SlideShare une entreprise Scribd logo
1  sur  35
Endpoint Evolution
    Mobile Device Management – Protecting Sensitive Data



    Kawika Takayama
    Public Sector – Endpoint Management and Mobility

Mobility, Virtualization and the Emerging Workspace        1
Consumerization is Changing the Face of IT

                                            1 Billion Consumer owned               Evolving User Focused Management
                                          Smartphones or tables by 2016
                                      365M will own Smartphone or Table
                                                                                                   2014
                     Unmanaged




                                              in the Workplace*                             246M Corp PCs
                                                                                         293M Personal PCs
                                                                                        819M Smartphones
Apps/Info/Access




                                                                                             116M Tablets
                                                                                      70M Virtual Desktops


                                                  2011
                                                 177M Corp PCs
                     Managed




                                                 300M Smartphones
                                                 15M Tablets
                                                 13M Virtual Desktops
                                                                                                             Relevant Devices Today

                                                                                                             Future Devices
                                  Traditional Device Focus
                                                       Corporate-Owned                Personally-Owned
                                 *Forrester Research                      Device
                   Mobility, Virtualization and the Emerging Workspace                                                                2
Mobility, Cloud and I.T. Mega- Pains


                                               Mobile
                                                        Must support to enhance
                                                        employees productivity


                                                        I do not have the means to
                                                        control security, risk, and
                           Frustration                  compliance across all of these
                                                        new I.T. platforms
         Private
          Cloud
                                                Cloud   Must embrace to drive business
                                                        agility and lower costs




Mobility, Virtualization and the Emerging Workspace                                      3
Operating System Diversity Skyrocketing

              Corporate Desktops                      First quarter PC forecast:
                 2009 to 2011                         Windows down
                                                      2%, Mac+iPad up 250%
87.3%              11%              1.7%
                                                          - asymco, April, 2011



                     8%             1.3%              Android devices outsold the
                                                      iPhone 2-to-1 in the past
                                                      three months
                                                        - PCWorld, September, 2011



    Windows               Mac              Linux




Mobility, Virtualization and the Emerging Workspace                                  4
Stimulating an Evolution in Systems Management


              Device Centric                                            User Centric
                                                                            Device

                                               Software     Cloud
  User
                                                           Services                       Location

                                                                            User
                           Device                 Device       User
                                                                                              Mobile
                                                             Data                             Devices
  Patches                                     Location
                                                              Virtual
                                                             Desktops                  Apps




Mobility, Virtualization and the Emerging Workspace                                               5
Symantec’s HoneyNet Project – March 8, 2012
                                                      The Set Up
   Before the 50 smartphones were “lost,” a collection of simulated corporate and personal data was placed on them
   to simulate a real phone. While these apps had no actual functionality, they were able to transmit data back to us
   which logged what apps were activated and when – and the phone finder was presented with an error message or
                                     other plausible reason for the app not working.
      The phones were then dropped in high-traffic areas such as elevators, malls, and office food courts, in New
    York, Washington D.C., Los Angeles, the Bay Area, and Ottawa, Canada. As people found the smartphones
     and attempted to access apps and data, details were anonymously logged to track the “human threat” of a lost
                                                         phone.
                                What to Expect When You Lose Your Phone
                        •96%       of lost smartphones were accessed by their finders
        •89% of devices were accessed for personal-related apps and information
        •83% of devices were accessed for corporate-related apps and information
    •50% of smartphone finders notified the owner and gave contact information to return the
    device – however almost all of these people (86 percent) attempted to access information on
                                           the devices.
                                                  .

                                         http://www.msnbc.msn.com/id/46665467
                                            How safe if your smartphone’s Data?

Mobility, Virtualization and the Emerging Workspace                                                                     6
The Importance of Patching 3rd Party Applications
 More than ⅔ of all endpoint
 vulnerabilities are found in                                          Internet Security Threat
 3rd party desktop applications                                            Report (April 2011)

                                                      • 30% increase in the overall number
                         National Vulnerability
                               Database                 of vulnerabilities in 2010 (6,253)
       Top 5 Vulnerable Applications
   Apple Safari | Mozilla Firefox | Google Chrome |   • 161% increase in new vendors
   Microsoft Internet Explorer | Adobe Flash Player     affected by vulnerabilities in 2010

                                                      • Chrome and Safari vulnerabilities
                                                        on the rise

                                                      • 346 vulnerabilities affecting
                                                        browser plug-ins


Mobility, Virtualization and the Emerging Workspace                                           7
Mobile Marketplace
                              Of the 1 Billion consumer Smartphone and
                             Tablets, Apple, Google, and Microsoft control
                                       90% of the marketplace*




Mobility, Virtualization and the Emerging Workspace                          8
Endpoint Management Building Blocks
                                                      Mobile
                                                      • Enterprise enablement
                                                      • Greater need for data security
                                                      • Central enterprise app store

                                                             Unified Application Management
                                                             • More application types to manage

                                             3               • Faster delivery of service
                                                             • Greater need to enforce compliance
                                                                  Cross Platform Patch

                                              2                   Management
                                                                  • Greater threats to other
                                                                    platforms
                                                                  • Third party applications
                                                                 Consistent Tool Sets

                                             1                   • Reduce errors and training costs
                                                                 • Fewer steps for routine tasks
                                                                 • Reduce IT silo’s


Mobility, Virtualization and the Emerging Workspace                                               9
Use Symantec Mobile Management to enforce policy
and compliance controls


 Secure
   Protect enterprise data and
   infrastructure from attack and theft



 Enable
   Activate enterprise access, apps and
   data easily and automatically



 Manage
   Control inventory and configuration
   with massive scalability

Redefining Mobile Protection                       10
Now Selling!
Odyssey Athena/Mobile Management for SCCM




• Managed through the Microsoft SCCM platform
• Provides a similar feature set to Symantec Mobile Management

                                                                 11
3
 Mobile Platform Enhancements
 Enables “Powered by Symantec”

Multiple Consoles



                                         Global Policy Editor        Configuration Profile Service
                                     Tenant Administration Service    Device Notification Service
Symantec Services                     Device Enrollment Service      Notification Feedback Service
                                      Device Provisioning Service          Console Integrator
                                       Device Inventory Service        Certificate Management



  Multiple OSs



                     Core products                                                Add-ons
       Symantec Mobile Management (existing product)                 Symantec DLP for Tablets (existing product)
     Symantec Mobile Management for SCCM (new product)                Symantec Managed PKI (existing product)


 Symantec Advances Enterprise Mobility Strategy                                                                    12
Symantec Mobile Superiority
• Symantec IS Security
    – Secure architecture satisfies DOD requirements
    – More than just MDM – DLP, SEP Mobile
• Scalability/Robustness
    – Most clients per server (40,000+)
    – Proven platform (can’t be built overnight)
• Unified Management
    – Any MDM will solve today’s tactical issues (executive iPads)
    – As mobile becomes mainstream, a silo solution is the wrong answer
• Future Proofing
    – MDM is commoditizing, converging with security and PCLCM solutions.
      Where will “pure play” vendors be a year from now? We are already
      there.

Mobility, Virtualization and the Emerging Workspace
Symantec Mobile Management
Robust mobile policy and compliance

     • Enterprise Enablement
            •    Activation of devices across platforms
            •    Software Delivery via Mobile App Store & Mobile Library
            •    Configuration & policy management


     • Mobile Security
            •    Security configuration, alerts, jailbreak protection
            •    Corporate / personal separation / remote wipe
            •    Identity and certificate management


     • Enterprise Management
            •    Asset reporting
            •    Single infrastructure console
            •    Scalable architecture



Mobility, Virtualization and the Emerging Workspace                        14
Actual Customers Challenges
    Banking &
     Finance
                     VP of Desktop Operations
                     • Cost containment for over 4,000          “Streaming is a stepping
                       applications
                     • Support Brick and Mortar reduction         stone to any device
                       initiative
                     • Pressure to support personal devices
                                                                      anywhere”

  Healthcare &
 Pharmaceuticals
                     VP of Client Architecture                   “Any app, any device,
                     Key Challenges
                     • 75% of current workforce is mobile         anytime in a secure
                     • Self Service permeates all IT projects          fashion”

 Entertainment &
     Gaming          VP of Desktop Operations                     “Self Service across
                     • Creative atmosphere driven towards Mac
                     • Enable end user choice in hardware &            devices is
                       devices
                     • Consistent software management across
                                                                 key to our IT business
                       platforms                                         model”
Mobility, Virtualization and the Emerging Workspace                                        15
Symantec Mobile Device Solutions Today

Mobile Device Security                                 Mobile Device Management



                                                                 Inventory
                                                               Symantec MMS
                     Threat Protection
                      (SEP Mobile Ed)

                                                                       Configuration
                                                                      Symantec MMS


               Network Access
                   Control                                          Intelligent Software
              (SNAC Mobile Ed)                                          Management
                                                                      Symantec MMS


                                                                  Remote
                                                                 Assistance
                                                               Symantec MMS

 Mobility, Virtualization and the Emerging Workspace                                       16
Symantec Mobile Management 7.1
Advanced iPhone/iPad/iOS Management
• Key Requirements/Features
    – Native iOS integration
        • Native agent for iPads and iPhones
          – Removal of dependency on MS Exchange
        • Easy device enrollment
          –   User authentication
          –   Automatic download of a device certificate
          –   Automatic initial download of all security and management policies, including the Apple Configuration Utility settings
          –   Identify and block jailbroken phone and other non-compliant devices (min OS, hardware type, etc.)
        • Collection of detailed asset inventory, e.g. device is jailbroken, what apps are installed, etc.
        • Confirms security and management policies have been applied to the device
    – Apple Configuration in Mobile Management 7.1 Console
        • Support for all of the native MDM features in iOS 4.0 and 5.0
        • Define and deploy settings from the Mobile Management 7.1/SMP console
          – VPN/Wireless settings, Proxy settings, Control iTunes, Safari and other features, etc.
          – Automatic download and application of new policies
        • Enterprise app store (“library”)
          – Enables delivery of in-house apps and content to device
          – Supports links to Third party apps in Apple App Store



Mobility, Virtualization and the Emerging Workspace                                                                                    17
Apple Configuration Profiles (Policies)
• Passcode Profile                                      • Restrictions
    –   Require passcode                                    –   App installation
    –   Allow simple value                                  –   Camera
    –   Require alphanumeric value                          –   Screen capture
    –   Passcode length                                     –   Automatic sync of mail accounts while
    –   Number of complex characters                            roaming
    –   Maximum passcode age                                –   Voice dialing when locked
    –   Time before auto-lock                               –   In-application purchasing
    –   Number of unique passcodes before reuse             –   Require encrypted backups to iTunes
    –   Grace period for device lock                        –   Explicit music & podcasts in iTunes
    –   Number of failed attempts before wipe               –   Allowed content ratings for movies, TV
    –   Control Configuration Profile removal by user           shows, apps
• Certificates and identities                               –   Safari security preferences
    – Credentials                                           –   YouTube
    – SCEP                                                  –   iTunes Store
• Exchange ActiveSync                                       –   App Store
• Email (IMAP/ POP)                                         –   Safari
• VPN (L2TP, PPTP, IPSec, Cisco, Juniper,               •   LDAP
         F5, custom)                                    •   CalDAV
• Wi-Fi (Open, WEP, WPA, WPA2, WEP                      •   CardDAV
         Enterprise, WPA Enterprise, etc.)              •   Subscribed calendars
• Advanced – APN, Proxy settings                        •   Web Clips
Mobility, Virtualization and the Emerging Workspace                                                      18
Apple iOS 4 and 5 MDM Actions and Asset Info
• Mgmt Console Actions                                     • Inventory Data
    –   Remote wipe                                          – Device information
                                                                •   Unique Device Identifier (UDID)
    –   Remote lock                                             •   Device name
    –   Reset passcode                                          •   iOS and build version
                                                                •   Model name and number
    –   Update Policies                                         •   Serial number
        • Updates configuration and Provisioning                •   Capacity and space available
                                                                •   IMEI
          Profiles over the air                                 •   Modem firmware
        • Performs selective wipe of specific                   •   Location (Lat./Long.)
          settings/email when selected policies are          – Network information
          removed                                               •   ICCID
                                                                •   Bluetooth® and Wi-Fi MAC addresses
    – Send Inventory                                            •   Current carrier network
    – Remove MDM and reset agent                                •   SIM carrier network
                                                                •   Carrier settings version
        • Provides full selective wipe by removal of all        •   Phone number
          profiles and content                                  •   Data roaming setting (on/off)
    – Configuration profile targeting                        – Compliance and security information
        • Based on standard policy targeting                    •   Configuration Profiles installed
                                                                •   Certificates installed with expiry dates
        • Admin defined list of policies                        •   List of all restrictions enforced
                                                                •   Hardware encryption capability
                                                                •   Passcode present
                                                             – Applications
                                                                • Applications installed (app ID, name, version, size,
                                                                  and app data size)
                                                                • Provisioning Profiles installed with expiry dates
Mobility, Virtualization and the Emerging Workspace                                                                      19
Athena MDM Agent for Android
  • Policies                               – Minimum symbols required in
      –   Wipe     data1                     password2
      –   Lock now                         – Minimum numerical digits
                                             required in password2
      –   Reset password
                                           – Minimum uppercase letters
      –   Password enabled                   required in password2
      –   Set maximum failed passwords     – Password expiration (number
          for wipe                           of days)2
      –   Set maximum inactivity time to   – Password history (max
          lock                               number of past passwords
      –   Set password minimum length        stored)2
      –   Alphanumeric password            – Password complex characters
          required                           required2
      –   Minimum letters required in      – Data Encryption2
          password2                        – Camera Disable3
      –   Minimum lowercase letters             1 - Wipes user data on device; does
          required in password2                 not wipe memory (SD) card
      –   Minimum non-letter characters         2 - Android 3.x+ required
          required in password2                 3 - Android 4.x+ required


Presentation Identifier Goes Here                                                     20
Athena MDM Agent for BlackBerry®

• Premium support for BlackBerry smartphones
    – Simplified enrollment with AD authentication
    – Extended hardware and software inventory
    – Zero-touch management
    – Live remote assistance – remote control, etc.




Presentation Identifier Goes Here                     21
Enterprise Mobility Roadmap
 Advancing our mobility strategy


                                                                     DLP




           Sept 2011                                     March 2012             Summer/Fall 2012*
 Comprehensive iOS Support                     Single Sign-On for Cloud/Web    Advancing MDM Support
  Public and Enterprise Apps                            Services (O3)           (iOS, Android, WP7/8)
                                             Symantec Mobile Management         IT Analytics for Mobile
   iOS Document Library &
                                               for SCCM (Odyssey Athena)
     Enterprise Appstore                                                         Secure Sync & Share
                                                        June 2012                   Collaboration
          Q1 2012
     DLP for Tablets &                           SMM - Advanced Android
SMM DLP enhancements (Jan)                           Management
                                             Mobile Security - Android Agent
VeriSign MPKI Integration (Feb)
 Symantec Confidential and Proprietary                                                                    22
 *Disclaimer - Roadmap contents and timing subject to change without notice
Introducing DLP for Tablets
                               New Technology = New Challenges
                                      Introduced Nov 2011

                                                  Execs pushing
            How do you say                          adoption
               “Yes”?                                                        Access to
                                                                          corporate email
                                                                           and network
     How do you
     demonstrate
     compliance?
                                                                             No control
                                                                            off-network

                    How do you                          All the access,
                     secure IP?                           few of the
                                                            controls
Mobility, Virtualization and the Emerging Workspace                                         24
Why use Symantec DLP for Tablets?
 Comprehensive
   Coverage




    Corporate Email             Personal Email             Social Media             Cloud Apps


    Most User            Works over Wi-Fi and 3G
     Friendly
                         Enables full use and productivity of the device. Our approach does NOT
                            • Require a restrictive “sandbox” approach, or
                            • Break business processes by restricting what data can go to the iPad

    Lowest TCO
                         Symantec DLP for Tablets™ is tightly integrated w/ Symantec DLP Suite:
                            • Common, advanced technologies for detecting confidential information
                            • Consistent application of DLP policy
                            • Seamless, integrated reporting & analytics


Redefining Mobile Protection                                                                         25
Symantec™ Data Loss Prevention for Tablets
• Extends DLP to the newest endpoint
    – Bridges the BYOD gap
• Prevents IP and PII data loss
    – Corporate and Web email
    – Web uploads and postings
    – Popular Apps
• Demonstrate compliance to auditors
• Educate your users
• Standalone or as part of the Symantec™ Data Loss Prevention
  Suite


Mobility, Virtualization and the Emerging Workspace             26
Data Loss Prevention for Tablets – Sample Use Case
Similar to Data Loss Prevention for Endpoint capability

    Problem                         DLP Policy           DLP Actions          Results



    • Users send                    • DLP inspects all   • Monitor only,      • User behavioral
      sensitive data                  outbound email       notify, block or     change
      via email                                            remove sensitive   • Automated
                                                           data                 compliance
                                                                              • Risk reduced




Mobility, Virtualization and the Emerging Workspace                                               27
Cross Platform Asset Lifecycle Management

         New Applications                         Update Applications      Retire Applications
             (Purchased Software)                      (Version Control)       (Recover Licenses)




                                                        Policy
                                                      Management
                                                        Issues
                                                         Visibility
                                                          Control
                                                            Effort




Mobility, Virtualization and the Emerging Workspace                                                 28
Altiris Client Management Suite for Mac


                                  Discovery and
                                  Inventory



                                 Intelligent Software &
                                 Patch Management



                                 Remote
                                 Assistance



                                 Imaging and
                                 Deployment




                                                          29
Mobility, Virtualization and the Emerging Workspace
Application Streaming and Virtualization
  Separating the things that matter

                                                            Streaming Server




                    Operating System                       Operating System


               Traditionally Installed                Streamed and Virtualized


Mobility, Virtualization and the Emerging Workspace                              30
Securely Deliver and Manage Any Service
to Any User in Any Location

  Support any device                           Manage applications                        Enable services
regardless of ownership                         regardless of type                     regardless of location

  Laptops            Desktops &
                         Tablets                 SaaS         Social &      Physical
                     Thin Clients               Delivery       Cloud         Apps
                                                              Services




                                                      App Store Delivery Models



                                                       Virtual Apps & Desktops




Mobility, Virtualization and the Emerging Workspace                                                             31
Introducing Symantec O3
            A New Cloud Information Protection Platform




                                               Symantec O3™
      Access      Information    Cloud
                                                              Control   Security   Compliance
      Control      Protection   Visibility


                                             Private
                                              Cloud




Redefining Mobile Protection                                                                    32
How Symantec O3 Works – User View
                                                             End-User
                                                            Any Device




                                               Symantec O3™
                                  Symantec O3         Symantec O3
                                         Symantec O3™
                                    Gateway        Intelligence Center
                               Identity and Access Broker                    Context-based Policies
                                  Information Gateway                          Status Monitoring
  Layered Protection                                                         Log and Audit Services
  2F Authentication
         DLP
      Encryption

                                                  Cloud, SaaS and Web Applications




                                   Public Cloud Services                 Datacenter / Private Cloud



Redefining Mobile Protection                                                                          33
Symantec Service Offering

                        Accelerated Adoption Program
                A free 2 day workshop that supports customer migrations from 6.x to 7.1

                         Distance Learning Assessment
         A free service offering to Education Accounts to provide insight on how to establish a
                                  world class distance learning program

                           Mobile Security Assessment
         5 week evaluation to identify risk inherent in the enterprise from the use of iPhones,
                                      iPads, and Android devices

                         Malicious Activity Assessment
         Free non-intrusive evaluation of network traffic on a customer’s entire network or a
                                      specific network segment



Mobility, Virtualization and the Emerging Workspace                                               34
EMM Partner Solution Integrators


                        ITS Partners                       Privilege Management and Lockdown
                       Mobile Management-as-
                              a-Service


                                                        Device Lockdown                    Network Resource Management
                 Intuitive                                                  Network Mgmt
   Endpoint Management-as-
           a-Service
                                      Cloud Services      ITMS
                                                                                                          eiPower
                                                                                 Green Energy      Power Management and Control

                                  Service Catalog
Request Fulfillment and Service
           Catalog
                                                                              Mobile
                                             Deployment
                                                              App Package              Mobile Solutions & Support for SCCM
                                                                                            (Now Apart of Symantec)
                DeployExpert and HiiS
                                                       Install, License Entitlement, App
                                                                     Delivery


Public Sector SE Management Team                                                                                                  35
Thank you!




Mobility, Virtualization and the Emerging Workspace

Contenu connexe

Tendances

The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
Tnooz-Amadeus Webinar: The impact of the always-connected traveler
Tnooz-Amadeus Webinar: The impact of the always-connected travelerTnooz-Amadeus Webinar: The impact of the always-connected traveler
Tnooz-Amadeus Webinar: The impact of the always-connected travelerKevin May
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012Robert Sutor
 
Ibm endpoint manager pulse
Ibm endpoint manager   pulseIbm endpoint manager   pulse
Ibm endpoint manager pulseRMayo22
 
Mobile sector's idea
Mobile sector's ideaMobile sector's idea
Mobile sector's ideaChen Chen
 
BI Forum 2010 - Mobile Business Intelligence
BI Forum 2010 - Mobile Business IntelligenceBI Forum 2010 - Mobile Business Intelligence
BI Forum 2010 - Mobile Business IntelligenceOKsystem
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Enterprise
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future StateBruce MacVarish
 
Bring Your Own Device Seminar
Bring Your Own Device SeminarBring Your Own Device Seminar
Bring Your Own Device Seminarhbethlehem
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wirelesspetch243
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase Türkiye
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Ibm cognos mobile now with android support
Ibm cognos mobile now with android supportIbm cognos mobile now with android support
Ibm cognos mobile now with android supportFriedel Jonker
 
Smarter Planet & Innovation
Smarter Planet & InnovationSmarter Planet & Innovation
Smarter Planet & InnovationKim Escherich
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Surround Computing: The Future of Work & Play
Surround Computing: The Future of Work & PlaySurround Computing: The Future of Work & Play
Surround Computing: The Future of Work & PlayAMD
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnSandy Kemsley
 

Tendances (20)

The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
Tnooz-Amadeus Webinar: The impact of the always-connected traveler
Tnooz-Amadeus Webinar: The impact of the always-connected travelerTnooz-Amadeus Webinar: The impact of the always-connected traveler
Tnooz-Amadeus Webinar: The impact of the always-connected traveler
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012
 
IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
Ibm endpoint manager pulse
Ibm endpoint manager   pulseIbm endpoint manager   pulse
Ibm endpoint manager pulse
 
Mobile sector's idea
Mobile sector's ideaMobile sector's idea
Mobile sector's idea
 
BI Forum 2010 - Mobile Business Intelligence
BI Forum 2010 - Mobile Business IntelligenceBI Forum 2010 - Mobile Business Intelligence
BI Forum 2010 - Mobile Business Intelligence
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
 
Bring Your Own Device Seminar
Bring Your Own Device SeminarBring Your Own Device Seminar
Bring Your Own Device Seminar
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wireless
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
 
Dsk mobiliz
Dsk mobilizDsk mobiliz
Dsk mobiliz
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Ibm cognos mobile now with android support
Ibm cognos mobile now with android supportIbm cognos mobile now with android support
Ibm cognos mobile now with android support
 
Smarter Planet & Innovation
Smarter Planet & InnovationSmarter Planet & Innovation
Smarter Planet & Innovation
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Surround Computing: The Future of Work & Play
Surround Computing: The Future of Work & PlaySurround Computing: The Future of Work & Play
Surround Computing: The Future of Work & Play
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, Tallinn
 

En vedette

Nudipay, Mobile Payments with the Barest of Fees
Nudipay, Mobile Payments with the Barest of FeesNudipay, Mobile Payments with the Barest of Fees
Nudipay, Mobile Payments with the Barest of FeesLawrence Schmid
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategyMicro Focus
 
Adapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityTripwire
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Palo Alto Networks Sponsor Session
Palo Alto Networks Sponsor SessionPalo Alto Networks Sponsor Session
Palo Alto Networks Sponsor SessionSplunk
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defensecentralohioissa
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 

En vedette (9)

Nudipay, Mobile Payments with the Barest of Fees
Nudipay, Mobile Payments with the Barest of FeesNudipay, Mobile Payments with the Barest of Fees
Nudipay, Mobile Payments with the Barest of Fees
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
Adapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint Security
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
E publishing
E publishingE publishing
E publishing
 
Palo Alto Networks Sponsor Session
Palo Alto Networks Sponsor SessionPalo Alto Networks Sponsor Session
Palo Alto Networks Sponsor Session
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 

Similaire à Endpoint Evolution

Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Faizal Adiputra
 
Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platformsDeepu S Nath
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsVictoria Romero-Gomez
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Omega Peripherals
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services managementLilian Schaffer
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services managementLilian Schaffer
 
How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedNalneesh Gaur
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationYugan Sikri
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Future of Integration | MuleSoft
Future of Integration | MuleSoftFuture of Integration | MuleSoft
Future of Integration | MuleSoftMuleSoft
 
Desktop Transformation
Desktop Transformation Desktop Transformation
Desktop Transformation InnoTech
 
Maximizing the Business Value of Connected Devices by Transforming the CIO's ...
Maximizing the Business Value of Connected Devices by Transforming the CIO's ...Maximizing the Business Value of Connected Devices by Transforming the CIO's ...
Maximizing the Business Value of Connected Devices by Transforming the CIO's ...Cognizant
 
Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debriefJason Poyner
 
Mobility Managment: Manage the growth of mobilization of the enterprise
Mobility Managment: Manage the growth of mobilization of the enterpriseMobility Managment: Manage the growth of mobilization of the enterprise
Mobility Managment: Manage the growth of mobilization of the enterpriseYugan Sikri
 

Similaire à Endpoint Evolution (20)

Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
Frostsullivanindonesiaictoutlookfor2012andbeyond 120216210846-phpapp01
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platforms
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of Things
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 branded
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, Implementation
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Future of Integration | MuleSoft
Future of Integration | MuleSoftFuture of Integration | MuleSoft
Future of Integration | MuleSoft
 
Desktop Transformation
Desktop Transformation Desktop Transformation
Desktop Transformation
 
Maximizing the Business Value of Connected Devices by Transforming the CIO's ...
Maximizing the Business Value of Connected Devices by Transforming the CIO's ...Maximizing the Business Value of Connected Devices by Transforming the CIO's ...
Maximizing the Business Value of Connected Devices by Transforming the CIO's ...
 
Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debrief
 
Mobility Managment: Manage the growth of mobilization of the enterprise
Mobility Managment: Manage the growth of mobilization of the enterpriseMobility Managment: Manage the growth of mobilization of the enterprise
Mobility Managment: Manage the growth of mobilization of the enterprise
 
Mobile Megatrends 2008
Mobile Megatrends 2008Mobile Megatrends 2008
Mobile Megatrends 2008
 

Plus de Carahsoft

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark FactsCarahsoft
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaCarahsoft
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement SpeakersCarahsoft
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitCarahsoft
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology SummitCarahsoft
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data DiscoveryCarahsoft
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working TogetherCarahsoft
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center VirtualizationCarahsoft
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and RemediationCarahsoft
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstractCarahsoft
 

Plus de Carahsoft (12)

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark Facts
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream Agenda
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement Speakers
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media Summit
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and Remediation
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 

Dernier

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Endpoint Evolution

  • 1. Endpoint Evolution Mobile Device Management – Protecting Sensitive Data Kawika Takayama Public Sector – Endpoint Management and Mobility Mobility, Virtualization and the Emerging Workspace 1
  • 2. Consumerization is Changing the Face of IT 1 Billion Consumer owned Evolving User Focused Management Smartphones or tables by 2016 365M will own Smartphone or Table 2014 Unmanaged in the Workplace* 246M Corp PCs 293M Personal PCs 819M Smartphones Apps/Info/Access 116M Tablets 70M Virtual Desktops 2011 177M Corp PCs Managed 300M Smartphones 15M Tablets 13M Virtual Desktops Relevant Devices Today Future Devices Traditional Device Focus Corporate-Owned Personally-Owned *Forrester Research Device Mobility, Virtualization and the Emerging Workspace 2
  • 3. Mobility, Cloud and I.T. Mega- Pains Mobile Must support to enhance employees productivity I do not have the means to control security, risk, and Frustration compliance across all of these new I.T. platforms Private Cloud Cloud Must embrace to drive business agility and lower costs Mobility, Virtualization and the Emerging Workspace 3
  • 4. Operating System Diversity Skyrocketing Corporate Desktops First quarter PC forecast: 2009 to 2011 Windows down 2%, Mac+iPad up 250% 87.3% 11% 1.7% - asymco, April, 2011 8% 1.3% Android devices outsold the iPhone 2-to-1 in the past three months - PCWorld, September, 2011 Windows Mac Linux Mobility, Virtualization and the Emerging Workspace 4
  • 5. Stimulating an Evolution in Systems Management Device Centric User Centric Device Software Cloud User Services Location User Device Device User Mobile Data Devices Patches Location Virtual Desktops Apps Mobility, Virtualization and the Emerging Workspace 5
  • 6. Symantec’s HoneyNet Project – March 8, 2012 The Set Up Before the 50 smartphones were “lost,” a collection of simulated corporate and personal data was placed on them to simulate a real phone. While these apps had no actual functionality, they were able to transmit data back to us which logged what apps were activated and when – and the phone finder was presented with an error message or other plausible reason for the app not working. The phones were then dropped in high-traffic areas such as elevators, malls, and office food courts, in New York, Washington D.C., Los Angeles, the Bay Area, and Ottawa, Canada. As people found the smartphones and attempted to access apps and data, details were anonymously logged to track the “human threat” of a lost phone. What to Expect When You Lose Your Phone •96% of lost smartphones were accessed by their finders •89% of devices were accessed for personal-related apps and information •83% of devices were accessed for corporate-related apps and information •50% of smartphone finders notified the owner and gave contact information to return the device – however almost all of these people (86 percent) attempted to access information on the devices. . http://www.msnbc.msn.com/id/46665467 How safe if your smartphone’s Data? Mobility, Virtualization and the Emerging Workspace 6
  • 7. The Importance of Patching 3rd Party Applications More than ⅔ of all endpoint vulnerabilities are found in Internet Security Threat 3rd party desktop applications Report (April 2011) • 30% increase in the overall number National Vulnerability Database of vulnerabilities in 2010 (6,253) Top 5 Vulnerable Applications Apple Safari | Mozilla Firefox | Google Chrome | • 161% increase in new vendors Microsoft Internet Explorer | Adobe Flash Player affected by vulnerabilities in 2010 • Chrome and Safari vulnerabilities on the rise • 346 vulnerabilities affecting browser plug-ins Mobility, Virtualization and the Emerging Workspace 7
  • 8. Mobile Marketplace Of the 1 Billion consumer Smartphone and Tablets, Apple, Google, and Microsoft control 90% of the marketplace* Mobility, Virtualization and the Emerging Workspace 8
  • 9. Endpoint Management Building Blocks Mobile • Enterprise enablement • Greater need for data security • Central enterprise app store Unified Application Management • More application types to manage 3 • Faster delivery of service • Greater need to enforce compliance Cross Platform Patch 2 Management • Greater threats to other platforms • Third party applications Consistent Tool Sets 1 • Reduce errors and training costs • Fewer steps for routine tasks • Reduce IT silo’s Mobility, Virtualization and the Emerging Workspace 9
  • 10. Use Symantec Mobile Management to enforce policy and compliance controls Secure Protect enterprise data and infrastructure from attack and theft Enable Activate enterprise access, apps and data easily and automatically Manage Control inventory and configuration with massive scalability Redefining Mobile Protection 10
  • 11. Now Selling! Odyssey Athena/Mobile Management for SCCM • Managed through the Microsoft SCCM platform • Provides a similar feature set to Symantec Mobile Management 11
  • 12. 3 Mobile Platform Enhancements Enables “Powered by Symantec” Multiple Consoles Global Policy Editor Configuration Profile Service Tenant Administration Service Device Notification Service Symantec Services Device Enrollment Service Notification Feedback Service Device Provisioning Service Console Integrator Device Inventory Service Certificate Management Multiple OSs Core products Add-ons Symantec Mobile Management (existing product) Symantec DLP for Tablets (existing product) Symantec Mobile Management for SCCM (new product) Symantec Managed PKI (existing product) Symantec Advances Enterprise Mobility Strategy 12
  • 13. Symantec Mobile Superiority • Symantec IS Security – Secure architecture satisfies DOD requirements – More than just MDM – DLP, SEP Mobile • Scalability/Robustness – Most clients per server (40,000+) – Proven platform (can’t be built overnight) • Unified Management – Any MDM will solve today’s tactical issues (executive iPads) – As mobile becomes mainstream, a silo solution is the wrong answer • Future Proofing – MDM is commoditizing, converging with security and PCLCM solutions. Where will “pure play” vendors be a year from now? We are already there. Mobility, Virtualization and the Emerging Workspace
  • 14. Symantec Mobile Management Robust mobile policy and compliance • Enterprise Enablement • Activation of devices across platforms • Software Delivery via Mobile App Store & Mobile Library • Configuration & policy management • Mobile Security • Security configuration, alerts, jailbreak protection • Corporate / personal separation / remote wipe • Identity and certificate management • Enterprise Management • Asset reporting • Single infrastructure console • Scalable architecture Mobility, Virtualization and the Emerging Workspace 14
  • 15. Actual Customers Challenges Banking & Finance VP of Desktop Operations • Cost containment for over 4,000 “Streaming is a stepping applications • Support Brick and Mortar reduction stone to any device initiative • Pressure to support personal devices anywhere” Healthcare & Pharmaceuticals VP of Client Architecture “Any app, any device, Key Challenges • 75% of current workforce is mobile anytime in a secure • Self Service permeates all IT projects fashion” Entertainment & Gaming VP of Desktop Operations “Self Service across • Creative atmosphere driven towards Mac • Enable end user choice in hardware & devices is devices • Consistent software management across key to our IT business platforms model” Mobility, Virtualization and the Emerging Workspace 15
  • 16. Symantec Mobile Device Solutions Today Mobile Device Security Mobile Device Management Inventory Symantec MMS Threat Protection (SEP Mobile Ed) Configuration Symantec MMS Network Access Control Intelligent Software (SNAC Mobile Ed) Management Symantec MMS Remote Assistance Symantec MMS Mobility, Virtualization and the Emerging Workspace 16
  • 17. Symantec Mobile Management 7.1 Advanced iPhone/iPad/iOS Management • Key Requirements/Features – Native iOS integration • Native agent for iPads and iPhones – Removal of dependency on MS Exchange • Easy device enrollment – User authentication – Automatic download of a device certificate – Automatic initial download of all security and management policies, including the Apple Configuration Utility settings – Identify and block jailbroken phone and other non-compliant devices (min OS, hardware type, etc.) • Collection of detailed asset inventory, e.g. device is jailbroken, what apps are installed, etc. • Confirms security and management policies have been applied to the device – Apple Configuration in Mobile Management 7.1 Console • Support for all of the native MDM features in iOS 4.0 and 5.0 • Define and deploy settings from the Mobile Management 7.1/SMP console – VPN/Wireless settings, Proxy settings, Control iTunes, Safari and other features, etc. – Automatic download and application of new policies • Enterprise app store (“library”) – Enables delivery of in-house apps and content to device – Supports links to Third party apps in Apple App Store Mobility, Virtualization and the Emerging Workspace 17
  • 18. Apple Configuration Profiles (Policies) • Passcode Profile • Restrictions – Require passcode – App installation – Allow simple value – Camera – Require alphanumeric value – Screen capture – Passcode length – Automatic sync of mail accounts while – Number of complex characters roaming – Maximum passcode age – Voice dialing when locked – Time before auto-lock – In-application purchasing – Number of unique passcodes before reuse – Require encrypted backups to iTunes – Grace period for device lock – Explicit music & podcasts in iTunes – Number of failed attempts before wipe – Allowed content ratings for movies, TV – Control Configuration Profile removal by user shows, apps • Certificates and identities – Safari security preferences – Credentials – YouTube – SCEP – iTunes Store • Exchange ActiveSync – App Store • Email (IMAP/ POP) – Safari • VPN (L2TP, PPTP, IPSec, Cisco, Juniper, • LDAP F5, custom) • CalDAV • Wi-Fi (Open, WEP, WPA, WPA2, WEP • CardDAV Enterprise, WPA Enterprise, etc.) • Subscribed calendars • Advanced – APN, Proxy settings • Web Clips Mobility, Virtualization and the Emerging Workspace 18
  • 19. Apple iOS 4 and 5 MDM Actions and Asset Info • Mgmt Console Actions • Inventory Data – Remote wipe – Device information • Unique Device Identifier (UDID) – Remote lock • Device name – Reset passcode • iOS and build version • Model name and number – Update Policies • Serial number • Updates configuration and Provisioning • Capacity and space available • IMEI Profiles over the air • Modem firmware • Performs selective wipe of specific • Location (Lat./Long.) settings/email when selected policies are – Network information removed • ICCID • Bluetooth® and Wi-Fi MAC addresses – Send Inventory • Current carrier network – Remove MDM and reset agent • SIM carrier network • Carrier settings version • Provides full selective wipe by removal of all • Phone number profiles and content • Data roaming setting (on/off) – Configuration profile targeting – Compliance and security information • Based on standard policy targeting • Configuration Profiles installed • Certificates installed with expiry dates • Admin defined list of policies • List of all restrictions enforced • Hardware encryption capability • Passcode present – Applications • Applications installed (app ID, name, version, size, and app data size) • Provisioning Profiles installed with expiry dates Mobility, Virtualization and the Emerging Workspace 19
  • 20. Athena MDM Agent for Android • Policies – Minimum symbols required in – Wipe data1 password2 – Lock now – Minimum numerical digits required in password2 – Reset password – Minimum uppercase letters – Password enabled required in password2 – Set maximum failed passwords – Password expiration (number for wipe of days)2 – Set maximum inactivity time to – Password history (max lock number of past passwords – Set password minimum length stored)2 – Alphanumeric password – Password complex characters required required2 – Minimum letters required in – Data Encryption2 password2 – Camera Disable3 – Minimum lowercase letters 1 - Wipes user data on device; does required in password2 not wipe memory (SD) card – Minimum non-letter characters 2 - Android 3.x+ required required in password2 3 - Android 4.x+ required Presentation Identifier Goes Here 20
  • 21. Athena MDM Agent for BlackBerry® • Premium support for BlackBerry smartphones – Simplified enrollment with AD authentication – Extended hardware and software inventory – Zero-touch management – Live remote assistance – remote control, etc. Presentation Identifier Goes Here 21
  • 22. Enterprise Mobility Roadmap Advancing our mobility strategy DLP Sept 2011 March 2012 Summer/Fall 2012* Comprehensive iOS Support Single Sign-On for Cloud/Web Advancing MDM Support Public and Enterprise Apps Services (O3) (iOS, Android, WP7/8) Symantec Mobile Management IT Analytics for Mobile iOS Document Library & for SCCM (Odyssey Athena) Enterprise Appstore Secure Sync & Share June 2012 Collaboration Q1 2012 DLP for Tablets & SMM - Advanced Android SMM DLP enhancements (Jan) Management Mobile Security - Android Agent VeriSign MPKI Integration (Feb) Symantec Confidential and Proprietary 22 *Disclaimer - Roadmap contents and timing subject to change without notice
  • 23. Introducing DLP for Tablets New Technology = New Challenges Introduced Nov 2011 Execs pushing How do you say adoption “Yes”? Access to corporate email and network How do you demonstrate compliance? No control off-network How do you All the access, secure IP? few of the controls Mobility, Virtualization and the Emerging Workspace 24
  • 24. Why use Symantec DLP for Tablets? Comprehensive Coverage Corporate Email Personal Email Social Media Cloud Apps Most User Works over Wi-Fi and 3G Friendly Enables full use and productivity of the device. Our approach does NOT • Require a restrictive “sandbox” approach, or • Break business processes by restricting what data can go to the iPad Lowest TCO Symantec DLP for Tablets™ is tightly integrated w/ Symantec DLP Suite: • Common, advanced technologies for detecting confidential information • Consistent application of DLP policy • Seamless, integrated reporting & analytics Redefining Mobile Protection 25
  • 25. Symantec™ Data Loss Prevention for Tablets • Extends DLP to the newest endpoint – Bridges the BYOD gap • Prevents IP and PII data loss – Corporate and Web email – Web uploads and postings – Popular Apps • Demonstrate compliance to auditors • Educate your users • Standalone or as part of the Symantec™ Data Loss Prevention Suite Mobility, Virtualization and the Emerging Workspace 26
  • 26. Data Loss Prevention for Tablets – Sample Use Case Similar to Data Loss Prevention for Endpoint capability Problem DLP Policy DLP Actions Results • Users send • DLP inspects all • Monitor only, • User behavioral sensitive data outbound email notify, block or change via email remove sensitive • Automated data compliance • Risk reduced Mobility, Virtualization and the Emerging Workspace 27
  • 27. Cross Platform Asset Lifecycle Management New Applications Update Applications Retire Applications (Purchased Software) (Version Control) (Recover Licenses) Policy Management Issues Visibility Control Effort Mobility, Virtualization and the Emerging Workspace 28
  • 28. Altiris Client Management Suite for Mac Discovery and Inventory Intelligent Software & Patch Management Remote Assistance Imaging and Deployment 29 Mobility, Virtualization and the Emerging Workspace
  • 29. Application Streaming and Virtualization Separating the things that matter Streaming Server Operating System Operating System Traditionally Installed Streamed and Virtualized Mobility, Virtualization and the Emerging Workspace 30
  • 30. Securely Deliver and Manage Any Service to Any User in Any Location Support any device Manage applications Enable services regardless of ownership regardless of type regardless of location Laptops Desktops & Tablets SaaS Social & Physical Thin Clients Delivery Cloud Apps Services App Store Delivery Models Virtual Apps & Desktops Mobility, Virtualization and the Emerging Workspace 31
  • 31. Introducing Symantec O3 A New Cloud Information Protection Platform Symantec O3™ Access Information Cloud Control Security Compliance Control Protection Visibility Private Cloud Redefining Mobile Protection 32
  • 32. How Symantec O3 Works – User View End-User Any Device Symantec O3™ Symantec O3 Symantec O3 Symantec O3™ Gateway Intelligence Center Identity and Access Broker Context-based Policies Information Gateway Status Monitoring Layered Protection Log and Audit Services 2F Authentication DLP Encryption Cloud, SaaS and Web Applications Public Cloud Services Datacenter / Private Cloud Redefining Mobile Protection 33
  • 33. Symantec Service Offering Accelerated Adoption Program A free 2 day workshop that supports customer migrations from 6.x to 7.1 Distance Learning Assessment A free service offering to Education Accounts to provide insight on how to establish a world class distance learning program Mobile Security Assessment 5 week evaluation to identify risk inherent in the enterprise from the use of iPhones, iPads, and Android devices Malicious Activity Assessment Free non-intrusive evaluation of network traffic on a customer’s entire network or a specific network segment Mobility, Virtualization and the Emerging Workspace 34
  • 34. EMM Partner Solution Integrators ITS Partners Privilege Management and Lockdown Mobile Management-as- a-Service Device Lockdown Network Resource Management Intuitive Network Mgmt Endpoint Management-as- a-Service Cloud Services ITMS eiPower Green Energy Power Management and Control Service Catalog Request Fulfillment and Service Catalog Mobile Deployment App Package Mobile Solutions & Support for SCCM (Now Apart of Symantec) DeployExpert and HiiS Install, License Entitlement, App Delivery Public Sector SE Management Team 35
  • 35. Thank you! Mobility, Virtualization and the Emerging Workspace

Notes de l'éditeur

  1. [Introduction and welcome]
  2. According to research firm, Strategy Analytics, 66.9 million tablets shipped worldwide in 2011, up a staggering 260 percent from the previous year.  In 2010, Apple’s famous iPad controlled nearly 70 percent of the tablet market, but just one year later, Android-based tablets secured just under 40 percent of the market. NFC – Near Field Communications to generate $74B in transactions by 2015 Juniper Networks (http://www.mobilemarketingwatch.com/juniper-says-nfc-will-drive-74-billion-in-transactions-by-2015-21588/)
  3. Odyssey’s Athena mobile management product shares considerable code with Symantec Mobile Management, but is integrated with Microsoft System Center Configuration Manager.While there are some differences due to use of SCCM instead of the Symantec Management Platform, most features are similar or the same (e.g. Mobile Library, configuration editing, legacy Windows Mobile software delivery, etc.).The Odyssey product will be renamed “Symantec Mobile Management for SCCM” mid-year.
  4. Console Agnostic, Cloud & Mobile PlatformThis shows how Symantec’s platform approach to mobility can greatly simplify an enterprise’s ability to integrate with and leverage existing and future consoles and devices, in a seamless and agnostic way.
  5. Extended iOS5 MDM features: Enhanced Email Configuration – Enable S/MIME encryptionPrevent sending email via third party applications and moving messages across different email accountsPrevent apps from sending email so that corporate email addresses don't inadvertently leakTurn off e-mail forwarding so that corporate email cannot be forwarded through a personal accountEnhanced Wi-Fi Configuration – Configure Wi-Fi proxy settings Enable automatic joins to Wi-Fi networksManage Roaming Configuration – Enable/disable voice roaming featuresEnable/disable data roaming featuresiCloud Configuration – Enable/disable iCloud back-up, document sync and Photo StreamUtilize iOS5 layer to report additional device detailsBattery life statusWireless carrier informationManage iTunes password entry Require an iTunes password to make iTunes access more secureManage certificates from non-trusted sources Set whether or not an end-user can accept a certificate from a non-trusted sourcePrevent certificates from being accepted from a non-trusted source.
  6. Monitor, block, remove content from outbound iPad traffic Protects HTTP/HTTPS, including:General Web traffic (including Webmail)Active SyncMost-common iPad applications (Dropbox, Facebook, & Twitter)FTPSupports: iPad 1 & 2 (iOS 4.2.1 and higher)3G and WiFi, on and off networkStandard DLP detection methods (DCM, EDM, IDM, VML)General and specialized response rules (including block & remove content)Provides:Flexibility to create Tablet-specific policiesSeparate Tablet incident type
  7. As of February 28th Symantec made generally available the first release of Symantec O3. The molecular symbol of O3 stand for Ozone. Ozone provides layer of protection for living things on earth by filtering out dangerous ultraviolet radiation. Symantec O3 similarly protects IT and users “above the cloud” when they access cloud applications and services, even from mobile devices.
  8. Let’s take a look now at how Symantec O3 works – first from the perspective of the user, then from the perspective of IT, and particularly operations and security.1. The user experience for Symantec O3 is exceedingly easy to grasp. First the user, on any device he or she might be using, accesses the Symantec O3 gateway through a URL – it is just like going to Google Maps. Next the user is prompted for one userid/password credential, just like he or she were logging onto your corporate network.Symantec O3 federates the passwords, and based one access policy, creates a simple portal of icons showing the Cloud apps and services the user has access to – after that the user never need enter another credential – he/she has single sign on to the Cloud, except in the cases where3b. Policy dictates the need for a second password. The user runs an app, typically on a mobile device, that generates the OTP – one time password, and the user enters that second factor, enabling access to the app. Note that with Symantec O3 we bypass the need for the app to support two factor authentication – the strong authentication is handled entirely by Symantec O3.That is it. The simple portal the user receives listing the apps they have access to remains open if they want, and they can click and launch without entering further credentials. The portal works on mobile devices, PCs, and client device that supports HTTP through a browser interface of some type.