Safely Enabling Mobile Devices with GlobalProtect Unlocking The Potential of Mobile Depends On Security Benefits to Business Running Your Business on Mobile Devices Accessing Business Apps Intranet Email Mobile Maturity •2 | ©2014, Palo Alto Networks. Confidential and Proprietary. Existing Approaches for Mobile Security Don’t Work Approach Exposure to Risk Block mobile devices People will still use mobile devices, except without your control Hope existing security protects mobile devices Don’t know if existing measures will be effective for mobile devices Use basic mobile security like ActiveSync Doesn’t address mobile threats and won’t secure apps and data •3 | ©2014, Palo Alto Networks. Confidential and Proprietary. New approach to safely enabling mobile devices Manage the Device Protect the Device Control the Data Ensure devices are safely enabled while simplifying deployment & setup • Ensure proper settings in place, such as strong passcodes and encryption • Simplify provisioning of common configuration like email and certificates Protect the mobile device from exploits and malware • Protecting the device from infection also protects confidential data and unauthorized network access Control access to data and movement of between applications • Control access by app, user, and device state • Extend data movement controls to the device to ensure data stays within “business apps” •4 | ©2014, Palo Alto Networks. Confidential and Proprietary. GlobalProtect Mobile Security Solution GlobalProtect Mobile Security Manager GlobalProtect Gateway Delivers mobile threat prevention and policy enforcement based on apps, users, content and device state Provides device management, malware detection, and device state GlobalProtect App Enables device management, provides device state information, and establishes secure connectivity •5 | ©2014, Palo Alto Networks. Confidential and Proprietary. Manage The Device GlobalProtect Mobile Security Manager Manage device settings • Enforce security settings such as passcode • Restricts device functions such as camera • Configure accounts such as email, VPN, Wi-Fi settings Understand device state • Monitor and report device state for policy enforcement, such as: • Whitelisted / blacklisted apps • Rooted / jailbroken Perform key operations • Ex: lock, unlock, wipe, send a message Detect Android Malware • GlobalProtect App 6 | ©2014, Palo Alto Networks. Confidential and Proprietary. Detect and react to the presence of malware Protect The Device Consistent security everywhere GlobalProtect Gateway • IPsec/SSL VPN connection to a purpose built next generation security platform for policy enforcement regardless of the device location Mobile threat prevention Threats GlobalProtect App 7 | ©2014, Palo Alto Networks. Confidential and Proprietary. • Vulnerability (IPS) and malware (AV) protection for mobile threats • URL filtering for protection against malicious websites • WildFire static and dynamic analysis for advanced mobile threats Control The Data Applications and Data GlobalProtect Gateway Control access to applications and data • Granular policy determines which users and devices can access sensitive applications and data • Policy criteria based on application, user, content, device, and device state for control and visibility • • Identify device types such as iOS, Android, Windows, Mac devices • Identify device ownership such as personal (BYOD) or corporate issued • Identify device states such as rooted/jailbroken File blocking based on content and content type Control data movement between apps on the device • GlobalProtect App 8 | ©2014, Palo Alto Networks. Confidential and Proprietary. Solution provides the foundation for future developments in data protection How the integrated solution works GlobalProtect Mobile Security Manager pricing & availability Mobile Security Manager runs on the new GP-100 appliance GP-100 appliance comes with support for up to 500 mobile devices Additional capacity licenses (perpetual) to support additional devices 1K, 2K, 5K, 10K, 25K, 50K, and 100k WildFire subscription (optional add-on) for Android malware detection Price varies based on underlying capacity license Orders and shipments expected February 2014 GP-100 is not designed to be sold as a stand alone product Requires other GlobalProtect components for full functionality (app, portal, gateway) Learn more New materials – public site and partner center 10 | ©2014, Palo Alto Networks. Confidential and Proprietary. System Setup Configure Portal to enable GP-100 Configure Gateway to receive mobile hip Setup GP-100 - Quickly talk about Quick Start Guide to get the device up and running GlobalProtect Portal Setup •Page 12 | © 2013 Palo Alto Networks. Proprietary and Confidential. Mobile Security Manager Setup on Gateway •Page 13 | © 2013 Palo Alto Networks. Proprietary and Confidential. Mobile Security Manager Setup •Page 14 | © 2013 Palo Alto Networks. Proprietary and Confidential. Mobile Security Manager Features Demo Dashboard - Widgets Monitor – MDM Logs, HIP Match Logs, Reports, Custom Reports Devices – Filters, Actions, Import Policy – iOS and Android Configurations, HIP Objects, Policies , Notifications Dashboard - Widgets •Page 16 | © 2013 Palo Alto Networks. Proprietary and Confidential. Monitor – MDM Logs, HIP Match Logs, Reports, Custom Reports •Page 17 | © 2013 Palo Alto Networks. Proprietary and Confidential. Devices – Filters, Actions, Import •Page 18 | © 2013 Palo Alto Networks. Proprietary and Confidential. Policy – iOS and Android Configurations, HIP Objects, Policies •Page 19 | © 2013 Palo Alto Networks. Proprietary and Confidential. Wildfire Integration Malware signatures from Wildfire – daily content update on GP-100 GlobalProtect App send the list of installed apps to GP-100 GP-100 will detect if the apps contain Malware Gateway via HIP report learns about devices that contain Malware GP-100 and Gateway can react to presence of Android malware and enforce policy. Setup – Dynamic Updates •Page 21 | © 2013 Palo Alto Networks. Proprietary and Confidential. Gateway- Mobile Device HIP Demo Mobile Device HIP Object Creation View Mobile Device HIP report Mobile Security Policy to control access to an application Gateway – Mobile HIP Object for use in Security Policy •Page 23 | © 2013 Palo Alto Networks. Proprietary and Confidential. Mobile Device HIP View from Panorama Configure HIP Match Log forwarding on the gateway to view from panorama End User Experience Demo App install from Play/App Store Connect to portal Complete enrollment (iOS and Android) Device configured automatically (iOS) Mobile Security Landscape Mobile Security Manager vs. Leading MDM Vendors Common Features Features Other MDM has slightly more Options Features we don’t support but other MDMs do Features we do better than other MDMs Features GlobalProtect MDM Leading MDM Vendors Device management Set Passcode, VPN, Wi-fi, certs, email, web clips, Disable Camera etc Same Reporting and dashboards Yes Yes Mobile OS Support iOS, Android iOS, Android(+ Samsung Safe), Windows Phone, Blackberry Device Actions Lock, Wipe, Message Same + some Selective Wipe Deployment Option On-Premise appliance On-Premise, Cloud/Hosted End-user self service portal No (target next year) Yes Enterprise app store & App Management No (target next year) Yes Data Protection/DLP on devices No (target next year) Various approaches – App/Document Containers, App Wrapping, Email Control etc. Roaming management & reporting No Yes Max # devices supported 100,000 Don’t Know; Cloud may scale but onpremise most likely not Management Features Role based Admin, logging, Syslog, Directory Integration, SNMP etc. Yes but potentially not fully baked Malware detection Yes No , some soft claims Automated device policy based on device state Yes limited Integration with VPN/Firewall for Granular security policy based on device state Yes Active Sync Connectors to block email access Why Palo Alto Networks for Mobile Security Integrates the necessary technologies – VPN, policy, threat prevention, management Uniquely capable of protecting the device by leveraging WildFire, IPS, and app policy Rich security platform that can protect all traffic, devices, applications and data – in the network 28 | ©2014, Palo Alto Networks. Confidential and Proprietary.