Presentation is loading. Please wait.

Presentation is loading. Please wait.

Triple-Layered Security. INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY.

Similar presentations


Presentation on theme: "Triple-Layered Security. INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY."— Presentation transcript:

1 Triple-Layered Security

2 INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY App Lockout App Block & Wipe App PIN File Recall DEVICE SECURITY iOS 4 Data Protection Hardware Encryption Device Provisioning VPN Device Remote Wipe

3 ROAMBI APP PIN ➡ Optional PIN for Roambi App ➡ Prompts users to create PIN if option is enabled ➡ Two Deployment Options: ➡ Always - whenever app is opened or brought to foreground ➡ Offline Only—whenever app is used without data connection or in airplane mode

4 ROAMBI ANALYTIC RECALL

5 USING ANALYTIC RECALL ➡ Use to remove or replace an RBI ➡ Prevents download of RBI ➡ Removes existing RBI from devices ➡ Prevent users from viewing recalled RBI ➡ Removes RBI from Portal list

6 USING APP LOCKOUT ➡ Initial defense for misplaced device ➡ Prevents opening of Roambi app ➡ No data is wiped from device ➡ Pre-cursor to Block & Wipe ➡ Initiated on the Control Panel

7 johndeemacbook.local

8 USING BLOCK & WIPE ➡ Blocks app when launch is attempted ➡ Targeted Wipe of Roambi content ➡ Targeted Wipe of Account Information ➡ Roambi app remains ➡ Does not wipe entire device

9 johndeemacbook.local

10 Deployment Options

11 Roambi can leverage both server and client side certificates. By using both server and client certificates you can guarantee the highest level of security for your corporate network and data. BI SYSTEM Are you a trusted site? ROAMBI PUBLISHER ROAMBI VIEWS Outer Firewall ROAMBI SERVER Ports would be opened on the firewall to allow phone users to access Roambi and to allow Roambi to access your BI System Inner Firewall DEPLOYMENT OPTIONS: ES IN THE DMZ

12 DEPLOYMENT OPTIONS: REVERSE PROXY Here only a web server exists in the DMZ which acts as a proxy to Roambi. BI SYSTEM ROAMBI PUBLISHER ROAMBI SERVER REVERSE PROXY ROAMBI VIEWS Outer Firewall Inner Firewall Are you a trusted site?

13 Outer Firewall DEPLOYMENT OPTIONS: VPN Users utilize the VPN client on the iPhone to access Roambi. Can use VPN on demand or user enabled VPN. BI SYSTEM ROAMBI PUBLISHER ROAMBI SERVER ROAMBI VIEWS

14 Outer Firewall Roambi can leverage both server and client side certificates. By using both server and client certificates you can guarantee the highest level of security for your corporate network and data. TWO-WAY SSL AUTHENTICATION BI SYSTEM Are you a trusted site? ROAMBI VIEWS ROAMBI PUBLISHER


Download ppt "Triple-Layered Security. INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY."

Similar presentations


Ads by Google