The New Mobility
Speakers
  Sarah Howland, Editor‐In‐Chief
  Field Technologies Magazine
  Martha Vazquez, Industry Analyst
  Frost & Sullivan
  Andy Willett, Senior Vice President
  NetMotion Wireless




                                        2
Global Mobile VPN Products Market:
         The New Mobility: How Mobile Applications and Devices are Changing
                                  Your Business.


                                           Martha Vazquez, Industry Analyst
                                                  Network Security
                                                   June 17, 2012




© 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of
Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
Today’s Presenter

                   Functional Expertise
                   • Experience in market research, consulting sales and business development with expertise in the
                     Information Communications and Technology Network Security sector.
                   • Developing research and analysis in the Network Security industry in areas such as:
                       - Technology and Demand Trends
                       - Market Sizing
                       - Market Forecasting and Strategic Analysis

                   Industry Expertise
                      Experience base in the information communication technologies sector, leveraging long-standing
                       working relationships with leading industry participants’ Senior Executives
                        - Mobile Security

Martha Vazquez          - Endpoint Security

Industry Analyst        - Managed Security Service Providers (MSSPs)
                        - Content Filtering

Frost & Sullivan   What I bring to the Team
North America         Expertise in managing executive level relationships
San Antonio, TX       In-depth understanding of the network security market
                      Experience in understanding market trends and forecasting
                   Career Highlights
                      Sales Consultant in several leading Wireless firms:
                        - AT&T
                        - Verizon Wireless

                   Education
                   • Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas
                   • Bachelor of Science from Texas State University, San Marcos, Texas




                                                                                                                        4
Focus Points


•   The rise in mobile field workers

•   The needs and challenges for the remote worker

•   The evolving security landscape

•   Security solutions used to support the mobile field worker

•   Defining a Mobile VPN

•   The future outlook for the Mobile VPN market

•   The Last Word




                                                                 5
Poll Question


•   What is the status of your mobile security strategy in place?
     1.   In place today
     2.   Don’t have one and are assessing what to do.
     3.   To be completed in 3 months
     4.   To be completed in 6 months


•   Do you believe that remote workers threaten your corporate
    environment?
     1.   Yes, we need to ensure employees securely access our
          network
     2.   No, we don’t believe the threat is significant




                                                                    6
The Rise in Mobile Field Workers


           Proliferation of Wireless Devices




                                               Source: Frost & Sullivan analysis


                                                                                   7
The needs and challenges for the remote worker

                                          Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020
                          Increase in advanced and complex threats drives               1-2 years     3-5 years             6-10 years
                          demand for Mobile VPN solutions to help manage security
                          on wireless devices
Market Drivers




                               Use of mobile or wireless devices within organizations
                               drives the demand for Mobile VPN solutions

                                   Compliance regulations requires organizations to
                                    implement products such as mobile VPNs
                                            Need for remote accessibility drives the
                                            need for secure and continuous access to
                                            critical data


                                    Budget Concerns due to the global 2011/12
                                    economic slowdown impacts the purchase of
Market Restraints




                                    mobile VPN solutions


                                 The need to support multiple operating systems
                                 slows down mobile VPN development and sales

                               Customer confusion about the importance of
                               mobile security solutions delays spending on
                               products including mobile VPNs
                     Impact:       High       Medium      Low                                                      Source: Frost & Sullivan analysis.



                                                                                                                                                 8
The Evolving Threat Landscape

                                                                          *Malware-as-a-Service (MaaS)
                                        Malware becomes more
                                        sophisticated over time,
                                        while malware tools
                                        emerge as a popular
                                        commodity.


                                                                           APT & *MaaS



                                               Mobile Malware

   Trojans, Botnets, Root kits
             (Zeus)




2006                             2011                              Beyond 2012

                                                                                 Source: Frost & Sullivan analysis


                                                                                                                     9
Security solutions that support the remote worker




                            Mobile VPN    Anti-malware


                                                     Application and
         Content Security
                                                     Device Control
                                    Central
                                  Management
    Data Loss                                              Network Access
    Prevention                                                Control




                      Complete Mobile Security Solution




                                                              Source: Frost & Sullivan analysis


                                                                                              10
Defining a Mobile VPN


•   A Mobile VPN is defined as a specific type of VPN that is
    based on security standards such as Mobile IP, IPSec or
    SSL but us built for wireless or mobile coverage.

    o   Security

    o   Session Persistence

    o   Application Persistence

    o   Network Transparency

    o   Bandwidth Optimization

                                                  Source: Frost & Sullivan analysis


                                                                                  11
Global Mobile VPN Market

  Key Takeaway: An increase in using wireless devices will fuel revenue growth
                                 through 2016




                                                                Source: Frost & Sullivan analysis


                                                                                                12
Global Mobile VPN Market

                          Key Takeaway: The highest penetration rates are expected to come from Cisco,
                                               Juniper, and NetMotion Wireless
                                                       Competitor Growth Analysis
                                                 Total Mobile VPN Products Market: Global, 2010
  Growth rate 2009-2010




                                                                                   Juniper               Cisco
                                                                                   Networks

                                                                                                               NetMotion Wireless
                                                                           IBM
                                                                                               Smith Micro
                                                                                               Software
                                  Birdstep        Radio IP
                                  Technologies
                                                                                  Check Point Software
                                                                                  Technologies
                                                             Columbitech



                                                                                              Revenue ($ Million)
                                 > 10% growth    10-20% Growth             > 20% Growth
                                                                                                  Note: Bubble size represents relative capitalization. The
                                                                                                    base year is 2010. Source: Frost & Sullivan analysis.

<N9B3-74>                                                                                                                                                 13
The Future Outlook for the Mobile VPN Market


            As the need for mobile device security continues to increase, the mobile
      1     VPN market will experience a healthy CAGR of 18.4 percent


            The value of the mobile VPN market is expected to reach $522M by
      2     2017.


            Demand for mobile VPN technologies is increasing as businesses adopt
      3     more mobile devices.


            Mobile VPN will be integrated into security solutions suites and will not
      4     remain a separate product.


            Adoption in the mobile VPN market remains high for telecoms and
      5     government markets.
                                                                               Source: Frost & Sullivan analysis.

<N9B3-74>                                                                                                      14
For Additional Information



 Mireya Espinoza                 Martha Vazquez
 Global Director                 Industry Analyst
 Corporate Communications        Network Security- ICT
 (210) 247-3870                  (210) 247-3864
 Mireya.espinoza@frost.com       Martha.vazquez@frost.com




 Jennifer Bates                  Craig Hays
 Director of Consulting          VP of Sales, North America
 Information and Communication   Information and Communications
 Technologies                    Technologies
 (940) 455-7475                  (210)247-2460
 Jennifer.bates@frost.com        chays@frost.com




<N9B3-74>                                                         15
The New Mobility
Andy Willet, SVP, NetMotion Wireless
Agenda
  Background
  Common Challenges to Mobile Deployments
  Considerations for Mobile VPN Software
  Q&A




                                            17
Background
  NetMotion Wireless
   • Based in Seattle, WA
   • Software provider focused 
     on challenges of mobile field 
     workers and wireless

  Andy Willett
   • 11 years at NetMotion 
     Wireless
   • 11 years at AT&T Wireless 
     and Sprint Wireless




                                      18
Common Challenges to Mobile Deployments
For Mobile Workers: 
  •     Frequent log‐ins, coverage drops 
        hurts productivity
        ▪ Time taken away from project
        ▪ Drain on IT helpdesk                  Case Study:
                                                Regional Public Utility
        ▪ Application crashes
                                                The math added up:
      • Complexity of technology leads to 
                                                • ~ 200 field workers
        low adoption
                                                • ~ 1 hour per day troubleshooting
        ▪ Field workers revert to old methods     connectivity issues/re-logins
        ▪ Solution too complex                  • Multiplied by hourly rate
                                                • Added to IT helpdesk requests
                                                • Equaled large amounts of lost
                                                  productivity each day




   7/23/2012                                                                         19
Common Challenges to Mobile Deployments
For IT Managers: 
   • Limited visibility, management and 
     control into mobile workforce 
     activities and devices
       ▪ Limited control of data access while 
         mobile
       ▪ Limited insight into bandwidth drains
       ▪ No application control
   • Limited control over at‐risk data and 
     anti‐virus support
       ▪ Users and networks at greater risk
       ▪ Limited ability to enforce policies
       ▪ Limited control over device upgrades




   7/23/2012                                     20
Considerations for Mobile VPN Software
   Management
   • Centralized web‐based console
   • Granular view into all devices and usage
   • Ability to generate historical reports

   Security
   • Advanced encryption and authentication
   • Ability to quarantine, verify, and control 
     devices and applications
   • Ability to create and enforce security policies

   Productivity
   • Low complexity, single sign‐on
   • Application persistence through suspend
   • Optimization of bandwidth and connections
Summary 
       Overcoming Common Challenges
            • Dropped coverage, application freezes hurt productivity
            • Limited visibility into workforce activities limits policy control
            • Lack of application level data control creates security risks

       Requirements you Need
            • Create granular visibility into your mobile workforce 
              activities with Management tools
            • Ensure seamless roaming coverage to increase Productivity
            • Get complete application level control of data in transit 
              with stringent Security coverage 




                                                                                   22
7/23/2012
Q&A
More Information…
 www.NetMotionWireless.com/Resources   (866) 262-7626




   7/23/2012                                            24
Thank You

More Related Content

PDF
Wireless Vulnerability Management: What It Means for Your Enterprise
PDF
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
PDF
White Paper: Securing Nomadic Workforce
PDF
Securing the network perimeter
PPT
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PDF
The Top 20 Cyberattacks on Industrial Control Systems
PDF
2009 Security Mega Trends & Emerging Threats
PDF
White Paper: Defense In Breadth
Wireless Vulnerability Management: What It Means for Your Enterprise
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
White Paper: Securing Nomadic Workforce
Securing the network perimeter
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
The Top 20 Cyberattacks on Industrial Control Systems
2009 Security Mega Trends & Emerging Threats
White Paper: Defense In Breadth

What's hot (18)

PDF
BMC - Response to the SolarWinds Breach/Malware
PDF
Virtela Corp Brochure
PPTX
Sophos
PDF
Trend Micro Dec 6 Toronto VMUG
PPTX
Testing cloud services - EuroSTAR
PPTX
Industrial cyber threat landscape
PDF
Infotec 2010 Ben Rothke - social networks and information security
PPTX
Cyber Security protection by MultiPoint Ltd.
PPTX
Trend Micro - Targeted attacks: Have you found yours?
PPTX
Cloud securityperspectives cmg
PDF
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
PPTX
Security assessment for financial institutions
PDF
Cyber Threat Management Services
PDF
Windstream Webinar: Debunking Network Security Myths
PPTX
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
PPT
The Consumerisation of Corporate IT
PDF
The Essential Ingredient for Today's Enterprise
PDF
Trend micro deep security
BMC - Response to the SolarWinds Breach/Malware
Virtela Corp Brochure
Sophos
Trend Micro Dec 6 Toronto VMUG
Testing cloud services - EuroSTAR
Industrial cyber threat landscape
Infotec 2010 Ben Rothke - social networks and information security
Cyber Security protection by MultiPoint Ltd.
Trend Micro - Targeted attacks: Have you found yours?
Cloud securityperspectives cmg
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Security assessment for financial institutions
Cyber Threat Management Services
Windstream Webinar: Debunking Network Security Myths
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
The Consumerisation of Corporate IT
The Essential Ingredient for Today's Enterprise
Trend micro deep security
Ad

Viewers also liked (20)

PDF
Erasure codes fast 2012
PDF
Gdfs sg246374
PDF
Na vsc install
PDF
WSC Net App storage for windows challenges and solutions
PDF
PAM g.tr 3832
PDF
Silverton cleversafe-object-based-dispersed-storage
DOCX
Migrate volume in akfiler7
PDF
Eiu china country_report_april_2012
PDF
Veriphyr bright talk 20120523
PDF
Empowered customer
PDF
Ibm 1129-the big data zoo
PDF
Guide to design_global_infrastructure
PDF
Pg cloud sla040512mgreer
TXT
Ak13 pam
PDF
Annual report full_11
DOCX
Perf stat windows
DOCX
C mode class
PDF
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11
PDF
Keynotes Le Mobile 2013
PDF
Catalogue formations altasys_conseil2013_
Erasure codes fast 2012
Gdfs sg246374
Na vsc install
WSC Net App storage for windows challenges and solutions
PAM g.tr 3832
Silverton cleversafe-object-based-dispersed-storage
Migrate volume in akfiler7
Eiu china country_report_april_2012
Veriphyr bright talk 20120523
Empowered customer
Ibm 1129-the big data zoo
Guide to design_global_infrastructure
Pg cloud sla040512mgreer
Ak13 pam
Annual report full_11
Perf stat windows
C mode class
Tr 3749 -net_app_storage_best_practices_for_v_mware_vsphere,_dec_11
Keynotes Le Mobile 2013
Catalogue formations altasys_conseil2013_
Ad

Similar to Net motion wireless-and_frost-sullivan_a-new-mobilty_ps (20)

PPT
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
PDF
Protecting Data on Laptops
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PPTX
Information Security, Cybercrime and technology futures allowing you to get a...
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PDF
White Paper: Mobile Security
PDF
Mobile Security Report 2009
PPTX
How information security empowers mobile innovation v3 branded
PDF
The Mobile Way Brochure
PDF
IT Security Trends 2013
PDF
Mobile Application Security
PDF
The global cyber security market
PDF
Managed Mobility Load Off Customer Wp
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PDF
Five things we have learned about mobility from our clients -- IBM, Alistair ...
PDF
Is Your Network Ready for BYOD?
PDF
Global Cyber Security Industry
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Protecting Data on Laptops
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Information Security, Cybercrime and technology futures allowing you to get a...
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
White Paper: Mobile Security
Mobile Security Report 2009
How information security empowers mobile innovation v3 branded
The Mobile Way Brochure
IT Security Trends 2013
Mobile Application Security
The global cyber security market
Managed Mobility Load Off Customer Wp
Day 3 p2 - security
Day 3 p2 - security
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Is Your Network Ready for BYOD?
Global Cyber Security Industry
PCTY 2012, IBM Security and Strategy v. Fabio Panada
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...

More from Accenture (20)

PDF
Certify 2014trends-report
PDF
Calabrio analyze
DOCX
Tier 2 net app baseline design standard revised nov 2011
DOCX
Performance problems on ethernet networks when the e0m management interface i...
DOCX
NetApp system installation workbook Spokane
DOCX
Migrate vol in akfiler7
DOCX
Data storage requirements AK
DOCX
Akfiler upgrades providence july 2012
DOC
NA notes
PPTX
Reporting demo
PPTX
Net app virtualization preso
PPT
Providence net app upgrade plan PPMC
PDF
50,000-seat_VMware_view_deployment
PDF
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...
PDF
Snap mirror source to tape to destination scenario
PDF
Ref arch for ve sg248155
PDF
NetApp VM .tr-3749
PDF
Na audit phs 06 dec11
PDF
Go further ds 2465
PDF
Data ontap 8.x 7 mode cook book v1 1
Certify 2014trends-report
Calabrio analyze
Tier 2 net app baseline design standard revised nov 2011
Performance problems on ethernet networks when the e0m management interface i...
NetApp system installation workbook Spokane
Migrate vol in akfiler7
Data storage requirements AK
Akfiler upgrades providence july 2012
NA notes
Reporting demo
Net app virtualization preso
Providence net app upgrade plan PPMC
50,000-seat_VMware_view_deployment
Tr 3998 -deployment_guide_for_hosted_shared_desktops_and_on-demand_applicatio...
Snap mirror source to tape to destination scenario
Ref arch for ve sg248155
NetApp VM .tr-3749
Na audit phs 06 dec11
Go further ds 2465
Data ontap 8.x 7 mode cook book v1 1

Net motion wireless-and_frost-sullivan_a-new-mobilty_ps

  • 2. Speakers Sarah Howland, Editor‐In‐Chief Field Technologies Magazine Martha Vazquez, Industry Analyst Frost & Sullivan Andy Willett, Senior Vice President NetMotion Wireless 2
  • 3. Global Mobile VPN Products Market: The New Mobility: How Mobile Applications and Devices are Changing Your Business. Martha Vazquez, Industry Analyst Network Security June 17, 2012 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
  • 4. Today’s Presenter Functional Expertise • Experience in market research, consulting sales and business development with expertise in the Information Communications and Technology Network Security sector. • Developing research and analysis in the Network Security industry in areas such as: - Technology and Demand Trends - Market Sizing - Market Forecasting and Strategic Analysis Industry Expertise  Experience base in the information communication technologies sector, leveraging long-standing working relationships with leading industry participants’ Senior Executives - Mobile Security Martha Vazquez - Endpoint Security Industry Analyst - Managed Security Service Providers (MSSPs) - Content Filtering Frost & Sullivan What I bring to the Team North America  Expertise in managing executive level relationships San Antonio, TX  In-depth understanding of the network security market  Experience in understanding market trends and forecasting Career Highlights  Sales Consultant in several leading Wireless firms: - AT&T - Verizon Wireless Education • Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas • Bachelor of Science from Texas State University, San Marcos, Texas 4
  • 5. Focus Points • The rise in mobile field workers • The needs and challenges for the remote worker • The evolving security landscape • Security solutions used to support the mobile field worker • Defining a Mobile VPN • The future outlook for the Mobile VPN market • The Last Word 5
  • 6. Poll Question • What is the status of your mobile security strategy in place? 1. In place today 2. Don’t have one and are assessing what to do. 3. To be completed in 3 months 4. To be completed in 6 months • Do you believe that remote workers threaten your corporate environment? 1. Yes, we need to ensure employees securely access our network 2. No, we don’t believe the threat is significant 6
  • 7. The Rise in Mobile Field Workers Proliferation of Wireless Devices Source: Frost & Sullivan analysis 7
  • 8. The needs and challenges for the remote worker Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020 Increase in advanced and complex threats drives 1-2 years 3-5 years 6-10 years demand for Mobile VPN solutions to help manage security on wireless devices Market Drivers Use of mobile or wireless devices within organizations drives the demand for Mobile VPN solutions Compliance regulations requires organizations to implement products such as mobile VPNs Need for remote accessibility drives the need for secure and continuous access to critical data Budget Concerns due to the global 2011/12 economic slowdown impacts the purchase of Market Restraints mobile VPN solutions The need to support multiple operating systems slows down mobile VPN development and sales Customer confusion about the importance of mobile security solutions delays spending on products including mobile VPNs Impact: High Medium Low Source: Frost & Sullivan analysis. 8
  • 9. The Evolving Threat Landscape *Malware-as-a-Service (MaaS) Malware becomes more sophisticated over time, while malware tools emerge as a popular commodity. APT & *MaaS Mobile Malware Trojans, Botnets, Root kits (Zeus) 2006 2011 Beyond 2012 Source: Frost & Sullivan analysis 9
  • 10. Security solutions that support the remote worker Mobile VPN Anti-malware Application and Content Security Device Control Central Management Data Loss Network Access Prevention Control Complete Mobile Security Solution Source: Frost & Sullivan analysis 10
  • 11. Defining a Mobile VPN • A Mobile VPN is defined as a specific type of VPN that is based on security standards such as Mobile IP, IPSec or SSL but us built for wireless or mobile coverage. o Security o Session Persistence o Application Persistence o Network Transparency o Bandwidth Optimization Source: Frost & Sullivan analysis 11
  • 12. Global Mobile VPN Market Key Takeaway: An increase in using wireless devices will fuel revenue growth through 2016 Source: Frost & Sullivan analysis 12
  • 13. Global Mobile VPN Market Key Takeaway: The highest penetration rates are expected to come from Cisco, Juniper, and NetMotion Wireless Competitor Growth Analysis Total Mobile VPN Products Market: Global, 2010 Growth rate 2009-2010 Juniper Cisco Networks NetMotion Wireless IBM Smith Micro Software Birdstep Radio IP Technologies Check Point Software Technologies Columbitech Revenue ($ Million) > 10% growth 10-20% Growth > 20% Growth Note: Bubble size represents relative capitalization. The base year is 2010. Source: Frost & Sullivan analysis. <N9B3-74> 13
  • 14. The Future Outlook for the Mobile VPN Market As the need for mobile device security continues to increase, the mobile 1 VPN market will experience a healthy CAGR of 18.4 percent The value of the mobile VPN market is expected to reach $522M by 2 2017. Demand for mobile VPN technologies is increasing as businesses adopt 3 more mobile devices. Mobile VPN will be integrated into security solutions suites and will not 4 remain a separate product. Adoption in the mobile VPN market remains high for telecoms and 5 government markets. Source: Frost & Sullivan analysis. <N9B3-74> 14
  • 15. For Additional Information Mireya Espinoza Martha Vazquez Global Director Industry Analyst Corporate Communications Network Security- ICT (210) 247-3870 (210) 247-3864 Mireya.espinoza@frost.com Martha.vazquez@frost.com Jennifer Bates Craig Hays Director of Consulting VP of Sales, North America Information and Communication Information and Communications Technologies Technologies (940) 455-7475 (210)247-2460 Jennifer.bates@frost.com chays@frost.com <N9B3-74> 15
  • 17. Agenda Background Common Challenges to Mobile Deployments Considerations for Mobile VPN Software Q&A 17
  • 18. Background NetMotion Wireless • Based in Seattle, WA • Software provider focused  on challenges of mobile field  workers and wireless Andy Willett • 11 years at NetMotion  Wireless • 11 years at AT&T Wireless  and Sprint Wireless 18
  • 19. Common Challenges to Mobile Deployments For Mobile Workers:  • Frequent log‐ins, coverage drops  hurts productivity ▪ Time taken away from project ▪ Drain on IT helpdesk Case Study: Regional Public Utility ▪ Application crashes The math added up: • Complexity of technology leads to  • ~ 200 field workers low adoption • ~ 1 hour per day troubleshooting ▪ Field workers revert to old methods connectivity issues/re-logins ▪ Solution too complex • Multiplied by hourly rate • Added to IT helpdesk requests • Equaled large amounts of lost productivity each day 7/23/2012 19
  • 20. Common Challenges to Mobile Deployments For IT Managers:  • Limited visibility, management and  control into mobile workforce  activities and devices ▪ Limited control of data access while  mobile ▪ Limited insight into bandwidth drains ▪ No application control • Limited control over at‐risk data and  anti‐virus support ▪ Users and networks at greater risk ▪ Limited ability to enforce policies ▪ Limited control over device upgrades 7/23/2012 20
  • 21. Considerations for Mobile VPN Software Management • Centralized web‐based console • Granular view into all devices and usage • Ability to generate historical reports Security • Advanced encryption and authentication • Ability to quarantine, verify, and control  devices and applications • Ability to create and enforce security policies Productivity • Low complexity, single sign‐on • Application persistence through suspend • Optimization of bandwidth and connections
  • 22. Summary  Overcoming Common Challenges • Dropped coverage, application freezes hurt productivity • Limited visibility into workforce activities limits policy control • Lack of application level data control creates security risks Requirements you Need • Create granular visibility into your mobile workforce  activities with Management tools • Ensure seamless roaming coverage to increase Productivity • Get complete application level control of data in transit  with stringent Security coverage  22 7/23/2012
  • 23. Q&A