Upload
scott-carlson
View
436
Download
1
Embed Size (px)
DESCRIPTION
Learn the latest trends and protections for the mobile workforce, including managing multiple devices. Security risks rise with the addition of more and more devices both in the traditional office and in the teleworking and mobile workforce. Join the interactive discussion on best practices for proactively managing devices across all levels of your agency. Apollo Group, New York City Health and Hospitals, NJVC, and Physiotherapy Associates: Security in the Age of a Mobile Workforce and Mobile Devices Scott Carlson, Principal Security Engineer, Apollo Group Kevin Brownstein, Manager – Systems Engineers, McAfee, Inc. Egon Rinderer, Chief of Cyber Security, NJVC, Inc., NGA Corey Cush, Assistant Vice President – Infrastructure Services, NYC Health & Hospitals Corp Kevin Slate, Vice President – Information Technology, Physiotherapy Associates
Citation preview
Security in the Age of a Mobile Workforce
and Mobile Devices
Kevin Brownstein, McAfee
Corey Cush, NYC Health & Hospitals Corp
Scott Carlson, Apollo Group
Kevin Slate, Physiotherapy Associates
Egon Rinderer, NJVC
October 19, 2011
Computing Cycles in Perspective (from Morgan Stanley)
De
vic
es/U
se
rs (
MM
in
Lo
g S
ca
le)
1,000,000
100,000
10,000
1,000
100
10
1
1960 1980 2000 2020
Mobile
Internet
Desktop
Internet
PC
Minicomputer
Mainframe
10B+
Units??
1B+ Units/
Users
100M
Units
10M Units
1M Units
The information in this presentation is provided only for educational
purposes and for the convenience of McAfee customers. The information
contained herein is subject to change without notice, and is provided “AS
IS” without guarantee or warranty as to the accuracy or applicability of the
information to any specific situation or circumstance.
Since FOCUS 2010:
Hypergrowth in Mobile Devices
October 19, 2011 2
“
The desktop internet ramp was just a warm-up act for what
we’re seeing happen on the mobile internet. The pace of
mobile innovation is “unprecedented, I think, in world
history.
Mary Meeker, Kleiner Perkins Caufield & Byers ”
Progress with Enterprise Security and Compliance:
Evolution to Mobile
• Enterprise IT organizations have made significant
progress, past ~6+ years
– Optimized IT security operations
– Increasing compliance efficiencies
• Mobile/consumerization, 2 years (iPhone)
• Accelerated past year (iPad, Android…)
• Now Mobile… we need “6+ years of management,
security, compliance” – in 6 months!
October 19, 2011 3
You already
built one security
infrastructure…
Bring Mobile Devices IN
October 19, 2011 4
DMZ
EMM EMM
McAfee® Mobile Security Integration
First Step: ePolicy Orchestrator® Platform
Bring mobile devices into the security management framework for centralized visibility and control.
Set policies for all endpoints alike, and report on them all centrally to understand and manage your
compliance status and risk profile at any given time.
Enterprise Mobility and Security Management
P
McAfee ePolicy Orchestrator Platform
October 19, 2011 5
McAfee’s Mobile Security Integration Direction
Next: McAfee® VirusScan® Mobile Software
Anti-Malware Data Leakage Prevention Application Security
Protect mobile devices and networks against viruses, spyware, botnets, and even Advanced Persistent
Threats. Roll out anti-malware solution and DAT updates to devices and other endpoints alike centrally
and in a policy-based way. Prove compliance with corporate and regulatory policy.
Enterprise Mobility and Anti-Malware
DMZ
EMM EMM
October 19, 2011 6
McAfee’s Mobile Security Integration Direction
Next: Secure Container and DLP
Anti-Malware Application Security Data Leakage Prevention Anti-Malware
Safeguard leakage of your corporate data with a secure container, at the host or mobile device, and
at the network level. Start with a secure container to prevent data leakage from email, and ultimately
extend granular data leakage prevention policies to mobile devices as you do other endpoints.
Enterprise Mobility and Data Leakage Prevention
DMZ
EMM EMM
October 19, 2011 7
McAfee’s Mobile Security Integration Direction
Next: Secure Applications
Anti-Malware Data Leakage Prevention Application Security
Start by scanning and certifying mobile applications for vulnerabilities or malware, monitoring their
behavior and developing reputations for them, and providing secure access to them via network
access control.
Enterprise Mobility and the Application Security Lifecycle
Scan
Certify
Monitor Aggregate
Provide Secure Access
October 19, 2011 8
McAfee’s Mobile Security Delivery Direction
Today: On Prem Software; Next: SaaS
Deploy secure enterprise mobility as an on-premise software or cloud-based software-as-a-service
solution.
Delivering Secure Enterprise Mobility in Multiple Ways
On Prem Software or SaaS Options
DMZ
EMM EMM
EMM
October 19, 2011 9
Public Sector Mobility Proof of Concept
October 19, 2011 10
Bringing all
endpoints into
compliance. Status
is critical to
assessing risk and
prioritizing actions
On-Premise Security Management through ePolicy
Orchestrator Platform
Compliance Across All Enterprise Endpoints
McAfee ,the McAfee logo and ePolicy Orchestrator are trademarks or registered trademarks of
McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and
brands may be claimed as the property of others. Copyright © 2011 McAfee, Inc.