Learn the latest trends and protections for the mobile workforce, including managing multiple devices. Security risks rise with the addition of more and more devices both in the traditional office and in the teleworking and mobile workforce. Join the interactive discussion on best practices for proactively managing devices across all levels of your agency.
Apollo Group, New York City Health and Hospitals, NJVC, and Physiotherapy Associates: Security in the Age of a Mobile Workforce and Mobile Devices
Scott Carlson, Principal Security Engineer, Apollo Group
Kevin Brownstein, Manager – Systems Engineers, McAfee, Inc.
Egon Rinderer, Chief of Cyber Security, NJVC, Inc., NGA
Corey Cush, Assistant Vice President – Infrastructure Services, NYC Health & Hospitals Corp
Kevin Slate, Vice President – Information Technology, Physiotherapy Associates
McAfee Focus 2011 - Security in the Age of a Mobile Workforce and Mobile Devices
1. October 19, 2011
Security in the Age of a Mobile Workforce
and Mobile Devices
Kevin Brownstein, McAfee
Corey Cush, NYC Health & Hospitals Corp
Scott Carlson, Apollo Group
Kevin Slate, Physiotherapy Associates
Egon Rinderer, NJVC
2. Since FOCUS 2010:
Hypergrowth in Mobile Devices
Computing Cycles in Perspective
(from Morgan Stanley)
Devices/Users (MM in Log Scale)
1,000,000
Mobile
Internet
100,000
Desktop
Internet
10,000
10B+
Units??
1,000
PC
1B+ Units/
Users
100
Minicomputer
100M
Units
10
10M Units
Mainframe
1
1M Units
1960
1980
2000
2020
“
The desktop internet ramp was just a warm-up act for what
we’re seeing happen on the mobile internet. The pace of
mobile innovation is “unprecedented, I think, in world
history.
”
Mary Meeker, Kleiner Perkins Caufield & Byers
The information in this presentation is provided only for educational
purposes and for the convenience of McAfee customers. The information
contained herein is subject to change without notice, and is provided “AS
IS” without guarantee or warranty as to the accuracy or applicability of the
information to any specific situation or circumstance.
2
October 19, 2011
3. Progress with Enterprise Security and Compliance:
Evolution to Mobile
• Enterprise IT organizations have made significant
progress, past ~6+ years
– Optimized IT security operations
– Increasing compliance efficiencies
• Mobile/consumerization, 2 years (iPhone)
• Accelerated past year (iPad, Android…)
• Now Mobile… we need “6+ years of management,
security, compliance” – in 6 months!
3
October 19, 2011
5. McAfee® Mobile Security Integration
First Step: ePolicy Orchestrator® Platform
EMM
EMM
DMZ
P
McAfee ePolicy Orchestrator Platform
Enterprise Mobility and Security Management
Bring mobile devices into the security management framework for centralized visibility and control.
Set policies for all endpoints alike, and report on them all centrally to understand and manage your
compliance status and risk profile at any given time.
5
October 19, 2011
6. McAfee’s Mobile Security Integration Direction
Next: McAfee® VirusScan® Mobile Software
EMM
EMM
DMZ
Anti-Malware
Data Leakage Prevention
Application Security
Enterprise Mobility and Anti-Malware
Protect mobile devices and networks against viruses, spyware, botnets, and even Advanced Persistent
Threats. Roll out anti-malware solution and DAT updates to devices and other endpoints alike centrally
and in a policy-based way. Prove compliance with corporate and regulatory policy.
6
October 19, 2011
7. McAfee’s Mobile Security Integration Direction
Next: Secure Container and DLP
EMM
EMM
DMZ
Anti-Malware
Data Leakage Prevention
Anti-Malware
Application Security
Enterprise Mobility and Data Leakage Prevention
Safeguard leakage of your corporate data with a secure container, at the host or mobile device, and
at the network level. Start with a secure container to prevent data leakage from email, and ultimately
extend granular data leakage prevention policies to mobile devices as you do other endpoints.
7
October 19, 2011
8. McAfee’s Mobile Security Integration Direction
Next: Secure Applications
Scan
Provide
Secure
Access
Aggregate
Anti-Malware
Certify
Monitor
Data Leakage Prevention
Application Security
Enterprise Mobility and the Application Security Lifecycle
Start by scanning and certifying mobile applications for vulnerabilities or malware, monitoring their
behavior and developing reputations for them, and providing secure access to them via network
access control.
8
October 19, 2011
9. McAfee’s Mobile Security Delivery Direction
Today: On Prem Software; Next: SaaS
EMM
EMM
EMM
DMZ
On Prem Software or SaaS Options
Delivering Secure Enterprise Mobility in Multiple Ways
Deploy secure enterprise mobility as an on-premise software or cloud-based software-as-a-service
solution.
9
October 19, 2011
11. On-Premise Security Management through ePolicy
Orchestrator Platform
Compliance Across All Enterprise Endpoints
Bringing all
endpoints into
compliance. Status
is critical to
assessing risk and
prioritizing actions