SlideShare uma empresa Scribd logo
1 de 18
Mobile Device Security The next challenge Jan Guldentops (  [email_address]  ) BA N.V. (  http://www.ba.be  )
About BA More information
I nformation  I ntegration i
Our Commitment Ask our partners
Our Commitment Ask our clients Public Sector/Government Non-profit Enterprise Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw) Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo,  Securex Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR
Information Integration BA’s infrastructure for: Digitisation Security Mobility Virtualisation Data Storage  and Warehousing Data Protection and Integrity Digital  Preservation and Archiving Data Access and Portability
Traditional Security-model is gone forever There is no perimeter anymore... Users are accessing data/app(lication)s From everywhere From all kinds of devices
There are no sure bets in the mobile device market King today, beggar tomorrow (e.g. RIM, Nokia) What will happen to Apple now Steve is dead ? Will Nokia rise from the grave by selling its soul to the devil ?
End-user rules... ICT/security has to follow not lead End-user decides which (cloud) apps/device he or she is going to use Wants to have that sexy device that fiits his personality...
BYOD Bring your own device  Let users buy their own phone, tablet or laptop Make IT support it
Most secure devices 1. Blackberry  2. iOS 3. Symbian 4. Android  5. Windows Phone
Armsrace The security feature list is continuously evolving version by version. IOS5 and Android 4 look very promising Windows Phone is too early days Security should be in the device OS itself and not added by extra software
Mobile security = big business All antivirus vendors have a mobile solution Kaspersky (not for Ios), Gdata & Symantec (only android), etc. Lots of mobile device management platforms out there  Mobile Iron, Zenprise, Good technologies, Kaspersky
Problems to fear / fix DATA LEAKAGE Encrypt / remote wipe Don't store confidential data on the device MALWARE Update your os Control the dev community / signing Walled gardens / sandboxes
Problems to fear / fix (2) STRONG AUTHENTICATION Password policies Better: certificates CONTROL Controll the apps/usage of your endusers BACKUPS
Conclusions The ghost is out of the bottle, no way back  Go for a crossplatform solution  Control what you can control BYOD will happen so prepare for it
Conclusions First you need a good policy What level of security do you want/have to accomplish? Riskanalysis – is this possible ? Plan for the worse Then find the tools to do it First tool is common sense (be smart) Look at the management solutions
Thank You Contact us 016/ 29.80.45 016/ 29.80.46 www.ba.be Vaartdijk 3/501  B-3018 Wijgmaal, Belgium [email_address] www.ba.be www.ba.be Twitter: JanGuldentops

Mais conteúdo relacionado

Mais procurados

бизнес планирование Wimax
бизнес планирование Wimaxбизнес планирование Wimax
бизнес планирование Wimax
sham_sr
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
Apperian
 

Mais procurados (19)

Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
What is a port?
What is a port? What is a port?
What is a port?
 
бизнес планирование Wimax
бизнес планирование Wimaxбизнес планирование Wimax
бизнес планирование Wimax
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust model
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHYFRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Pace IT - Secure Mobile Devices
Pace IT - Secure Mobile DevicesPace IT - Secure Mobile Devices
Pace IT - Secure Mobile Devices
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 

Destaque (7)

Testimonials
TestimonialsTestimonials
Testimonials
 
Mobile augmented virtual location reality"- ORBIT
Mobile augmented virtual location reality"- ORBIT Mobile augmented virtual location reality"- ORBIT
Mobile augmented virtual location reality"- ORBIT
 
Mark Daemen Corelio, Current status & strategy of newspaper company"
Mark Daemen Corelio, Current status & strategy of newspaper company"Mark Daemen Corelio, Current status & strategy of newspaper company"
Mark Daemen Corelio, Current status & strategy of newspaper company"
 
Uxperts mobi 2013 ux for android
Uxperts mobi 2013   ux for androidUxperts mobi 2013   ux for android
Uxperts mobi 2013 ux for android
 
Apps For Ghent
Apps For GhentApps For Ghent
Apps For Ghent
 
Lakewood WA, crime, July 2009 report
Lakewood WA, crime, July 2009 reportLakewood WA, crime, July 2009 report
Lakewood WA, crime, July 2009 report
 
Meeting with Investors of March 2015
Meeting with Investors of March 2015Meeting with Investors of March 2015
Meeting with Investors of March 2015
 

Semelhante a Mobilemonday b2b b-asecurity

Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 

Semelhante a Mobilemonday b2b b-asecurity (20)

Sophos
SophosSophos
Sophos
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Byod
ByodByod
Byod
 
Mobile security management
Mobile security managementMobile security management
Mobile security management
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 

Mais de Mobile Monday Brussels

Uxperts mobi 2013 Ux for the future @ EhB
Uxperts mobi 2013  Ux for the future @ EhBUxperts mobi 2013  Ux for the future @ EhB
Uxperts mobi 2013 Ux for the future @ EhB
Mobile Monday Brussels
 
Mobile gaming app promotion- mark brill
Mobile gaming   app promotion- mark brillMobile gaming   app promotion- mark brill
Mobile gaming app promotion- mark brill
Mobile Monday Brussels
 
Uxperts mobi 2013 how the f -_ do i start
Uxperts mobi 2013   how the f -_ do i startUxperts mobi 2013   how the f -_ do i start
Uxperts mobi 2013 how the f -_ do i start
Mobile Monday Brussels
 

Mais de Mobile Monday Brussels (20)

Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 Belgium
 
GARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile appsGARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile apps
 
Djump
DjumpDjump
Djump
 
Appsmarathon 2013
Appsmarathon 2013Appsmarathon 2013
Appsmarathon 2013
 
Uxperts mobi 2013 Ux for the future @ EhB
Uxperts mobi 2013  Ux for the future @ EhBUxperts mobi 2013  Ux for the future @ EhB
Uxperts mobi 2013 Ux for the future @ EhB
 
Uxperts mobi 2013 soa & challenges
Uxperts mobi 2013   soa & challengesUxperts mobi 2013   soa & challenges
Uxperts mobi 2013 soa & challenges
 
Mobile gaming app promotion- mark brill
Mobile gaming   app promotion- mark brillMobile gaming   app promotion- mark brill
Mobile gaming app promotion- mark brill
 
Uxperts mobi 2013 what about testing
Uxperts mobi 2013   what about testing Uxperts mobi 2013   what about testing
Uxperts mobi 2013 what about testing
 
Uxperts mobi 2013 introduction
Uxperts mobi 2013   introductionUxperts mobi 2013   introduction
Uxperts mobi 2013 introduction
 
Uxperts mobi 2013 ux for windows 8
Uxperts mobi 2013   ux for windows 8Uxperts mobi 2013   ux for windows 8
Uxperts mobi 2013 ux for windows 8
 
Uxperts mobi 2013 how the f -_ do i start
Uxperts mobi 2013   how the f -_ do i startUxperts mobi 2013   how the f -_ do i start
Uxperts mobi 2013 how the f -_ do i start
 
Uxperts mobi 2013 ux for i os
Uxperts mobi 2013   ux for i osUxperts mobi 2013   ux for i os
Uxperts mobi 2013 ux for i os
 
Apps4 geo geosolutions
Apps4 geo geosolutionsApps4 geo geosolutions
Apps4 geo geosolutions
 
Appsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeoAppsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeo
 
Momojan21012013
Momojan21012013Momojan21012013
Momojan21012013
 
Mv use of social media Dorien Aerts
Mv use of social media   Dorien AertsMv use of social media   Dorien Aerts
Mv use of social media Dorien Aerts
 
Mobilemonday Slovakia
Mobilemonday SlovakiaMobilemonday Slovakia
Mobilemonday Slovakia
 
Mobile monday intro to social media on mobile
Mobile monday intro to social media on mobileMobile monday intro to social media on mobile
Mobile monday intro to social media on mobile
 
Survey anyplace apps marathon
Survey anyplace apps marathonSurvey anyplace apps marathon
Survey anyplace apps marathon
 
Belgian mobile app developer profile
Belgian mobile app developer profileBelgian mobile app developer profile
Belgian mobile app developer profile
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Mobilemonday b2b b-asecurity

  • 1. Mobile Device Security The next challenge Jan Guldentops ( [email_address] ) BA N.V. ( http://www.ba.be )
  • 2. About BA More information
  • 3. I nformation I ntegration i
  • 4. Our Commitment Ask our partners
  • 5. Our Commitment Ask our clients Public Sector/Government Non-profit Enterprise Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw) Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo, Securex Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR
  • 6. Information Integration BA’s infrastructure for: Digitisation Security Mobility Virtualisation Data Storage and Warehousing Data Protection and Integrity Digital Preservation and Archiving Data Access and Portability
  • 7. Traditional Security-model is gone forever There is no perimeter anymore... Users are accessing data/app(lication)s From everywhere From all kinds of devices
  • 8. There are no sure bets in the mobile device market King today, beggar tomorrow (e.g. RIM, Nokia) What will happen to Apple now Steve is dead ? Will Nokia rise from the grave by selling its soul to the devil ?
  • 9. End-user rules... ICT/security has to follow not lead End-user decides which (cloud) apps/device he or she is going to use Wants to have that sexy device that fiits his personality...
  • 10. BYOD Bring your own device Let users buy their own phone, tablet or laptop Make IT support it
  • 11. Most secure devices 1. Blackberry 2. iOS 3. Symbian 4. Android 5. Windows Phone
  • 12. Armsrace The security feature list is continuously evolving version by version. IOS5 and Android 4 look very promising Windows Phone is too early days Security should be in the device OS itself and not added by extra software
  • 13. Mobile security = big business All antivirus vendors have a mobile solution Kaspersky (not for Ios), Gdata & Symantec (only android), etc. Lots of mobile device management platforms out there Mobile Iron, Zenprise, Good technologies, Kaspersky
  • 14. Problems to fear / fix DATA LEAKAGE Encrypt / remote wipe Don't store confidential data on the device MALWARE Update your os Control the dev community / signing Walled gardens / sandboxes
  • 15. Problems to fear / fix (2) STRONG AUTHENTICATION Password policies Better: certificates CONTROL Controll the apps/usage of your endusers BACKUPS
  • 16. Conclusions The ghost is out of the bottle, no way back Go for a crossplatform solution Control what you can control BYOD will happen so prepare for it
  • 17. Conclusions First you need a good policy What level of security do you want/have to accomplish? Riskanalysis – is this possible ? Plan for the worse Then find the tools to do it First tool is common sense (be smart) Look at the management solutions
  • 18. Thank You Contact us 016/ 29.80.45 016/ 29.80.46 www.ba.be Vaartdijk 3/501 B-3018 Wijgmaal, Belgium [email_address] www.ba.be www.ba.be Twitter: JanGuldentops

Notas do Editor

  1. Purpose of presentation: 20 slides, 20 seconds, maximum presentation time of 6 minutes Objective: visionary and innovating introduction
  2. Keywords: A) Virtual; Integrated; Enterprise; Federated; Combined; Contextual; Ad hoc; Distributed; Structured; Aggregated B) Information; Data; Knowledge; Wisdom; Query; Content; Schema; Resource; Model C) Integration; Infrastructure; Base; Broker; Systems; Management; Convergence; Architecture; Solution; Federation;
  3. Connect keywords with focus Keywords for Mobility: Freedom, Future, Productivity Keywords for Security: Threats, Globalisation, Competition Keywords for Virtualisation: Environment, Cost control, Financial crisis Keywords for Digitisation: Future, Sustainability, Preservation; Competition