mca 2013 - symantec - peter van leeuwen
DESCRIPTION
TRANSCRIPT
![Page 1: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/1.jpg)
Enterprise Mobility Driving Productivity Without Sacrificing Protection
Peter van Leeuwen Principal Systems Engineer, Endpoint Management & Mobility
![Page 2: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/2.jpg)
Founded in 1982
IPO in 1989
Approximately 20,500 Employees
Operations in 50 Countries
#379 on the 2013 Fortune 500
100 Percent of Fortune 500 Companies are Customers
$6.9 Billion Revenue in FY2013; Approximately 52% Outside of the U.S.
More Than 1,500 Global Patents
Included on Fortune’s Most Admired Companies List
Invests 14% of Annual Revenue in R&D*
* R&D Investments is Non-GAAP
We Protect Information and
Identities Independent of
Platform: Physical, Mobile,
Virtual, Cloud
in Office and Shop Floor IT
![Page 3: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/3.jpg)
Evolving Challenges
![Page 4: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/4.jpg)
Evolving Challenges
![Page 5: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/5.jpg)
Evolving Challenges
![Page 6: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/6.jpg)
Evolving Challenges
![Page 7: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/7.jpg)
BYOD Perception
Benefits Hardware procurement
savings
Contract plan savings
Increased worker productivity
Employee satisfaction
Competitive advantage
Risks Information security
Legal
![Page 8: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/8.jpg)
Benefits Hardware procurement
savings
Contract plan savings
Increased worker productivity
Employee satisfaction
Competitive advantage
Risks Information security
Legal
Reality
![Page 9: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/9.jpg)
BYOD: Is all a Myth, Hype or …..
• By the end of last year Intel
– had 23,500 mobile devices in it´s BYOD program (+ 38%)
– supported 41 mobile applications
– added 16 approved applications that could be used as part of its BYOD program in 2012 (+ 64%)
• Employees report they are saving an average of 57 minutes daily
• This savings equates to an annual productivity gain of about 5 million hours from BYOD in 2012 alone
Intel´s BYOD Program
Source: Intel IT Performance Report 2012-2013
![Page 10: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/10.jpg)
Productivity Without Compromise Mission: “Any device, Anywhere, Any time!!!”
Manage Devices Dynamically
Secure App Community
Secure Data at Rest and in Transit
Enable Users
![Page 11: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/11.jpg)
Selecting the Right Solution for the Enterprise Understanding various use cases
Company-owned Personally-owned
Man
age
d
Un
man
age
d
Company Controls Personal Device
Company Controls Relevant Apps and Data Only
Company Controls Standard Device
Company Owned But Unmanaged
Company owned, but unmanaged
Company controls personal device Company controls standard device
Company controls relevant apps and data only
Ap
p c
en
tric
D
evic
e ce
ntr
ic
BYOD
![Page 12: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/12.jpg)
Five Pillars of Our Solution
Company credentials extended to both public and private
cloud services
User & App Access Mgmt.
Corporate data separation and delivery of IT
services
App & Data Protection
Configuration, control and
management of mobile devices
Device Management
Mobile security threat detection and
removal
Threat Protection
Enterprise-grade file sharing and
collaboration in the cloud
Secure File Sharing
Consolidating Access, Management & Security:
Solve Bigger Jobs
Enabling Productivity Through Apps
Separating Personal and Corporate Data
![Page 13: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/13.jpg)
App & Data Protection
Quickly enable group based mobile app and content
delivery
ENABLE SECURE MANAGE
Policy management
for data protection and
compliance
Lifecycle management with updates
and revocation
app
![Page 14: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/14.jpg)
App & Data Protection App Protection Without Source Code Changes
How Does It work?
Apps and content are wrapped and secured in a
policy controlled container. Authentication, encryption
and other policies are enabled with Symantec App
Center. No source code modifications are required.
.IPA or .APK file with standard libraries
App wrapped with Symantec Libraries and policy controls
ready for deployment
![Page 15: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/15.jpg)
App & Data Protection Introducing Symantec Secure Email
![Page 16: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/16.jpg)
App & Data Protection App Ecosystem – Apps with built-in Symantec security technology
Availability: 2H CY2013
http://go.symantec.com/SSP
Content / Document Mgmt
Accellion
Alfresco
Asdeqlabs Asdeqdocs
BigTinCan Hub
Citrix ShareFile
Framehawk
Luminix Pulsar
Content / Document Mgmt
WatchDox
Webalo
Office Productivity Apps
Symantec Secure Email
Branchfire iAnnotate
Byte2 Office2 HD
GoodiWare GoodReader
Ikonic Mail
Infraware Polaris Office
Industry Specific
Basis Design Barcode Essentials
Browsing & Messaging
Damaka Xavy
Gryphn Secure Messaging
Mobotap Dolphin Browser
• Extends App Center policy to third-party commercial apps
• Delivery through vendor app stores
Remote Management
Splashtop
Ericom
![Page 17: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/17.jpg)
Key Takeaways
![Page 18: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/18.jpg)
Mobility: The question is……
If Why When
How
![Page 19: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/19.jpg)
Mobility is more than apps & devices
![Page 20: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/20.jpg)
BYOD MDM
![Page 21: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/21.jpg)
BUILD STRATEGY 1ST
![Page 22: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/22.jpg)
Step back and create a bigger strategy
![Page 23: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/23.jpg)
BE DEVICE INDEPENDANT
![Page 24: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/24.jpg)
Don´t forget Training & Support
![Page 25: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/25.jpg)
Want to know more?
• Visit our booth (#9)
• Visit our website(s):
• http://go.symantec.com/mobile
• http://go.symantec.com/mobile-solutions
• http://www.symantec.com/nl/nl/page.jsp?id
=mobile_solutions
• Contact us at
• 030-8080100
![Page 26: MCA 2013 - Symantec - Peter van Leeuwen](https://reader034.vdocuments.site/reader034/viewer/2022051312/546c3209af795958298b4feb/html5/thumbnails/26.jpg)
Thank you!
Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Peter van Leeuwen
[email protected] @P_vanLeeuwen