technological solutions for the new mobile …xnetworks.es/contents/exn/mobileenterpriseing.pdf ·...

4
TECHNOLOGICAL SOLUTIONS FOR THE NEW MOBILE ENTERPRISE www.exclusive-networks.com • [email protected] • Tel: 902 108 872

Upload: truongcong

Post on 18-Feb-2019

217 views

Category:

Documents


0 download

TRANSCRIPT

TECHNOLOGICAL SOLUTIONS FOR THE NEW MOBILE ENTERPRISEwww.exclusive-networks.com • [email protected] • Tel: 902 108 872

APPLICATION

ACCESS

DEVICE

PRO

OFP

OIN

T

MOBILEI

RON

MOBILEIRON

SOPH

OS

ZS

CALER

AER

OH

IVE

NET

WO

RKS

PA

LOALTO

NETWORKS

MOBILEIRON

VIDYO

AEROHIVE NETWO

RKS

AEROHIVE NETWORKS

The business world is no stranger to the mobility phenomenon, nor should it be. With the explosion of new devices and applications, the way people communicate has changed. And with it, so have the fundamentals of infrastructure, security and IT administrator management.

What was once a BYOD problem, arising from users’ progressive incorporation of laptops, smartphones,

Enterprise mobility requires new foundations that can support the technology. LAN-access infrastructure models, perimeter security and the management of users, applications and devices have all changed dramatically.

Exclusive Networks, a SuperVAD and pioneer in launching and promoting new technologies, has brought together a set of technologies and solutions adapted to the necessities of today’s mobile enterprise under the acronym MEE (Mobile Enterprise Eco-System).

tablets and hybrids into companies, is now a businessreality, enabling improvements in employee productivity and cost reductions.

Yesterday’s technology platforms for managing users, applications and devices are no longer valid today. IT perimeter security is also an obsolete concept.

MEE provides the visibility and control required by IT administrators for the correct management and security of their users, applications and content:

• Mobile users.• Cloud-based applications.• Control of personal devices - BYOD (Bring Your Own Device).• Control of corporate devices - MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Content Management), etc.

MOBILE ENTERPRISE ECO-SYSTEMTECHNOLOGICAL SOLUTIONS FOR THE NEW MOBILE ENTERPRISE

MEE, A NEW TECHNOLOGY PARADIGMFOR THE MOBILE ENTERPRISE

AEROHIVE NETWORKS provides mobile enterprises with Intelligent Access Points for WLAN connectivity without costly controllers. It offers a suitable professional solution for distributed environments, small branch offices and teleworking.

• Can adapt to the sharp increase in Wi-Fi clients.• Optimizes applications created specifically for mobile users.• Equipped with ubiquitous Wi-Fi coverage with 8-10 times greater bandwidth, via 802.11n.• Allows Wi-Fi as a viable Ethernet substitution for accessing critical business applications.• Enables the joint use of cable and wireless access, interchangeably. • Provides simple, secure guest access.• Level 7 security.• Easy implementation.• Management in the cloud.

Aerohive’s WLAN Access Points are organized in ”hives” that share control information among themselves and make functions like fast and secure

MOBILE ENTERPRISES REQUIRE NEW ACCESS TECHNOLOGIES FOR APPLICATIONS AND CONTENT

ENTERPRISE MOBILITY TRANSFORMS DEVICE MANAGEMENT AND SECURITY MODELS

Access to applications and content no longer depends on a specific physical location or controls based on ports and protocols.

MOBILEIRON offers the most secure and innovative Enterprise Mobile Management (EMM) technology. Its solutions enable secure mobile device use in companies, safeguarding sensitive corporate data and shielding the network from mobile threats, while complying with regulatory and corporate policies.

Mobileiron is the first solution capable of combining the administration of data-controlled smart devices and wireless device cost control in real time:

• Secure application management (Apps@Work).

• Application blacklist/whitelist to protect against inappropriate access or use.

• Secure application downloading (App Delivery Network).

• Secure storage and synchronization (AppConnect).

• Secure tunnel through AppTunnel.

• Data loss prevention and secure access to Sharepoint / data in the cloud (Sentry and Docs@ Work).

• Encryption and multi-device security policies.

• Multi-device granular control enabling the differentiation of applications and professional data from personal data with different security and access policies.

• Centralized management of users, devices and geolocation services.

• Etc.

SOPHOS completes the range of EMM solutions with Sophos Mobile Control, providing complete mobile device security by blocking malware and controlling devices, applications, data and network access.

Sophos Mobile Control protects mobile devices by centralizing security settings, remotely blocking unwanted features and wiping data from lost or stolen devices. Sophos also enables the consistent application of security policies, secure password and locking period policies, application control and installation, and blocking of cameras, browsers and YouTube.

Thanks to Sophos, IT administrators can reduce administrative tasks through a self-service portal that lets users register new devices and lock or wipe lost phones.

PALO ALTO NETWORKS provides visibility and control of Internet applications used in corporate networks, thanks to a next-generation firewall that classifies traffic based on the application’s exact identification, regardless of port, protocol, SSL encryption or any other evasive tactic. The company goes one step further with its Global Protect solution, extending the concept to mobile users, regardless of their geographical location, meaning that security policies can remain centralized and predictable even when users aren’t.

L2/L3 roaming, dynamic RF management, security, service quality and mesh networking possible. Aerohive can be managed easily from the cloud and allows unprecedented levels of application security (level 7) for each client, regardless of their physical location or medium used.

To round out the range of e-mail security solutions for hybrid environments, PROOFPOINT also provides innovative solutions for e-mail compliance and security, minimizing costs and simplifying management.

As every company is different, flexibility features highly in Proofpoint’s solutions, implementation and technical service. The company is a leader in SaaS e-mail solutions, but also specializes in virtual and hybrid device implementation.

THE MOBILITY PHENOMENON SHOULDN’T PUT THE SECURITY OF E-MAIL AND WEB BROWSING AT RISK

TECHNOLOGY INFRASTRUCTURE SHOULDN’T BE LEFT OUT OF THE MOBILITY PHENOMENON

Running a business anywhere while protecting users and the organization is a challenge that every company must meet. Do you feel your security is at risk when users are out of your network or using uncontrolled devices?

Mobility requires companies to provide new, faster, more intelligent and automated communication and security infrastructure, based on the SaaS and cloud model.

This vision considers that mobile user application preferences, the use of various devices and user habits will have a profound and radical effect on the creation and supply of the next generation of infrastructure.

The technology products offered by Exclusive Networks are complemented by cutting-edge, disruptive solutions that are adapted to the changing times:

• Offers high-performance solutions that help organizations accelerate, optimize and secure

their applications. With mobility, access is multiplied, and A10 Networks optimizes and secures networks thanks to a greater understanding of user and application traffic, so that appropriate policies can be applied to prioritize application bandwidth, the optimized use of multiple links, and more.

ZSCALER makes your business operate securely and flexibly outside of the corporate network, simplifying the IT environment and reducing costs through advanced cloud-based service with more than 100 data centers worldwide.

Zscaler leads the next generation of web security and SaaS e-mail tools, protecting users on any device, in any location, even outside the corporate network, by inspecting bidirectional traffic in real-time and protecting users from new advanced Internet threats:

• Protection of mobile users and their mobile devices wherever they are, safeguarding confidential data and corporate e-mail, even when accessed from unprotected public places.

• Advanced control of social networking and the Web 2.0.

• Direct access to the Internet through Zscaler Secure Cloud Gateway, eliminating return traffic

to company headquarters and the high latency generated by its vast MPLS network.

• Real-time security: zero-hour protection against the most advanced threats.

• Rapid rollout: the cloud enables the solution’s quick rollout and easy maintenance.

• Verifies compliance with corporate security policies and identifies and tracks users and

IT resources on the network, allowing for the detection of improper use and unauthorized access. Arbor Networks provides maximum visibility to everything happening on the network, creating accurate, customized usage reports and generating alerts if traffic deviations are detected.

• Leader in stopping cybernetic attacks that use advanced malware, zero-day exploits

and APT tactics. FireEye solutions round out the defense system of firewalls, IPS, anti-virus solutions and gateways that can’t stop more advanced threats. FireEye security appliances reinforce the security of workstations connected to the company network, controlling them and disabling any malware activity. They also prevent data loss as a result of latest-generation malware thanks to its FACT (FireEye Attack Confirmation Technology), which identifies compromised devices and prevents contagion.

• Data security leader that provides a full security life cycle for databases and files

in companies and public institutions and for the applications that they use. Leading global companies, government organizations and service providers rely on Imperva to prevent sensitive data theft, protect against data leaks, have secure applications and ensure data confidentiality.

• The leader in network auto-mation solutions responds to the five biggest questions facing

IT departments regarding the mobility phenomenon: who has access to what; who and where they are; what network requirements are needed for which devices; what improvements must be made to guarantee network security and operation; and finally, how to be prepared for the arrival of new, as yet unknown devices. Infoblox centrally distributes and manages network services that support network infrastructure and applications.

• Provides the necessary visibilityand knowledge to defend against cyber attacks, detect

and respond to increasingly sophisticated threats and ensure compliance with regulations (PCI DSS, NERC CIP, GLBA, FISMA, HIPAA, SOX and GPG 13).

LogRhythm analyses and manages the data network, the host and user activity data files in one integrated solution.

• Offers a complete portfolio oftelepresence solutions for video-conferencing from any terminal onany network without expensive network upgrades, making it a

perfect solution for mobile environments. Vidyo’s adaptive architecture of video layers provides low-latency, high-definition videoconferencing on general data networks and the Internet using any device. Vidyo offers solutions for service provider facilities and companies that incorporate various types of terminals to meet all kinds of technical and business needs.

• Provides a single, manageable and scalable solution to encryptany fi le, any database, any

application, in any location without sacrificing application performance or creating complexity in key management.