sybase confidential propriety.ianywhere confidentialianywhere confidential proprietary.sybase...
TRANSCRIPT
Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.
Addressing the Challenges of Device and Data Security for the Mobile Enterprise
Tim CarterSales [email protected]
iAnywhere Confidential
Agenda
Security Needs of Mobile TechnologyEnterprise Mobile Security RequirementsAddressing Mobile Security with AfariaOur "Top 10 Tips" for Making Your Mobile Solution Successful and SecureSummary
Security Needs of Mobile Technology
Understanding the risk How sensitive is the data?
What’s the impact if data falls into the wrong hands?
Performing risk analyses Security of all data is not the same
Usage and Security Policies Equip your users to understand the risks
Security Needs of Mobile Technology
How much security is necessary? One size does not fit all
Appropriate to users and their applications
Why mobile presents significant challenges Users are outside the firewall
Devices are portable and easily lost
Enterprise Requirements forMobile Security
3. Access to data stored on the device or on storage cards
2. Data transmitted over the network
1. Protection of data in central systems
4. Protection of data on devices lost or stolen
Four Key Areas
Enterprise Requirements forMobile Security
Power-on password policies, data on device encryption, virus protection, data backup
Several encryption methods including 128-bit SSL support, Firewall traversal
User authentication and assignments of channels to groups, Admin security
Remote wipe of data on lost/stolen devices,data restore,device re-provisioning
Central control of security policiesRelieve the security burden from the userMinimal user impact
Frontline Management
Security and Management Are Converging
User authentication (password) Data-on-device encryption Device authentication (certificates) Lost or stolen device protection Anti-virus updates Patch Management Backup and Restore Device (Re)Provisioning
Security vs. Usability
Different settings for different user populations Policy Management Central control, deployment and maintenance of policies
Security Usability
Long alphanumeric passwordsLimited password attempts
Triple DES EncryptionDevice lockdown
Anti-Virus ProtectionPatch Management
Data Backup/Restore
Alphanumeric passwordsMore password attempts
AES EncryptionDevice lockdown
Anti-Virus ProtectionData Backup/Restore
PIN number passwordsDevice lockdown
Anti-Virus ProtectionPatch Management
Data Backup/Restore
Management and Security have Common Requirements
Scalability Policy Management Central Control Visibility Remove User Burden Logging, reporting and auditing
Afaria Security Management in Action
My Top 10 Tips for Making Your Mobility Project Successful and Secure
Focus on the right projectsEngage your users earlyUnderstand the technology differencesMake it easy for your users to adopt (focus on
usability)Ensure there is clear visibility from headquarters
My Top 10 Tips for Making Your Mobility Project Successful and Secure
Determine and communicate usage policies to your users (consider tech and non-tech issues)
Use security software and infrastructure to implement your policies directly from HQ
Allow your top performers to continue to be top performers
Analyse the ROI six months after the project has been bedded in
Use a management and security framework capable of supporting mobile projects
Summary
Management and Security together allow enterprises to scale their investments in mobile technology
Management and security are converging rapidly
iAnywhere leads the market in delivering management, security and all the other elements necessary to allow enterprises to extend business applications to their front lines
Sybase Confidential Propriety. iAnywhere ConfidentialiAnywhere Confidential Proprietary. Sybase Confidential Propriety.
Addressing the Challenges of Device and Data Security for the Mobile Enterprise
Tim CarterSales [email protected]
iAnywhere Confidential