the mobile wireless enterprise: managing the new complexity
DESCRIPTION
The Mobile Wireless Enterprise: Managing the New Complexity. Paul Miller Managing Director, Wireless & Mobile. More than 15 years experience in mobile and security industries - PowerPoint PPT PresentationTRANSCRIPT
2Symantec ConfidentialSymantec Mobile Enterprise Security
More than 15 years experience in mobile and security industries
Develop Symantec’s mobile client security strategy and delivery and the overall vision for mobile and wireless as it pertains to the enterprise and consumer markets
Key highlights: Identity strategy using mobile infrastructure to combat identity fraud,
particularly for the enterprise and financial markets
PKI-based identity and mobile commerce
Copy protection, license management, and Digital Rights Management product lines
Paul MillerManaging Director, Wireless & Mobile
3Symantec ConfidentialSymantec Mobile Enterprise Security
Hundreds of MSS customersMillions of security alerts per monthMillions of threat reports per month200,000 malware submissions per month
Symantec™ Global Intelligence Network
Twyford, England
Munich, Germany
Alexandria, VA
Sydney, Australia
Redwood City, CA
Santa Monica, CA
Calgary, Canada
San Francisco, CA
Dublin, Ireland
Pune, India
Taipei, Taiwan
Tokyo, Japan
>6,200 Managed Security Devices + 120 Million Systems Worldwide + 30% of World’s email Traffic +AdvancedHoneypot Network
74 Symantec Monitored Countries+4 Symantec SOCs 40,000+ Registered Sensors
in 180+ Countries+ +8 Symantec Security Response Centers
4Symantec ConfidentialSymantec Mobile Enterprise Security
The Smartphone Security “Perfect Storm”
Outdated Thinking: 75% of companies have not addressed smartphone security*(60% cite security as biggest mobility obstacle*)
IT is Organizing:Ad hoc deployment giving way to centralized policies that include all endpoints (Server, PC, Laptop and Mobile)
Mobile/wireless IT spending likely to exceed IT budget growth in many organizations: 12.5% avg. growth rate (Source: Gartner)
Increasing Mobile Device Threats: Mobile virus variants have doubled every 6 months since 2004 (235 mobile virus variants in H1’06)(Source: Symantec Security Response)
Enterprise Faith: 80% of companies are allowing corporate data on devices, yet continue to not secure the data*
Fastest Growing Device Segment: Smartphone growth = 77%Other mobiles = 27%Mobiles out ship PC’s 5:1 in 2006(Source: Canalys for H1’05 to H1’06, IDC & Gartner)
* Q1 2006 Symantec survey conducted by Economist Intelligence Unit
5Symantec ConfidentialSymantec Mobile Enterprise Security
Policy Management
Event & Log ManagementInformation ManagementVulnerability Management
Information SecurityInformation Security
Security FoundationSecurity Foundation
Mobile Devices are Part of the Endpoint
SmartphoneSmartphone LaptopLaptop DesktopDesktop File ServerFile Server Application ServerApplication Server Messaging ServerMessaging Server Database ServerDatabase Server
Security ManagementSecurity Management
i!
Se
curity
Se
curity
Da
sh
bo
ard
Da
sh
bo
ard
6Symantec ConfidentialSymantec Mobile Enterprise Security
Integrated ProtectionProtection from unwanted network intrusions, as well as from viruses, Trojans, and worms
Centralized ManagementAdministrators can configure, lock, and enforce security policies either remotely or locally
Comprehensive ResponseAutomatic wireless security and application updates via LiveUpdate™ ensure current on-device protection
Symantec Mobile Security Strategy
7Symantec ConfidentialSymantec Mobile Enterprise Security
Mobile is the newest platform… and now part of the endpoint
Emerging Mobile market lags PC… hackers attack the weakest link
Smartphones… the newest step in device evolution
Hybrid Ownership – The “Pro-sumer”… both employee & consumer
Loss/Theft/Damage of the device far more likely than PCs
New Trends in Mobile Device Attacks: Pranking4Profit
Snoopware
Loss Mitigation
Mobile Security Trends
8Symantec ConfidentialSymantec Mobile Enterprise Security
Mobile attacks now are more for financial gain… not notoriety
Premium SMS attacks can drain user accounts
Mobile devices are increasingly becoming payment instruments
Pranking4Profit
Mobile devices are becoming digital wallets and identities
9Symantec ConfidentialSymantec Mobile Enterprise Security
Invasion of Privacy
People are the Perimeter: Mobile blurs the distinction between Employee and Consumer, between user and network If a mobile phone is always with you… it is always at risk
Snoopware: Mobile spyware exploits telephony apps…not just e-mail
Snoopware
Snoopware puts a stranger in your bedroom and a competitor in your boardroom
10Symantec ConfidentialSymantec Mobile Enterprise Security
Loss/Theft/Damage of mobile devices is far more likely than PCs
Regulations forcing disclosure on lost laptops will apply to mobile phones as the information is shared between devices
Loss Mitigation: Flexible defense to match the risk
Loss Mitigation
Lost phones hurt everyone:
Users, Employers, and Operators
11Symantec ConfidentialSymantec Mobile Enterprise Security
Future of Mobile Enterprise and Security
Mobile security and mobile device management market: $1B in 2004, $12B in 2009; 78% CAGR (Source: Adventis)
Mobile/wireless IT spending likely to exceed IT budget growth in many organizations: 12.5% avg. growth rate (Source: Gartner)
Enterprises will extend existing security applications to mobile devices
Mobile devices will increase their role in security
Enterprises will need security that support key mobile platforms: Symbian, Windows, Palm, and Linux
Ad hoc mobile security approaches are giving way to centralized security policies that address ALL endpoint devices: PCs, laptops and smartphones
ISPs will enable enterprises to secure “in region”