Automated Security for iOS and Android Devices

13
© 2010 Fiberlink Communications MORE Webinar Series © 2010 Fiberlink Communications Automated Security for iOS and Android Devices John Nielsen

description

Learn how to secure iOS and Android devices including smartphones and tablets in the enterprise. Learn more at: http://www.maas360.com/products/mobile-device-management/apple-ios/

Transcript of Automated Security for iOS and Android Devices

Page 1: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series© 2010 Fiberlink Communications

Automated Security for iOS and Android Devices

John Nielsen

Page 2: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series 2

Agenda

> Mobile Device Management Essentials> Automated Security via Real Time Compliance > Essential Features> IT Value> Real World Use Case Review> How to get started

Page 3: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Mobile Device Management Essentials

The Basics> Single Console Management

> Device enrollment

> OTA configuration

> Security policy management

> Real-time reporting

> Remote lock & wipe

> Self-service Portal

Advanced Management> Corporate App Storefront

> Application and Document Management

> Event-based Security and Compliance Rules Engine

3

MaaS360 Event-based Security & Compliance

Device Enrollment,

Acceptable Use

Corp App Storefront

MDM Actions

Page 4: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Essential Features for Event Based Security

> Real time device evaluation Evaluate device compliance in real time

> User/Admin Notification Support Directly message user and administrators when out of

compliance

> Automated Action Enforcement and Removal Take immediate action or provide user a “grace period” to

remediate violation Auto “lift” of enforced action when device returns to

compliant state

> VIP/Exempt Devices Mark devices as exempt from automated action

> Full Audit History Support Track action history

Page 5: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

The Basics of Automated Security Compliance

> Ensure Devices meet Compliance Requirements Critical Detection Capabilities:

• Enforce MDM Management• Minimum OS Version• Remote Wipe Compliance• Jailbreak/Root Detection

> Take Action on Rule Violations Critical Action Capabilities:

• Alert User & Admin• Block Email Access

5

• Encryption Compliance• Application Restrictions

(iOS/Android)• SIM Change• Roaming State Change

• Restrict Device (Email, Wi-Fi, VPN)• Wipe Device

Page 6: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

IT Value

>Ensure Devices Meet Compliance Requirements

>Proactive Compliance>Mitigate Business and Legal

Risk >Give IT peace of mind by

automating compliance enforcements policies Real time alerting &

enforcement Take action without IT admin

intervention

Page 7: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

How can MaaS360 Help?

7

One Window. One System.

Page 8: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Use Case: Enforce Minimum Device Version

> Ensure devices are running security approved versions of Android or Apple OS

> If out of compliance immediately ‘Restrict Device’ from connecting to corporate resources (email, VPN, Wi-Fi)

> Restore connectivity once upgrade to approved version takes place

Page 9: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Use Case: Wipe Jailbroken iPhones

> Ensure iOS devices have not been Jailbroken

> If out of compliance, notify user and wait 2 days for remediation

> If not remediated, wipe device to factory default settings

Page 10: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Use Case: Application Management Enforcement

> Ensure unwanted applications are not installed and running on devices

> If found, immediately block user from corporate email

> Restore connectivity to email when restricted app has been removed

Page 11: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Take the Free Evaluation

See for yourself…

Go to www.maas360.comand click “Get Started”

11

Page 12: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Network World MDM Product Test

“Fiberlink’s MaaS360 is our Clear Choice Winner, based on its strong overall performance, particularly its ease of use. The application initially shocked us, as it was comparatively simple to deploy.”

MaaS360 is the Clear Choice Winner

Page 13: Automated Security for iOS and Android Devices

© 2010 Fiberlink CommunicationsMORE Webinar Series

Wrap-up

> Up-coming Webinars (http://maasters.maas360.com/webinars/)

August 18th – Optimized Management for iPhones, iPads, and Androids with Exchange 2007 & Exchange 2010

September 1st – Best Practices for Enabling Android Devices in the Enterprise

> Past Webinars (http://links.maas360.com/webinars/)

Forrester - Map Your Mobility Strategy to Meet New Demands Aberdeen – Best Practices for Managing iPhones, iPads, and Androids Enterprise Mobility Foundation - Managing Personal Mobile Devices In Your

Business

> Plus lots of How-To content at the MaaSters Center Mobile Device Management Best Practices

• http://links.maas360.com/mdm/ Mobile Device Management Strategy Series from Lopez Research

• http://links.maas360.com/mdmstrategy/ Mobile Device Management Glossary

• http://links.maas360.com/mdmglossary/

13

Questions or follow-up?John Nielsen- [email protected]