4. Exploding Number of Mobile Devices
Pave the Way for “Bring Your Own Device” (BYOD)
2010 177M corp PCs
2015 246M corp PCs
2010 173 M personal PCs
2015 293M personal PCs
2010 300M smartphones
2015 1017M smartphones
39% 69% 340% 2,170%
2010 15M tablets
2015 326M tablets
5. Changes in Working Style
New applications
deployed
in the cloud
Enterprises allow
mobile access to
their network
Workers use three
or more devices
80% 65% 52%
1 2 3
Sources:
1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011
2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012
3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012
6. Freedom, Privacy and
Productivity
Easy access to files, applications, email
Use the latest technology and applications
Personal stuff is untouched
Do it themselves (i.e. Self-Service)
Simple, Secure and
Reliable
Protect company information
Only let authorized users in
Easy to work with and reliable
Reporting, audit and monitor
User IT Staff
The Desires of Users Versus IT Staff
7. Company Controls applications and
Data Only
Company Controls Personal DeviceCompany Controls Standard Device
32
1
UnmanagedManaged
Company Owned Personally Owned
Company Owns an Unmanaged
Device
BYOD
User and App
Access
Management
Threat
Protection
Secure File
Sharing
Device
Management
App and Data
Protection
User and App
Access
Management.
Threat
Protection
Secure File
Sharing
Device
Management
App and Data
Protection
User and App
Access
Management
Secure File
Sharing
App and Data
Protection
2
4
Evolving Endpoint Adoption Map
9. Success = Mastering Control Points
Devices Applications Data
…without disrupting user experience
10. 5 Pillars of Enterprise Mobility
ControlPoints
User & App
Access
App & Data
Protection
Device
Management
Threat
Protection
Secure File
Sharing
Device
Application
Data
Company credentials
extended to both
public and private
cloud services
Corporate data
separation and
delivery of IT
services
Configuration,
control and
management of
mobile devices
Mobile Security
Threat
detection
and removal
Enterprise-grade
file sharing and
collaboration in
the cloud
11. Symantec’s Comprehensive Solution
Symantec
O3™
App
Center
Mobile
Management
Mobile
Security
Content
Center
Primary
Products
User and App
Access
App and Data
Protection
Device
Management
Threat
Protection
Secure File
Sharing
Symantec Managed
PKI
Symantec
Validation and ID
Protection Service
(VIP)
Symantec Data Loss
Prevention for
Mobile
Symantec Mobile
Encryption
Altiris™ Client
Management Suite
from Symantec
Altiris™ IT
Management Suite
from Symantec
Symantec Endpoint
Protection
Symantec O3™
Complementary
Products
12. Competitive Matrix
User and App
Access
App and Data
Protection
Device
Management
Threat
Protection
Secure File
Sharing
Fiberlink
Airwatch
MobileIron
Good
Zenprise
Symantec
McAfee
SAP/Sybase
15. Symantec O3
A Cloud Information Protection Platform
Symantec O3
Private Cloud / Data Center
Symantec O3
Gateway
Identity and Access
Broker
Information Gateway
Symantec O3
Intelligence Center
Context-based Policies
Status Monitoring
Log and Audit Services
Layered
Protection
2F Authentication
Data Loss
Prevention
Encryption
Public Cloud
End-User
Any
Device
16. Why Symantec O3
• Proven Infrastructure
Works with federated and non-
federated applications
2
3
• Highly Scalable
Leverages existing infrastructure
• Capture Security
Events
Correlation of security intelligence
17. Use Case #2:
Access Company and Personal Email
Mobile Protection
VPNWi-Fi
CA
Network Access
17
18. 18
Symantec Mobile Management
Standalone or Plug into SMP and SCCM
Enable
Activate enterprise access,
applications and data easily
and automatically
> iOS®, Android™, Microsoft®,
Blackberry®, Symbian™
Secure
Protect enterprise data
and infrastructure from
attack and theft
> Detect JB, ensure passcodes, …
Manage
Control inventory and
configuration with
massive scalability
> Integrated with SMP and
SCCM
19. 19
Comprehensive Device Management
Configure Devices
Self-service enrollment
Configure Email, VPN, Wi-Fi
Identity Certificates
Distribute applications
In-house applications or public-store
applications
Docs, videos – any active content
Group based management
Manage Assets
Centralized visibility and control
Automated workflows
Scalable to 20,000+ devices
Apply Policies
Passwords, App restrictions
Compliance with Jailbreak
Selective wipe and Full wipe
20. 20
Why Symantec Mobile Device Management
2
3 • Integrated Mobile
Device Management
Unified management with Macs and
PCs
21. 21
Use Case #3:
Secure iOS/Android/HTML5 applications and
Content
Enterprise App Store
Personal
CRM
Corporate
applicatio
ns
Corp AppACME
Public
application
s
Documents
Containerized Application
22. 22
Mobile Application Management
Comprehensive Application-Wrapping Technology
App Store
Repository for internal
and external mobile
applications
App Policy
Protect application against
data loss through encryption,
removal control and
separation of corporate data
Content Center
Data Loss Prevention
policy to control
confidential data access
23. 23
Comprehensive Mobile App Management
Deploy applications
Enterprise app store for internal applications
Recommendations from public application
store
Group based targeting
Deploy Content
Enterprise content store for docs, videos
Containerize data with per object policies
Group based targeting
Manage Lifecycle
Revoke and update applications selectively
Centralized visibility and control
MDM features for policy management
Protect Data
Security and Management layer around data
Passwords, encryption, offline access, rooting
Separate corproate and personal data
24. 24
• Application deployment and provisioning
• User authentication across applications
• Copy and paste prevention
• Per-application file encryption
• Remote data/app wipe
• iOS, Android, and HTML5 support
SYMANTEC APP CENTER
Symantec App Center
Mobile App and Data Protection
25. 25
Same Security as Sandboxing, but More
Flexible
.IPA or .APK file
with standard
libraries
App wrapped with App
Center
libraries and policy controls
ready for deployment
27. 27
Why Symantec for Mobile applications
• Quick and Easy
Expedite deployment of
applications with an easy-to-use
SaaS app store
• Scalable and
Seamless
Enable any number of applications
with no source-code changes
• Independent of Mobile
Device Management
Address mobile application needs
without managing the complete device
29. Android Has Malware Problem
29
– More Than 50% Of Mobile Malware Is On Android
0
500
1000
1500
2000
2500
Jul-10
Sep-10
Nov-10
Jan-11
Mar-11
May-11
Jul-11
Sep-11
Nov-11
Jan-12
Mar-12
Android Malware Family
67% of enterprises are concerned with malware
attacks spreading from mobile devices to internal
networks.
- Symantec 2012 State of Mobility Survey
29
31. Why Symantec for Mobile Security
32
– High efficacy
Monitors 70+ application
stores, analyzes 3 million+
applications, information from 7
million+ active devices.
• Enterprise Grade Security
Most applications are freeware, consumer
editions. Symantec Mobile Security
provides centralized management
including LiveUpdates.
• Enterprise Integration
Anti-malware is one-piece of mobile
security. Symantec Mobile Security
is integrated with Mobile Device
Management.
32
32. Bringing It All Together
33
Devices. Applications.
Data.
Mobile Protection 33
34. Summary
• No business is safe from attack – regardless of its size or industry
• Attackers are being more selective in who they target
• Obtaining information is key – if an attacker could make money from it, it’s a potential
target
Below are some qualifying questions that can help you determine a security solution
requirement:
• What are you currently doing to safeguard your data?
• How are your emails protected?
• Do you use mobile devices in your organisation?
• What industry regulations do you have to comply with?
• How are you protecting your end users workstations?