4. IT’s Challenge with Mobile Devices
Web 2.0, Apps 2.0, Mobility 2.0
More than half of all
Threats Are 60,000 users don’t lock their
New Pieces of HR devices
Malware/day
IT Sales
IT
80% of IT Users
Concerned about
Finance Device Data Loss
Mobile Devices
Predicted to be New
Malware Frontier
4 June 1, 2011
5. Requirements for Secure Application Enablement
Enterprise and
LOB Apps
Basic Customer Facing
Services Apps
Web and
Social Media
Required:
• Data Protection
• Security Policy Management
• Compliance
• Self-Service Provisioning
• Authentication
• Enterprise App Management
5 June 1, 2011
6. Empowering Enterprise Mobility
• Makes it secure
– Configures, enforces and manages native
device security settings Enterprise Environment
iPad
– Enforces device compliance with enterprise
policies Messaging
Android
– Extends the security infrastructure to
include devices via ePO integration today Applications
and ultimately via integration with anti-
iPhone
malware, web protection, DLP, and Global
Threat Intelligence
Directory
– Integrates with the data center: VPN, Wi-Fi,
PKI, directories, and LOB applications Windows McAfee
• Makes it easy Mobile EMM Certificate
Services
– Integrates with McAfee ePO for simple
administration, reporting BlackBerry
– Enables user self-service provisioning Files
– Personalizes devices to
webOS
optimize end-user productivity Database
• Makes it scalable
– Scales to 10s of 1,000s of devices Symbian
– Supports HA and DR configurations
VPN
6 June 1, 2011
7. The Right Life Cycle for Mobile Device Management
Enterprise Application Management Provisioning
Make applications available in a secure, role- Self-service provisioning sets security policies,
based way. Offer software for download, links configures network connectivity, and
to third-party app stores, and web links. automatically personalizes devices for users.
Application Provisioning
Management
IT Operations Support Security and Authentication
Manage policies and devices Each device is issued a unique digital
centrally and get centralized certificate to strongly authenticate it
reporting through McAfee ePO against Microsoft CA for security and
integration. user experience.
IT Operations
Support ePO
ePO Security &
Authentication
Compliance Policy Management
Automatically check devices prior to Compliance Policy Push security policies, configuration
network access to ensure Management updates, and remote helpdesk tasks
only authorized, secured devices (such as lock, wipe, and selective
access the network wipe) over-the-air.
7 June 1, 2011
8. Self-Service Provisioning for iPhone
1 2 3 4
Go to the Enter Your Email Agree to IT Services are
App Store Credentials Corporate Policy Auto-Provisioned
Easy, Secure, Automated
Easy, Secure, Automated
8 June 1, 2011
9. Self-Service Provisioning for Android
1 2 3 4
Go to the Enter Your Email Agree to IT Services are
Marketplace Credentials Corporate Policy Auto-Provisioned
Easy, Secure, Automated
9 June 1, 2011
10. Industry Standard PKI for Strong Authentication
Industry-Standard Security:
Microsoft Certificate Authority Benefits:
• Industry-standard security
• Strong authentication for secure
access to communications
services such as Wi-Fi and VPN
• Strong authentication for secure
push email and other applications
• Single sign on for enhanced user
experience
• No impact on battery life
10 10 June 1, 2011
11. Enterprise Application Store
• Recommend and make
applications securely
available based on
group, role, or device
type.
– Custom corporate
applications
– Third-party
applications (Apple
App Store or Android
Marketplace)
– Webclips
• Device application
inventory, audit, and
policy management
11
13. Centralized Visibility and Control with ePO
What we don’t
manage is where
compliance status is
unknown
13
14. Centralized Visibility and Control with ePO
Bringing all
endpoints into
compliance status
view is critical to
assessing risk and
prioritizing actions
14
15. All Part of McAfee Security Connected
Security Management
Policy Management Vulnerability Management
Security Reporting Risk Management
Mobile Management Compliance
Network Security
Next Generation Firewall
Content Security
Network Intrusion Prevention Email Gateway
NAC Gateway Web Gateway
Network User Behavior Analysis Data Loss Prevention
Network Threat Behavior Analysis Encryption
Network Threat Response
Endpoint Security
Mac, UNIX/Linux AV Anti-Virus & Anti-Spyware Desktop Firewall Email Server AV & Anti-Spam
Virtual Desktop Host Intrusion Prevention Device Control SharePoint Protection
Virtual Server Endpoint Encryption Policy Auditing Website Reputation
Mobile Devices Application Whitelisting NAC Endpoint
15 June 1, 2011