Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase...
-
Upload
randell-shepherd -
Category
Documents
-
view
225 -
download
0
Transcript of Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase...
![Page 1: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/1.jpg)
Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.
Addressing the Challenges of Device and Data Security for the Mobile Enterprise
Tim CarterSales [email protected]
iAnywhere Confidential
![Page 2: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/2.jpg)
Agenda
Security Needs of Mobile TechnologyEnterprise Mobile Security RequirementsAddressing Mobile Security with AfariaOur "Top 10 Tips" for Making Your Mobile Solution Successful and SecureSummary
![Page 3: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/3.jpg)
Security Needs of Mobile Technology
Understanding the risk How sensitive is the data?
What’s the impact if data falls into the wrong hands?
Performing risk analyses Security of all data is not the same
Usage and Security Policies Equip your users to understand the risks
![Page 4: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/4.jpg)
Security Needs of Mobile Technology
How much security is necessary? One size does not fit all
Appropriate to users and their applications
Why mobile presents significant challenges Users are outside the firewall
Devices are portable and easily lost
![Page 5: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/5.jpg)
Enterprise Requirements forMobile Security
3. Access to data stored on the device or on storage cards
2. Data transmitted over the network
1. Protection of data in central systems
4. Protection of data on devices lost or stolen
Four Key Areas
![Page 6: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/6.jpg)
Enterprise Requirements forMobile Security
Power-on password policies, data on device encryption, virus protection, data backup
Several encryption methods including 128-bit SSL support, Firewall traversal
User authentication and assignments of channels to groups, Admin security
Remote wipe of data on lost/stolen devices,data restore,device re-provisioning
Central control of security policiesRelieve the security burden from the userMinimal user impact
![Page 7: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/7.jpg)
Frontline Management
![Page 8: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/8.jpg)
Security and Management Are Converging
User authentication (password) Data-on-device encryption Device authentication (certificates) Lost or stolen device protection Anti-virus updates Patch Management Backup and Restore Device (Re)Provisioning
![Page 9: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/9.jpg)
Security vs. Usability
Different settings for different user populations Policy Management Central control, deployment and maintenance of policies
Security Usability
Long alphanumeric passwordsLimited password attempts
Triple DES EncryptionDevice lockdown
Anti-Virus ProtectionPatch Management
Data Backup/Restore
Alphanumeric passwordsMore password attempts
AES EncryptionDevice lockdown
Anti-Virus ProtectionData Backup/Restore
PIN number passwordsDevice lockdown
Anti-Virus ProtectionPatch Management
Data Backup/Restore
![Page 10: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/10.jpg)
Management and Security have Common Requirements
Scalability Policy Management Central Control Visibility Remove User Burden Logging, reporting and auditing
![Page 11: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/11.jpg)
Afaria Security Management in Action
![Page 12: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/12.jpg)
My Top 10 Tips for Making Your Mobility Project Successful and Secure
Focus on the right projectsEngage your users earlyUnderstand the technology differencesMake it easy for your users to adopt (focus on
usability)Ensure there is clear visibility from headquarters
![Page 13: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/13.jpg)
My Top 10 Tips for Making Your Mobility Project Successful and Secure
Determine and communicate usage policies to your users (consider tech and non-tech issues)
Use security software and infrastructure to implement your policies directly from HQ
Allow your top performers to continue to be top performers
Analyse the ROI six months after the project has been bedded in
Use a management and security framework capable of supporting mobile projects
![Page 14: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/14.jpg)
Summary
Management and Security together allow enterprises to scale their investments in mobile technology
Management and security are converging rapidly
iAnywhere leads the market in delivering management, security and all the other elements necessary to allow enterprises to extend business applications to their front lines
![Page 15: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.](https://reader035.fdocuments.in/reader035/viewer/2022081516/56649dc85503460f94abda8d/html5/thumbnails/15.jpg)
Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.
Addressing the Challenges of Device and Data Security for the Mobile Enterprise
Tim CarterSales [email protected]
iAnywhere Confidential