Partner Brochure
Transcription
Partner Brochure
Partner Brochure Enterprises Can Securely Manage Their Mobility with Lacoon and AirWatch Lacoon Mobile Security provides a Mobile Threat Management Platform that integrates with AirWatch® Mobile Device Management to enable enterprises to securely manage and mitigate the risks of BYOD to protect their corporate assets from zero-day and advanced mobile cyber threats. Lacoon complements and strengthens AirWatch’s security capabilities with a platform that delivers a multi-layer approach: Mobile Vulnerability Assessments: identifying vulnerabilities at the device, application and network layer that represent risks to an enterprise’s corporate data and resources. Advanced Threat Detection: combining multiple patent-pending techniques to uncover advanced persistent threats (APTs), as well as emerging, zero-day attacks. Dynamic Risk-Based Mitigation: proactively triggering defenses based on real-time risk levels, with the ability to eliminate malicious mobile applications and exploits to prevent eavesdropping and data exfiltration. Together, enterprises can manage and reduce the risks iOS and Android devices pose to their environment. The Lacoon Difference Most Comprehensive Vulnerability/Threat Assessment Capabilities – Lacoon looks at all the different threat vectors attackers can try to exploit on the devices, in the applications and in the network to determine the risks introduced by an enterprise’s mobility. Android Detection Capabilities iOS Detection Capabilities Unparalleled Attack Detection Rooting Applications Device Jailbreaks Capabilities – The unique ability to File System Tampering Stolen or Fake Certificates correlate findings from proprietary Vulnerable Configurations Malicious Profiles behavioral algorithms with real-time Suspicious Configuration Changes Suspicious Configuration Changes Secure Container Compromises Secure Container Compromises information on the device’s activity Malicious Behaviors: Spy-phones, Malicious Behaviors: Spy-phones and network connections enables SMS interception, Key Logging, Lacoon to detect attacks that evade all Screen Scraping other solutions. Real-Time Risk Profiles – Lacoon assigns a real-time risk score - Low, Medium or High – that represents the threat-level of each device, based on ongoing threat assessments. Man-in-the-Middle Attacks Connections to Rogue Hotspots Exploits Against OS Versions Proxy, VPN Man-in-the-Middle Attacks Exploits Against OS Versions Risk-Based Mitigation – Enterprises can choose how best to manage and mitigate their risks, with remediation options on the device, in the network or through the AirWatch integration (with the ability to remove or block an AirWatch Profile from the device until the threat is eliminated). Enterprise-Ready Solution – The integration of Lacoon and AirWatch enables customers to quickly and easily roll out Lacoon’s security measures, while keeping operational costs low. The integration makes it easy to add, remove, update and enforce corporate security policies. Minimal User Impact – The non-intrusive, easily deployable solution provides security, without impacting the end user’s experience or privacy. Partner Brochure Dynamic Attack Protection and Policy Enforcement Enabled by Lacoon and AirWatch The integration of Lacoon and AirWatch enables enterprise customers to: Strengthen Mobile Device Policy Management and Enforcement Simplify the Roll out of Advanced Mobile Security Lower Operational Costs 1 Lacoon App Sends Device Risk Information to Lacoon’s Behavioral Risk Engine (BRE) for Analysis Runs in the Background Enforces Attack Mitigation on the Device 2 Risk Calculated Lacoon BRE Analyzes Device, App and Network Data to Identify: Vulnerabilities in the Device, OS and Configurations. Malicious Applications Mobile Antivirus Malicious Device and Network Events & Assigns Each Device a Score Reflecting its RealTime Risk Level 3 Threat-Based Mitigation Policy A Mitigation Policy is Set by the Enterprise to Define How Low, Medium and High Risk Devices Should be Handled, Including Which AirWatch Profiles the Devices Can Access 4 Threat Mitigation For High Risk Devices, Active Protection Capabilities Can Be Used to Keep Corporate Data & Resources Safe: Via AirWatch Integration to change access privileges On the Device to remove the malicious app In the Network to block malicious traffic Partner Brochure What We Do: Simplify Enterprise Mobility AirWatch® by VMware® is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable enterprise mobility management platform integrates with existing enterprise systems and allows you to manage all devices, regardless of type, platform or ownership, from one central console. Every Mobile Device Manage any mobile device type, including smartphones, tablets, laptops, desktops, rugged devices, printers and peripherals. • Smartphones and tablets • Laptops and desktops • Rugged devices • Printers and peripherals Every Mobile Operating System Support multiple operating systems including Android™, Apple® iOS, BlackBerry®, Mac® OS and Windows® across your organization. • Android • Mac OS • Apple iOS • Windows • BlackBerry Every Mobile Deployment Enable mobile deployments with multiple device ownership models, including corporate, employee-owned and line of business. • Corporate: end user and multiuser • Employee: BYOD • Line of business: kiosk and shared Company Differentiators Product Differentiators • 12,000+ customers in 150 countries • Common development platform • 1,800+ employees across ten offices • Broadest mobility solution set • 600+ research and development resources • Multitenant, highly scalable architecture • Recognized as the industry leader • Advanced integration with mobile ecosystem • Expertise in building enterprise solutions •Flexible delivery: cloud and on premise Partner Brochure How We Do It: Enterprise Mobility Management Platform Workspace AirWatch® Workspace provides complete separation of corporate and personal data on a device, ensuring corporate resources are secure and employee privacy is maintained. A secure containerized solution for all enterprise data including email, applications, content and browsing, AirWatch Workspace is managed at the application level without MDM, making it ideal for BYOD and high regulation deployments. Devices AirWatch allows you to gain visibility into the devices – including smartphones, tablets and laptops – connecting to your enterprise network, content and resources. Quickly enroll devices in your enterprise environment, update device settings over-the-air and enforce security policies and compliance across your entire device fleet. Apps AirWatch enables you to manage internal, public and purchased apps across devices enrolled in your organization. Distribute, update, track and recommend apps with the AirWatch® App Catalog. Build custom business apps with the AirWatch® Software Development Kit, or wrap existing internal applications for advanced security with AirWatch® App Wrapping. Content AirWatch secures document distribution and promotes content collaboration anytime, anywhere with AirWatch® Secure Content Locker™. Access your corporate documents, email attachments and user-generated content in a secure container. Protect sensitive les with user authentication, le encryption, geofencing, sharing limitations and offline viewing restrictions. Email AirWatch integrates with your existing email infrastructure to deliver comprehensive security for mobile email. Control device access to corporate email and encrypt sensitive data with AirWatch® Secure Email Gateway. Containerize email and provide a consistent user experience with AirWatch® Inbox for Android and Apple iOS. Browsing AirWatch® Browser is a secure browsing alternative to native browsers and provides organizations with the ability to configure customized settings to meet unique business and end-user needs. Dene and enforce secure browsing policies for intranet sites without a device-level VPN. Enable secure browsing with whitelists and blacklists or kiosk mode. Our Customers