Beruflich Dokumente
Kultur Dokumente
Agenda
About The Attachmate Group, Inc. (TAG) Your World Is On The Move Q&A
Revenue US$1 billion in FY13 (April 12 March 13) Solid balance sheet with US$300 million+ of cash
Leadership:
Jeff Hawn, Chairman and CEO, TAG Charles Sansbury, CFO and COO, TAG Kathleen Owens, President and General Manager, Attachmate Bob Flynn, President and General Manager, Novell Jay Gardner, President and General Manager, NetIQ Nils Brauckmann, President and General Manager, SUSE
3
Enterprise Linux Server Enterprise Linux Desktop Virtualization Cloud Computing Integrated Systems
Work Used to Be
Whats Changed
10
113 cell phones are lost or stolen every minute in the U.S.
Nearly 12,000 laptops are lost or go missing at U.S. airports every week
Most organizations dont leverage the security features built into the device
11
12
13
VP just lost his smartphone and needs data wiped to prevent a security breach
Manager at a closing needs to print a lastminute change to a contract from his mobile devices
14
of organizations report increase in virus or malware infections due to insecure mobile devices
14,900
files from malicious programs targeting Android were detected in Q2 of 2012
every 12 seconds
during the first half of 2011
15
2,500
MALWARE
Yet most smartphones and tablets have little security protection.
TYPES OF MOBILE
Only 4%
of smartphones & tablets have security installed
Less than 1 in 20
smartphones & tablets have third-party security software installed
Security
demand is expected to soar in coming years
16
DATA IS VULNERABLE
Half of all mobile users store their passwords and credit card info on their device
Contact Lists Emails 62% 58% 52% 35% 34% 30%
60%
Of lost or stolen smartphones contain the following sensitive data:
17
83%
66% of employees use free file-sharing platforms that are vulnerable to malicious cyber attacks
70 Million
smartphones are lost every year
FREE FILE-SHARING PLATFORMS ARE DANGEROUS
for enterprise because they lack proper file security and file management that businesses require
66%
46% of employees are not aware of their organizations IT policies
86%
41% of employees use their personal devices for work without permission from the company
41%
41% of employers allow employees to use their own devices to access business files
FIXA USERS
have reported concerns with security for their free personal accounts at BOX
41%
40% of employees allow their kids to use their work computer at home
In 2011,
DROPBOX
accounts could be accessed without a password due to a security glitch
40%
18
16%
of them have corporate data professionally wiped from their mobile device
19
5%
of them had their old device securely destroyed
SOURCES: http://www.ctia.org/advocacy/research/index.cfm/AID/10323 http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/a#mobilesecurity http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/a#topmobilemarkets http://blog.kensington.com/security/2012/01/10/the-cost-of-stolen-laptops-tablets-and-smartphones/
58%
of them keep their old device
Gartner Recommends
Organizations must deploy EFSS services to secure enterprise information assets. Failure to provide these capabilities will subject organizations to information leakage threats caused by users who move data through uncontrolled personal cloud services.
MarketScope for Enterprise File Synchronization and Sharing (EFSS), Gartner, Feb 12, 2013
You can tell users what they are not allowed to do, but you still need to provide a viable alternative
20
Hassles
http://www.youtube.com/watch?v=7y8Zz1prX6M
21
Mobile Printing
22
Demonstration
ZENworks Mobile Management
Mobile Device Management
Filr
Mobile File Synchronization and Sharing
iPrint
Mobile Printing
24
Today and tomorrow, Novell will leverage what it does best to help you drive better productivity in an ever-changing world.
25
How to
26
http://www.youtube.com/watch?v=_NOjkEH4Rj8
27
28
Evaluation
ZMM Evaluation http://download.novell.com/Download?buildid=2e8jHbBQoMM~ ZMM Online Documentation http://www.novell.com/documentation/zenworksmobile27/index.html
29
This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Novell, Inc. may make improvements in or changes to the software described in this document at any time. Copyright 2011 Novell, Inc. All rights reserved.
All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States. All third-party trademarks are the property of their respective owners.