SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
ZABEZPEČENIE MOBILNÝCH ZARIADENÍ VO
FIREMNOM PROSTREDÍ
Ján Kvasnička
Senior Pre-Sales Consultant, Czech Republic and Slovakia
THE CHALLENGES OF MOBILITY MOVE BEYOND THE DEVICE
Copyright © 2015 Symantec Corporation
2
Information must be
protected no matter
where it resides
Protecting sensitive
information takes
priority over
protecting devices
INFORMATION IS
EVERYWHERE
The number of
mobile threats is on
the rise
Exposure to malware
and risky apps
RISE OF MOBILE
THREATS
Users adopt personal
apps to improve
productivity
Data leaks to
unauthorized, cloud-
based apps
MOBILE APPS
Multiple platforms
with disparate
controls
Users want the latest
technology and apps
ADVENT OF MOBILE
AND BYOD
THE NUMBER OF MOBILE THREATS IS ON THE RISE
Copyright © 2015 Symantec Corporation
3
Classified as
Malware
Classified as
Grayware
Further
classified as
Madware
1.4 M
0.7 M
0.2 M
2.3 M
2.2 M
1.4 M
1.3 M
1.2 M
0.6 M
OF THE 6.3 MILLION APPS ANALYZED IN 2014, 1 MILLION WERE CLASSIFIED AS
MALWARE AND 2.3 MILLION WERE CLASSIFIED AS GRAYWARE
Source: Symantec ISTR 2015
CAUSES OF MOBILE THREATS BY CLASSIFICATION
Copyright © 2015 Symantec Corporation
4
Send Content
Adware Annoyance
Reconfigure Device
Traditional Threats
Steal Information
Track User
26% TRADITIONAL THREATS – Backdoor Trojans, Downloaders, DDoS Utility, etc.
22% TRACK USER – Threats that spy on users, tracks user locations
21% STEAL INFORMATION - Steal device data, media files, and any user credentials
Source: Symantec ISTR 2015
SYMANTEC IS ADJUSTING TO MEET CUSTOMER NEEDS
Copyright © 2015 Symantec Corporation
5
Stop malicious mobile threats
Protect your sensitive information, wherever it resides
SYMANTEC MOBILITY SUITE
Copyright © 2015 Symantec Corporation
6
MOBILITY: SUITE
MOBILITY: DEVICE
MANAGEMENT
MOBILITY:
APPLICATION
MANAGEMENT
MOBILITY:
WORKFORCE APPS
MOBILITY: THREAT
PROTECTION
MOBILE DEVICE MANAGEMENT
Copyright © 2015 Symantec Corporation
7
Activate enterprise access
easily and automatically
ENABLE SECURE
Enforce device policies and
compliance
MANAGE
Visibility and reporting with
web-based management
Enable, secure, and manage your heterogeneous mobile environment
MOBILE APPLICATION MANAGEMENT
Copyright © 2015 Symantec Corporation
8
Symantec’s Enterprise App
Store is end-user and IT friendly
MOBILIZE APPS & CONTENT PROTECT INFORMATION
Extend enterprise security
policies
Integration with DLP
SOLVE FOR BYOD
Clear separation of corporate
and personal data
MOBILE
APP
MOBILIZE APPS AND CONTENT
Copyright © 2015 Symantec Corporation
9
ENTERPRISE APP STORE
• Distribute/update/revoke specific apps/content
• Web, native, HTML5 – in-house, external apps
• PDF’s, videos, ePub documents, forms
END-USER AND IT FRIENDLY
• Consumer-style portal, reviews, screenshots
• Corporate branding
• Versioning and expiration options
PROTECT INFORMATION ON MOBILE APPS
Copyright © 2015 Symantec Corporation
10
ENTERPRISE SECURITY POLICIES
• Authentication: LDAP/SAML – online, offline access
• Encryption: FIPS 140-2, AES 256 – for all selected data
• Data Loss Prevention: copy-paste, sharing restrictions
SAFELY EXTEND ENTERPRISE RESOURCES
• App Proxy secures app data in transit
• Email Proxy prevents unauthorized access to Exchange
• No firewall holes or device-wide VPN
SYMANTEC APP WRAPPING TECHNOLOGY
• No developer resources required
• No additional infrastructure required
• No delays on mobile app rollouts
App wrapped with Symantec libraries and policy controls
SOLVE FOR BYOD
Copyright © 2015 Symantec Corporation
11
ALLOW PERSONAL DEVICES
• Secure access to corporate information
• Auto-configuration of settings like Wi-Fi and VPN
• Lock and wipe only specific corporate data
END-USER AND IT FRIENDLY
• No device level controls
• No monitoring of device apps or data
• Focus on corporate apps and data
A clear separation of corporate and personal data
WORKFORCE APPS
Copyright © 2015 Symantec Corporation
12
MOBILITY: WORKFORCE APPS
WORK MAIL
A secure email/PIM app
WORK WEB
A secure browser for websites and apps
WORK MAIL
Copyright © 2015 Symantec Corporation
13
• Automatically configure and sync Email, Calendar,
Contacts, Tasks, and Notes
• Rich integration with Exchange ActiveSync (EAS)
• Push Notifications
• Simplified Enrollment
• AES-256 Encryption for all data and SD card
• Password policy management
• Attachment policies and secure storage
• Support S/MIME signing and encryption
A secure app for email/PIM
WORK WEB
Copyright © 2015 Symantec Corporation
14
• Enable secure access to web-based corporate
resources
• Whitelist URLs that may be opened in the web
browser
• Require internal websites and web-based apps to open
in Work Web
• Pre-configure web bookmarks for employees
• Restrict copy/paste of data and open-in attachments
to unapproved apps
• Leverage secure app proxy as a virtual network
gateway for incoming traffic
• Perform safe web searches powered by Norton Safe
Search
A secure browser for accessing websites and apps
THREAT PROTECTION
Copyright © 2015 Symantec Corporation
15
Advanced, proactive protection
against risky apps
APP ADVISOR ANTI-MALWARE
Protect against latest threats
with Live-Update
Compliance rules based on
device security posture
WEB PROTECTION
Detect and block phishing
websites
APP RISK REPORTING POWERED BY NORTON MOBILE INSIGHT
Copyright © 2015 Symantec Corporation
16
200+ APP STORES
Crawled continuously
30K NEW APPS
Processed every 24 hours
15M ANDROID
Android apps in our
database
800K APPS
With medium or high
battery or data usage
3M MALICIOUS
Apps identified
90M APPS
With potential privacy
leaks or intrusive behaviors
APP ADVISOR IDENTIFIES RISKY APPS
• Apps that leak information
• Apps that drain battery
• Apps that consume too much bandwidth
• Proactive protection before download from Google Play
• Enable users to make informed decisions about apps
Copyright © 2015 Symantec Corporation
18
Copyright © 2015 Symantec Corporation
19
Copyright © 2015 Symantec Corporation
20
PROTECT AGAINST MALICIOUS THREATS
ANTI-MALWARE
• Fast and effective on-device scans
• Protect against latest threats with Live-Update
integration
• Implement compliance rules based on device
security posture
WEB PROTECTION
• Detect and block phishing websites
• Enable safe mobile browsing
SYMANTEC’S MOBILE VISION AND STRATEGY
Copyright © 2015 Symantec Corporation
22
THREAT
PROTECTION
INFORMATION
PROTECTION
INTEGRATE SYMANTEC’S MOBILE TECHNOLOGY INTO BROADER SOLUTIONS TO HELP
YOU PROTECT YOUR SENSITIVE INFORMATION AND PROTECT AGAINST THREATS
THANK YOU!
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Ján Kvasnička
jan_kvasnicka@symantec.com

Weitere ähnliche Inhalte

Was ist angesagt?

The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecuritySkycure
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewSymantec
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 

Was ist angesagt? (20)

The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 

Ähnlich wie Zabezpečení mobilních zařízení ve firemním prostředí

IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 

Ähnlich wie Zabezpečení mobilních zařízení ve firemním prostředí (20)

IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 

Mehr von MarketingArrowECS_CZ

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfMarketingArrowECS_CZ
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?MarketingArrowECS_CZ
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaMarketingArrowECS_CZ
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceMarketingArrowECS_CZ
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeMarketingArrowECS_CZ
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle softwareMarketingArrowECS_CZ
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?MarketingArrowECS_CZ
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoMarketingArrowECS_CZ
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. částMarketingArrowECS_CZ
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. částMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částMarketingArrowECS_CZ
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyMarketingArrowECS_CZ
 

Mehr von MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Zabezpečení mobilních zařízení ve firemním prostředí

  • 1. ZABEZPEČENIE MOBILNÝCH ZARIADENÍ VO FIREMNOM PROSTREDÍ Ján Kvasnička Senior Pre-Sales Consultant, Czech Republic and Slovakia
  • 2. THE CHALLENGES OF MOBILITY MOVE BEYOND THE DEVICE Copyright © 2015 Symantec Corporation 2 Information must be protected no matter where it resides Protecting sensitive information takes priority over protecting devices INFORMATION IS EVERYWHERE The number of mobile threats is on the rise Exposure to malware and risky apps RISE OF MOBILE THREATS Users adopt personal apps to improve productivity Data leaks to unauthorized, cloud- based apps MOBILE APPS Multiple platforms with disparate controls Users want the latest technology and apps ADVENT OF MOBILE AND BYOD
  • 3. THE NUMBER OF MOBILE THREATS IS ON THE RISE Copyright © 2015 Symantec Corporation 3 Classified as Malware Classified as Grayware Further classified as Madware 1.4 M 0.7 M 0.2 M 2.3 M 2.2 M 1.4 M 1.3 M 1.2 M 0.6 M OF THE 6.3 MILLION APPS ANALYZED IN 2014, 1 MILLION WERE CLASSIFIED AS MALWARE AND 2.3 MILLION WERE CLASSIFIED AS GRAYWARE Source: Symantec ISTR 2015
  • 4. CAUSES OF MOBILE THREATS BY CLASSIFICATION Copyright © 2015 Symantec Corporation 4 Send Content Adware Annoyance Reconfigure Device Traditional Threats Steal Information Track User 26% TRADITIONAL THREATS – Backdoor Trojans, Downloaders, DDoS Utility, etc. 22% TRACK USER – Threats that spy on users, tracks user locations 21% STEAL INFORMATION - Steal device data, media files, and any user credentials Source: Symantec ISTR 2015
  • 5. SYMANTEC IS ADJUSTING TO MEET CUSTOMER NEEDS Copyright © 2015 Symantec Corporation 5 Stop malicious mobile threats Protect your sensitive information, wherever it resides
  • 6. SYMANTEC MOBILITY SUITE Copyright © 2015 Symantec Corporation 6 MOBILITY: SUITE MOBILITY: DEVICE MANAGEMENT MOBILITY: APPLICATION MANAGEMENT MOBILITY: WORKFORCE APPS MOBILITY: THREAT PROTECTION
  • 7. MOBILE DEVICE MANAGEMENT Copyright © 2015 Symantec Corporation 7 Activate enterprise access easily and automatically ENABLE SECURE Enforce device policies and compliance MANAGE Visibility and reporting with web-based management Enable, secure, and manage your heterogeneous mobile environment
  • 8. MOBILE APPLICATION MANAGEMENT Copyright © 2015 Symantec Corporation 8 Symantec’s Enterprise App Store is end-user and IT friendly MOBILIZE APPS & CONTENT PROTECT INFORMATION Extend enterprise security policies Integration with DLP SOLVE FOR BYOD Clear separation of corporate and personal data MOBILE APP
  • 9. MOBILIZE APPS AND CONTENT Copyright © 2015 Symantec Corporation 9 ENTERPRISE APP STORE • Distribute/update/revoke specific apps/content • Web, native, HTML5 – in-house, external apps • PDF’s, videos, ePub documents, forms END-USER AND IT FRIENDLY • Consumer-style portal, reviews, screenshots • Corporate branding • Versioning and expiration options
  • 10. PROTECT INFORMATION ON MOBILE APPS Copyright © 2015 Symantec Corporation 10 ENTERPRISE SECURITY POLICIES • Authentication: LDAP/SAML – online, offline access • Encryption: FIPS 140-2, AES 256 – for all selected data • Data Loss Prevention: copy-paste, sharing restrictions SAFELY EXTEND ENTERPRISE RESOURCES • App Proxy secures app data in transit • Email Proxy prevents unauthorized access to Exchange • No firewall holes or device-wide VPN SYMANTEC APP WRAPPING TECHNOLOGY • No developer resources required • No additional infrastructure required • No delays on mobile app rollouts App wrapped with Symantec libraries and policy controls
  • 11. SOLVE FOR BYOD Copyright © 2015 Symantec Corporation 11 ALLOW PERSONAL DEVICES • Secure access to corporate information • Auto-configuration of settings like Wi-Fi and VPN • Lock and wipe only specific corporate data END-USER AND IT FRIENDLY • No device level controls • No monitoring of device apps or data • Focus on corporate apps and data A clear separation of corporate and personal data
  • 12. WORKFORCE APPS Copyright © 2015 Symantec Corporation 12 MOBILITY: WORKFORCE APPS WORK MAIL A secure email/PIM app WORK WEB A secure browser for websites and apps
  • 13. WORK MAIL Copyright © 2015 Symantec Corporation 13 • Automatically configure and sync Email, Calendar, Contacts, Tasks, and Notes • Rich integration with Exchange ActiveSync (EAS) • Push Notifications • Simplified Enrollment • AES-256 Encryption for all data and SD card • Password policy management • Attachment policies and secure storage • Support S/MIME signing and encryption A secure app for email/PIM
  • 14. WORK WEB Copyright © 2015 Symantec Corporation 14 • Enable secure access to web-based corporate resources • Whitelist URLs that may be opened in the web browser • Require internal websites and web-based apps to open in Work Web • Pre-configure web bookmarks for employees • Restrict copy/paste of data and open-in attachments to unapproved apps • Leverage secure app proxy as a virtual network gateway for incoming traffic • Perform safe web searches powered by Norton Safe Search A secure browser for accessing websites and apps
  • 15. THREAT PROTECTION Copyright © 2015 Symantec Corporation 15 Advanced, proactive protection against risky apps APP ADVISOR ANTI-MALWARE Protect against latest threats with Live-Update Compliance rules based on device security posture WEB PROTECTION Detect and block phishing websites
  • 16. APP RISK REPORTING POWERED BY NORTON MOBILE INSIGHT Copyright © 2015 Symantec Corporation 16 200+ APP STORES Crawled continuously 30K NEW APPS Processed every 24 hours 15M ANDROID Android apps in our database 800K APPS With medium or high battery or data usage 3M MALICIOUS Apps identified 90M APPS With potential privacy leaks or intrusive behaviors
  • 17. APP ADVISOR IDENTIFIES RISKY APPS • Apps that leak information • Apps that drain battery • Apps that consume too much bandwidth • Proactive protection before download from Google Play • Enable users to make informed decisions about apps
  • 18. Copyright © 2015 Symantec Corporation 18
  • 19. Copyright © 2015 Symantec Corporation 19
  • 20. Copyright © 2015 Symantec Corporation 20
  • 21. PROTECT AGAINST MALICIOUS THREATS ANTI-MALWARE • Fast and effective on-device scans • Protect against latest threats with Live-Update integration • Implement compliance rules based on device security posture WEB PROTECTION • Detect and block phishing websites • Enable safe mobile browsing
  • 22. SYMANTEC’S MOBILE VISION AND STRATEGY Copyright © 2015 Symantec Corporation 22 THREAT PROTECTION INFORMATION PROTECTION INTEGRATE SYMANTEC’S MOBILE TECHNOLOGY INTO BROADER SOLUTIONS TO HELP YOU PROTECT YOUR SENSITIVE INFORMATION AND PROTECT AGAINST THREATS
  • 23. THANK YOU! Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Ján Kvasnička jan_kvasnicka@symantec.com