sybase confidential propriety.ianywhere confidentialianywhere confidential proprietary.sybase...

15
Sybase Confidential Propriety. iAnywhere Confidential iAnywhere Confidential Proprietary. Sybase Confidential Propriety. Addressing the Challenges of Device and Data Security for the Mobile Enterprise Tim Carter Sales Director [email protected] iAnywhere Confidential

Upload: randell-shepherd

Post on 15-Jan-2016

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.

Addressing the Challenges of Device and Data Security for the Mobile Enterprise

Tim CarterSales [email protected]

iAnywhere Confidential

Page 2: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Agenda

Security Needs of Mobile TechnologyEnterprise Mobile Security RequirementsAddressing Mobile Security with AfariaOur "Top 10 Tips" for Making Your Mobile Solution Successful and SecureSummary

Page 3: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Security Needs of Mobile Technology

Understanding the risk How sensitive is the data?

What’s the impact if data falls into the wrong hands?

Performing risk analyses Security of all data is not the same

Usage and Security Policies Equip your users to understand the risks

Page 4: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Security Needs of Mobile Technology

How much security is necessary? One size does not fit all

Appropriate to users and their applications

Why mobile presents significant challenges Users are outside the firewall

Devices are portable and easily lost

Page 5: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Enterprise Requirements forMobile Security

3. Access to data stored on the device or on storage cards

2. Data transmitted over the network

1. Protection of data in central systems

4. Protection of data on devices lost or stolen

Four Key Areas

Page 6: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Enterprise Requirements forMobile Security

Power-on password policies, data on device encryption, virus protection, data backup

Several encryption methods including 128-bit SSL support, Firewall traversal

User authentication and assignments of channels to groups, Admin security

Remote wipe of data on lost/stolen devices,data restore,device re-provisioning

Central control of security policiesRelieve the security burden from the userMinimal user impact

Page 7: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Frontline Management

Page 8: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Security and Management Are Converging

User authentication (password) Data-on-device encryption Device authentication (certificates) Lost or stolen device protection Anti-virus updates Patch Management Backup and Restore Device (Re)Provisioning

Page 9: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Security vs. Usability

Different settings for different user populations Policy Management Central control, deployment and maintenance of policies

Security Usability

Long alphanumeric passwordsLimited password attempts

Triple DES EncryptionDevice lockdown

Anti-Virus ProtectionPatch Management

Data Backup/Restore

Alphanumeric passwordsMore password attempts

AES EncryptionDevice lockdown

Anti-Virus ProtectionData Backup/Restore

PIN number passwordsDevice lockdown

Anti-Virus ProtectionPatch Management

Data Backup/Restore

Page 10: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Management and Security have Common Requirements

Scalability Policy Management Central Control Visibility Remove User Burden Logging, reporting and auditing

Page 11: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Afaria Security Management in Action

Page 12: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

My Top 10 Tips for Making Your Mobility Project Successful and Secure

Focus on the right projectsEngage your users earlyUnderstand the technology differencesMake it easy for your users to adopt (focus on

usability)Ensure there is clear visibility from headquarters

Page 13: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

My Top 10 Tips for Making Your Mobility Project Successful and Secure

Determine and communicate usage policies to your users (consider tech and non-tech issues)

Use security software and infrastructure to implement your policies directly from HQ

Allow your top performers to continue to be top performers

Analyse the ROI six months after the project has been bedded in

Use a management and security framework capable of supporting mobile projects

Page 14: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Summary

Management and Security together allow enterprises to scale their investments in mobile technology

Management and security are converging rapidly

iAnywhere leads the market in delivering management, security and all the other elements necessary to allow enterprises to extend business applications to their front lines

Page 15: Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device

Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.

Addressing the Challenges of Device and Data Security for the Mobile Enterprise

Tim CarterSales [email protected]

iAnywhere Confidential