SlideShare une entreprise Scribd logo
1  sur  34
Mobile Thought Leaders
Australia
1
Presentation to begin
0 8 : 1 5 am
Mobile Thought Leaders
Australia
2
Mobile Thought Leaders Australia
Sydney Chapter
The 3rd Wave of Mobile Security
Justin Roche
VP Consulting GEMA - Asia
Mobile Thought Leaders
Australia
3
Mobile Thought Leaders
Australia
4
• LinkedIn Group
• Peer Introductions
• Invite Colleagues!
• mobilethoughtleaders.com.au
• @MTL_Australia
• Coming Soon: The MTL App
Mobile Thought Leaders
Australia
5
2015/16 Meetings
Antwerp
Atlanta
Austin
Baltimore
Beijing
Birmingham
Boston
Bremen
Brisbane
Brussels
Calgary
Charlotte/NC
Chicago
Cincinnati
Cleveland
Columbus
Dallas
Denver
Detroit
Dubai
Dublin
Gothenburg
Hamburg
Houston
London
Los Angeles
Louisville
Melbourne
Merida
Mexico City
Miami
Milan
Milwaukee
Nashville
NYC
Orlando/Tampa
Oslo
Perth
Philadelphia
Phoenix
Pittsburgh
Portland
Raleigh
Riyadh
Rome
San Diego
Sao Paulo
Seattle
St. Louis
Stockholm
Sydney
Toronto
Vancouver
Washington, DC
Mobile Thought Leaders
Australia
6
Today
o Lightning Round
o Sponsors: VMware/MSC Mobility
o Third Wave of Security
o Roundtable Breakfast
o Plus/Delta & Next Meeting Plan
Mobile Thought Leaders
Australia
7
Lightning Round
• Name, Role,
Company
• Top Interest Today
Mobile Thought Leaders
Australia
8
Todays Sponsor
Mobility and Cloud is Shifting CIOs to a New Model of IT
CONFIDENTIAL 9
Mobilizing business processes enables– roaming staff help improve customer satisfaction;
boost employee productivity; increase competitive advantage, and much more
Smartphones are
forecasted to reach 2
billion, tablets 261
million by 2016.
Gartner
Worldwide Financial
Services spent $114
Billion on Mobility,
Cloud, and Big Data
Analytics in 2015
IDC Financial Insights
92% of 37 institutions polled
in a Celent Survey in 2015
said the use of tablets for
front-line staff was "highly
or extremely likely.”
American Banker
Now Is the Time to Reimagine How You Do Business
CONFIDENTIAL 10
Revenue
Growth
Risk and
Compliance
Operational
Efficiencies
Customer
Experience
CONFIDENTIAL 11
Modernize the customer
and client interactions for
mobile Gen Yers and
Millennials to drive
engagement and loyalty
Transforming To Stay Relevant
Transform operations to
improve operational
efficiency and drive down
costs
Improve data security,
protect sensitive
information and maintain
compliance
Provide always-available
systems and protect
against disasters and
business disruptions
What You Can Deliver – Transactions Transformed
Capital One 360 Café
Boylston Street
Boston, MA
Secure, reliable, compliant,
and personalized interactions
in-person and online while
reducing operating costs and
risks.
VMware End-User Computing Solutions Bridge Two Worlds
CONFIDENTIAL 13
#vmwmobility
Enterprise
Workspace
Management
Mobility
Management
Enabling the Secure Digital Workspace
#digitalworkspace
CONFIDENTIAL 14
Secure Email
Consistent Access Experience
Any Device – User enrollment
Secure Conditional Access
Delivering flexibility, mobility and compliance for financial
services
19
The Secure Digital Workspace
Improve
Employee
Productivity
and Customer
Experience with
Mobile
Workflows
Support
Business
Continuity with
High
Availability of
Services
Secure Data,
Stay Compliant,
and Reduce
Risk
Transform
Operations and
Gain Operational
Efficiencies
CONFIDENTIAL
MOBILE SECURITY ALLIANCE – MSA
20
Unifying End Point Security with Enterprise Mobility Management
http://www.air-watch.com/partners/mobile-security-alliance/
• Device
• Applications
• Networks
AirWatch Privacy First
21
Visual Privacy AppWhatIsAirWatch.com Privacy Officer
Your Privacy Matters!
Your User’s Privacy Matters
Mobile Thought Leaders
Australia
22
Todays Sponsor
Mobile Thought Leaders
Australia
23
Managed Mobile Security
• Device Security Posture
Management
• Mobile App Scanning
• Mobile Data Analysis
• App Store Management
• Free POC
Mobile Thought Leaders
Australia
24
3rd Wave of Security
Mobile Thought Leaders
Australia
25
3rd Wave Challenges for the Enterprise
• Employees make security decisions
without considering risks
• 80% of employees use non-
approved apps
• Mobile device management
solutions do not provide effective
protection
• Third party SaaS Apps don’t
traverse the corporate security
border
Non-ApprovedApps Useage LoB vs IT
(IDC)
Mobile Thought Leaders
Australia
26
MTL Members on Mobile Security…
• Users will work around anything that is hard or inconvenient
• We have threat vectors and exposures that we don’t understand
• So far we have been lucky
• Velocity, Variability, & Volume overwhelm past methods of security
“
”
Mobile Thought Leaders
Australia
27
Protect the
Devices
Access Controls Support
Innovation
Intrinsically Secure
Devices
Containerization Contextual Security
MDM EFSS & VPN Self-Defending
Apps
Device Lock &
Wipe
Blacklists &
Whitelists
Fine-grained
security
Three Eras of Mobile Security
Mobile Thought Leaders
Australia
28
Security has changed
Mobile Thought Leaders
Australia
29
Gartner on Endpoint Priorities 2016
Mobile Application
Strategies
Mobile app development strategy encompasses skill-building
strategies, tools for key and rapidly developed mobile apps,
and methods to empower the business and tie mobile to
crucial IT infrastructure.
Office 365, Google Apps for
Work or Other Cloud Office
Initiatives
Just about every organization must decide if (and how) it will
move to Microsoft Office 365 or Google Apps for Work
(referred to collectively as "cloud office" along with other
competitors).
Digital Workplace Program
The digital workplace is a business strategy to boost
employee engagement and agility by means of a more
consumerised work environment.
Mobile Thought Leaders
Australia
30
Evolving Risks
• 79% of public mobile apps have behaviors
that could lead to corporate data loss
• Users are unaware of risks from Wi-Fi,
websites or apps
• Device contexts change in real time
P[]
[ cv
DEVICE
CONFIGURATION
NETWORK &
WEB THREATS
REAL-TIME
ACTIVITY
INSECURE APPS
(PRIVACY)
Mobile Thought Leaders
Australia
31
IT: Advisor and Collaborator
Don’t: Do:
Adapt your legacy solutions to
mobile use cases
Deploy tailored solutions for
mobile business and
technology use cases
Add Lockdown on user
devices
Add accountability by
increasing visibility
Focus on blacklisting
consumer apps used by
shadow IT
Offer whitelisted alternatives to
guide and inform business-
lead apps
Mobile Thought Leaders
Australia
32
Elements of the 3rd Wave
Rules-based
Response
Use-case fine control
EMM Integration
Contextual rules
management
Crowd-sourced
Intelligence
Control/Enablement
Balance
Mobile Thought Leaders
Australia
33
Third Wave Technologies
IAM
RTEM
App Activity
Analysis and
Management
Mobile
Perimeter
Management
Activity logging
and discovery
Identity and
Access
Management,
Single-Sign-On
and
Real-time
expense
management
rules-based
consumption
controls,
App crash and
app usage data
and analysis
Proxy control, IP
and email
connection
identification,
network access
control
Secure and
logged texting,
calling,
interaction
capture
Ping, Centrify,
Android for Work
Wandera,
AirWatch, Navita
Appthority,
Wandera,
Crittercism
Wandera, DEP,
Android for Work,
Zimperium
MobileGuard
Truphone
Mobile Thought Leaders
Australia
34
Third Wave Technologies
Appthority Wandera Zimperium
Integration MDM, backend or on-
device app
On device agent On-device app,
running
Rules-based
responsiveness √ √ √
Crowd-sourced
intelligence √ √ √
Contextual Rules
Management √ √
Mobile App Framework
testing √ √ √
Control Granularity Hundreds Dozens Dozens
Contextual Focus Apps Device
communications
Device Perimeter
Mobile Thought Leaders
Australia
35
Case Study: Fortune 50
A Bigger Challenge than First Thought
• 310,000 Unique Apps
• 120,000 Apps fully analyzed (38%)
• 18,000 Paid (6%)
• 30,000 Dead (10%)
• 130,000 Stale (42%)
• 12,000 Currently unable to process
72%
28%
10,000+ Devices
Mobile Thought Leaders
Australia
36
Case Study: Fortune 50
Data is exfiltrated over time from individual mobile
devices that hold corporate information
10,930
Sends forms of PII:
Calendar, Address Book,
IMEI, UDID, Location
14,338
Sends Sensitive
Data without
Encryption
5,109
Sends SMS
Messages
3,578
connect to China
509
send PII
439
connect to Russia
45
send PII
1082
connect to Korea
50
send PII
Mobile Thought Leaders
Australia
37
Takeaways
1. You will need a variety of new tools and processes
to maintain progress, manage changing risks
2. Utilize the full set of OEM Enterprise Controls
– DEP or Android for Work
3. The third wave is about alignment
– User Experience
– Use Cases
– Business Outcomes
4. Insight at the point of action enables and protects
– Trust, monitor and respond
Mobile Thought Leaders
Australia
38
The 3rd Wave of Mobile Security
Mobile Thought Leaders Australia

Contenu connexe

Tendances

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityAndris Soroka
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 

Tendances (19)

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Security that works
Security that worksSecurity that works
Security that works
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
BYOD
BYODBYOD
BYOD
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 

Similaire à MTL Australia 2016 - The 3rd Wave of Security

Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremDipesh Mukerji
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Empower Your Workforce with KloudData Customized Mobility Solutions
Empower Your Workforce with KloudData Customized Mobility SolutionsEmpower Your Workforce with KloudData Customized Mobility Solutions
Empower Your Workforce with KloudData Customized Mobility SolutionsKloudData Inc
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Net Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility BrochureNet Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility BrochureNet Solutions
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileMonitise MEA
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimiLtd
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Ahmed Banafa
 

Similaire à MTL Australia 2016 - The 3rd Wave of Security (20)

Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Empower Your Workforce with KloudData Customized Mobility Solutions
Empower Your Workforce with KloudData Customized Mobility SolutionsEmpower Your Workforce with KloudData Customized Mobility Solutions
Empower Your Workforce with KloudData Customized Mobility Solutions
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
Net Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility BrochureNet Solutions Enterprise Mobility Brochure
Net Solutions Enterprise Mobility Brochure
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes Mobile
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast Briefing
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 
Ahmed Banafa EMM
Ahmed Banafa EMMAhmed Banafa EMM
Ahmed Banafa EMM
 
Health IT and Information security by Manish Tiwari
Health IT and Information security by Manish TiwariHealth IT and Information security by Manish Tiwari
Health IT and Information security by Manish Tiwari
 

Dernier

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 

Dernier (20)

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 

MTL Australia 2016 - The 3rd Wave of Security

  • 2. Mobile Thought Leaders Australia 2 Mobile Thought Leaders Australia Sydney Chapter The 3rd Wave of Mobile Security Justin Roche VP Consulting GEMA - Asia
  • 4. Mobile Thought Leaders Australia 4 • LinkedIn Group • Peer Introductions • Invite Colleagues! • mobilethoughtleaders.com.au • @MTL_Australia • Coming Soon: The MTL App
  • 5. Mobile Thought Leaders Australia 5 2015/16 Meetings Antwerp Atlanta Austin Baltimore Beijing Birmingham Boston Bremen Brisbane Brussels Calgary Charlotte/NC Chicago Cincinnati Cleveland Columbus Dallas Denver Detroit Dubai Dublin Gothenburg Hamburg Houston London Los Angeles Louisville Melbourne Merida Mexico City Miami Milan Milwaukee Nashville NYC Orlando/Tampa Oslo Perth Philadelphia Phoenix Pittsburgh Portland Raleigh Riyadh Rome San Diego Sao Paulo Seattle St. Louis Stockholm Sydney Toronto Vancouver Washington, DC
  • 6. Mobile Thought Leaders Australia 6 Today o Lightning Round o Sponsors: VMware/MSC Mobility o Third Wave of Security o Roundtable Breakfast o Plus/Delta & Next Meeting Plan
  • 7. Mobile Thought Leaders Australia 7 Lightning Round • Name, Role, Company • Top Interest Today
  • 9. Mobility and Cloud is Shifting CIOs to a New Model of IT CONFIDENTIAL 9 Mobilizing business processes enables– roaming staff help improve customer satisfaction; boost employee productivity; increase competitive advantage, and much more Smartphones are forecasted to reach 2 billion, tablets 261 million by 2016. Gartner Worldwide Financial Services spent $114 Billion on Mobility, Cloud, and Big Data Analytics in 2015 IDC Financial Insights 92% of 37 institutions polled in a Celent Survey in 2015 said the use of tablets for front-line staff was "highly or extremely likely.” American Banker
  • 10. Now Is the Time to Reimagine How You Do Business CONFIDENTIAL 10 Revenue Growth Risk and Compliance Operational Efficiencies Customer Experience
  • 11. CONFIDENTIAL 11 Modernize the customer and client interactions for mobile Gen Yers and Millennials to drive engagement and loyalty Transforming To Stay Relevant Transform operations to improve operational efficiency and drive down costs Improve data security, protect sensitive information and maintain compliance Provide always-available systems and protect against disasters and business disruptions
  • 12. What You Can Deliver – Transactions Transformed Capital One 360 Café Boylston Street Boston, MA Secure, reliable, compliant, and personalized interactions in-person and online while reducing operating costs and risks.
  • 13. VMware End-User Computing Solutions Bridge Two Worlds CONFIDENTIAL 13 #vmwmobility Enterprise Workspace Management Mobility Management
  • 14. Enabling the Secure Digital Workspace #digitalworkspace CONFIDENTIAL 14 Secure Email Consistent Access Experience Any Device – User enrollment Secure Conditional Access
  • 15. Delivering flexibility, mobility and compliance for financial services 19 The Secure Digital Workspace Improve Employee Productivity and Customer Experience with Mobile Workflows Support Business Continuity with High Availability of Services Secure Data, Stay Compliant, and Reduce Risk Transform Operations and Gain Operational Efficiencies CONFIDENTIAL
  • 16. MOBILE SECURITY ALLIANCE – MSA 20 Unifying End Point Security with Enterprise Mobility Management http://www.air-watch.com/partners/mobile-security-alliance/ • Device • Applications • Networks
  • 17. AirWatch Privacy First 21 Visual Privacy AppWhatIsAirWatch.com Privacy Officer Your Privacy Matters! Your User’s Privacy Matters
  • 19. Mobile Thought Leaders Australia 23 Managed Mobile Security • Device Security Posture Management • Mobile App Scanning • Mobile Data Analysis • App Store Management • Free POC
  • 21. Mobile Thought Leaders Australia 25 3rd Wave Challenges for the Enterprise • Employees make security decisions without considering risks • 80% of employees use non- approved apps • Mobile device management solutions do not provide effective protection • Third party SaaS Apps don’t traverse the corporate security border Non-ApprovedApps Useage LoB vs IT (IDC)
  • 22. Mobile Thought Leaders Australia 26 MTL Members on Mobile Security… • Users will work around anything that is hard or inconvenient • We have threat vectors and exposures that we don’t understand • So far we have been lucky • Velocity, Variability, & Volume overwhelm past methods of security “ ”
  • 23. Mobile Thought Leaders Australia 27 Protect the Devices Access Controls Support Innovation Intrinsically Secure Devices Containerization Contextual Security MDM EFSS & VPN Self-Defending Apps Device Lock & Wipe Blacklists & Whitelists Fine-grained security Three Eras of Mobile Security
  • 25. Mobile Thought Leaders Australia 29 Gartner on Endpoint Priorities 2016 Mobile Application Strategies Mobile app development strategy encompasses skill-building strategies, tools for key and rapidly developed mobile apps, and methods to empower the business and tie mobile to crucial IT infrastructure. Office 365, Google Apps for Work or Other Cloud Office Initiatives Just about every organization must decide if (and how) it will move to Microsoft Office 365 or Google Apps for Work (referred to collectively as "cloud office" along with other competitors). Digital Workplace Program The digital workplace is a business strategy to boost employee engagement and agility by means of a more consumerised work environment.
  • 26. Mobile Thought Leaders Australia 30 Evolving Risks • 79% of public mobile apps have behaviors that could lead to corporate data loss • Users are unaware of risks from Wi-Fi, websites or apps • Device contexts change in real time P[] [ cv DEVICE CONFIGURATION NETWORK & WEB THREATS REAL-TIME ACTIVITY INSECURE APPS (PRIVACY)
  • 27. Mobile Thought Leaders Australia 31 IT: Advisor and Collaborator Don’t: Do: Adapt your legacy solutions to mobile use cases Deploy tailored solutions for mobile business and technology use cases Add Lockdown on user devices Add accountability by increasing visibility Focus on blacklisting consumer apps used by shadow IT Offer whitelisted alternatives to guide and inform business- lead apps
  • 28. Mobile Thought Leaders Australia 32 Elements of the 3rd Wave Rules-based Response Use-case fine control EMM Integration Contextual rules management Crowd-sourced Intelligence Control/Enablement Balance
  • 29. Mobile Thought Leaders Australia 33 Third Wave Technologies IAM RTEM App Activity Analysis and Management Mobile Perimeter Management Activity logging and discovery Identity and Access Management, Single-Sign-On and Real-time expense management rules-based consumption controls, App crash and app usage data and analysis Proxy control, IP and email connection identification, network access control Secure and logged texting, calling, interaction capture Ping, Centrify, Android for Work Wandera, AirWatch, Navita Appthority, Wandera, Crittercism Wandera, DEP, Android for Work, Zimperium MobileGuard Truphone
  • 30. Mobile Thought Leaders Australia 34 Third Wave Technologies Appthority Wandera Zimperium Integration MDM, backend or on- device app On device agent On-device app, running Rules-based responsiveness √ √ √ Crowd-sourced intelligence √ √ √ Contextual Rules Management √ √ Mobile App Framework testing √ √ √ Control Granularity Hundreds Dozens Dozens Contextual Focus Apps Device communications Device Perimeter
  • 31. Mobile Thought Leaders Australia 35 Case Study: Fortune 50 A Bigger Challenge than First Thought • 310,000 Unique Apps • 120,000 Apps fully analyzed (38%) • 18,000 Paid (6%) • 30,000 Dead (10%) • 130,000 Stale (42%) • 12,000 Currently unable to process 72% 28% 10,000+ Devices
  • 32. Mobile Thought Leaders Australia 36 Case Study: Fortune 50 Data is exfiltrated over time from individual mobile devices that hold corporate information 10,930 Sends forms of PII: Calendar, Address Book, IMEI, UDID, Location 14,338 Sends Sensitive Data without Encryption 5,109 Sends SMS Messages 3,578 connect to China 509 send PII 439 connect to Russia 45 send PII 1082 connect to Korea 50 send PII
  • 33. Mobile Thought Leaders Australia 37 Takeaways 1. You will need a variety of new tools and processes to maintain progress, manage changing risks 2. Utilize the full set of OEM Enterprise Controls – DEP or Android for Work 3. The third wave is about alignment – User Experience – Use Cases – Business Outcomes 4. Insight at the point of action enables and protects – Trust, monitor and respond
  • 34. Mobile Thought Leaders Australia 38 The 3rd Wave of Mobile Security Mobile Thought Leaders Australia