extending secure enterrpise content and apps to mobile devices - iongrid and rsa webinar
DESCRIPTION
A few years ago, only the laptop had remote access to internal applications and secure file stores. Today, employees want ubiquitous access to job-critical content and applications on ANY device, and if IT doesn't support mobile devices just the same as laptops, they will often use personal email and cloud storage accounts to get what they need. This slide presentation is from a webinar hosted by ionGrid and RSA, and it covers new options on how companies can securely extend firewalled content and enterprise applications to mobile devices to make employees more productive.TRANSCRIPT
1© Copyright 2011 EMC Corporation. All rights reserved.
RSA and ionGrid WebinarSecurely Extending the
Information Infrastructure
2© Copyright 2011 EMC Corporation. All rights reserved.
The Panel
Kurt Foeller, Moderator
Michael Rothrock, ionGrid
Co-founder, VP Product
Donald Weller, RSA
Sales Leader - Authentication
Robert Petersen, RSA
Product Manager, SecurID
3© Copyright 2011 EMC Corporation. All rights reserved.
Agenda
1.Mobile trends
2.Mobile content requirements
3.Stratos highlights
4.Stratos-RSA solution
5.RSA highlights
4© Copyright 2011 EMC Corporation. All rights reserved.
Let’s start with some fresh data
Tablets are booming - 119M in 2012, up 140%
Android sales eclipsed iPhone in 2012
Mobile workers carry 3+ devices
25% of mobile workers bypass IT controls
5© Copyright 2011 EMC Corporation. All rights reserved.
Mobile Trends in 2013
1. Increased Mobilization
2. Advanced Persistent Threats
3. Universal Information Access
6© Copyright 2011 EMC Corporation. All rights reserved.
Mobile Trend #1:
Increased Mobilization
7© Copyright 2011 EMC Corporation. All rights reserved.
BIG PICTURE: BY 2011, THE DIGITAL UNIVERSE SURPASSED
1.8 ZETTABYTES1,800,000,000,000,000,000,000
8© Copyright 2011 EMC Corporation. All rights reserved.
$
9© Copyright 2011 EMC Corporation. All rights reserved.
Mobile Trend #2:
Advanced Persistent Threats
10© Copyright 2011 EMC Corporation. All rights reserved.
11© Copyright 2011 EMC Corporation. All rights reserved.
855
174,000,000
Source: Verizon RISK Team: 2012 Data Breach Investigations Report
12© Copyright 2011 EMC Corporation. All rights reserved.
Mobile Trend #3:
Universal Information Access
13© Copyright 2011 EMC Corporation. All rights reserved.
What employees want• To do ‘real work’ on smartphones and tablets
just the same as laptops
14© Copyright 2011 EMC Corporation. All rights reserved.
Secure mobile content access is easier said than done
User Access Control
Authentication
Data Loss Prevention
Overhead CostsIT Resources
Regulatory Compliance
Chief Concerns
15© Copyright 2011 EMC Corporation. All rights reserved.
Baseline requirements for secure mobile access
For the User
Single sign-on and seamless connectivity
Two-factor auth on mobile devices
Information protection, not device protection
Containerized information approach
For IT and Compliance
16© Copyright 2011 EMC Corporation. All rights reserved.
Introducing ionGrid Stratos
Stratos allows users to easily and securely access business files and applications on iPad & iPhone
17© Copyright 2011 EMC Corporation. All rights reserved.
The Stratos Platform
Docs Web
StratosCore
Apps iOS Native or
HTML 5
Auth & security
Compliant HTML5, CSS3
Single sign-on
Pixel-perfect rendering
Annotation SharePoint,
file servers, ECMs
Core provides single sign on and secure
access
18© Copyright 2011 EMC Corporation. All rights reserved.
Use Cases in Brief
• Increased security strength with two-factor authentication
• Integrated solution for banking customers
• Fast deployment time
19© Copyright 2011 EMC Corporation. All rights reserved.
Two-Factor Authentication
20© Copyright 2011 EMC Corporation. All rights reserved.
Increased content security with two-factor authentication
21© Copyright 2011 EMC Corporation. All rights reserved.
Authenticator Options
22© Copyright 2011 EMC Corporation. All rights reserved.
Key Features & Solution Benefits
Solution Benefit
Solution and Feature Detail
Meet compliance regulations
Direct integration to RSA ensures that 2-factor authentication policies are consistently applied to all devices
Ease of integration
Support for multi-factor authentication to address user requirements
Increased security
Expanded security model covering highly regulated industries
Scalable infrastructure
Scalable security model and architecture
Comprehensive content solution
Complete mobile security solution: application, information, and document protection
23© Copyright 2011 EMC Corporation. All rights reserved.
THANK YOUTHANK YOUTHANK YOUFor more information:
Donald [email protected]
Stephen [email protected]