12
Security in the Age of a Mobile Workforce and Mobile Devices Kevin Brownstein, McAfee Corey Cush, NYC Health & Hospitals Corp Scott Carlson, Apollo Group Kevin Slate, Physiotherapy Associates Egon Rinderer, NJVC October 19, 2011

McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

Embed Size (px)

DESCRIPTION

Learn the latest trends and protections for the mobile workforce, including managing multiple devices. Security risks rise with the addition of more and more devices both in the traditional office and in the teleworking and mobile workforce. Join the interactive discussion on best practices for proactively managing devices across all levels of your agency. Apollo Group, New York City Health and Hospitals, NJVC, and Physiotherapy Associates: Security in the Age of a Mobile Workforce and Mobile Devices Scott Carlson, Principal Security Engineer, Apollo Group Kevin Brownstein, Manager – Systems Engineers, McAfee, Inc. Egon Rinderer, Chief of Cyber Security, NJVC, Inc., NGA Corey Cush, Assistant Vice President – Infrastructure Services, NYC Health & Hospitals Corp Kevin Slate, Vice President – Information Technology, Physiotherapy Associates

Citation preview

Page 1: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

Security in the Age of a Mobile Workforce

and Mobile Devices

Kevin Brownstein, McAfee

Corey Cush, NYC Health & Hospitals Corp

Scott Carlson, Apollo Group

Kevin Slate, Physiotherapy Associates

Egon Rinderer, NJVC

October 19, 2011

Page 2: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

Computing Cycles in Perspective (from Morgan Stanley)

De

vic

es/U

se

rs (

MM

in

Lo

g S

ca

le)

1,000,000

100,000

10,000

1,000

100

10

1

1960 1980 2000 2020

Mobile

Internet

Desktop

Internet

PC

Minicomputer

Mainframe

10B+

Units??

1B+ Units/

Users

100M

Units

10M Units

1M Units

The information in this presentation is provided only for educational

purposes and for the convenience of McAfee customers. The information

contained herein is subject to change without notice, and is provided “AS

IS” without guarantee or warranty as to the accuracy or applicability of the

information to any specific situation or circumstance.

Since FOCUS 2010:

Hypergrowth in Mobile Devices

October 19, 2011 2

The desktop internet ramp was just a warm-up act for what

we’re seeing happen on the mobile internet. The pace of

mobile innovation is “unprecedented, I think, in world

history.

Mary Meeker, Kleiner Perkins Caufield & Byers ”

Page 3: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

Progress with Enterprise Security and Compliance:

Evolution to Mobile

• Enterprise IT organizations have made significant

progress, past ~6+ years

– Optimized IT security operations

– Increasing compliance efficiencies

• Mobile/consumerization, 2 years (iPhone)

• Accelerated past year (iPad, Android…)

• Now Mobile… we need “6+ years of management,

security, compliance” – in 6 months!

October 19, 2011 3

Page 4: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

You already

built one security

infrastructure…

Bring Mobile Devices IN

October 19, 2011 4

Page 5: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

DMZ

EMM EMM

McAfee® Mobile Security Integration

First Step: ePolicy Orchestrator® Platform

Bring mobile devices into the security management framework for centralized visibility and control.

Set policies for all endpoints alike, and report on them all centrally to understand and manage your

compliance status and risk profile at any given time.

Enterprise Mobility and Security Management

P

McAfee ePolicy Orchestrator Platform

October 19, 2011 5

Page 6: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

McAfee’s Mobile Security Integration Direction

Next: McAfee® VirusScan® Mobile Software

Anti-Malware Data Leakage Prevention Application Security

Protect mobile devices and networks against viruses, spyware, botnets, and even Advanced Persistent

Threats. Roll out anti-malware solution and DAT updates to devices and other endpoints alike centrally

and in a policy-based way. Prove compliance with corporate and regulatory policy.

Enterprise Mobility and Anti-Malware

DMZ

EMM EMM

October 19, 2011 6

Page 7: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

McAfee’s Mobile Security Integration Direction

Next: Secure Container and DLP

Anti-Malware Application Security Data Leakage Prevention Anti-Malware

Safeguard leakage of your corporate data with a secure container, at the host or mobile device, and

at the network level. Start with a secure container to prevent data leakage from email, and ultimately

extend granular data leakage prevention policies to mobile devices as you do other endpoints.

Enterprise Mobility and Data Leakage Prevention

DMZ

EMM EMM

October 19, 2011 7

Page 8: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

McAfee’s Mobile Security Integration Direction

Next: Secure Applications

Anti-Malware Data Leakage Prevention Application Security

Start by scanning and certifying mobile applications for vulnerabilities or malware, monitoring their

behavior and developing reputations for them, and providing secure access to them via network

access control.

Enterprise Mobility and the Application Security Lifecycle

Scan

Certify

Monitor Aggregate

Provide Secure Access

October 19, 2011 8

Page 9: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

McAfee’s Mobile Security Delivery Direction

Today: On Prem Software; Next: SaaS

Deploy secure enterprise mobility as an on-premise software or cloud-based software-as-a-service

solution.

Delivering Secure Enterprise Mobility in Multiple Ways

On Prem Software or SaaS Options

DMZ

EMM EMM

EMM

October 19, 2011 9

Page 10: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

Public Sector Mobility Proof of Concept

October 19, 2011 10

Page 11: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

Bringing all

endpoints into

compliance. Status

is critical to

assessing risk and

prioritizing actions

On-Premise Security Management through ePolicy

Orchestrator Platform

Compliance Across All Enterprise Endpoints

Page 12: McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices

McAfee ,the McAfee logo and ePolicy Orchestrator are trademarks or registered trademarks of

McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and

brands may be claimed as the property of others. Copyright © 2011 McAfee, Inc.