SlideShare une entreprise Scribd logo
1  sur  13
Symantec AppCenter Overview

Presenters:
Andrew Blackham - Symantec Presales Specialist
Exploding Number of Mobile Devices
Pave the Way for “Bring Your Own Device” (BYOD)

39%
2010 177M corp PCs
2015 246M corp PCs

69%
2010 173 M personal PCs
2015 293M personal PCs

340%
2010 300M smartphones
2015 1017M smartphones

2,170%
2010 15M tablets
2015 326M tablets
Changes in Working Style

1

2

3

80%

65%

52%

New applications
deployed
in the cloud

Enterprises allow
mobile access to
their network

Workers use three
or more devices

Sources:
1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011
2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012
3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
The Desires of Users Versus IT Staff

User

IT Staff

Freedom, Privacy and
Productivity

Simple, Secure and
Reliable

Easy access to files, applications, email
Use the latest technology and applications
Personal stuff is untouched
Do it themselves (i.e. Self-Service)

Protect company information
Only let authorized users in
Easy to work with and reliable
Reporting, audit and monitor
Success = Mastering Control Points

Devices

Applications

Data

…without disrupting user experience
Symantec’s Comprehensive Solution

User and App
Access

Primary
Products

Complementary
Products

App and Data
Protection

Device
Management

Threat
Protection

Secure File
Sharing

Symantec
O3™

App
Center

Mobile
Management

Mobile
Security

Content
Center

Symantec Managed
PKI

Symantec Data Loss
Prevention for
Mobile

Altiris™ Client
Management Suite
from Symantec

Symantec Endpoint
Protection

Symantec O3™

Symantec Mobile
Encryption

Altiris™ IT
Management Suite
from Symantec

Symantec
Validation and ID
Protection Service
(VIP)
Use Case:
Secure iOS/Android/HTML5 applications and
Content

Enterprise App Store

Containerized Application

Personal

CRM
Public
application
s

ACME
Corporate
applicatio
ns

Corp App
Documents

7
Symantec App Center
Mobile App & Data Protection
SYMANTEC APP CENTER

•
•
•
•
•
•

App deployment & provisioning
User authentication across apps
Copy & paste prevention
Per app file encryption
Remote data/app wipe
iOS & Android support
8

8
Mobile Application Management
– Comprehensive App Wrapping Tech

App Store
Repository for internal
and external mobile
applications

App Policy
Protect app against data loss
through encryption, removal
control and separation of
corporate data

Content Center
DLP policy to control
confidential data access

9
Same Security as Sandboxing, but More
Flexible

.IPA or .APK file
with standard
libraries

App wrapped with App
Center
libraries and policy controls
ready for deployment
10
Business and Personal
Apps and Data Co-exist

11

11
Symantec Sealed Program
• New Symantec mobility technology program
• Extends containerization to third-party public apps

Symantec
Sealed

• Delivery through Apple app store
• Apps delivered with Symantec security built-in
Signed Partners
Moxier Mail

Polaris Office

Good Reader

Enterprise Email with
direct push

Mobile Office to edit
MS Office docs

PDF reader with
annotation features

iKonic Mail

Xavy

iAnnotate

Secure access to
enterprise email

Connects to MS Lync &
Office Communicator

Read, Annotate and
Share PDF documents

Picsel SmartOffice
View and edit
MS Office files
1
2
Any Questions?

Contenu connexe

Tendances

Tendances (20)

Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years
 
Watson IOT Platform
Watson IOT PlatformWatson IOT Platform
Watson IOT Platform
 
IoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTIoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoT
 
Watson Internet of Things Hexamite
Watson Internet of Things HexamiteWatson Internet of Things Hexamite
Watson Internet of Things Hexamite
 
IBM Watson IOT
IBM Watson IOTIBM Watson IOT
IBM Watson IOT
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives
 
People Counting: Internet of Things in Motion at JavaOne 2013
People Counting: Internet of Things in Motion at JavaOne 2013People Counting: Internet of Things in Motion at JavaOne 2013
People Counting: Internet of Things in Motion at JavaOne 2013
 
Tec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesTec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examples
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domain
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
IoT (what, where, when, why, how)
IoT (what, where, when, why, how)IoT (what, where, when, why, how)
IoT (what, where, when, why, how)
 
IoT-Use-Case-eBook
IoT-Use-Case-eBookIoT-Use-Case-eBook
IoT-Use-Case-eBook
 
internet of things : 2021 perspective
internet of things : 2021 perspectiveinternet of things : 2021 perspective
internet of things : 2021 perspective
 
IoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsIoT Introduction Architecture and Applications
IoT Introduction Architecture and Applications
 
IBM Internet of Things Offerings
IBM Internet of Things OfferingsIBM Internet of Things Offerings
IBM Internet of Things Offerings
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and Blockchain
 
Intelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsIntelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and Communications
 

En vedette

En vedette (10)

Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from Symantec
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Business Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive AnalyticsBusiness Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive Analytics
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 

Similaire à Symantec AppCenter Webinar.pptx

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 

Similaire à Symantec AppCenter Webinar.pptx (20)

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 2015
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 

Plus de Arrow ECS UK

2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
Arrow ECS UK
 

Plus de Arrow ECS UK (19)

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education Partner
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training Centre
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 
Big Data & Information Management Channel Manager
Big Data & Information Management Channel ManagerBig Data & Information Management Channel Manager
Big Data & Information Management Channel Manager
 
Build a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecBuild a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with Symantec
 
Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?Is 2014 the Year of The Internet of things?
Is 2014 the Year of The Internet of things?
 
NetApp 2014 Predictions
NetApp 2014 PredictionsNetApp 2014 Predictions
NetApp 2014 Predictions
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Arrow ECS and McAfee, an award winning team
Arrow ECS and McAfee, an award winning teamArrow ECS and McAfee, an award winning team
Arrow ECS and McAfee, an award winning team
 
Evolution of the Data Centre by NetApp
Evolution of the Data Centre by NetAppEvolution of the Data Centre by NetApp
Evolution of the Data Centre by NetApp
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Symantec AppCenter Webinar.pptx

  • 1. Symantec AppCenter Overview Presenters: Andrew Blackham - Symantec Presales Specialist
  • 2. Exploding Number of Mobile Devices Pave the Way for “Bring Your Own Device” (BYOD) 39% 2010 177M corp PCs 2015 246M corp PCs 69% 2010 173 M personal PCs 2015 293M personal PCs 340% 2010 300M smartphones 2015 1017M smartphones 2,170% 2010 15M tablets 2015 326M tablets
  • 3. Changes in Working Style 1 2 3 80% 65% 52% New applications deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices Sources: 1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011 2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012 3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
  • 4. The Desires of Users Versus IT Staff User IT Staff Freedom, Privacy and Productivity Simple, Secure and Reliable Easy access to files, applications, email Use the latest technology and applications Personal stuff is untouched Do it themselves (i.e. Self-Service) Protect company information Only let authorized users in Easy to work with and reliable Reporting, audit and monitor
  • 5. Success = Mastering Control Points Devices Applications Data …without disrupting user experience
  • 6. Symantec’s Comprehensive Solution User and App Access Primary Products Complementary Products App and Data Protection Device Management Threat Protection Secure File Sharing Symantec O3™ App Center Mobile Management Mobile Security Content Center Symantec Managed PKI Symantec Data Loss Prevention for Mobile Altiris™ Client Management Suite from Symantec Symantec Endpoint Protection Symantec O3™ Symantec Mobile Encryption Altiris™ IT Management Suite from Symantec Symantec Validation and ID Protection Service (VIP)
  • 7. Use Case: Secure iOS/Android/HTML5 applications and Content Enterprise App Store Containerized Application Personal CRM Public application s ACME Corporate applicatio ns Corp App Documents 7
  • 8. Symantec App Center Mobile App & Data Protection SYMANTEC APP CENTER • • • • • • App deployment & provisioning User authentication across apps Copy & paste prevention Per app file encryption Remote data/app wipe iOS & Android support 8 8
  • 9. Mobile Application Management – Comprehensive App Wrapping Tech App Store Repository for internal and external mobile applications App Policy Protect app against data loss through encryption, removal control and separation of corporate data Content Center DLP policy to control confidential data access 9
  • 10. Same Security as Sandboxing, but More Flexible .IPA or .APK file with standard libraries App wrapped with App Center libraries and policy controls ready for deployment 10
  • 11. Business and Personal Apps and Data Co-exist 11 11
  • 12. Symantec Sealed Program • New Symantec mobility technology program • Extends containerization to third-party public apps Symantec Sealed • Delivery through Apple app store • Apps delivered with Symantec security built-in Signed Partners Moxier Mail Polaris Office Good Reader Enterprise Email with direct push Mobile Office to edit MS Office docs PDF reader with annotation features iKonic Mail Xavy iAnnotate Secure access to enterprise email Connects to MS Lync & Office Communicator Read, Annotate and Share PDF documents Picsel SmartOffice View and edit MS Office files 1 2

Notes de l'éditeur

  1. Good
  2. Device growth continues in all segments, but the phenomenal growth of smart phones and tablets is transforming the way we do business, calling for new IT strategies. IT’s basic responsibilities are the same: to manage and secure devices, and protect the information they transmit and carry. The new challenges include device ownership, how to manage communication networks that we do not control, and uncertain boundaries between work and personal use.[Sources:In 2010, 350.9m PC’s were shipped (177.8m professional, 173.2m home)2014 # of Corporate PC’s (laptop, desktop, notebook): 246,600,000 (Gartner: G00212068, Apr 2011) 2014 # of Consumer PC’s (laptop, desktop, notebook): 293,500,000 (Gartner: G00212068, Apr 2011) 2015 # of Tablets:  326,304,000  (Gartner: G00219441, Sept 2011) 2015 # of Smartphones:  1,016,964,300  (IDC: 232163, Jan 2012)]
  3. Mobile device adoption has already changed our working style. Most new applications are deployed in the cloud to better accommodate mobile users and those with multiple devices. Almost ⅔ of organizations allow mobile devices, and more than half of the work force use at least three devices. I’m partly responsible for that last number – I use at least [number of desktop, phone, laptop, and tablet devices] devices almost every day.[Sources:IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012]
  4. Script:At the heart of Symantec App Center is the app wrapping technology which is made up of three different areas. They App Store, App Policies, and Content Center. In the App Store we will find both internal and external applications for iOS and Android. App Center can then be used to wrap policies around these applications to provide a variety of functionality to secure and prevent data loss through technologies such as encryption, authentication rules, and more. Finally, App Center has support for content as well. This would include documents, videos, and spreadsheets in which we can lock down to control access.