Triple-Layered Security. INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Meraki Mobile Device Management
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
SSL From Your Smartphone Support for Android Smartphones /
1 Enabling Secure Internet Access with ISA Server.
Barracuda Networks Steve Scheidegger Commercial Account Manager
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Your storage on the ground; Your files in the cloud.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Troubleshooting Windows Vista Security Chapter 4.
20 21 Remote Wipe.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Module 5: Configuring Internet Explorer and Supporting Applications.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Milestone SAP Portal Learning at the Lakes August 12, 2009.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Module 11: Designing an Active Directory Federation Services Implementation in Windows Server 2008.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level –Remove: EncRc5-0 EncRc5-40 EncRc5-56.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
User and Device Management
20 21 Remote Wipe.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
CudaLaunch for Barracuda NG Firewall.
Palo Alto Networks Certified Network Security Engineer
Chapter 5 Electronic Commerce | Security Threats - Solution
Contents Software components All users in one location:
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
The sign of success.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
6/17/2018 5:54 AM OSP322 Getting the best of both worlds, making the most of SharePoint hybrid search solutions Shyam Narayan Microsoft © 2013 Microsoft.
Securing the Network Perimeter with ISA 2004
Chapter 5 Electronic Commerce | Security Threats - Solution
Implementing TMG Server Publishing
Business mail account in yahoo
Utilize Group Policy Terminal Server Settings
Access and Information Protection Product Overview October 2013
Identity & Access Management
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
System Center Marketing
Designing IIS Security (IIS – Internet Information Service)
Securing web applications Externally
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Presentation transcript:

Triple-Layered Security

INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY App Lockout App Block & Wipe App PIN File Recall DEVICE SECURITY iOS 4 Data Protection Hardware Encryption Device Provisioning VPN Device Remote Wipe

ROAMBI APP PIN ➡ Optional PIN for Roambi App ➡ Prompts users to create PIN if option is enabled ➡ Two Deployment Options: ➡ Always - whenever app is opened or brought to foreground ➡ Offline Only—whenever app is used without data connection or in airplane mode

ROAMBI ANALYTIC RECALL

USING ANALYTIC RECALL ➡ Use to remove or replace an RBI ➡ Prevents download of RBI ➡ Removes existing RBI from devices ➡ Prevent users from viewing recalled RBI ➡ Removes RBI from Portal list

USING APP LOCKOUT ➡ Initial defense for misplaced device ➡ Prevents opening of Roambi app ➡ No data is wiped from device ➡ Pre-cursor to Block & Wipe ➡ Initiated on the Control Panel

johndeemacbook.local

USING BLOCK & WIPE ➡ Blocks app when launch is attempted ➡ Targeted Wipe of Roambi content ➡ Targeted Wipe of Account Information ➡ Roambi app remains ➡ Does not wipe entire device

johndeemacbook.local

Deployment Options

Roambi can leverage both server and client side certificates. By using both server and client certificates you can guarantee the highest level of security for your corporate network and data. BI SYSTEM Are you a trusted site? ROAMBI PUBLISHER ROAMBI VIEWS Outer Firewall ROAMBI SERVER Ports would be opened on the firewall to allow phone users to access Roambi and to allow Roambi to access your BI System Inner Firewall DEPLOYMENT OPTIONS: ES IN THE DMZ

DEPLOYMENT OPTIONS: REVERSE PROXY Here only a web server exists in the DMZ which acts as a proxy to Roambi. BI SYSTEM ROAMBI PUBLISHER ROAMBI SERVER REVERSE PROXY ROAMBI VIEWS Outer Firewall Inner Firewall Are you a trusted site?

Outer Firewall DEPLOYMENT OPTIONS: VPN Users utilize the VPN client on the iPhone to access Roambi. Can use VPN on demand or user enabled VPN. BI SYSTEM ROAMBI PUBLISHER ROAMBI SERVER ROAMBI VIEWS

Outer Firewall Roambi can leverage both server and client side certificates. By using both server and client certificates you can guarantee the highest level of security for your corporate network and data. TWO-WAY SSL AUTHENTICATION BI SYSTEM Are you a trusted site? ROAMBI VIEWS ROAMBI PUBLISHER