SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
security in a hybrid mam & Mdm world
                        Carlos Montero-Luque, SVP Engineering




Tuesday, July 31, 12
mobility management
                       •   “It’s appropriate to manage the device if you own that
                           device... If the corporation owns the device, it should
                           manage that device. When is it valid to manage the
                           application? Always”

                              •   Alan Murray, SVP Products, Apperian

                       •   “IT should not manage what it does not own”

                              •   Gartner


Tuesday, July 31, 12
enterprise mobility management

                       •   Enterprise Mobility Management has become a core policy
                           for CIO’s

                       •   Mobile BYOD is no longer a trend, but a way of life for most
                           organizations

                            •   The economics of BYOD, if done properly, are favorable
                                for organizations that manage and embrace it



Tuesday, July 31, 12
mobility and It
                       •   The life of the IT manager has not changed, it simply got
                           more complicated

                       •   Issues that were relegated to management behind a firewall
                           are now extended by two major IT trends:

                            •   Cloud computing

                            •   Mobile computing

                       •   Security, compliance, governance, remediation, those issues
                           are as important as ever
Tuesday, July 31, 12
The dilemma for it

                       •   IT has two key responsibilities:

                            •   Provide expected and certifiable security, protection,
                                compliance

                            •   Provide applications and content required by users




Tuesday, July 31, 12
extending to mobility
                       •   The issues that are relevant in “traditional” client platforms
                           are just as important in mobility:

                            •   Acquiring and deploying applications and content

                            •   Delivering content to users, securely

                            •   Enabling access to internal and external required
                                content

                            •   Managing infrastructure

Tuesday, July 31, 12
CONSTRAINTS
                       •   IT needs to deal with these new requirements:

                            •   Cost-effectively

                            •   From multiple form-factors

                            •   Securely and by policy

                            •   With appropriate management

                            •   Dealing with a new IT experience

                            •   In BYOD environments
Tuesday, July 31, 12
Enterprise mobility management and
                                    security
                       •   Security is a core requirement

                       •   Mobile Application Management provides key elements for security
                           in enterprise mobile environments

                       •   The draft of NIST Special Publication 800-124 defines security
                           objectives:

                            •   Confidentiality of data

                            •   Integrity of data

                            •   Availability of resources

Tuesday, July 31, 12
apperian and enterprise mobile
                                       security
                       •   The Apperian AppBus architecture describes a holistic view
                           for securing enterprise assets in a mobile environment

                            •   Securing access to the mobile environment,
                                applications, and content via Mobile Application
                                Management

                            •   Ensuring the integrity of content and applications

                            •   If needed, securing devices via Mobile Device
                                Management or native device security tools

Tuesday, July 31, 12
apperian appBus
                                          Custom             Market
                                           apps               place                      Admin portal                                     Catalog

                                                   inspect               secure         extend            personalize     Analyze            engage
                                                                                                 AppBus

                                                                      Enterprise App Services Environment (EASE)



                 inspect                 secure                                   extend                  personalize                      analyze              engage
        ✦   Code check &         ✦   Device wipe                        ✦   SDK: notifications,       ✦    Custom EULA               ✦   App Inventory    ✦   App ratings
            reporting            ✦   Device lock                            ver checking &           ✦    Branded catalog           ✦   Usage reports    ✦   Crowdsourcing
                                                                            forced updates
        ✦   Signing validation   ✦   App delete                                                      ✦    App categories            ✦   Device details   ✦   Beta testing
                                                                        ✦   SSO (SAML 2.0)                                                                   segmenting
                                 ✦   App Policies: data                     integration
                                                                                                     ✦    Limit app access by
        ✦   Malware detection
                                     encryption, copy/                                                    role
                                     paste prevention,
                                     required passcode
                                 ✦   App-level VPN


Tuesday, July 31, 12
nist guidelines to improve mobile
                                        security

                       •   Develop models for system threats to devices and corporate
                           assets accessed through them

                            •   Identification, likelihood, impact, analysis, controls




Tuesday, July 31, 12
required security services

                       •   General policy

                       •   Data Communication and storage - Apperian EASE

                       •   User and device authentication - Apperian EASE

                       •   Applications - Apperian EASE




Tuesday, July 31, 12
apperian EASE capabilities
                       MAM#Lifecycle#

                               Source       Prepare      protect        manage       publish




                              ✓   Inspect apps for non-conformance & malware
                              ✓   Apply set of policies to an App file with no coding
                              ✓   Securely install Apps over-air to multiple devices to scale
                              ✓   Provide private app catalog to deliver custom apps
                              ✓   Create analytics on app usage by user/app/group


Tuesday, July 31, 12
mobile device security policy

                       •   Which mobile devices can access enterprise resources

                       •   Which resources are accessible

                       •   Device provisioning

                       •   Administering management software
                       •   Consistency with non-mobile environments



Tuesday, July 31, 12
operational aspects in a mobile
                                     environment

                       •   Implementation and testing of a solution prototype

                       •   Securing devices to allow resource access

                       •   Maintaining the mobile environment security




Tuesday, July 31, 12
SUMMARy
                       •   Enterprise Mobility Management is a core policy and needs to be
                           a core capability for a growing number of CIOs
                       •   Security in a mobile environment has a number of layers to it,
                           sometimes applying to devices, but always applying to corporate
                           assets, including user access, applications, and content
                       •   Standardizing the security in an enterprise mobile environment
                           uses a number of processes, tools, and techniques. MAM provides
                           a comprehensive set of tools to secure corporate assets. MDM can
                           complement those tools by managing device security, if needed


Tuesday, July 31, 12
Thanks




Tuesday, July 31, 12

Contenu connexe

Tendances

Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
Scott K. Wilder
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
Apperian
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
MobiWee
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 

Tendances (20)

IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Windows intune
Windows intuneWindows intune
Windows intune
 
About Acumin
About AcuminAbout Acumin
About Acumin
 

En vedette

Ancillaries: Final!
Ancillaries: Final!Ancillaries: Final!
Ancillaries: Final!
GeeetarBen
 
Тариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникацииТариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникации
SocialMediaClubCA
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных кресел
Andreykireenkov
 
презентация фотоомоложения ell
презентация фотоомоложения ellпрезентация фотоомоложения ell
презентация фотоомоложения ell
Andreykireenkov
 
News international media briefing december
News international media briefing   decemberNews international media briefing   december
News international media briefing december
mindshareinfectious
 
Be German About Your Frontend
Be German About Your FrontendBe German About Your Frontend
Be German About Your Frontend
Arush Sehgal
 
Relationship between bribery and economic growth
Relationship between bribery and economic growthRelationship between bribery and economic growth
Relationship between bribery and economic growth
Navin Elias
 

En vedette (20)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Energy Coops
Energy CoopsEnergy Coops
Energy Coops
 
Ancillaries: Final!
Ancillaries: Final!Ancillaries: Final!
Ancillaries: Final!
 
North island college
North island collegeNorth island college
North island college
 
Тариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникацииТариель Джалаллы. Социальные сети и кризисные коммуникации
Тариель Джалаллы. Социальные сети и кризисные коммуникации
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных кресел
 
презентация фотоомоложения ell
презентация фотоомоложения ellпрезентация фотоомоложения ell
презентация фотоомоложения ell
 
2 класс. lesson 33. она может скакать через скакалку
2 класс. lesson 33. она может скакать через скакалку2 класс. lesson 33. она может скакать через скакалку
2 класс. lesson 33. она может скакать через скакалку
 
NinjaChix Magazine Proposal
NinjaChix Magazine ProposalNinjaChix Magazine Proposal
NinjaChix Magazine Proposal
 
Benvenuto nel più grande progetto Internet
Benvenuto nel più grande progetto InternetBenvenuto nel più grande progetto Internet
Benvenuto nel più grande progetto Internet
 
Economics and wealth
Economics and wealthEconomics and wealth
Economics and wealth
 
Dakar2012
Dakar2012Dakar2012
Dakar2012
 
News international media briefing december
News international media briefing   decemberNews international media briefing   december
News international media briefing december
 
Be German About Your Frontend
Be German About Your FrontendBe German About Your Frontend
Be German About Your Frontend
 
Relationship between bribery and economic growth
Relationship between bribery and economic growthRelationship between bribery and economic growth
Relationship between bribery and economic growth
 
Internet
InternetInternet
Internet
 
Lesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаLesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школа
 

Similaire à Security In A Hybrid MAM and MDM World

Apperian brian day
Apperian brian dayApperian brian day
Apperian brian day
MassTLC
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
Duffy Fron
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
Jon Bultmeyer
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochure
martgroot
 

Similaire à Security In A Hybrid MAM and MDM World (20)

Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Apperian brian day
Apperian brian dayApperian brian day
Apperian brian day
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochure
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 

Plus de Apperian

Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
Apperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
Apperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
Apperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
Apperian
 

Plus de Apperian (16)

Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Security In A Hybrid MAM and MDM World

  • 1. security in a hybrid mam & Mdm world Carlos Montero-Luque, SVP Engineering Tuesday, July 31, 12
  • 2. mobility management • “It’s appropriate to manage the device if you own that device... If the corporation owns the device, it should manage that device. When is it valid to manage the application? Always” • Alan Murray, SVP Products, Apperian • “IT should not manage what it does not own” • Gartner Tuesday, July 31, 12
  • 3. enterprise mobility management • Enterprise Mobility Management has become a core policy for CIO’s • Mobile BYOD is no longer a trend, but a way of life for most organizations • The economics of BYOD, if done properly, are favorable for organizations that manage and embrace it Tuesday, July 31, 12
  • 4. mobility and It • The life of the IT manager has not changed, it simply got more complicated • Issues that were relegated to management behind a firewall are now extended by two major IT trends: • Cloud computing • Mobile computing • Security, compliance, governance, remediation, those issues are as important as ever Tuesday, July 31, 12
  • 5. The dilemma for it • IT has two key responsibilities: • Provide expected and certifiable security, protection, compliance • Provide applications and content required by users Tuesday, July 31, 12
  • 6. extending to mobility • The issues that are relevant in “traditional” client platforms are just as important in mobility: • Acquiring and deploying applications and content • Delivering content to users, securely • Enabling access to internal and external required content • Managing infrastructure Tuesday, July 31, 12
  • 7. CONSTRAINTS • IT needs to deal with these new requirements: • Cost-effectively • From multiple form-factors • Securely and by policy • With appropriate management • Dealing with a new IT experience • In BYOD environments Tuesday, July 31, 12
  • 8. Enterprise mobility management and security • Security is a core requirement • Mobile Application Management provides key elements for security in enterprise mobile environments • The draft of NIST Special Publication 800-124 defines security objectives: • Confidentiality of data • Integrity of data • Availability of resources Tuesday, July 31, 12
  • 9. apperian and enterprise mobile security • The Apperian AppBus architecture describes a holistic view for securing enterprise assets in a mobile environment • Securing access to the mobile environment, applications, and content via Mobile Application Management • Ensuring the integrity of content and applications • If needed, securing devices via Mobile Device Management or native device security tools Tuesday, July 31, 12
  • 10. apperian appBus Custom Market apps place Admin portal Catalog inspect secure extend personalize Analyze engage AppBus Enterprise App Services Environment (EASE) inspect secure extend personalize analyze engage ✦ Code check & ✦ Device wipe ✦ SDK: notifications, ✦ Custom EULA ✦ App Inventory ✦ App ratings reporting ✦ Device lock ver checking & ✦ Branded catalog ✦ Usage reports ✦ Crowdsourcing forced updates ✦ Signing validation ✦ App delete ✦ App categories ✦ Device details ✦ Beta testing ✦ SSO (SAML 2.0) segmenting ✦ App Policies: data integration ✦ Limit app access by ✦ Malware detection encryption, copy/ role paste prevention, required passcode ✦ App-level VPN Tuesday, July 31, 12
  • 11. nist guidelines to improve mobile security • Develop models for system threats to devices and corporate assets accessed through them • Identification, likelihood, impact, analysis, controls Tuesday, July 31, 12
  • 12. required security services • General policy • Data Communication and storage - Apperian EASE • User and device authentication - Apperian EASE • Applications - Apperian EASE Tuesday, July 31, 12
  • 13. apperian EASE capabilities MAM#Lifecycle# Source Prepare protect manage publish ✓ Inspect apps for non-conformance & malware ✓ Apply set of policies to an App file with no coding ✓ Securely install Apps over-air to multiple devices to scale ✓ Provide private app catalog to deliver custom apps ✓ Create analytics on app usage by user/app/group Tuesday, July 31, 12
  • 14. mobile device security policy • Which mobile devices can access enterprise resources • Which resources are accessible • Device provisioning • Administering management software • Consistency with non-mobile environments Tuesday, July 31, 12
  • 15. operational aspects in a mobile environment • Implementation and testing of a solution prototype • Securing devices to allow resource access • Maintaining the mobile environment security Tuesday, July 31, 12
  • 16. SUMMARy • Enterprise Mobility Management is a core policy and needs to be a core capability for a growing number of CIOs • Security in a mobile environment has a number of layers to it, sometimes applying to devices, but always applying to corporate assets, including user access, applications, and content • Standardizing the security in an enterprise mobile environment uses a number of processes, tools, and techniques. MAM provides a comprehensive set of tools to secure corporate assets. MDM can complement those tools by managing device security, if needed Tuesday, July 31, 12