeesAct within next 60 days to receive:Special product discounts availableSpecial rates for project-based ALI services
Call Cindy for more details!
Upcoming Webinar TopicsNovember 8: Disaster Recovery & Business
Continuity for SMB Organizations
In this second webinar in our virtualization series, we'll be showing some disaster recovery options from VMware that make business continuity so simple and affordable that no organization has to continue to take the risk of being unprepared.
Registration link coming in the follow up email or register from our event listing at www.ali-inc.com
Questions & DiscussionCindy DeHartPractice [email protected]
Neil KimberleySales [email protected]
Sophia GermanidesNovell Account [email protected]