mobile-centric zero trust security framework · 2020. 1. 6. · apps, profiles and policies grant...
TRANSCRIPT
Mobile-centric
Zero Trust Security
Framework
Alex Mosher
Global VP of Solutions
DISCLAIMER
Statements in this presentation concerning future prospects, business outlook, and product
availability and plans are forward looking statements that involve a number of uncertainties and
risks. Factors that could cause actual events or results to differ materially include: sales productivity;
possible disruptive effects of organizational changes; shifts in customer demand; perceptions of
MobileIron and its prospects; technological changes; competitive factors; unanticipated delays in
scheduled product availability dates; general business conditions; delays and inabilities in
negotiating third partner partnerships, and other factors. The information on the roadmap is intended
to outline our general product direction and it should not be relied upon in making purchasing
decisions. The information on any roadmap shown is not a commitment, promise or legal obligation
to deliver any material, code or functionality. The development, release and timing of any features or
functionality described for our products remains at MobileIron’s sole discretion. Future product will
be priced separately. This roadmap does not constitute an offer to sell any product or technology.
Mobile is at the
center of our universe
Smartphones
over PCs
Website traffic
from phonesPhone looks
per day
Higher throughput
from 5G vs 4G
Daily active users
on Slack
The second most
popular app
category
Enabling simple, secure
financial transactions
And starting to appear
as the primary ID
for consumer apps.
Leading the way for enterprise apps
of enterprises
are using cloud
is the average number
of cloud apps an enterprise uses
With the adoption of mobile and
cloud traditional perimeter-based
security is no longer sufficient
…and it’s all secured by a password?
Hmm.
of breaches involve
weak, default or stolen
passwords
Passwords are
a security risk
Yet, 2/3 breached every year
$124B spent on IT security
This shift requires a new
security approach
The zero trust approach
Assume bad actors are on your network
Never trust, always verify…
On-going compliance enforcement
Validate
the device
Establish
user context
Check app
authorizationVerify
networks
Detect and
remediate threats
WHO’S GOING TO FULLY SECURE
AND UNLEASH THE POWER OF A
PERIMETER-LESS MOBILE ENTERPRISE?
Identity-centric
approach?
Gateway-centric
approach?
Device-centric
approach?
Limited visibility
on device, app, and threats
Passwords are
a security risk.
Limited visibility
on device, app, and threats
25% enterprise traffic doesn’t go
through the enterprise network
Comprehensive correlation between
user, device, app, networks and
threats
Mobile is at the center
of the enterprise
No. No. Yes.
A mobile-centric zero trust approach
Provision any
device for a user
with the appropriate
apps, profiles and
policies
Grant access
based on full
context (user, device, app,
network, threat, time,
location and OS)
Enforce
security policies (user, device, app,
network, threat, time,
location and OS)
Protect data
at rest and in motion
by containerizing
and eliminating
threats on the device
Ever-presentBiometrics becoming
your identityAmazing consumer
experiences
Mobile: More powerful than you think
would do away with
passwords if they could
and believe they can
reduce their risk of breach
by half
Security leaders believe
that mobile devices will
be your ID
Customers
A PROVEN MOBILE LEADER
Business critical
endpoints
Security patents
Revenue renewal rate
Ecosystem partners
Gartner
leaders quadrant
Recognition: