mobile-centric zero trust security framework · 2020. 1. 6. · apps, profiles and policies grant...

24
Mobile-centric Zero Trust Security Framework Alex Mosher Global VP of Solutions

Upload: others

Post on 09-Oct-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Mobile-centric

Zero Trust Security

Framework

Alex Mosher

Global VP of Solutions

Page 2: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

DISCLAIMER

Statements in this presentation concerning future prospects, business outlook, and product

availability and plans are forward looking statements that involve a number of uncertainties and

risks. Factors that could cause actual events or results to differ materially include: sales productivity;

possible disruptive effects of organizational changes; shifts in customer demand; perceptions of

MobileIron and its prospects; technological changes; competitive factors; unanticipated delays in

scheduled product availability dates; general business conditions; delays and inabilities in

negotiating third partner partnerships, and other factors. The information on the roadmap is intended

to outline our general product direction and it should not be relied upon in making purchasing

decisions. The information on any roadmap shown is not a commitment, promise or legal obligation

to deliver any material, code or functionality. The development, release and timing of any features or

functionality described for our products remains at MobileIron’s sole discretion. Future product will

be priced separately. This roadmap does not constitute an offer to sell any product or technology.

Page 3: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Mobile is at the

center of our universe

Page 4: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Smartphones

over PCs

Website traffic

from phonesPhone looks

per day

Page 5: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Higher throughput

from 5G vs 4G

Daily active users

on Slack

The second most

popular app

category

Page 6: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Enabling simple, secure

financial transactions

Page 7: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

And starting to appear

as the primary ID

for consumer apps.

Page 8: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Leading the way for enterprise apps

Page 9: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

of enterprises

are using cloud

is the average number

of cloud apps an enterprise uses

Page 10: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

With the adoption of mobile and

cloud traditional perimeter-based

security is no longer sufficient

Page 11: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

…and it’s all secured by a password?

Hmm.

Page 12: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

of breaches involve

weak, default or stolen

passwords

Passwords are

a security risk

Page 13: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Yet, 2/3 breached every year

$124B spent on IT security

Page 14: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

This shift requires a new

security approach

Page 15: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

The zero trust approach

Assume bad actors are on your network

Never trust, always verify…

On-going compliance enforcement

Validate

the device

Establish

user context

Check app

authorizationVerify

networks

Detect and

remediate threats

Page 16: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

WHO’S GOING TO FULLY SECURE

AND UNLEASH THE POWER OF A

PERIMETER-LESS MOBILE ENTERPRISE?

Identity-centric

approach?

Gateway-centric

approach?

Device-centric

approach?

Limited visibility

on device, app, and threats

Passwords are

a security risk.

Limited visibility

on device, app, and threats

25% enterprise traffic doesn’t go

through the enterprise network

Comprehensive correlation between

user, device, app, networks and

threats

Mobile is at the center

of the enterprise

No. No. Yes.

Page 17: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

A mobile-centric zero trust approach

Provision any

device for a user

with the appropriate

apps, profiles and

policies

Grant access

based on full

context (user, device, app,

network, threat, time,

location and OS)

Enforce

security policies (user, device, app,

network, threat, time,

location and OS)

Protect data

at rest and in motion

by containerizing

and eliminating

threats on the device

Page 18: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Ever-presentBiometrics becoming

your identityAmazing consumer

experiences

Mobile: More powerful than you think

Page 19: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

would do away with

passwords if they could

and believe they can

reduce their risk of breach

by half

Page 20: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Security leaders believe

that mobile devices will

be your ID

Page 21: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect
Page 22: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect
Page 23: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect

Customers

A PROVEN MOBILE LEADER

Business critical

endpoints

Security patents

Revenue renewal rate

Ecosystem partners

Gartner

leaders quadrant

Recognition:

Page 24: Mobile-centric Zero Trust Security Framework · 2020. 1. 6. · apps, profiles and policies Grant access based on full context (user, device, app, network, threat, time ... Protect