Security is an ever evolving challenge for enterprises and government agencies with new actors, often state sponsored, creating new threats which target high value assets. Mobility has added a new dimension to securing digital assets with the ‘always on, always connected, cloud native, socially enabled’ capabilities.
4. Mobile Thought Leaders
Australia
4
• LinkedIn Group
• Peer Introductions
• Invite Colleagues!
• mobilethoughtleaders.com.au
• @MTL_Australia
• Coming Soon: The MTL App
5. Mobile Thought Leaders
Australia
5
2015/16 Meetings
Antwerp
Atlanta
Austin
Baltimore
Beijing
Birmingham
Boston
Bremen
Brisbane
Brussels
Calgary
Charlotte/NC
Chicago
Cincinnati
Cleveland
Columbus
Dallas
Denver
Detroit
Dubai
Dublin
Gothenburg
Hamburg
Houston
London
Los Angeles
Louisville
Melbourne
Merida
Mexico City
Miami
Milan
Milwaukee
Nashville
NYC
Orlando/Tampa
Oslo
Perth
Philadelphia
Phoenix
Pittsburgh
Portland
Raleigh
Riyadh
Rome
San Diego
Sao Paulo
Seattle
St. Louis
Stockholm
Sydney
Toronto
Vancouver
Washington, DC
6. Mobile Thought Leaders
Australia
6
Today
o Lightning Round
o Sponsors: VMware/MSC Mobility
o Third Wave of Security
o Roundtable Breakfast
o Plus/Delta & Next Meeting Plan
9. Mobility and Cloud is Shifting CIOs to a New Model of IT
CONFIDENTIAL 9
Mobilizing business processes enables– roaming staff help improve customer satisfaction;
boost employee productivity; increase competitive advantage, and much more
Smartphones are
forecasted to reach 2
billion, tablets 261
million by 2016.
Gartner
Worldwide Financial
Services spent $114
Billion on Mobility,
Cloud, and Big Data
Analytics in 2015
IDC Financial Insights
92% of 37 institutions polled
in a Celent Survey in 2015
said the use of tablets for
front-line staff was "highly
or extremely likely.”
American Banker
10. Now Is the Time to Reimagine How You Do Business
CONFIDENTIAL 10
Revenue
Growth
Risk and
Compliance
Operational
Efficiencies
Customer
Experience
11. CONFIDENTIAL 11
Modernize the customer
and client interactions for
mobile Gen Yers and
Millennials to drive
engagement and loyalty
Transforming To Stay Relevant
Transform operations to
improve operational
efficiency and drive down
costs
Improve data security,
protect sensitive
information and maintain
compliance
Provide always-available
systems and protect
against disasters and
business disruptions
12. What You Can Deliver – Transactions Transformed
Capital One 360 Café
Boylston Street
Boston, MA
Secure, reliable, compliant,
and personalized interactions
in-person and online while
reducing operating costs and
risks.
14. Enabling the Secure Digital Workspace
#digitalworkspace
CONFIDENTIAL 14
Secure Email
Consistent Access Experience
Any Device – User enrollment
Secure Conditional Access
15. Delivering flexibility, mobility and compliance for financial
services
19
The Secure Digital Workspace
Improve
Employee
Productivity
and Customer
Experience with
Mobile
Workflows
Support
Business
Continuity with
High
Availability of
Services
Secure Data,
Stay Compliant,
and Reduce
Risk
Transform
Operations and
Gain Operational
Efficiencies
CONFIDENTIAL
16. MOBILE SECURITY ALLIANCE – MSA
20
Unifying End Point Security with Enterprise Mobility Management
http://www.air-watch.com/partners/mobile-security-alliance/
• Device
• Applications
• Networks
17. AirWatch Privacy First
21
Visual Privacy AppWhatIsAirWatch.com Privacy Officer
Your Privacy Matters!
Your User’s Privacy Matters
19. Mobile Thought Leaders
Australia
23
Managed Mobile Security
• Device Security Posture
Management
• Mobile App Scanning
• Mobile Data Analysis
• App Store Management
• Free POC
21. Mobile Thought Leaders
Australia
25
3rd Wave Challenges for the Enterprise
• Employees make security decisions
without considering risks
• 80% of employees use non-
approved apps
• Mobile device management
solutions do not provide effective
protection
• Third party SaaS Apps don’t
traverse the corporate security
border
Non-ApprovedApps Useage LoB vs IT
(IDC)
22. Mobile Thought Leaders
Australia
26
MTL Members on Mobile Security…
• Users will work around anything that is hard or inconvenient
• We have threat vectors and exposures that we don’t understand
• So far we have been lucky
• Velocity, Variability, & Volume overwhelm past methods of security
“
”
23. Mobile Thought Leaders
Australia
27
Protect the
Devices
Access Controls Support
Innovation
Intrinsically Secure
Devices
Containerization Contextual Security
MDM EFSS & VPN Self-Defending
Apps
Device Lock &
Wipe
Blacklists &
Whitelists
Fine-grained
security
Three Eras of Mobile Security
25. Mobile Thought Leaders
Australia
29
Gartner on Endpoint Priorities 2016
Mobile Application
Strategies
Mobile app development strategy encompasses skill-building
strategies, tools for key and rapidly developed mobile apps,
and methods to empower the business and tie mobile to
crucial IT infrastructure.
Office 365, Google Apps for
Work or Other Cloud Office
Initiatives
Just about every organization must decide if (and how) it will
move to Microsoft Office 365 or Google Apps for Work
(referred to collectively as "cloud office" along with other
competitors).
Digital Workplace Program
The digital workplace is a business strategy to boost
employee engagement and agility by means of a more
consumerised work environment.
26. Mobile Thought Leaders
Australia
30
Evolving Risks
• 79% of public mobile apps have behaviors
that could lead to corporate data loss
• Users are unaware of risks from Wi-Fi,
websites or apps
• Device contexts change in real time
P[]
[ cv
DEVICE
CONFIGURATION
NETWORK &
WEB THREATS
REAL-TIME
ACTIVITY
INSECURE APPS
(PRIVACY)
27. Mobile Thought Leaders
Australia
31
IT: Advisor and Collaborator
Don’t: Do:
Adapt your legacy solutions to
mobile use cases
Deploy tailored solutions for
mobile business and
technology use cases
Add Lockdown on user
devices
Add accountability by
increasing visibility
Focus on blacklisting
consumer apps used by
shadow IT
Offer whitelisted alternatives to
guide and inform business-
lead apps
28. Mobile Thought Leaders
Australia
32
Elements of the 3rd Wave
Rules-based
Response
Use-case fine control
EMM Integration
Contextual rules
management
Crowd-sourced
Intelligence
Control/Enablement
Balance
29. Mobile Thought Leaders
Australia
33
Third Wave Technologies
IAM
RTEM
App Activity
Analysis and
Management
Mobile
Perimeter
Management
Activity logging
and discovery
Identity and
Access
Management,
Single-Sign-On
and
Real-time
expense
management
rules-based
consumption
controls,
App crash and
app usage data
and analysis
Proxy control, IP
and email
connection
identification,
network access
control
Secure and
logged texting,
calling,
interaction
capture
Ping, Centrify,
Android for Work
Wandera,
AirWatch, Navita
Appthority,
Wandera,
Crittercism
Wandera, DEP,
Android for Work,
Zimperium
MobileGuard
Truphone
30. Mobile Thought Leaders
Australia
34
Third Wave Technologies
Appthority Wandera Zimperium
Integration MDM, backend or on-
device app
On device agent On-device app,
running
Rules-based
responsiveness √ √ √
Crowd-sourced
intelligence √ √ √
Contextual Rules
Management √ √
Mobile App Framework
testing √ √ √
Control Granularity Hundreds Dozens Dozens
Contextual Focus Apps Device
communications
Device Perimeter
31. Mobile Thought Leaders
Australia
35
Case Study: Fortune 50
A Bigger Challenge than First Thought
• 310,000 Unique Apps
• 120,000 Apps fully analyzed (38%)
• 18,000 Paid (6%)
• 30,000 Dead (10%)
• 130,000 Stale (42%)
• 12,000 Currently unable to process
72%
28%
10,000+ Devices
32. Mobile Thought Leaders
Australia
36
Case Study: Fortune 50
Data is exfiltrated over time from individual mobile
devices that hold corporate information
10,930
Sends forms of PII:
Calendar, Address Book,
IMEI, UDID, Location
14,338
Sends Sensitive
Data without
Encryption
5,109
Sends SMS
Messages
3,578
connect to China
509
send PII
439
connect to Russia
45
send PII
1082
connect to Korea
50
send PII
33. Mobile Thought Leaders
Australia
37
Takeaways
1. You will need a variety of new tools and processes
to maintain progress, manage changing risks
2. Utilize the full set of OEM Enterprise Controls
– DEP or Android for Work
3. The third wave is about alignment
– User Experience
– Use Cases
– Business Outcomes
4. Insight at the point of action enables and protects
– Trust, monitor and respond