the mobile wireless enterprise: managing the new complexity

12
The Mobile Wireless Enterprise: Managing the New Complexity

Upload: tristram-davies

Post on 01-Jan-2016

22 views

Category:

Documents


0 download

DESCRIPTION

The Mobile Wireless Enterprise: Managing the New Complexity. Paul Miller Managing Director, Wireless & Mobile. More than 15 years experience in mobile and security industries - PowerPoint PPT Presentation

TRANSCRIPT

The Mobile Wireless Enterprise: Managing the New Complexity

2Symantec ConfidentialSymantec Mobile Enterprise Security

More than 15 years experience in mobile and security industries

Develop Symantec’s mobile client security strategy and delivery and the overall vision for mobile and wireless as it pertains to the enterprise and consumer markets

Key highlights: Identity strategy using mobile infrastructure to combat identity fraud,

particularly for the enterprise and financial markets

PKI-based identity and mobile commerce

Copy protection, license management, and Digital Rights Management product lines

Paul MillerManaging Director, Wireless & Mobile

3Symantec ConfidentialSymantec Mobile Enterprise Security

Hundreds of MSS customersMillions of security alerts per monthMillions of threat reports per month200,000 malware submissions per month

Symantec™ Global Intelligence Network

Twyford, England

Munich, Germany

Alexandria, VA

Sydney, Australia

Redwood City, CA

Santa Monica, CA

Calgary, Canada

San Francisco, CA

Dublin, Ireland

Pune, India

Taipei, Taiwan

Tokyo, Japan

>6,200 Managed Security Devices + 120 Million Systems Worldwide + 30% of World’s email Traffic +AdvancedHoneypot Network

74 Symantec Monitored Countries+4 Symantec SOCs 40,000+ Registered Sensors

in 180+ Countries+ +8 Symantec Security Response Centers

4Symantec ConfidentialSymantec Mobile Enterprise Security

The Smartphone Security “Perfect Storm”

Outdated Thinking: 75% of companies have not addressed smartphone security*(60% cite security as biggest mobility obstacle*)

IT is Organizing:Ad hoc deployment giving way to centralized policies that include all endpoints (Server, PC, Laptop and Mobile)

Mobile/wireless IT spending likely to exceed IT budget growth in many organizations: 12.5% avg. growth rate (Source: Gartner)

Increasing Mobile Device Threats: Mobile virus variants have doubled every 6 months since 2004 (235 mobile virus variants in H1’06)(Source: Symantec Security Response)

Enterprise Faith: 80% of companies are allowing corporate data on devices, yet continue to not secure the data*

Fastest Growing Device Segment: Smartphone growth = 77%Other mobiles = 27%Mobiles out ship PC’s 5:1 in 2006(Source: Canalys for H1’05 to H1’06, IDC & Gartner)

* Q1 2006 Symantec survey conducted by Economist Intelligence Unit

5Symantec ConfidentialSymantec Mobile Enterprise Security

Policy Management

Event & Log ManagementInformation ManagementVulnerability Management

Information SecurityInformation Security

Security FoundationSecurity Foundation

Mobile Devices are Part of the Endpoint

SmartphoneSmartphone LaptopLaptop DesktopDesktop File ServerFile Server Application ServerApplication Server Messaging ServerMessaging Server Database ServerDatabase Server

Security ManagementSecurity Management

i!

Se

curity

Se

curity

Da

sh

bo

ard

Da

sh

bo

ard

6Symantec ConfidentialSymantec Mobile Enterprise Security

Integrated ProtectionProtection from unwanted network intrusions, as well as from viruses, Trojans, and worms

Centralized ManagementAdministrators can configure, lock, and enforce security policies either remotely or locally

Comprehensive ResponseAutomatic wireless security and application updates via LiveUpdate™ ensure current on-device protection

Symantec Mobile Security Strategy

7Symantec ConfidentialSymantec Mobile Enterprise Security

Mobile is the newest platform… and now part of the endpoint

Emerging Mobile market lags PC… hackers attack the weakest link

Smartphones… the newest step in device evolution

Hybrid Ownership – The “Pro-sumer”… both employee & consumer

Loss/Theft/Damage of the device far more likely than PCs

New Trends in Mobile Device Attacks: Pranking4Profit

Snoopware

Loss Mitigation

Mobile Security Trends

8Symantec ConfidentialSymantec Mobile Enterprise Security

Mobile attacks now are more for financial gain… not notoriety

Premium SMS attacks can drain user accounts

Mobile devices are increasingly becoming payment instruments

Pranking4Profit

Mobile devices are becoming digital wallets and identities

9Symantec ConfidentialSymantec Mobile Enterprise Security

Invasion of Privacy

People are the Perimeter: Mobile blurs the distinction between Employee and Consumer, between user and network If a mobile phone is always with you… it is always at risk

Snoopware: Mobile spyware exploits telephony apps…not just e-mail

Snoopware

Snoopware puts a stranger in your bedroom and a competitor in your boardroom

10Symantec ConfidentialSymantec Mobile Enterprise Security

Loss/Theft/Damage of mobile devices is far more likely than PCs

Regulations forcing disclosure on lost laptops will apply to mobile phones as the information is shared between devices

Loss Mitigation: Flexible defense to match the risk

Loss Mitigation

Lost phones hurt everyone:

Users, Employers, and Operators

11Symantec ConfidentialSymantec Mobile Enterprise Security

Future of Mobile Enterprise and Security

Mobile security and mobile device management market: $1B in 2004, $12B in 2009; 78% CAGR (Source: Adventis)

Mobile/wireless IT spending likely to exceed IT budget growth in many organizations: 12.5% avg. growth rate (Source: Gartner)

Enterprises will extend existing security applications to mobile devices

Mobile devices will increase their role in security

Enterprises will need security that support key mobile platforms: Symbian, Windows, Palm, and Linux

Ad hoc mobile security approaches are giving way to centralized security policies that address ALL endpoint devices: PCs, laptops and smartphones

ISPs will enable enterprises to secure “in region”

Symantec Protects Information, Interactions & Infrastructure

Thank You!