Transcript Document

Strategic Approach to Mobile Security & BYOD Enablement

Embrace Mobility.

Without Compromise.

The apps they need. On the devices they want. Without sacrificing compliance.

The Good Old Days of Mobility…

 Fully integrated security, encryption and policy stacks  Business Email, Calendar and Contacts only on BlackBerry  IT command-and-control, no personal apps allowed  Predictable and controlled

Today’s Mobility Environment

New Enterprise Mobility Challenge End User IT Organization

“Give me the apps and data I need on the devices I want. Without restricting my personal use.”

Business

“How do we protect our assets if we can’t trust or control the device?

How do we manage compliance?” “We need productive employees and maximum returns on mobility without sacrificing security and compliance!”

Enterprise Mobility Challenge

Embracing the Next Wave of Mobility

What Makes BYOD a Unique Challenge for Enterprise IT?

Consumer grade OS’s susceptible to rooting and malware Devices in an unknown and unverified starting state Unencrypted corporate data mixed with personal Unverified 3 rd party apps with access to open APIs Restrictions on strong device-level policies and wiping Accidental data leakage through end-user actions

Heightened risk of corporate data leakage and cyber attacks

6

What Makes BYOD a Unique Challenge for Enterprise IT?

React & Restrict Approach

We’ll allow BYOD by imposing greater restrictions on what employees can do if they “bring devices to work”.

Embrace & Extend Approach

We’ll embrace BYOD by securely “bringing work to devices” (BWTD!) without restricting personal use or access to key business applications.

Evolution of EMM (MDM) Technology to Address Challenges Mobile Apps & Private Data

Mobile App Management Encryption & “Containerization” of Corporate Apps & Data

Mobile Devices

Mobile Device Management (MDM)

Provisioning & Management

Integrity Verification Compliance OS Hardening

Security & Compliance

Secure Containerization

Key Considerations and Approaches

Secure Containerization

Key Considerations and Approaches

Secure Containerization

Key Considerations and Approaches

Fixmo Mobile Security

Embrace Mobility Without Compromise

Enable trusted and protected mobile computing in the age of consumerization and hyper connectivity.

Products that help IT organizations in public and private sector proactively:  Contain and protect their private data and assets on increasingly personal devices  Detect & prevent anomalies and attacks   Monitor and maintain system integrity Maintain & prove compliance

Fixmo Enterprise Mobility Platform

Modular Platform for Security and Compliance

Mobile Apps & Private Data [MAM] [Secure Containerization] Mobile Devices [MDM] Provisioning & Management [Integrity] Security & Compliance

13

Fixmo SafeZone

Secure Workspace and App Containerization

Secure workspace and containerization solution that keeps ALL business data and apps

encrypted, contained and under IT control independent of the device or who owns it  Full suite of secure business productivity apps pre-built to run inside the secure workspace including Email/PIM, Browser, Documents, PDF Annotation, Camera, SharePoint  High assurance security and DLP for iOS and Android – no matter who owns the device

Does your company need to consider a “Beyond MDM” mobility strategy?

1. What are the requirements and expectations of your employees for how they will use mobile devices?

2. Do you want to allow Email? Intranet Browsing? Document access? SharePoint access? Custom business apps?

3. Do you need to be able to wipe all business data (email, apps, documents, etc.) without wiping the entire device?

4. Do you have regulatory compliance requirements related to DLP and encryption of data-at-rest / in-transit?

5. To what degree will your company be embracing BYOD policies within the next 12 months?

Mobility Without Compromise

Thank You!

Michael Dennehy, Fixmo [email protected]

www.fixmo.com

16