Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Winter Gathering 2015 - Mobil sikkerhet

EVRY
February 05, 2015
28

Winter Gathering 2015 - Mobil sikkerhet

EVRY

February 05, 2015
Tweet

More Decks by EVRY

Transcript

  1. © 2014 Citrix. Confidential. 3 Sikkerhetstrusler Hvor er enheten min??

    BYOD Datalekkasje «Bad apps» Nettfiske Nedlåst – leter etter muligheter - brukes ikke Ingen samhandling .......
  2. Define the problem Freedom for users to access all apps

    and data from any of their devices Which apps matter today? What about tomorrow? Email? Cloud? Legacy? What data do they need? Is it sensitive? Do they need it offline? Is your focus on SmartPhones, Tablets or Laptops? Will users expect all three? Are they company or personal devices? How much control can you have – and how much do you want?
  3. © 2014 Citrix. Confidential. 5 5 tips Administrer kún det

    som er viktig Tenk brukervennlighet Virtualiser og «containarize» Automatisering (compliance og konfigurering) Beskytt dine data!
  4. © 2014 Citrix. Confidential. 9 Feature rich MDM with freedom

    of choice Productivity and Collaboration Data Management App Management Device Management
  5. © 2014 Citrix. Confidential. 10 Mobile lifecycle management Start here

    Gain visibility to devices (BYOD or CL) Push policies (WiFi, VPN, Passcode etc.) Provision apps automatically Manage users through AD groups Monitor and manage compliance Notify users Support end-users remotely Remotely lock or selectively wipe Device agnostic – iOS, Android, Windows Phone
  6. © 2014 Citrix. Confidential. 11 11 Automated Device Compliance Passcode

    policy AD changes to user Jailbroken device Unmanaged device Data Roaming Geo-fencing App Blacklist App Whitelist Compliance Engine Initiate compliance actions based on a variety of triggers Lock device Modify policy set Block network access Selective wipe Full wipe Revoke Send notification Set out of compliance
  7. © 2014 Citrix. Confidential. 12 Secure and manage mobile applications

    simply and easily Productivity and Collaboration Data Management App Management Device Management
  8. © 2014 Citrix. Confidential. 14 “” Mobile security breaches are

    – and will continue to be – the result of misconfiguration and misuse (by the user) on an app level, rather than the outcome of deeply technical attacks on mobile devices Dionisio Zumerle Gartner, Principal Research Analyst, 2014 75% by 2017 App Security should be managed by IT Source: Gartner Press Release, May 29, 2014: http://www.gartner.com/newsroom/id/2753017
  9. © 2014 Citrix. Confidential. 16 • Secure app containers •

    Inter-app controls • On-demand micro VPN • Conditional access policies • App lock and wipe
  10. © 2014 Citrix. Confidential. 17 EMM is more than just

    checking your email Productivity and Collaboration Data Management App Management Device Management
  11. © 2014 Citrix. Confidential. 19 Send, share and sync files

    “Follow-me” data across any device Encrypted in transit and at rest Remote wipe & account locking On-premises and public clouds Outlook-Plugin SharePoint and network drives Content editing, check-in, check-out
  12. © 2014 Citrix. Confidential. 20 Experience productivity through application integration

    Productivity and Collaboration Data Management App Management Device Management
  13. © 2014 Citrix. Confidential. 21 o Secure browser o Internal

    web access o URL BL/WL o Mail, calendar, contacts o Enterprise class o Better than native o Secure VDI like access to physical desktop o Access work files and apps o Offline content edit o Review , comment and collaborate on documents o Secure notes o Team notebooks o Email and calendar integration o Secure EFSS o Mobile content editing o SharePoint & network files