SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Gastone Nencini
Trend Micro Italy Leader and Snr. Technical
Manager Trend Micro Southern Europe
Trend Micro Mobile Solutions
10/1/2013 Confidential | Copyright 2012 Trend Micro Inc.
2.4B
Internet Users1
1 Trillion+
URLs indexed
by Google2
665M
Web Sites3
1B
Facebook Users4
427M
Smart Phones
Sold Last Year5
54%
of Facebook
Access is via
Mobile6
Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012;
4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;
Confidential | Copyright 2013 Trend Micro Inc.
01/10/2013 2
Empower the Business…
Confidential | Copyright 2013 Trend Micro Inc.
01/10/2013 3
…while Protecting Information
Confidential | Copyright 2013 Trend Micro Inc.
01/10/2013 4
Consumerization
ITEmployees
Cyber Threats
Attackers
Cloud &
Virtualization
01/10/2013 5
Confidential | Copyright 2013 Trend Micro Inc.
Consumers
Email &
Messaging
Web
Access
File/Folder &
Removable Media
IT Admin
Employees
Then…
01/10/2013 6
Confidential | Copyright 2013 Trend Micro Inc.
Device
Hopping
Consumers
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Employees
IT Admin
Now!
01/10/2013 7
Confidential | Copyright 2013 Trend Micro Inc.
Source: KPCB, Apple Quarterly Results
21.2M
iPhones
1.3M
iPods
Unprecedented Adoption Rates
66.1M
iPads
0
1
2
3 4 5 6 7 8
8
Confidential | Copyright 2013 Trend Micro Inc.
01/10/2013
Source:
Asymco.com, June 2012
Confidential | Copyright 2013 Trend Micro Inc.
01/10/2013 9
IT is exploring solutions
MDM / MAM
Some baseline security controls,
visibility, and settings push, but…
Limited data protection
Containers / App Wrapping
Some separation of work / personal
workspace, but…
Unfamiliar UX,
limited 3rd party apps
Users may work around
Secure Sync & Share
Stays out of employees’ way,
familiar apps
Often a separate silo, IT
controls are weak
01/10/2013 11Confidential | Copyright 2013 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
A range of device types,
company-owned or BYOD
Trend Mobile Solutions
Mobile Security
SafeSync
Device Management & Control
10/1/2013 12Confidential | Copyright 2012 Trend Micro Inc.
Employees
Trend Micro Mobile
Security
Email SharePoint Corp Data Web Traffic
• Easy onboarding: email, URL, QR code
• Apple (iOS), Android, Blackberry, Windows
Phone 7 and 8
• Optional Cloud Communication Server
• Device Discovery
• Device Provisioning
• Remote Control
• Reporting
• Inventory Management
Cloud
Comm.
Server
Threat Protection
10/1/2013 13Confidential | Copyright 2012 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
Trend Micro Mobile
Security
• Android AV and Website
Reputation
• Leveraging Smart Protection
Network
• Anti-Malware
• Firewall
• Web Threat Protection
• Call Filtering
• SMS/WAP Anti-Spam
Encryption
10/1/2013 14Confidential | Copyright 2012 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
Trend Micro Mobile
Security
• Encryption Enforcement
• Remote Wipe
• Selective Wipe
• Remote Lock
• SIM Change/ Watch
• Feature Lock
• Password Policy
Application Control
10/1/2013 15Confidential | Copyright 2012 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
Trend Micro Mobile
Security
• White Lists, Black Lists
• App push
• Mobile app inventory
• Mobile Application Reputation
Service (MARS)
• Categorized app control
Mobile App Reputation – How it Works
Trend Micro MARS Generates
reputation
scores and
detailed report
Trend Micro MARS Generates
reputation
scores and
detailed report
Collects Apps and
scans them in the
cloud
Collects Apps and
scans them in the
cloud
Static Analysis:
Dissects app code
and private data
access.
Static Analysis:
Dissects app code
and private data
access.
Correlates web
queries with Smart
Protection Network
Correlates web
queries with Smart
Protection Network
Dynamic Analysis:
Activates app to
analyse actual
behaviour
Dynamic Analysis:
Activates app to
analyse actual
behaviour
1
2
3
4
Without IT Solutions, Employees Improvise
Need mobile file access
Will email to self or others…
…or just install Dropbox
…or Google Drive
…or iCloud
…or SugarSync
…or SkyDrive
…or…
Secure Sync & Share
10/1/2013 18Confidential | Copyright 2012 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
SafeSync
• A corporate alternative to
DropBox
• Data on premise or in Trend
Cloud (future)
• Integrated DLP
• Sync restrictions
• Sharing restrictions
• Persistent File Encryption
Colleagues
Data Loss Prevention
10/1/2013 19Confidential | Copyright 2012 Trend Micro Inc.
Employees
SafeSync
Colleagues
Integrated DLP
ActiveSync Control (future)
10/1/2013 20Confidential | Copyright 2012 Trend Micro Inc.
Employees
ActiveSync Control
• Add-on to ScanMail for
Exchange
• DLP scans emails
• If violation occurs, attachment
removed when accessed via
mobile device
• Require MFA
• If device is unhealthy,
ActiveSync is restricted
The Trend Advantage
• Complete end user protection from a single vendor
• Trend Micro Control Manager provides centralized
management across all Trend Products
– Unified DLP management
– Unified Threat management
– Unified user management
• Mobile security and management that balances
enablement with security.
10/1/2013 21Confidential | Copyright 2012 Trend Micro Inc.
Employees
Complete End User Protection
Device
Hopping
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Copyright 2013 Trend Micro Inc.
Thank you
2310/1/2013 Confidential | Copyright 2013 Trend Micro Inc.

Contenu connexe

Tendances

[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secure
Kappa Data
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
YogeshIJTSRD
 

Tendances (20)

(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of things
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secure
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The CloudCLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 

En vedette

ICT Career: A dynamic Future
ICT Career: A dynamic FutureICT Career: A dynamic Future
ICT Career: A dynamic Future
Sarang Shaikh
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
'Atikah Khalil
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
ainizbahari97
 
Security Measure
Security MeasureSecurity Measure
Security Measure
syafiqa
 
Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in education
Sanika Deshmukh
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

En vedette (16)

Plagiarism
PlagiarismPlagiarism
Plagiarism
 
[ICT] Banking & Technology
[ICT] Banking & Technology[ICT] Banking & Technology
[ICT] Banking & Technology
 
ICT Career: A dynamic Future
ICT Career: A dynamic FutureICT Career: A dynamic Future
ICT Career: A dynamic Future
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Careers in ICT
Careers in ICTCareers in ICT
Careers in ICT
 
ICT in Healthcare - Opportunities and Challenges
ICT in Healthcare - Opportunities and ChallengesICT in Healthcare - Opportunities and Challenges
ICT in Healthcare - Opportunities and Challenges
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 
CHAP 4 - SOCIAL IMPACT OF ICT
CHAP 4 - SOCIAL IMPACT OF ICTCHAP 4 - SOCIAL IMPACT OF ICT
CHAP 4 - SOCIAL IMPACT OF ICT
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in education
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education ppt
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similaire à festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi economici

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2016
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]
Vikash Lalsing (CITP)
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 

Similaire à festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi economici (20)

Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 

Plus de festival ICT 2016

Plus de festival ICT 2016 (20)

Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
 
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
 
LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...
 
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
 
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
 
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
 
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
 
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
 
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
 
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
 
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
 
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
 
Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015
 
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
 
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
 Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution... Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
 
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi economici

  • 1. Gastone Nencini Trend Micro Italy Leader and Snr. Technical Manager Trend Micro Southern Europe Trend Micro Mobile Solutions 10/1/2013 Confidential | Copyright 2012 Trend Micro Inc.
  • 2. 2.4B Internet Users1 1 Trillion+ URLs indexed by Google2 665M Web Sites3 1B Facebook Users4 427M Smart Phones Sold Last Year5 54% of Facebook Access is via Mobile6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012; Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 2
  • 3. Empower the Business… Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 3
  • 4. …while Protecting Information Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 4
  • 6. Consumers Email & Messaging Web Access File/Folder & Removable Media IT Admin Employees Then… 01/10/2013 6 Confidential | Copyright 2013 Trend Micro Inc.
  • 7. Device Hopping Consumers Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Employees IT Admin Now! 01/10/2013 7 Confidential | Copyright 2013 Trend Micro Inc.
  • 8. Source: KPCB, Apple Quarterly Results 21.2M iPhones 1.3M iPods Unprecedented Adoption Rates 66.1M iPads 0 1 2 3 4 5 6 7 8 8 Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013
  • 9. Source: Asymco.com, June 2012 Confidential | Copyright 2013 Trend Micro Inc. 01/10/2013 9
  • 10. IT is exploring solutions MDM / MAM Some baseline security controls, visibility, and settings push, but… Limited data protection Containers / App Wrapping Some separation of work / personal workspace, but… Unfamiliar UX, limited 3rd party apps Users may work around Secure Sync & Share Stays out of employees’ way, familiar apps Often a separate silo, IT controls are weak
  • 11. 01/10/2013 11Confidential | Copyright 2013 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic A range of device types, company-owned or BYOD Trend Mobile Solutions Mobile Security SafeSync
  • 12. Device Management & Control 10/1/2013 12Confidential | Copyright 2012 Trend Micro Inc. Employees Trend Micro Mobile Security Email SharePoint Corp Data Web Traffic • Easy onboarding: email, URL, QR code • Apple (iOS), Android, Blackberry, Windows Phone 7 and 8 • Optional Cloud Communication Server • Device Discovery • Device Provisioning • Remote Control • Reporting • Inventory Management Cloud Comm. Server
  • 13. Threat Protection 10/1/2013 13Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • Android AV and Website Reputation • Leveraging Smart Protection Network • Anti-Malware • Firewall • Web Threat Protection • Call Filtering • SMS/WAP Anti-Spam
  • 14. Encryption 10/1/2013 14Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • Encryption Enforcement • Remote Wipe • Selective Wipe • Remote Lock • SIM Change/ Watch • Feature Lock • Password Policy
  • 15. Application Control 10/1/2013 15Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • White Lists, Black Lists • App push • Mobile app inventory • Mobile Application Reputation Service (MARS) • Categorized app control
  • 16. Mobile App Reputation – How it Works Trend Micro MARS Generates reputation scores and detailed report Trend Micro MARS Generates reputation scores and detailed report Collects Apps and scans them in the cloud Collects Apps and scans them in the cloud Static Analysis: Dissects app code and private data access. Static Analysis: Dissects app code and private data access. Correlates web queries with Smart Protection Network Correlates web queries with Smart Protection Network Dynamic Analysis: Activates app to analyse actual behaviour Dynamic Analysis: Activates app to analyse actual behaviour 1 2 3 4
  • 17. Without IT Solutions, Employees Improvise Need mobile file access Will email to self or others… …or just install Dropbox …or Google Drive …or iCloud …or SugarSync …or SkyDrive …or…
  • 18. Secure Sync & Share 10/1/2013 18Confidential | Copyright 2012 Trend Micro Inc. Employees Email SharePoint Corp Data Web Traffic SafeSync • A corporate alternative to DropBox • Data on premise or in Trend Cloud (future) • Integrated DLP • Sync restrictions • Sharing restrictions • Persistent File Encryption Colleagues
  • 19. Data Loss Prevention 10/1/2013 19Confidential | Copyright 2012 Trend Micro Inc. Employees SafeSync Colleagues Integrated DLP
  • 20. ActiveSync Control (future) 10/1/2013 20Confidential | Copyright 2012 Trend Micro Inc. Employees ActiveSync Control • Add-on to ScanMail for Exchange • DLP scans emails • If violation occurs, attachment removed when accessed via mobile device • Require MFA • If device is unhealthy, ActiveSync is restricted
  • 21. The Trend Advantage • Complete end user protection from a single vendor • Trend Micro Control Manager provides centralized management across all Trend Products – Unified DLP management – Unified Threat management – Unified user management • Mobile security and management that balances enablement with security. 10/1/2013 21Confidential | Copyright 2012 Trend Micro Inc.
  • 22. Employees Complete End User Protection Device Hopping Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Copyright 2013 Trend Micro Inc.
  • 23. Thank you 2310/1/2013 Confidential | Copyright 2013 Trend Micro Inc.