SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Security Threats &
Breaches: Keeping your
Mobile Devices Secure
Here’s what we’ll cover today:
   Welcome & Introduction
   The reality of security breaches AND increasing
    mobility
   Solution overview: Using ZENworks to keep you
    out of the headlines

      Extending Network Security
      Reporting features                Demo
      Ease of Management

   Questions, Discussion & Next Steps
Novell Platinum Partner
            Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina


   Collaboration, Conferencing & Messaging
   Converged IP networking & telephony
   Network Resource Management solutions
   Wireless & Mobile Workforce solutions
   Data Storage, Archiving & Disaster Recovery
   Network Support & Optimization
   Virtualization
   Data Security
   Managed Services
   Training
The Reality of Today’s Security Breaches
Cherry Hill, NJ – October 8, 2012
2 data backup tapes were lost during shipping in late March 2012. The tapes
included customer names, Social Security numbers, addresses, account
numbers, debit card numbers, and credit card numbers.


                                                    Marysville, TN – October 18,
                                                    2012
                                                    A password-protected laptop was
                                                    stolen from an employee's home on
                                                    August 25. It contained two groups of
                                                    patient data. Patient names, dates of
                                                    birth, responsible party names, patient
Scottsdale, AZ – October 19, 2012                   addresses, physician names, and
A vendor working with patient data for digital      billing information for 22,000 patients
conversion from lost a flash drive on or around     were on the laptop. An additional 5,000
July 16. It contained patient names, Social         patients had similar information
Security numbers, dates of birth, addresses,        exposed as well as their Social
telephone numbers, account numbers, diagnoses,      Security numbers and other non-
and other protected health information.             medical information.
SECURING YOUR MOBILE
DATA WITH ZENWORKS
Solutions to help you avoid the headlines
The ZENworks Family: Windows, Mac & Mobile Endpoints


                        Windows, Mac & Mobile Configuration
                                  Management
                                                              Patch Management
      Asset
    Management




     Application                                       End Point Security
    Virtualization                                       Management




                     Service Desk         Full Disk Encryption
Are you just as locked out of your own
devices as any hacker?
Why ZENworks Full
 Disk Encryption?
Centralized Management

One Console. One Agent. One Tool for all your endpoint management
                             tasks




ZENworks also does configuration, patch, asset & endpoint security
                         management
Fully Featured
From a single
console, ZENworks
lets you manage          Manage access, with support for pre-boot auth
your enterprise
remotely:
down the hall, down
the street, across the
country, or around the   Turn encryption on/off
world



                         Troubleshoot passwords



                         Manage hardware & software encryption


Deploy encryption
software across the      Generate reports
enterprise at the push   demonstrating encryption
of a button
Rapid Deployment
Pre-Boot Authentication
Ease of Management
Service Desk Friendly
Control the story


 Know you’re safe.

 Prove you’re safe.




15   © Novell, Inc. All rights reserved.
NEXT STEPS
ALI Consulting & Deployment Services
Highly experienced advisors with diverse & practical technical experience


                                         • Proactive strategy
                                         • Clear roadmap for deployment
                                         • Value driven project analysis
                                         • Limits burden on existing staff
                                         • Saves IT budget
                                         • Speeds time to deployment
               Project &
Consultative                             • Priority access to Novell as
               Resource    Deployment
Assessment
               Planning                    needed
                                         • Option for lab testing
Special Incentives for Webinar Attendees
Act within next 60 days to receive:
   Special product discounts available
   Special rates for project-based ALI services



                                       Call Cindy for more details!
Upcoming Webinar Topics
November 8:        Disaster Recovery & Business
                        Continuity for SMB
 Organizations

In this second webinar in our virtualization series, we'll be
showing some disaster recovery options from VMware that
make business continuity so simple and affordable that no
organization has to continue to take the risk of being
unprepared.

Registration link coming in the follow up email or register
from our event listing at www.ali-inc.com
Questions & Discussion
                                 Cindy DeHart
                                 Practice Manager
                                 cindy@ali-inc.com
                                 540.443.3392

                                Neil Kimberley
                                Sales Engineer
                                nkimberley@novell.com




Sophia Germanides
Novell Account Executive
Sophia.Germanides@novell.com

Mais conteúdo relacionado

Mais procurados

Jason Leske 2017
Jason Leske 2017Jason Leske 2017
Jason Leske 2017
Jason Leske
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
comania
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009
Alexis Brown
 
Vdi Wp
Vdi WpVdi Wp
Vdi Wp
ConRes
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
Clear Technologies
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
SHC
 

Mais procurados (19)

Linkedin profile resume
Linkedin profile resumeLinkedin profile resume
Linkedin profile resume
 
Actian/Ingres database
Actian/Ingres database Actian/Ingres database
Actian/Ingres database
 
Its Quick Overview (Itms)
Its Quick Overview (Itms)Its Quick Overview (Itms)
Its Quick Overview (Itms)
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
Jason Leske 2017
Jason Leske 2017Jason Leske 2017
Jason Leske 2017
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overview
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Eezi sign WEB
Eezi sign WEBEezi sign WEB
Eezi sign WEB
 
Vdi Wp
Vdi WpVdi Wp
Vdi Wp
 
W8 client management
W8 client managementW8 client management
W8 client management
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
WA Technologies Company Profile
WA Technologies Company ProfileWA Technologies Company Profile
WA Technologies Company Profile
 

Destaque

How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)
Sean Si
 
How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)
Sean Si
 
Apac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain TimesApac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain Times
Michel Van Woudenberg
 
Outbound Links (Public)
Outbound Links (Public)Outbound Links (Public)
Outbound Links (Public)
Sean Si
 
URL Slugs (Public)
URL Slugs (Public)URL Slugs (Public)
URL Slugs (Public)
Sean Si
 

Destaque (20)

BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threats
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worth
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
ФМИ Python: Agile & Friends
ФМИ Python: Agile & FriendsФМИ Python: Agile & Friends
ФМИ Python: Agile & Friends
 
How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)How to Cook Your Content Right (Public)
How to Cook Your Content Right (Public)
 
How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)How to Integrate Low Hanging Keywords from the Global Market (Public)
How to Integrate Low Hanging Keywords from the Global Market (Public)
 
Internetblindheid Kurt Beheydt Iprospect
Internetblindheid   Kurt Beheydt  IprospectInternetblindheid   Kurt Beheydt  Iprospect
Internetblindheid Kurt Beheydt Iprospect
 
Apac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain TimesApac Oracle Smart Strategies For Uncertain Times
Apac Oracle Smart Strategies For Uncertain Times
 
De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010De vrolijkheid 17 juni 2010
De vrolijkheid 17 juni 2010
 
Outbound Links (Public)
Outbound Links (Public)Outbound Links (Public)
Outbound Links (Public)
 
URL Slugs (Public)
URL Slugs (Public)URL Slugs (Public)
URL Slugs (Public)
 
Delen
DelenDelen
Delen
 
10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity10 Web Tools to improve your Social Media Activity
10 Web Tools to improve your Social Media Activity
 

Semelhante a Security Threats & Breaches with Mobile Devices

Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
Rakesh Kumar
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 

Semelhante a Security Threats & Breaches with Mobile Devices (20)

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDon't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Vdi overview
Vdi overviewVdi overview
Vdi overview
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created Equal
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 

Mais de Advanced Logic Industries

Dickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD FutureDickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD Future
Advanced Logic Industries
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with Platespin
Advanced Logic Industries
 

Mais de Advanced Logic Industries (14)

New Challenges in Email & Communications Archiving
New Challenges in Email & Communications ArchivingNew Challenges in Email & Communications Archiving
New Challenges in Email & Communications Archiving
 
Making Work from Home (Really) Work
Making Work from Home (Really) WorkMaking Work from Home (Really) Work
Making Work from Home (Really) Work
 
5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Dickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD FutureDickens Solution Event: Ghost of BYOD Future
Dickens Solution Event: Ghost of BYOD Future
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
 
Streamline it & save with virtualization
Streamline it & save with virtualizationStreamline it & save with virtualization
Streamline it & save with virtualization
 
Webinar: Mobile Device Management
Webinar: Mobile Device ManagementWebinar: Mobile Device Management
Webinar: Mobile Device Management
 
Mobile device management
Mobile device management Mobile device management
Mobile device management
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with Platespin
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManager
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
 
Virtualization 101 for Everyone
Virtualization 101 for EveryoneVirtualization 101 for Everyone
Virtualization 101 for Everyone
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Security Threats & Breaches with Mobile Devices

  • 1. Security Threats & Breaches: Keeping your Mobile Devices Secure
  • 2. Here’s what we’ll cover today:  Welcome & Introduction  The reality of security breaches AND increasing mobility  Solution overview: Using ZENworks to keep you out of the headlines  Extending Network Security  Reporting features Demo  Ease of Management  Questions, Discussion & Next Steps
  • 3. Novell Platinum Partner Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina  Collaboration, Conferencing & Messaging  Converged IP networking & telephony  Network Resource Management solutions  Wireless & Mobile Workforce solutions  Data Storage, Archiving & Disaster Recovery  Network Support & Optimization  Virtualization  Data Security  Managed Services  Training
  • 4. The Reality of Today’s Security Breaches Cherry Hill, NJ – October 8, 2012 2 data backup tapes were lost during shipping in late March 2012. The tapes included customer names, Social Security numbers, addresses, account numbers, debit card numbers, and credit card numbers. Marysville, TN – October 18, 2012 A password-protected laptop was stolen from an employee's home on August 25. It contained two groups of patient data. Patient names, dates of birth, responsible party names, patient Scottsdale, AZ – October 19, 2012 addresses, physician names, and A vendor working with patient data for digital billing information for 22,000 patients conversion from lost a flash drive on or around were on the laptop. An additional 5,000 July 16. It contained patient names, Social patients had similar information Security numbers, dates of birth, addresses, exposed as well as their Social telephone numbers, account numbers, diagnoses, Security numbers and other non- and other protected health information. medical information.
  • 5. SECURING YOUR MOBILE DATA WITH ZENWORKS Solutions to help you avoid the headlines
  • 6. The ZENworks Family: Windows, Mac & Mobile Endpoints Windows, Mac & Mobile Configuration Management Patch Management Asset Management Application End Point Security Virtualization Management Service Desk Full Disk Encryption
  • 7. Are you just as locked out of your own devices as any hacker?
  • 8. Why ZENworks Full Disk Encryption?
  • 9. Centralized Management One Console. One Agent. One Tool for all your endpoint management tasks ZENworks also does configuration, patch, asset & endpoint security management
  • 10. Fully Featured From a single console, ZENworks lets you manage Manage access, with support for pre-boot auth your enterprise remotely: down the hall, down the street, across the country, or around the Turn encryption on/off world Troubleshoot passwords Manage hardware & software encryption Deploy encryption software across the Generate reports enterprise at the push demonstrating encryption of a button
  • 15. Control the story Know you’re safe. Prove you’re safe. 15 © Novell, Inc. All rights reserved.
  • 17. ALI Consulting & Deployment Services Highly experienced advisors with diverse & practical technical experience • Proactive strategy • Clear roadmap for deployment • Value driven project analysis • Limits burden on existing staff • Saves IT budget • Speeds time to deployment Project & Consultative • Priority access to Novell as Resource Deployment Assessment Planning needed • Option for lab testing
  • 18. Special Incentives for Webinar Attendees Act within next 60 days to receive:  Special product discounts available  Special rates for project-based ALI services Call Cindy for more details!
  • 19. Upcoming Webinar Topics November 8: Disaster Recovery & Business Continuity for SMB Organizations In this second webinar in our virtualization series, we'll be showing some disaster recovery options from VMware that make business continuity so simple and affordable that no organization has to continue to take the risk of being unprepared. Registration link coming in the follow up email or register from our event listing at www.ali-inc.com
  • 20. Questions & Discussion Cindy DeHart Practice Manager cindy@ali-inc.com 540.443.3392 Neil Kimberley Sales Engineer nkimberley@novell.com Sophia Germanides Novell Account Executive Sophia.Germanides@novell.com