Slide 1OverviewSlide 3Bring Your Own Device OpportunitySlide 5Bring Your Own Device – Mobile SecurityNext-Gen Multi-OS Mobile Device ManagementCompetitive OutlookSlide 9MobileIron iPhone, iPad & iPod ServicesMobileIron Blackberry Value-Added ServicesMobileIron Full MDM Services for WinMO, & SymbianBring Your Own Device Security ControlsCost AnalysisSlide 15What Does It All Mean?Slide 17!! Are we under attack !!Personal Consumer devices continue to invade *Corporate enterprise – just wanting to plug in*Mobile Device ManagementOverview•The main devices for corporate productivity used to be the desktop or laptop computer. •RIM’s BlackBerry opened the door for smartphones as business tools.•Employees began bringing their own non-BlackBerry devices into work, and demanding that they be able to connect them with corporate resources•Mobile device management as a hub for managing a variety of corporate and personal•Security is a focus of most MDM vendors. •Mobile devices are increasingly application platforms. •Mobile technology will continue to change rapidlyHow It Got Here Where It’s GoingWe must continue to focus on solutions that offer us Enforced Passwords, Device Wipe, Remote Lock, Audit trail/logging, Jailbreak detection, Software Distribution with Application downloading, updating and verification support, external memory blocking and configuration change history.We must continue to focus on solutions that offer us Enforced Passwords, Device Wipe, Remote Lock, Audit trail/logging, Jailbreak detection, Software Distribution with Application downloading, updating and verification support, external memory blocking and configuration change history.Northwestern University Graduate Team – Praxiteles. 2012Bring Your Own Device is seen to be complex, expensive, and dangerous especially for Data SecurityIf employees are using their own devices, legitimate questions include:•How can IT protect the corporate data from corruption, misuse, or theft?•How can efficient use of company-owned applications be supported on a device with non-standard configuration? •How can the employee install a needed application even when their device uses a different operating system or operating system version?•Who is responsible for taking care of his or her asset; •How can the organization protect centrally located data if it can’t ensure that a device is properly secured? Northwestern University Graduate Team – Praxiteles. 201231/13/191/13/19Bring Your Own Device OpportunityNorthwestern University Graduate Team – Praxiteles. 20125Typical Network Security ArchitectureSecurity Network ArchitectureTypical Components•Gateway firewalls•Dual gateway firewalls•Internal firewalls•Gateway anti-malware•Endpoint anti-malware•Dual Internet connections•Segmented networks•Tiered networks•Virtual Private Networks (VPN)•Intrusion detection & prevention•Content filtering•Data Leakage Protection (DLP)•Network Access Control (NAC)•Endpoint encryption•Enhanced authentication•Security management technologiesRisk Tolerance: LowPresence of Sensitive Data: YesRemote Users: YesHours of Operation: 24/7Online Business: YesBring Your Own Device – Mobile SecurityNext-Gen Multi-OS Mobile Device ManagementEnterprise Services•Real-Time Smartphone Inventory Dashboard – Multi-OS•Advanced Security & Management–Configure, Secure & Manage Smartphone & iPad (OTA)•Application Mgmt & Distribution –Real-time inventory, In-house App Store•Generate Actionable Alerts based on Policy –SIM change, Intl roaming,…•Employee Owned phone –Data boundary, Self Governance,…•iPhone/iPad•Android •Blackberry•Windows Mobile•Symbian7Competitive OutlookSolutionThree Services of MobileIron Virtual Smartphone PlatformEnterprise End-UserVirtual Smartphone PlatformControl Cost(Telecom)Reduce wireless bills thru visibility into usage and quality Control Chaos(IT)Secure and manage mobile devices, data, and appsExpand Experience(User)Deliver new services and move accountability to the userSmartphone Mission ControlProactive Business IntelligenceCooperativeMobilityAdvancedManagementAdvancedManagementMobile Activity IntelligenceMobile Activity IntelligenceMyPhone@WorkMyPhone@Work•Device management •Security •Access control •Enterprise data boundary (selective wipe, privacy)•Remote control•Enterprise app store •Activity analysis(voice, SMS, data traffic)•Int’l roaming monitor•Service quality analysis•Alerts and actions•Activity and quality•Privacy controls•Enterprise app store•Self-management9MobileIroniPhone, iPad & iPod ServicesSecure at ScaleSecure at ScaleManage AppsManage AppsControl CostControl CostIntegrate iPhone into IT Operations•Provision at scale•Configure and secure devices•Obtain real-time inventory•Determine operational & security state of devices•Revoke enterprise resources and settingsManage Enterprise Apps End-to-End•Gain real-time visibility into installed apps (iOS 4)•Recommend App Store applications to end-users•Distribute in-house applications over-the-air (iOS 4)Manage Enterprise Apps End-to-End•Determine which devices are internationally roaming (iOS 4)•Generate alerts based on IT policy•Measure and record connection quality and speed (Cellular and Wi-Fi)•Report performance and dropped calls on map10MobileIronBlackberry Value-Added ServicesAdvanced TroubleshootingAdvanced TroubleshootingControl Cost and QualityControl Cost and QualityEmployee Self-GovernanceEmployee Self-GovernanceAdvanced Help Desk & App Mgmt tools •Provision at scale•Configure and secure devices•Obtain real-time inventory•Determine operational & security state of devices•Revoke enterprise resources and settingsReal-time Business Intelligence•Activity analysis (voice, SMS, data traffic)•Generate alerts based on Telecom policy (minutes usage and International roaming)•Report performance and dropped calls on map•Billing plan integration Employee Self-Portal •Employee Self-registration•Up-to-date view of usage by end user•Enterprise App Store•SMS search and history•Enterprise sociograph•Find-my-phone mapping11MobileIronFull MDM Services for WinMO, & SymbianSmartphone Mission ControlSmartphone Mission ControlControl Cost & Quality Control Cost & Quality Employee Self-governanceEmployee Self-governanceNext-Gen MobileDevice Management •Device Management•Remote Control/Access to
View Full Document