Upload
derrick-margison
View
214
Download
0
Tags:
Embed Size (px)
Citation preview
Embrace Mobility.Without Compromise.
The apps they need.
On the devices they want.
Without sacrificing compliance.
Strategic Approach to Mobile Security & BYOD Enablement
Fully integrated security, encryption and policy stacks
Business Email, Calendar and Contacts only on BlackBerry
IT command-and-control, no personal apps allowed
Predictable and controlled
The Good Old Days of Mobility…
Today’s Mobility Environment
Work / Play
NFC
Bluetooth
WiFi
GPS
BYOD
Apps
Social
Banking
Extremely Powerful Business Productivity Tools
Highly Portable & Highly Vulnerable Consumer-Grade Devices
Camera
Life-Changing Personal Computing & Communications
Consumerization
End User IT Organization
Business“Give me the apps and data I need on the devices I want.
Without restricting my personal use.”
“How do we protect our assets if we can’t trust or control the device?
How do we manage compliance?”
“We need productive employees and maximum returns on mobility without sacrificing security and compliance!”
New Enterprise Mobility Challenge
The real challenge isn’t “bringing devices to work”.The real challenge is bringing work to devices, without
compromising security or compliance.
Company Owned, Business Only Devices
Company Owned Business Only (COBO)
Company Owned Personal Enabled (COPE)
Employee Owned Business Enabled (BYOD)
Command and Control, Lock it Down
Choice of Device and OS
Mix of Personal and Business Use
Greater Admin Privileges to User
Empower Employees to Do Their Job
Enterprise Mobility ChallengeEmbracing the Next Wave of Mobility
6
What Makes BYOD a Unique Challenge for Enterprise IT?
Devices in an unknown and unverified starting state
Unencrypted corporate data mixed with personal
Consumer-grade OS’s susceptible to rooting and malware
Heightened risk of corporate data leakage and cyber
attacks
Restrictions on strong device-level policies and wiping
Accidental data leakage through end-user actions
Unverified 3rd party apps with access to open APIs
React & Restrict ApproachWe’ll allow BYOD by imposing greater restrictions on what
employees can do if they “bring devices to work”.
What Makes BYOD a Unique Challenge for Enterprise IT?
Embrace & Extend ApproachWe’ll embrace BYOD by securely
“bringing work to devices” (BWTD!) without restricting personal use or access to key business applications.
Evolution of EMM (MDM) Technology to Address Challenges
Mobile Devices
Mobile Apps & Private Data
Security & Compliance
Provisioning & Management
Mobile App Management
Encryption & “Containerization” of Corporate Apps & Data
Integrity VerificationCompliance
OS Hardening
Mobile Device Management(MDM)
Secure ContainerizationKey Considerations and Approaches
YOUR Business Apps/Data
The Mobile Device
THEIR Personal Apps/Data
Access Control PoliciesAuthentication & Conditional Policies
Data EncryptionData At-Rest + Data-In-Transit
Compliance Considerations
Data Leakage PreventionRestrict Copy/Paste
Restrict Direct Sharing to Internet
Jailbreak/Root Detection
Containment from Personal Apps/Data
Selective Lock/WipeWipe Business Data, Not Personal
What Security Do I Need to Add?
Secure ContainerizationKey Considerations and Approaches
Email & PIMEmail, Calendar, Contacts
BrowserIntranet Access
Separation of Business Browser Cache
DocumentsEmail Attachments
Documents Created On-Device
Documents Downloaded from Intranet
Microsoft SharePoint
Custom AppsIn-House Built and/or 3 rd Party Apps
Which Apps & Data Do I Need to Protect?
Secure ContainerizationKey Considerations and Approaches
Fixmo Mobile SecurityEmbrace Mobility Without Compromise
Enable trusted and protected mobile computing in the age of consumerization and hyper connectivity.
Products that help IT organizations in public and private sector proactively: Contain and protect their private data and
assets on increasingly personal devices Detect & prevent anomalies and attacks Monitor and maintain system integrity Maintain & prove compliance
What We Do
How We Do It
Fixmo Enterprise Mobility PlatformModular Platform for Security and Compliance
13
Mobile Devices
Mobile Apps & Private Data
Security & Compliance
Provisioning & Management
[MDM]
[MAM] [Secure Containerization]
[Integrity]
Fixmo SafeZoneSecure Workspace and App Containerization
Secure workspace and containerization solution that keeps ALL business data and apps encrypted, contained and under IT control independent of the device or who owns it
Full suite of secure business productivity apps pre-built to run inside the secure workspace including Email/PIM, Browser, Documents, PDF Annotation, Camera, SharePoint
High assurance security and DLP for iOS and Android – no matter who owns the device
Does your company need to consider a “Beyond MDM” mobility strategy?
1. What are the requirements and expectations of your employees for how they will use mobile devices?
2. Do you want to allow Email? Intranet Browsing? Document access? SharePoint access? Custom business apps?
3. Do you need to be able to wipe all business data (email, apps, documents, etc.) without wiping the entire device?
4. Do you have regulatory compliance requirements related to DLP and encryption of data-at-rest / in-transit?
5. To what degree will your company be embracing BYOD policies within the next 12 months?