Extending Secure Enterrpise Content and Apps to Mobile Devices - ionGrid and RSA Webinar

Please download to get full document.

View again

All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
 2
 
 

Slides

  A few years ago, only the laptop had remote access to internal applications and secure file stores. Today, employees want ubiquitous access to job-critical content and applications on ANY device, and if IT doesn't support mobile devices just the same as laptops, they will often use personal email and cloud storage accounts to get what they need. This slide presentation is from a webinar hosted by ionGrid and RSA, and it covers new options on how companies can securely extend firewalled content and enterprise applications to mobile devices to make employees more productive.
Related documents
Share
Transcript
  • 1. RSA and ionGrid Webinar Securely Extending the Information Infrastructure© Copyright 2011 EMC Corporation. All rights reserved. 1
  • 2. The Panel Kurt Foeller, Moderator Michael Rothrock, ionGrid Co-founder, VP Product Donald Weller, RSA Sales Leader - Authentication Robert Petersen, RSA Product Manager, SecurID© Copyright 2011 EMC Corporation. All rights reserved. 2
  • 3. Agenda1.Mobile trends2.Mobile content requirements3.Stratos highlights4.Stratos-RSA solution5.RSA highlights© Copyright 2011 EMC Corporation. All rights reserved. 3
  • 4. Let’s start with some fresh dataTablets are booming - 119M in 2012, up 140% Android sales eclipsed iPhone in 2012 Mobile workers carry 3+ devices 25% of mobile workers bypass IT controls © Copyright 2011 EMC Corporation. All rights reserved. 4
  • 5. Mobile Trends in 20131. Increased Mobilization2. Advanced Persistent Threats3. Universal Information Access© Copyright 2011 EMC Corporation. All rights reserved. 5
  • 6. Mobile Trend #1: Increased Mobilization© Copyright 2011 EMC Corporation. All rights reserved. 6
  • 7. BIG PICTURE: BY 2011, THE DIGITAL UNIVERSE SURPASSED 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 © Copyright 2011 EMC Corporation. All rights reserved. 7
  • 8. $© Copyright 2011 EMC Corporation. All rights reserved. 8
  • 9. Mobile Trend #2: Advanced Persistent Threats© Copyright 2011 EMC Corporation. All rights reserved. 9
  • 10. © Copyright 2011 EMC Corporation. All rights reserved. 10
  • 11. 855 174,000,000Source: Verizon RISK Team: 2012 Data Breach Investigations Report © Copyright 2011 EMC Corporation. All rights reserved. 11
  • 12. Mobile Trend #3: Universal Information Access© Copyright 2011 EMC Corporation. All rights reserved. 12
  • 13. What employees want• To do ‘real work’ on smartphones and tablets just the same as laptops © Copyright 2011 EMC Corporation. All rights reserved. 13
  • 14. Secure mobile content access is easier said than done Chief Concerns Regulatory User Access Authentication Compliance Control Data Loss IT Resources Overhead Costs Prevention© Copyright 2011 EMC Corporation. All rights reserved. 14
  • 15. Baseline requirements forsecure mobile access For the User For IT and Compliance Single sign-on and seamless Information protection, not device connectivity protection Containerized information Two-factor auth on mobile devices approach© Copyright 2011 EMC Corporation. All rights reserved. 15
  • 16. Introducing ionGrid StratosStratos allows users to easily and securely accessbusiness files and applications on iPad & iPhone© Copyright 2011 EMC Corporation. All rights reserved. 16
  • 17. The Stratos Platform Pixel-perfect  Compliant rendering HTML5, CSS3 Annotation SharePoint, file Docs  Single sign-on servers, ECMs Web Stratos Core  iOS Native or Core provides single Apps HTML 5 sign on and secure access  Auth & security © Copyright 2011 EMC Corporation. All rights reserved. 17
  • 18. Use Cases in Brief • Increased security strength with two-factor authentication • Integrated solution for banking customers • Fast deployment time© Copyright 2011 EMC Corporation. All rights reserved. 18
  • 19. Two-Factor Authentication© Copyright 2011 EMC Corporation. All rights reserved. 19
  • 20. Increased content security with two-factor authentication© Copyright 2011 EMC Corporation. All rights reserved. 20
  • 21. Authenticator Options© Copyright 2011 EMC Corporation. All rights reserved. 21
  • 22. Key Features & Solution Benefits Solution Benefit Solution and Feature Detail Meet compliance Direct integration to RSA ensures that 2-factor regulations authentication policies are consistently applied to all devices Ease of Support for multi-factor authentication to address integration user requirements Increased security Expanded security model covering highly regulated industries Scalable Scalable security model and architecture infrastructure Comprehensive Complete mobile security solution: application, content solution information, and document protection© Copyright 2011 EMC Corporation. All rights reserved. 22
  • 23. THANK YOU For more information: Donald Weller Donald.WellerIII@rsa.com Stephen Bulfer stephen@iongrid.com© Copyright 2011 EMC Corporation. All rights reserved. 23
  • Related Search
    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks