do you know if your android devices are safe?
DESCRIPTION
As more and more of your employees are purchasing Android devices, and expecting to use them for work, are you prepared? Android is the top mobile operating system in the US, and analysts expect this won’t change anytime soon. The openness of the operating systems brings benefits and also risks, and you need to make sure your corporate data is protected. Join Matthew Olszewski, Senior Manager, Strategic Alliances, Enterprise Mobility at Samsung, and Tyler Stone, Strategic Partner Manager at Apperian, as they show you how you can secure corporate data on Android devices in the enterprise.TRANSCRIPT
Samsung / Apperian
The critical question facing mobile businesses today
How do we protect corporate data on hundreds and thousands ofmobile devices – especially if we don’t own them?
• Companies deploying appswith sensitive and proprietarycorporate data
• > 50% of the US workforce
owns their own smartphone
• 61% of global enterprisessupport use of personaldevices
Data source: Gartner;Forrester
Securing apps and data – not just the device
MAM and some MDM solutions offer a variety of basic appmanagement capabilities, including:
• Delete remotely• Device wipe and/or lock• Malware inspection
But real app security requiresa more focused effort …
… encrypting and protecting data at theapp level, not the device or OS
• Requires integration at the time of app development• Updating security policies requires development• Does not support pre-existing or developed apps
• Performance and battery hog• Separates data – doesn’t secure it• Separates & divides the native user experience
Mobile app security: key comparisons
Virtual Machines
Integrated SDKs
• Cannot enforce policies on individual apps & users• Separates & divides the native user experience• Multiple apps within a “Super App”
Sandboxes /Containers
• No development or source code access required• Fine-grained policies down to individual apps & users• Maintains native user experience
App Policies
Use API's to add securityinto app at development
time
Installation of secondaryOS on device – apps run
within this VM
Multiple apps run within asingle, secured container
Security policies wrappedor injected into compiled
app
Technology Description Considerations
✗
✗
✗
✓
Apperian app policies … powered by Mocana
wrapped around individual mobile apps
• Uses FIPS 140-2 certified encryption and SuiteB algorithms
• Enables:o Separation of enterprise & personal datao “Bring Your Own Device” to worko Protection of enterprise datao Native user experience
(a) App-Level Data Encryption(b) App-Level VPN(c) App-Level Passcode(d) App-Level Copy/Paste Protection
Apperian app policies – a deeper look
Security andUsage Policies Capability
• Accomplished through a fully-automated technique called “App Wrapping”
• Supports managed & unmanaged devices:
o Internal employee facing apps
o Customer/Partner Apps (B2C, B2B)
Let’s see how this all actually works…
DEMO