sybase confidential propriety.ianywhere confidentialianywhere confidential proprietary.sybase...

Post on 15-Jan-2016

229 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.

Addressing the Challenges of Device and Data Security for the Mobile Enterprise

Tim CarterSales Directortim.carter@ianywhere.com

iAnywhere Confidential

Agenda

Security Needs of Mobile TechnologyEnterprise Mobile Security RequirementsAddressing Mobile Security with AfariaOur "Top 10 Tips" for Making Your Mobile Solution Successful and SecureSummary

Security Needs of Mobile Technology

Understanding the risk How sensitive is the data?

What’s the impact if data falls into the wrong hands?

Performing risk analyses Security of all data is not the same

Usage and Security Policies Equip your users to understand the risks

Security Needs of Mobile Technology

How much security is necessary? One size does not fit all

Appropriate to users and their applications

Why mobile presents significant challenges Users are outside the firewall

Devices are portable and easily lost

Enterprise Requirements forMobile Security

3. Access to data stored on the device or on storage cards

2. Data transmitted over the network

1. Protection of data in central systems

4. Protection of data on devices lost or stolen

Four Key Areas

Enterprise Requirements forMobile Security

Power-on password policies, data on device encryption, virus protection, data backup

Several encryption methods including 128-bit SSL support, Firewall traversal

User authentication and assignments of channels to groups, Admin security

Remote wipe of data on lost/stolen devices,data restore,device re-provisioning

Central control of security policiesRelieve the security burden from the userMinimal user impact

Frontline Management

Security and Management Are Converging

User authentication (password) Data-on-device encryption Device authentication (certificates) Lost or stolen device protection Anti-virus updates Patch Management Backup and Restore Device (Re)Provisioning

Security vs. Usability

Different settings for different user populations Policy Management Central control, deployment and maintenance of policies

Security Usability

Long alphanumeric passwordsLimited password attempts

Triple DES EncryptionDevice lockdown

Anti-Virus ProtectionPatch Management

Data Backup/Restore

Alphanumeric passwordsMore password attempts

AES EncryptionDevice lockdown

Anti-Virus ProtectionData Backup/Restore

PIN number passwordsDevice lockdown

Anti-Virus ProtectionPatch Management

Data Backup/Restore

Management and Security have Common Requirements

Scalability Policy Management Central Control Visibility Remove User Burden Logging, reporting and auditing

Afaria Security Management in Action

My Top 10 Tips for Making Your Mobility Project Successful and Secure

Focus on the right projectsEngage your users earlyUnderstand the technology differencesMake it easy for your users to adopt (focus on

usability)Ensure there is clear visibility from headquarters

My Top 10 Tips for Making Your Mobility Project Successful and Secure

Determine and communicate usage policies to your users (consider tech and non-tech issues)

Use security software and infrastructure to implement your policies directly from HQ

Allow your top performers to continue to be top performers

Analyse the ROI six months after the project has been bedded in

Use a management and security framework capable of supporting mobile projects

Summary

Management and Security together allow enterprises to scale their investments in mobile technology

Management and security are converging rapidly

iAnywhere leads the market in delivering management, security and all the other elements necessary to allow enterprises to extend business applications to their front lines

Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.

Addressing the Challenges of Device and Data Security for the Mobile Enterprise

Tim CarterSales Directortim.carter@ianywhere.com

iAnywhere Confidential

top related