Upload
emerce
View
748
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
Enterprise Mobility Driving Productivity Without Sacrificing Protection
Peter van Leeuwen Principal Systems Engineer, Endpoint Management & Mobility
Founded in 1982
IPO in 1989
Approximately 20,500 Employees
Operations in 50 Countries
#379 on the 2013 Fortune 500
100 Percent of Fortune 500 Companies are Customers
$6.9 Billion Revenue in FY2013; Approximately 52% Outside of the U.S.
More Than 1,500 Global Patents
Included on Fortune’s Most Admired Companies List
Invests 14% of Annual Revenue in R&D*
* R&D Investments is Non-GAAP
We Protect Information and
Identities Independent of
Platform: Physical, Mobile,
Virtual, Cloud
in Office and Shop Floor IT
Evolving Challenges
Evolving Challenges
Evolving Challenges
Evolving Challenges
BYOD Perception
Benefits Hardware procurement
savings
Contract plan savings
Increased worker productivity
Employee satisfaction
Competitive advantage
Risks Information security
Legal
Benefits Hardware procurement
savings
Contract plan savings
Increased worker productivity
Employee satisfaction
Competitive advantage
Risks Information security
Legal
Reality
BYOD: Is all a Myth, Hype or …..
• By the end of last year Intel
– had 23,500 mobile devices in it´s BYOD program (+ 38%)
– supported 41 mobile applications
– added 16 approved applications that could be used as part of its BYOD program in 2012 (+ 64%)
• Employees report they are saving an average of 57 minutes daily
• This savings equates to an annual productivity gain of about 5 million hours from BYOD in 2012 alone
Intel´s BYOD Program
Source: Intel IT Performance Report 2012-2013
Productivity Without Compromise Mission: “Any device, Anywhere, Any time!!!”
Manage Devices Dynamically
Secure App Community
Secure Data at Rest and in Transit
Enable Users
Selecting the Right Solution for the Enterprise Understanding various use cases
Company-owned Personally-owned
Man
age
d
Un
man
age
d
Company Controls Personal Device
Company Controls Relevant Apps and Data Only
Company Controls Standard Device
Company Owned But Unmanaged
Company owned, but unmanaged
Company controls personal device Company controls standard device
Company controls relevant apps and data only
Ap
p c
en
tric
D
evic
e ce
ntr
ic
BYOD
Five Pillars of Our Solution
Company credentials extended to both public and private
cloud services
User & App Access Mgmt.
Corporate data separation and delivery of IT
services
App & Data Protection
Configuration, control and
management of mobile devices
Device Management
Mobile security threat detection and
removal
Threat Protection
Enterprise-grade file sharing and
collaboration in the cloud
Secure File Sharing
Consolidating Access, Management & Security:
Solve Bigger Jobs
Enabling Productivity Through Apps
Separating Personal and Corporate Data
App & Data Protection
Quickly enable group based mobile app and content
delivery
ENABLE SECURE MANAGE
Policy management
for data protection and
compliance
Lifecycle management with updates
and revocation
app
App & Data Protection App Protection Without Source Code Changes
How Does It work?
Apps and content are wrapped and secured in a
policy controlled container. Authentication, encryption
and other policies are enabled with Symantec App
Center. No source code modifications are required.
.IPA or .APK file with standard libraries
App wrapped with Symantec Libraries and policy controls
ready for deployment
App & Data Protection Introducing Symantec Secure Email
App & Data Protection App Ecosystem – Apps with built-in Symantec security technology
Availability: 2H CY2013
http://go.symantec.com/SSP
Content / Document Mgmt
Accellion
Alfresco
Asdeqlabs Asdeqdocs
BigTinCan Hub
Citrix ShareFile
Framehawk
Luminix Pulsar
Content / Document Mgmt
WatchDox
Webalo
Office Productivity Apps
Symantec Secure Email
Branchfire iAnnotate
Byte2 Office2 HD
GoodiWare GoodReader
Ikonic Mail
Infraware Polaris Office
Industry Specific
Basis Design Barcode Essentials
Browsing & Messaging
Damaka Xavy
Gryphn Secure Messaging
Mobotap Dolphin Browser
• Extends App Center policy to third-party commercial apps
• Delivery through vendor app stores
Remote Management
Splashtop
Ericom
Key Takeaways
Mobility: The question is……
If Why When
How
Mobility is more than apps & devices
BYOD MDM
BUILD STRATEGY 1ST
Step back and create a bigger strategy
BE DEVICE INDEPENDANT
Don´t forget Training & Support
Want to know more?
• Visit our booth (#9)
• Visit our website(s):
• http://go.symantec.com/mobile
• http://go.symantec.com/mobile-solutions
• http://www.symantec.com/nl/nl/page.jsp?id
=mobile_solutions
• Contact us at
• 030-8080100
Thank you!
Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Peter van Leeuwen
[email protected] @P_vanLeeuwen