Partner Brochure

Transcription

Partner Brochure
Partner Brochure
Enterprises Can Securely Manage Their Mobility with Lacoon and AirWatch
Lacoon Mobile Security provides a Mobile Threat Management Platform that integrates with AirWatch® Mobile
Device Management to enable enterprises to securely manage and mitigate the risks of BYOD to protect their
corporate assets from zero-day and advanced mobile cyber threats. Lacoon complements and strengthens
AirWatch’s security capabilities with a platform that delivers a multi-layer approach:



Mobile Vulnerability Assessments: identifying vulnerabilities at the device, application and network
layer that represent risks to an enterprise’s corporate data and resources.
Advanced Threat Detection: combining multiple patent-pending techniques to uncover advanced
persistent threats (APTs), as well as emerging, zero-day attacks.
Dynamic Risk-Based Mitigation: proactively triggering defenses based on real-time risk levels, with the
ability to eliminate malicious mobile applications and exploits to prevent eavesdropping and data
exfiltration.
Together, enterprises can manage and reduce the risks iOS and Android devices pose to their environment.
The Lacoon Difference
Most Comprehensive Vulnerability/Threat Assessment Capabilities – Lacoon looks at all the different threat
vectors attackers can try to exploit on the devices, in the applications and in the network to determine the risks
introduced by an enterprise’s mobility.
Android Detection Capabilities
iOS Detection Capabilities
Unparalleled Attack Detection
Rooting Applications
Device Jailbreaks
Capabilities – The unique ability to
File System Tampering
Stolen or Fake Certificates
correlate findings from proprietary
Vulnerable Configurations
Malicious Profiles
behavioral algorithms with real-time
Suspicious Configuration Changes
Suspicious Configuration Changes
Secure
Container
Compromises
Secure Container Compromises
information on the device’s activity
Malicious Behaviors: Spy-phones,
Malicious Behaviors: Spy-phones
and network connections enables
SMS
interception,
Key
Logging,
Lacoon to detect attacks that evade all
Screen Scraping
other solutions.
Real-Time Risk Profiles – Lacoon
assigns a real-time risk score - Low,
Medium or High – that represents
the threat-level of each device, based
on ongoing threat assessments.
Man-in-the-Middle Attacks Connections to Rogue Hotspots
Exploits Against OS Versions
Proxy, VPN Man-in-the-Middle
Attacks
Exploits Against OS Versions
Risk-Based Mitigation – Enterprises can choose how best to manage and mitigate their risks, with remediation
options on the device, in the network or through the AirWatch integration (with the ability to remove or block
an AirWatch Profile from the device until the threat is eliminated).
Enterprise-Ready Solution – The integration of Lacoon and AirWatch enables customers to quickly and easily
roll out Lacoon’s security measures, while keeping operational costs low. The integration makes it easy to add,
remove, update and enforce corporate security policies.
Minimal User Impact – The non-intrusive, easily deployable solution provides security, without impacting the
end user’s experience or privacy.
Partner Brochure
Dynamic Attack Protection and Policy Enforcement Enabled by Lacoon and AirWatch
The integration of Lacoon and AirWatch enables enterprise customers to:



Strengthen Mobile Device Policy Management and Enforcement
Simplify the Roll out of Advanced Mobile Security
Lower Operational Costs
1
Lacoon App
Sends Device Risk
Information to
Lacoon’s
Behavioral Risk
Engine (BRE) for
Analysis
 Runs in the
Background
 Enforces Attack
Mitigation on the
Device
2
Risk Calculated
Lacoon BRE
Analyzes Device,
App and Network
Data to Identify:
 Vulnerabilities in the
Device, OS and
Configurations.
 Malicious
Applications
 Mobile Antivirus
 Malicious Device and
Network Events
& Assigns Each
Device a Score
Reflecting its RealTime Risk Level
3
Threat-Based
Mitigation
Policy
A Mitigation Policy
is Set by the
Enterprise to Define
How Low, Medium
and High Risk
Devices Should be
Handled, Including
Which AirWatch
Profiles the Devices
Can Access
4 Threat Mitigation
For High Risk
Devices, Active
Protection
Capabilities Can Be
Used to Keep
Corporate Data &
Resources Safe:
 Via AirWatch
Integration to
change access
privileges
 On the Device to
remove the
malicious app
 In the Network to
block malicious
traffic
Partner Brochure
What We Do: Simplify Enterprise Mobility
AirWatch® by VMware® is the global leader in enterprise-grade mobility solutions across every device, every
operating system and every mobile deployment. Our scalable enterprise mobility management platform
integrates with existing enterprise systems and allows you to manage all devices, regardless of type, platform or
ownership, from one central console.
Every Mobile Device
Manage any mobile device type, including smartphones, tablets,
laptops, desktops, rugged devices, printers and peripherals.
• Smartphones and tablets
• Laptops and desktops
• Rugged devices
• Printers and peripherals
Every Mobile Operating System
Support multiple operating systems including Android™, Apple® iOS,
BlackBerry®, Mac® OS and Windows® across your organization.
• Android
• Mac OS
• Apple iOS
• Windows
• BlackBerry
Every Mobile Deployment
Enable mobile deployments with multiple device ownership models,
including corporate, employee-owned and line of business.
• Corporate: end user and multiuser
• Employee: BYOD
• Line of business: kiosk and shared
Company Differentiators
Product Differentiators
• 12,000+ customers in 150 countries
• Common development platform
• 1,800+ employees across ten offices
• Broadest mobility solution set
• 600+ research and development resources
• Multitenant, highly scalable architecture
• Recognized as the industry leader
• Advanced integration with mobile ecosystem
• Expertise in building enterprise solutions
•Flexible delivery: cloud and on premise
Partner Brochure
How We Do It: Enterprise Mobility Management Platform
Workspace
AirWatch® Workspace provides complete separation of corporate and personal data on a device, ensuring corporate
resources are secure and employee privacy is maintained. A secure containerized solution for all enterprise data including
email, applications, content and browsing, AirWatch Workspace is managed at the application level without MDM, making
it ideal for BYOD and high regulation deployments.
Devices
AirWatch allows you to gain visibility into the devices – including smartphones, tablets and laptops – connecting to your
enterprise network, content and resources. Quickly enroll devices in your enterprise environment, update device settings
over-the-air and enforce security policies and compliance across your entire device fleet.
Apps
AirWatch enables you to manage internal, public and purchased apps across devices enrolled in your organization.
Distribute, update, track and recommend apps with the AirWatch® App Catalog. Build custom business apps with the
AirWatch® Software Development Kit, or wrap existing internal applications for advanced security with AirWatch® App
Wrapping.
Content
AirWatch secures document distribution and promotes content collaboration anytime, anywhere with
AirWatch® Secure Content Locker™. Access your corporate documents, email attachments and user-generated content in a
secure container. Protect sensitive les with user authentication, le encryption, geofencing, sharing limitations and offline
viewing restrictions.
Email
AirWatch integrates with your existing email infrastructure to deliver comprehensive security for mobile email. Control
device access to corporate email and encrypt sensitive data with AirWatch® Secure Email Gateway. Containerize email and
provide a consistent user experience with AirWatch® Inbox for Android and Apple iOS.
Browsing
AirWatch® Browser is a secure browsing alternative to native browsers and provides organizations with the ability to configure customized settings to meet unique business and end-user needs. Dene and enforce secure browsing policies for
intranet sites without a device-level VPN. Enable secure browsing with whitelists and blacklists or kiosk mode.
Our Customers