35
Symantec Mobile Solutions Overview Presenters: Andrew Blackham - Symantec Presales Specialist

Symantec Mobile Security

Embed Size (px)

Citation preview

Page 1: Symantec Mobile Security

Symantec Mobile Solutions Overview

Presenters:

Andrew Blackham - Symantec Presales Specialist

Page 2: Symantec Mobile Security

Agenda

– The Mobile Landscape

– 5 Pillars of Enterprise Mobility

– Supporting BYOD

– Summary

– Q&A

2

Page 3: Symantec Mobile Security

Mobile Landscape

Page 4: Symantec Mobile Security

Exploding Number of Mobile DevicesPave the Way for “Bring Your Own Device” (BYOD)

2010 177M corp PCs

2015 246M corp PCs

2010 173 M personal PCs

2015 293M personal PCs

2010 300M smartphones

2015 1017M smartphones

39% 69% 340% 2,170%

2010 15M tablets

2015 326M tablets

Page 5: Symantec Mobile Security

Changes in Working Style

New applications deployed

in the cloud

Enterprises allow mobile access to

their network

Workers use threeor more devices

80% 65% 52%1 2 3

Sources:1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 20112. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 20123. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012

Page 6: Symantec Mobile Security

Freedom, Privacy and ProductivityEasy access to files, applications, emailUse the latest technology and applicationsPersonal stuff is untouchedDo it themselves (i.e. Self-Service)

Simple, Secure and ReliableProtect company informationOnly let authorized users inEasy to work with and reliableReporting, audit and monitor

User IT Staff

The Desires of Users Versus IT Staff

Page 7: Symantec Mobile Security

Company Controls applications and Data Only

Company Controls Personal DeviceCompany Controls Standard Device

32

1

Unm

anagedM

anaged

Company Owned Personally Owned

Company Owns an Unmanaged Device

BYOD

User and App Access

Management

ThreatProtection

Secure File Sharing

Device Management

App and DataProtection

User and App Access

Management.

ThreatProtection

Secure File Sharing

Device Management

App and DataProtection

User and App Access

Management

Secure File Sharing

App and DataProtection

2

4

Evolving Endpoint Adoption Map

Page 8: Symantec Mobile Security

The 5 Pillars of Enterprise Mobility

Page 9: Symantec Mobile Security

Success = Mastering Control Points

Devices Applications Data

…without disrupting user experience

Page 10: Symantec Mobile Security

5 Pillars of Enterprise Mobility Co

ntro

l Poi

nts

User & App Access

App & Data Protection

Device Management

Threat Protection

Secure File Sharing

Device

Application

Data

Company credentials extended to both public and private

cloud services

Corporate data separation and

delivery of IT services

Configuration, control and

management of mobile devices

Mobile SecurityThreat

detectionand removal

Enterprise-gradefile sharing and collaboration in

the cloud

Page 11: Symantec Mobile Security

Symantec’s Comprehensive Solution

Symantec O3™

App Center

Mobile Management

Mobile Security

Content Center

Primary Products

User and App Access

App and Data Protection

Device Management

Threat Protection

Secure File Sharing

Symantec Managed PKI

Symantec Validation and ID

Protection Service (VIP)

Symantec Data Loss Prevention for

Mobile

Symantec Mobile Encryption

Altiris™ Client Management Suite

from Symantec

Altiris™ IT Management Suite

from Symantec

Symantec Endpoint Protection

Symantec O3™Complementary Products

Page 12: Symantec Mobile Security

Competitive Matrix

User and App Access

App and Data Protection

Device Management

Threat Protection

Secure File Sharing

Fiberlink

Airwatch MobileIron

Good

Zenprise

Symantec

McAfee

SAP/Sybase

Page 13: Symantec Mobile Security

Mobility Solutions Breakdown

Page 14: Symantec Mobile Security

Use Case #1:Access SaaS Applications From Any Device

Page 15: Symantec Mobile Security

Symantec O3

A Cloud Information Protection Platform

Symantec O3

Private Cloud / Data Center

Symantec O3

GatewayIdentity and Access BrokerInformation Gateway

Symantec O3 Intelligence CenterContext-based PoliciesStatus MonitoringLog and Audit Services

Layered Protection

2F AuthenticationData Loss PreventionEncryption

Public Cloud

End-UserAny

Device

Page 16: Symantec Mobile Security

Why Symantec O3

• Proven InfrastructureWorks with federated and non-federated applications

1..2..3

2

3

• Highly ScalableLeverages existing infrastructure

• Capture Security Events

Correlation of security intelligence

Page 17: Symantec Mobile Security

Use Case #2:Access Company and Personal Email

Mobile Protection

VPNWi-Fi

CA

Network Access

17

Page 18: Symantec Mobile Security

18

Symantec Mobile ManagementStandalone or Plug into SMP and SCCM

EnableActivate enterprise access, applications and data easily and automatically> iOS®, Android™, Microsoft®, Blackberry®, Symbian™

SecureProtect enterprise data and infrastructure from attack and theft> Detect JB, ensure passcodes, …

ManageControl inventory and configuration with massive scalability> Integrated with SMP and SCCM

Page 19: Symantec Mobile Security

19

Comprehensive Device Management

Configure Devices

Self-service enrollmentConfigure Email, VPN, Wi-FiIdentity Certificates

Distribute applications

In-house applications or public-store applicationsDocs, videos – any active content Group based management

Manage Assets

Centralized visibility and controlAutomated workflowsScalable to 20,000+ devices

Apply Policies

Passwords, App restrictionsCompliance with JailbreakSelective wipe and Full wipe

Page 20: Symantec Mobile Security

20

Why Symantec Mobile Device Management

1..2..3

2

3 • Integrated Mobile Device Management

Unified management with Macs and PCs

Page 21: Symantec Mobile Security

21

Use Case #3:Secure iOS/Android/HTML5 applications and Content

Enterprise App Store

Personal

CRM

Corporate applicatio

ns

Corp AppACME

Public application

s

Documents

Containerized Application

Page 22: Symantec Mobile Security

22

Mobile Application ManagementComprehensive Application-Wrapping Technology

App StoreRepository for internal and external mobile applications

App PolicyProtect application against data loss through encryption, removal control and separation of corporate data

Content CenterData Loss Prevention policy to control confidential data access

Page 23: Symantec Mobile Security

23

Comprehensive Mobile App Management

Deploy applications

Enterprise app store for internal applicationsRecommendations from public application storeGroup based targeting

Deploy Content

Enterprise content store for docs, videos Containerize data with per object policiesGroup based targeting

Manage Lifecycle

Revoke and update applications selectivelyCentralized visibility and controlMDM features for policy management

Protect Data

Security and Management layer around dataPasswords, encryption, offline access, rootingSeparate corproate and personal data

Page 24: Symantec Mobile Security

24

• Application deployment and provisioning• User authentication across applications• Copy and paste prevention • Per-application file encryption• Remote data/app wipe• iOS, Android, and HTML5 support

SYMANTEC APP CENTER

Symantec App Center Mobile App and Data Protection

Page 25: Symantec Mobile Security

25

Same Security as Sandboxing, but More Flexible

.IPA or .APK file with standard

libraries

App wrapped with App Centerlibraries and policy controlsready for deployment

Page 26: Symantec Mobile Security

26

Business and Personal Applications and Data Co-exist

Page 27: Symantec Mobile Security

27

Why Symantec for Mobile applications

• Quick and Easy Expedite deployment of applications with an easy-to-use SaaS app store

1..2..3

• Scalable and Seamless

Enable any number of applications with no source-code changes

• Independent of Mobile Device Management

Address mobile application needs without managing the complete device

Page 28: Symantec Mobile Security

Personal

CRM

Corp applications

Corp AppACME

Email Documents

Use Case #4:Secure Email and Prevent Malware

28

28

Page 29: Symantec Mobile Security

Android Has Malware Problem

29

– More Than 50% Of Mobile Malware Is On Android

0

500

1000

1500

2000

2500Android Malware Family

67% of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. - Symantec 2012 State of Mobility Survey

29

Page 30: Symantec Mobile Security

Symantec Mobile Security

30

AntimalwareAnti-TheftWeb Protection

Centralized ManagementAdvanced Protection

Comprehensive Protection

Management

30

Page 31: Symantec Mobile Security

Why Symantec for Mobile Security

32

– High efficacy

Monitors 70+ application stores, analyzes 3 million+ applications, information from 7 million+ active devices.

1..2..3

• Enterprise Grade SecurityMost applications are freeware, consumer editions. Symantec Mobile Security provides centralized management including LiveUpdates.

• Enterprise IntegrationAnti-malware is one-piece of mobile security. Symantec Mobile Security is integrated with Mobile Device Management.

32

Page 32: Symantec Mobile Security

Bringing It All Together

33

Devices. Applications. Data.

Mobile Protection 33

Page 33: Symantec Mobile Security

Summary

Page 34: Symantec Mobile Security

Summary

• No business is safe from attack – regardless of its size or industry

• Attackers are being more selective in who they target

• Obtaining information is key – if an attacker could make money from it, it’s a potential target

Below are some qualifying questions that can help you determine a security solution requirement:

• What are you currently doing to safeguard your data?

• How are your emails protected?

• Do you use mobile devices in your organisation?

• What industry regulations do you have to comply with?

• How are you protecting your end users workstations?

Page 35: Symantec Mobile Security

Any Questions?