+ All Categories
Home > Technology > MCA 2013 - Symantec - Peter van Leeuwen

MCA 2013 - Symantec - Peter van Leeuwen

Date post: 18-Nov-2014
Category:
Upload: emerce
View: 749 times
Download: 1 times
Share this document with a friend
Description:
 
26
Enterprise Mobility Driving Productivity Without Sacrificing Protection Peter van Leeuwen Principal Systems Engineer, Endpoint Management & Mobility
Transcript
Page 1: MCA 2013 - Symantec - Peter van Leeuwen

Enterprise Mobility Driving Productivity Without Sacrificing Protection

Peter van Leeuwen Principal Systems Engineer, Endpoint Management & Mobility

Page 2: MCA 2013 - Symantec - Peter van Leeuwen

Founded in 1982

IPO in 1989

Approximately 20,500 Employees

Operations in 50 Countries

#379 on the 2013 Fortune 500

100 Percent of Fortune 500 Companies are Customers

$6.9 Billion Revenue in FY2013; Approximately 52% Outside of the U.S.

More Than 1,500 Global Patents

Included on Fortune’s Most Admired Companies List

Invests 14% of Annual Revenue in R&D*

* R&D Investments is Non-GAAP

We Protect Information and

Identities Independent of

Platform: Physical, Mobile,

Virtual, Cloud

in Office and Shop Floor IT

Page 3: MCA 2013 - Symantec - Peter van Leeuwen

Evolving Challenges

Page 4: MCA 2013 - Symantec - Peter van Leeuwen

Evolving Challenges

Page 5: MCA 2013 - Symantec - Peter van Leeuwen

Evolving Challenges

Page 6: MCA 2013 - Symantec - Peter van Leeuwen

Evolving Challenges

Page 7: MCA 2013 - Symantec - Peter van Leeuwen

BYOD Perception

Benefits Hardware procurement

savings

Contract plan savings

Increased worker productivity

Employee satisfaction

Competitive advantage

Risks Information security

Legal

Page 8: MCA 2013 - Symantec - Peter van Leeuwen

Benefits Hardware procurement

savings

Contract plan savings

Increased worker productivity

Employee satisfaction

Competitive advantage

Risks Information security

Legal

Reality

Page 9: MCA 2013 - Symantec - Peter van Leeuwen

BYOD: Is all a Myth, Hype or …..

• By the end of last year Intel

– had 23,500 mobile devices in it´s BYOD program (+ 38%)

– supported 41 mobile applications

– added 16 approved applications that could be used as part of its BYOD program in 2012 (+ 64%)

• Employees report they are saving an average of 57 minutes daily

• This savings equates to an annual productivity gain of about 5 million hours from BYOD in 2012 alone

Intel´s BYOD Program

Source: Intel IT Performance Report 2012-2013

Page 10: MCA 2013 - Symantec - Peter van Leeuwen

Productivity Without Compromise Mission: “Any device, Anywhere, Any time!!!”

Manage Devices Dynamically

Secure App Community

Secure Data at Rest and in Transit

Enable Users

Page 11: MCA 2013 - Symantec - Peter van Leeuwen

Selecting the Right Solution for the Enterprise Understanding various use cases

Company-owned Personally-owned

Man

age

d

Un

man

age

d

Company Controls Personal Device

Company Controls Relevant Apps and Data Only

Company Controls Standard Device

Company Owned But Unmanaged

Company owned, but unmanaged

Company controls personal device Company controls standard device

Company controls relevant apps and data only

Ap

p c

en

tric

D

evic

e ce

ntr

ic

BYOD

Page 12: MCA 2013 - Symantec - Peter van Leeuwen

Five Pillars of Our Solution

Company credentials extended to both public and private

cloud services

User & App Access Mgmt.

Corporate data separation and delivery of IT

services

App & Data Protection

Configuration, control and

management of mobile devices

Device Management

Mobile security threat detection and

removal

Threat Protection

Enterprise-grade file sharing and

collaboration in the cloud

Secure File Sharing

Consolidating Access, Management & Security:

Solve Bigger Jobs

Enabling Productivity Through Apps

Separating Personal and Corporate Data

Page 13: MCA 2013 - Symantec - Peter van Leeuwen

App & Data Protection

Quickly enable group based mobile app and content

delivery

ENABLE SECURE MANAGE

Policy management

for data protection and

compliance

Lifecycle management with updates

and revocation

app

Page 14: MCA 2013 - Symantec - Peter van Leeuwen

App & Data Protection App Protection Without Source Code Changes

How Does It work?

Apps and content are wrapped and secured in a

policy controlled container. Authentication, encryption

and other policies are enabled with Symantec App

Center. No source code modifications are required.

.IPA or .APK file with standard libraries

App wrapped with Symantec Libraries and policy controls

ready for deployment

Page 15: MCA 2013 - Symantec - Peter van Leeuwen

App & Data Protection Introducing Symantec Secure Email

Page 16: MCA 2013 - Symantec - Peter van Leeuwen

App & Data Protection App Ecosystem – Apps with built-in Symantec security technology

Availability: 2H CY2013

http://go.symantec.com/SSP

Content / Document Mgmt

Accellion

Alfresco

Asdeqlabs Asdeqdocs

BigTinCan Hub

Citrix ShareFile

Framehawk

Luminix Pulsar

Content / Document Mgmt

WatchDox

Webalo

Office Productivity Apps

Symantec Secure Email

Branchfire iAnnotate

Byte2 Office2 HD

GoodiWare GoodReader

Ikonic Mail

Infraware Polaris Office

Industry Specific

Basis Design Barcode Essentials

Browsing & Messaging

Damaka Xavy

Gryphn Secure Messaging

Mobotap Dolphin Browser

• Extends App Center policy to third-party commercial apps

• Delivery through vendor app stores

Remote Management

Splashtop

Ericom

Page 17: MCA 2013 - Symantec - Peter van Leeuwen

Key Takeaways

Page 18: MCA 2013 - Symantec - Peter van Leeuwen

Mobility: The question is……

If Why When

How

Page 19: MCA 2013 - Symantec - Peter van Leeuwen

Mobility is more than apps & devices

Page 20: MCA 2013 - Symantec - Peter van Leeuwen

BYOD MDM

Page 21: MCA 2013 - Symantec - Peter van Leeuwen

BUILD STRATEGY 1ST

Page 22: MCA 2013 - Symantec - Peter van Leeuwen

Step back and create a bigger strategy

Page 23: MCA 2013 - Symantec - Peter van Leeuwen

BE DEVICE INDEPENDANT

Page 24: MCA 2013 - Symantec - Peter van Leeuwen

Don´t forget Training & Support

Page 26: MCA 2013 - Symantec - Peter van Leeuwen

Thank you!

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Peter van Leeuwen

[email protected] @P_vanLeeuwen


Recommended