Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without...

16
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security & BYOD Enablement

Transcript of Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without...

Page 1: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Embrace Mobility.Without Compromise.

The apps they need.

On the devices they want.

Without sacrificing compliance.

Strategic Approach to Mobile Security & BYOD Enablement

Page 2: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Fully integrated security, encryption and policy stacks

Business Email, Calendar and Contacts only on BlackBerry

IT command-and-control, no personal apps allowed

Predictable and controlled

The Good Old Days of Mobility…

Page 3: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Today’s Mobility Environment

Work / Play

NFC

Bluetooth

WiFi

GPS

BYOD

Apps

Social

Banking

Extremely Powerful Business Productivity Tools

Highly Portable & Highly Vulnerable Consumer-Grade Devices

Camera

Life-Changing Personal Computing & Communications

Consumerization

Page 4: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

End User IT Organization

Business“Give me the apps and data I need on the devices I want.

Without restricting my personal use.”

“How do we protect our assets if we can’t trust or control the device?

How do we manage compliance?”

“We need productive employees and maximum returns on mobility without sacrificing security and compliance!”

New Enterprise Mobility Challenge

Page 5: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

The real challenge isn’t “bringing devices to work”.The real challenge is bringing work to devices, without

compromising security or compliance.

Company Owned, Business Only Devices

Company Owned Business Only (COBO)

Company Owned Personal Enabled (COPE)

Employee Owned Business Enabled (BYOD)

Command and Control, Lock it Down

Choice of Device and OS

Mix of Personal and Business Use

Greater Admin Privileges to User

Empower Employees to Do Their Job

Enterprise Mobility ChallengeEmbracing the Next Wave of Mobility

Page 6: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

6

What Makes BYOD a Unique Challenge for Enterprise IT?

Devices in an unknown and unverified starting state

Unencrypted corporate data mixed with personal

Consumer-grade OS’s susceptible to rooting and malware

Heightened risk of corporate data leakage and cyber

attacks

Restrictions on strong device-level policies and wiping

Accidental data leakage through end-user actions

Unverified 3rd party apps with access to open APIs

Page 7: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

React & Restrict ApproachWe’ll allow BYOD by imposing greater restrictions on what

employees can do if they “bring devices to work”.

What Makes BYOD a Unique Challenge for Enterprise IT?

Embrace & Extend ApproachWe’ll embrace BYOD by securely

“bringing work to devices” (BWTD!) without restricting personal use or access to key business applications.

Page 8: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Evolution of EMM (MDM) Technology to Address Challenges

Mobile Devices

Mobile Apps & Private Data

Security & Compliance

Provisioning & Management

Mobile App Management

Encryption & “Containerization” of Corporate Apps & Data

Integrity VerificationCompliance

OS Hardening

Mobile Device Management(MDM)

Page 9: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Secure ContainerizationKey Considerations and Approaches

YOUR Business Apps/Data

The Mobile Device

THEIR Personal Apps/Data

Page 10: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Access Control PoliciesAuthentication & Conditional Policies

Data EncryptionData At-Rest + Data-In-Transit

Compliance Considerations

Data Leakage PreventionRestrict Copy/Paste

Restrict Direct Sharing to Internet

Jailbreak/Root Detection

Containment from Personal Apps/Data

Selective Lock/WipeWipe Business Data, Not Personal

What Security Do I Need to Add?

Secure ContainerizationKey Considerations and Approaches

Page 11: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Email & PIMEmail, Calendar, Contacts

BrowserIntranet Access

Separation of Business Browser Cache

DocumentsEmail Attachments

Documents Created On-Device

Documents Downloaded from Intranet

Microsoft SharePoint

Custom AppsIn-House Built and/or 3 rd Party Apps

Which Apps & Data Do I Need to Protect?

Secure ContainerizationKey Considerations and Approaches

Page 12: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Fixmo Mobile SecurityEmbrace Mobility Without Compromise

Enable trusted and protected mobile computing in the age of consumerization and hyper connectivity.

Products that help IT organizations in public and private sector proactively: Contain and protect their private data and

assets on increasingly personal devices Detect & prevent anomalies and attacks Monitor and maintain system integrity Maintain & prove compliance

What We Do

How We Do It

Page 13: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Fixmo Enterprise Mobility PlatformModular Platform for Security and Compliance

13

Mobile Devices

Mobile Apps & Private Data

Security & Compliance

Provisioning & Management

[MDM]

[MAM] [Secure Containerization]

[Integrity]

Page 14: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Fixmo SafeZoneSecure Workspace and App Containerization

Secure workspace and containerization solution that keeps ALL business data and apps encrypted, contained and under IT control independent of the device or who owns it

Full suite of secure business productivity apps pre-built to run inside the secure workspace including Email/PIM, Browser, Documents, PDF Annotation, Camera, SharePoint

High assurance security and DLP for iOS and Android – no matter who owns the device

Page 15: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Does your company need to consider a “Beyond MDM” mobility strategy?

1. What are the requirements and expectations of your employees for how they will use mobile devices?

2. Do you want to allow Email? Intranet Browsing? Document access? SharePoint access? Custom business apps?

3. Do you need to be able to wipe all business data (email, apps, documents, etc.) without wiping the entire device?

4. Do you have regulatory compliance requirements related to DLP and encryption of data-at-rest / in-transit?

5. To what degree will your company be embracing BYOD policies within the next 12 months?

Page 16: Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.

Mobility Without Compromise

16

Thank You!

Michael Dennehy, [email protected]