Transcript Document
Strategic Approach to Mobile Security & BYOD Enablement
Embrace Mobility.
Without Compromise.
The apps they need. On the devices they want. Without sacrificing compliance.
The Good Old Days of Mobility…
Fully integrated security, encryption and policy stacks Business Email, Calendar and Contacts only on BlackBerry IT command-and-control, no personal apps allowed Predictable and controlled
Today’s Mobility Environment
New Enterprise Mobility Challenge End User IT Organization
“Give me the apps and data I need on the devices I want. Without restricting my personal use.”
Business
“How do we protect our assets if we can’t trust or control the device?
How do we manage compliance?” “We need productive employees and maximum returns on mobility without sacrificing security and compliance!”
Enterprise Mobility Challenge
Embracing the Next Wave of Mobility
What Makes BYOD a Unique Challenge for Enterprise IT?
Consumer grade OS’s susceptible to rooting and malware Devices in an unknown and unverified starting state Unencrypted corporate data mixed with personal Unverified 3 rd party apps with access to open APIs Restrictions on strong device-level policies and wiping Accidental data leakage through end-user actions
Heightened risk of corporate data leakage and cyber attacks
6
What Makes BYOD a Unique Challenge for Enterprise IT?
React & Restrict Approach
We’ll allow BYOD by imposing greater restrictions on what employees can do if they “bring devices to work”.
Embrace & Extend Approach
We’ll embrace BYOD by securely “bringing work to devices” (BWTD!) without restricting personal use or access to key business applications.
Evolution of EMM (MDM) Technology to Address Challenges Mobile Apps & Private Data
Mobile App Management Encryption & “Containerization” of Corporate Apps & Data
Mobile Devices
Mobile Device Management (MDM)
Provisioning & Management
Integrity Verification Compliance OS Hardening
Security & Compliance
Secure Containerization
Key Considerations and Approaches
Secure Containerization
Key Considerations and Approaches
Secure Containerization
Key Considerations and Approaches
Fixmo Mobile Security
Embrace Mobility Without Compromise
Enable trusted and protected mobile computing in the age of consumerization and hyper connectivity.
Products that help IT organizations in public and private sector proactively: Contain and protect their private data and assets on increasingly personal devices Detect & prevent anomalies and attacks Monitor and maintain system integrity Maintain & prove compliance
Fixmo Enterprise Mobility Platform
Modular Platform for Security and Compliance
Mobile Apps & Private Data [MAM] [Secure Containerization] Mobile Devices [MDM] Provisioning & Management [Integrity] Security & Compliance
13
Fixmo SafeZone
Secure Workspace and App Containerization
Secure workspace and containerization solution that keeps ALL business data and apps
encrypted, contained and under IT control independent of the device or who owns it Full suite of secure business productivity apps pre-built to run inside the secure workspace including Email/PIM, Browser, Documents, PDF Annotation, Camera, SharePoint High assurance security and DLP for iOS and Android – no matter who owns the device
Does your company need to consider a “Beyond MDM” mobility strategy?
1. What are the requirements and expectations of your employees for how they will use mobile devices?
2. Do you want to allow Email? Intranet Browsing? Document access? SharePoint access? Custom business apps?
3. Do you need to be able to wipe all business data (email, apps, documents, etc.) without wiping the entire device?
4. Do you have regulatory compliance requirements related to DLP and encryption of data-at-rest / in-transit?
5. To what degree will your company be embracing BYOD policies within the next 12 months?
Mobility Without Compromise
Thank You!
Michael Dennehy, Fixmo [email protected]
www.fixmo.com
16