Mais conteúdo relacionado Semelhante a Zabezpečení mobilních zařízení ve firemním prostředí (20) Mais de MarketingArrowECS_CZ (20) Zabezpečení mobilních zařízení ve firemním prostředí2. THE CHALLENGES OF MOBILITY MOVE BEYOND THE DEVICE
Copyright © 2015 Symantec Corporation
2
Information must be
protected no matter
where it resides
Protecting sensitive
information takes
priority over
protecting devices
INFORMATION IS
EVERYWHERE
The number of
mobile threats is on
the rise
Exposure to malware
and risky apps
RISE OF MOBILE
THREATS
Users adopt personal
apps to improve
productivity
Data leaks to
unauthorized, cloud-
based apps
MOBILE APPS
Multiple platforms
with disparate
controls
Users want the latest
technology and apps
ADVENT OF MOBILE
AND BYOD
3. THE NUMBER OF MOBILE THREATS IS ON THE RISE
Copyright © 2015 Symantec Corporation
3
Classified as
Malware
Classified as
Grayware
Further
classified as
Madware
1.4 M
0.7 M
0.2 M
2.3 M
2.2 M
1.4 M
1.3 M
1.2 M
0.6 M
OF THE 6.3 MILLION APPS ANALYZED IN 2014, 1 MILLION WERE CLASSIFIED AS
MALWARE AND 2.3 MILLION WERE CLASSIFIED AS GRAYWARE
Source: Symantec ISTR 2015
4. CAUSES OF MOBILE THREATS BY CLASSIFICATION
Copyright © 2015 Symantec Corporation
4
Send Content
Adware Annoyance
Reconfigure Device
Traditional Threats
Steal Information
Track User
26% TRADITIONAL THREATS – Backdoor Trojans, Downloaders, DDoS Utility, etc.
22% TRACK USER – Threats that spy on users, tracks user locations
21% STEAL INFORMATION - Steal device data, media files, and any user credentials
Source: Symantec ISTR 2015
5. SYMANTEC IS ADJUSTING TO MEET CUSTOMER NEEDS
Copyright © 2015 Symantec Corporation
5
Stop malicious mobile threats
Protect your sensitive information, wherever it resides
6. SYMANTEC MOBILITY SUITE
Copyright © 2015 Symantec Corporation
6
MOBILITY: SUITE
MOBILITY: DEVICE
MANAGEMENT
MOBILITY:
APPLICATION
MANAGEMENT
MOBILITY:
WORKFORCE APPS
MOBILITY: THREAT
PROTECTION
7. MOBILE DEVICE MANAGEMENT
Copyright © 2015 Symantec Corporation
7
Activate enterprise access
easily and automatically
ENABLE SECURE
Enforce device policies and
compliance
MANAGE
Visibility and reporting with
web-based management
Enable, secure, and manage your heterogeneous mobile environment
8. MOBILE APPLICATION MANAGEMENT
Copyright © 2015 Symantec Corporation
8
Symantec’s Enterprise App
Store is end-user and IT friendly
MOBILIZE APPS & CONTENT PROTECT INFORMATION
Extend enterprise security
policies
Integration with DLP
SOLVE FOR BYOD
Clear separation of corporate
and personal data
MOBILE
APP
9. MOBILIZE APPS AND CONTENT
Copyright © 2015 Symantec Corporation
9
ENTERPRISE APP STORE
• Distribute/update/revoke specific apps/content
• Web, native, HTML5 – in-house, external apps
• PDF’s, videos, ePub documents, forms
END-USER AND IT FRIENDLY
• Consumer-style portal, reviews, screenshots
• Corporate branding
• Versioning and expiration options
10. PROTECT INFORMATION ON MOBILE APPS
Copyright © 2015 Symantec Corporation
10
ENTERPRISE SECURITY POLICIES
• Authentication: LDAP/SAML – online, offline access
• Encryption: FIPS 140-2, AES 256 – for all selected data
• Data Loss Prevention: copy-paste, sharing restrictions
SAFELY EXTEND ENTERPRISE RESOURCES
• App Proxy secures app data in transit
• Email Proxy prevents unauthorized access to Exchange
• No firewall holes or device-wide VPN
SYMANTEC APP WRAPPING TECHNOLOGY
• No developer resources required
• No additional infrastructure required
• No delays on mobile app rollouts
App wrapped with Symantec libraries and policy controls
11. SOLVE FOR BYOD
Copyright © 2015 Symantec Corporation
11
ALLOW PERSONAL DEVICES
• Secure access to corporate information
• Auto-configuration of settings like Wi-Fi and VPN
• Lock and wipe only specific corporate data
END-USER AND IT FRIENDLY
• No device level controls
• No monitoring of device apps or data
• Focus on corporate apps and data
A clear separation of corporate and personal data
12. WORKFORCE APPS
Copyright © 2015 Symantec Corporation
12
MOBILITY: WORKFORCE APPS
WORK MAIL
A secure email/PIM app
WORK WEB
A secure browser for websites and apps
13. WORK MAIL
Copyright © 2015 Symantec Corporation
13
• Automatically configure and sync Email, Calendar,
Contacts, Tasks, and Notes
• Rich integration with Exchange ActiveSync (EAS)
• Push Notifications
• Simplified Enrollment
• AES-256 Encryption for all data and SD card
• Password policy management
• Attachment policies and secure storage
• Support S/MIME signing and encryption
A secure app for email/PIM
14. WORK WEB
Copyright © 2015 Symantec Corporation
14
• Enable secure access to web-based corporate
resources
• Whitelist URLs that may be opened in the web
browser
• Require internal websites and web-based apps to open
in Work Web
• Pre-configure web bookmarks for employees
• Restrict copy/paste of data and open-in attachments
to unapproved apps
• Leverage secure app proxy as a virtual network
gateway for incoming traffic
• Perform safe web searches powered by Norton Safe
Search
A secure browser for accessing websites and apps
15. THREAT PROTECTION
Copyright © 2015 Symantec Corporation
15
Advanced, proactive protection
against risky apps
APP ADVISOR ANTI-MALWARE
Protect against latest threats
with Live-Update
Compliance rules based on
device security posture
WEB PROTECTION
Detect and block phishing
websites
16. APP RISK REPORTING POWERED BY NORTON MOBILE INSIGHT
Copyright © 2015 Symantec Corporation
16
200+ APP STORES
Crawled continuously
30K NEW APPS
Processed every 24 hours
15M ANDROID
Android apps in our
database
800K APPS
With medium or high
battery or data usage
3M MALICIOUS
Apps identified
90M APPS
With potential privacy
leaks or intrusive behaviors
17. APP ADVISOR IDENTIFIES RISKY APPS
• Apps that leak information
• Apps that drain battery
• Apps that consume too much bandwidth
• Proactive protection before download from Google Play
• Enable users to make informed decisions about apps
21. PROTECT AGAINST MALICIOUS THREATS
ANTI-MALWARE
• Fast and effective on-device scans
• Protect against latest threats with Live-Update
integration
• Implement compliance rules based on device
security posture
WEB PROTECTION
• Detect and block phishing websites
• Enable safe mobile browsing
22. SYMANTEC’S MOBILE VISION AND STRATEGY
Copyright © 2015 Symantec Corporation
22
THREAT
PROTECTION
INFORMATION
PROTECTION
INTEGRATE SYMANTEC’S MOBILE TECHNOLOGY INTO BROADER SOLUTIONS TO HELP
YOU PROTECT YOUR SENSITIVE INFORMATION AND PROTECT AGAINST THREATS
23. THANK YOU!
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Ján Kvasnička
jan_kvasnicka@symantec.com