Fear and Loathing in BYOD or "What I Learned Reading the SANS Mobility Survey Results"

Size: px
Start display at page:

Download "Fear and Loathing in BYOD or "What I Learned Reading the SANS Mobility Survey Results""

Transcription

1 Fear and Loathing in BYOD or "What I Learned Reading the SANS Mobility Survey Results" Sponsored by GIAC and Trusted Computing Group 2013 The SANS Institute

2 Today s Speakers Joshua Wright, SANS Analyst and Senior Instructor Lisa Lorenzin, Principal Solutions Architect, Juniper Networks Courtney Imbert, Technical Director, GIAC 2013 The SANS Institute 2

3 SANS Market Analysis Survey SANS conducted a survey on Bring Your Own Device policies and practices Nearly 600 respondents, Oct. and Nov The results are not inspiring Vulnerabilities and attacks against mobile are expanding. Demand continues to increase. Defense policies and practices stagnate? 2013 The SANS Institute 3

4 Who Participated? 7% 7% 5% 8% 5% 4% 3% 1% 10%.gov "Other" Financial 14% 21% 15% Well-distributed survey participation Ample representation from many groups Roughly even split across large, medium, and small organizations 39% represent international organizations 2013 The SANS Institute 4

5 Roles and Responsibilities 47% of respondents were at the management, director, or executive level Of the remaining respondents, varied technical roles Network and system ops Security analysts Risk/policy/compliance Mostly staff employees, few consultants 2013 The SANS Institute 5

6 100% 80 99% 60 79% 40 59% 20 39% 10 19% Less than 10% Unknown BYOD Use 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% What percent of your workforce currently use their own devices for work? Respondents indicated that less than 20% of their organizations' employees use personally owned devices for work The SANS Institute 6

7 Wait, What? These numbers are up, 10% from last year's survey (still seems low) Gartner predicts 85% of companies will use BYOD by 2017, 50% to require its use! Some possibilities: Respondents hate BYOD and are lying Users are using BYOD without IT knowledge Gartner is wrong no, that can't be right The SANS Institute 7

8 Application Use Other Hospital/provider information systems Industry-specific machinery or devices Operational control systems such as HVAC, Customer databases Financial/accounting systems IT systems for administration and support Development and production servers Productivity apps (CRM, proprietary internal Line of business (LOB) apps Company and intranet 0% 50% 100% remains king for BYOD enterprise data use, but ERP/CRM/LOB apps are growing. It's OK to freak out now The SANS Institute 8

9 Platform Use "What operating systems is your workforce using to access these resources? Select all that apply." Other, 1.9% Windows Mobile, 13.4% BlackBerry, 19.0% Apple ios, 35.7% Android, 29.9% Despite Android's worldwide lead, ios leads in enterprise adoption among respondents The SANS Institute 9

10 So Far, So Good Of these results, no tremendous surprises so far but here's where things get weird The SANS Institute 10

11 BYOD Perception of Risk Low: 13.2% Medium: 40.8% Very low: 1.7% High: 44.3% 85% of respondents are Somewhat or Very Concerned about BYOD's risks Insufficient controls, lack of manageability and visibility, mobile malware, legal issues, and user mistakes widely seen as concerns The SANS Institute 11

12 Organizations are Committed to BYOD Deployment 15.3% 8.3% 2.8% 3.3% Critical Extremely important Important Unimportant 24.8% Unknown Other 45.5% 2013 The SANS Institute 12

13 Yet 36% of organizations rely solely on user education to mitigate mobile device threats 35% of organizations have "no protection against hostile applications" on BYOD devices The primary security technique used to protect data access for mobile devices is: VPN 2013 The SANS Institute 13

14 I Heart VPN VPN is a great technology Integrity and confidentiality for data transit Many organizations use VPN for an authentication layer However, VPN does not solve the security challenges of mobile devices Sophisticated platform controls are needed 2013 The SANS Institute 14

15 MDM, MAM, Data Isolation Few respondents are using MDM, MAM, or Data Isolation (e.g., Citrix) for data protection Part of this is cost and use cases If is the primary mobile app, perhaps additional data controls are not needed As enterprise apps continue to be deployed to BYOD, VPN will not be sufficient 2013 The SANS Institute 15

16 Red: Not Confident Other Advanced intelligence tools focused on Centralized management for mobile Geolocation and tracking of mobile devices Threat monitoring and reporting Restricting installations of apps on mobile VPN/secure access to corporate network and Separation of corporate and personal data/apps Securing data at rest and during transport Knowing/controlling device access to sensitive Application integrity protections Endpoint protections Enrollment with enterprise security services Registration and fingerprinting devices 0% 10% 20% 30% 40% 50% Very confident Confident Not confident N/A 2013 The SANS Institute 16

17 Growth and Maturity Are Needed Enterprises are not widely adopting sophisticated security controls for mobile Cost, lack of flexibility and reliability, lack of resources for deployment, and lack of confidence in controls were cited by respondents Vendors: Take Note. We need more sophisticated, reliable tools, at a lower cost per device The SANS Institute 17

18 The Result Organizations indicate that they are committed to BYOD mobile security and that the tools for security aren't yet sufficiently baked for widespread adoption and that, despite concerns, adoption will continue, with growing access to enterprise data What we get is 2013 The SANS Institute 18

19 Fear and Loathing in BYOD Joshua Wright Chris Crowley With Fewer Anthropomorphic Desert Animal Sightings* * I am much better at hacking mobile devices than I am at Photoshop. Really The SANS Institute 19

20 What Organizations Can Do Learn to scrutinize mobile applications: You can't evaluate all apps, but you should identify flaws in critical apps prior to adoption Adopt MDM systems of some sort, but don't fall in love: be prepared to reevaluate yearly while systems mature Develop policies to guide BYOD adoption and use: Don't expect your users to intuitively know about the dangers and expected use behaviors 2013 The SANS Institute 20

21 Conclusion A broad group of IT pros and management responded to our survey Much of the results were predictable, but still inspiring Organizations need to improve mobile device security posture, but have concerns about today's controls While controls mature, organizations can take steps to improve the security of deployments today 2013 The SANS Institute 21

22 SANS Security 575: Mobile Device Security and Ethical Hacking 6-day technical, hands-on course In-depth analysis of mobile platforms, security features and limitations Learn to evaluate mobile apps for ios, Android through network analysis, reverse engineering, and app manipulation Use wireless, network, web hacking techniques to exploit mobile devices The SANS Institute 22

23 Using Industry Standards to Cure Fear and Loathing in BYOD Security Lisa Lorenzin, Juniper Networks and co-chair TCG Trusted Network Connect Work Group 12/9/2013 Copyright 2013 Trusted Computing Group 23

24 Virtualized Platform Mobile Phones Printers & Hardcopy Authentication Network Security Storage Security Hardware Applications Software Stack Operating Systems Web Services Authentication Data Protection Desktops & Notebooks Servers Infrastructure

25 BYOD Security Is Hard...But There s Help TCG has already developed security solutions Notebook computers and tablets based on a Trusted Platform Module (TPM) Mobile Trusted Module (MTM) for mobile devices (ex. Windows phones) Self-encrypting Drives (SEDs) for data protection in mobile devices Trusted Network Connect (TNC) specifications for enterprise networks Copyright Trusted Computing Group Slide 25

26 Escalating Trust = Increased Access Copyright Trusted Computing Group Slide 26

27 Four Steps to BYOD Security Copyright Trusted Computing Group Slide 27

28 Implementing the Four Steps Copyright Trusted Computing Group Slide 28

29 Next Steps and Call to Action Read the SANS BYOD survey results white paper Read the TCG BYOD security white paper: Contact vendors and insist on acquiring TCG-certified technology Deploy solutions in pilot first, observe and correct issues, then deploy into production. For more information on TCG technologies and architects guides, visit Copyright Trusted Computing Group Slide 29

30 GIAC Mobile Device Security Analyst GMOB The first vendor-neutral mobile device security certification. GMOB candidates must possess a thorough understanding of mobile device penetration testing and the ability to perform a security analysis of mobile applications. Includes ios, Android, Windows and BlackBerry. Learn more and preregister for GMOB at Prepare for the GMOB with SANS SEC575: Mobile Device Security and Ethical Hacking The SANS Institute 30

31 Please use GoToWebinar s Questions tool to submit questions to our panel. Q & A Send to Organizers and tell us if it s for a specific panelist The SANS Institute 31

32 Acknowledgements Thanks to our sponsors: To our special guests: Lisa Lorenzin Courtney Imbert And to our attendees: Thank you for joining us today 2013 The SANS Institute 32

Fear and Loathing in BYOD

Fear and Loathing in BYOD A SANS Analyst Survey Written by Joshua Wright Advisor: Chris Crowley December 2013 Sponsored by Trusted Computing Group 2013 SANS Institute Introduction It s not shocking to see media reports depicting

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015 Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

SANS Survey on Mobility/BYOD Security Policies and Practices

SANS Survey on Mobility/BYOD Security Policies and Practices Sponsored by RSA SANS Survey on Mobility/BYOD Security Policies and Practices October 2012 A SANS Whitepaper Written by: Kevin Johnson and Tony DeLaGrange Advisor: Barbara Filkins Survey Participants Page

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information

THOUSANDS OF APPS CAN'T BE WRONG: MOBILE APPLICATION ANALYSIS AT SCALE

THOUSANDS OF APPS CAN'T BE WRONG: MOBILE APPLICATION ANALYSIS AT SCALE THOUSANDS OF APPS CAN'T BE WRONG: MOBILE APPLICATION ANALYSIS AT SCALE Chris Eng Vice President, Research Session ID: Session Classification: MBS-T08 Intermediate Agenda State of Mobility in the Enterprise

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

Protect Identities for people, workstations, mobiles, networks

Protect Identities for people, workstations, mobiles, networks ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global

More information

The State of Mobile Application Insecurity

The State of Mobile Application Insecurity The State of Mobile Application Insecurity Sponsored by IBM Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute Research Report Part 1. Introduction The State

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

Marble & MobileIron Mobile App Risk Mitigation

Marble & MobileIron Mobile App Risk Mitigation Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Legal Statement This product roadmap sets forth Juniper Networks current intention

More information

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Addressing BYOD Challenges with ForeScout and Motorola Solutions Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless

More information

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity

More information

1 0 0 V i l l a g e C o u r t H a z l e t, N J 0 7 7 3 0, U S A Tel: +1 (732) 416-7722 w w w. p a l i n d r o m e t e c h. c o m.

1 0 0 V i l l a g e C o u r t H a z l e t, N J 0 7 7 3 0, U S A Tel: +1 (732) 416-7722 w w w. p a l i n d r o m e t e c h. c o m. Impart Assurance Instill Trust Inspire Confidence Mike Stauffer Advanced mobile data networks and the promise of accessing mission critical apps anytime from anywhere are two reasons behind the increase

More information

A Taste of SANS SEC575 Part I: Invasion of the Mobile Phone Snatchers

A Taste of SANS SEC575 Part I: Invasion of the Mobile Phone Snatchers A Taste of SANS SEC575 Part I: Invasion of the Mobile Phone Snatchers Mobile Device Security and Ethical Hacking Today's Focus: Mitigating the Stolen Device Threat Joshua Wright jwright@willhackforsushi.com

More information

Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices

Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices Survey Results and Q&A 18-December-2013 Ryan Faas Journalist and Consultant T. Reid Lewis President Enterprise Device Alliance Presenters

More information

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD 2 Unless you operate out of a cave, chances are your

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!

More information

The Challenges Posed by BYOD.

The Challenges Posed by BYOD. The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

How To Improve Your Network Security

How To Improve Your Network Security Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

An ICS White Paper. Mobile Device Management for the Agile Enterprise

An ICS White Paper. Mobile Device Management for the Agile Enterprise Mobile Device Management for the Agile Enterprise December 2012 Copyright 2012 ICS Nett, Inc. All rights reserved. This document contains proprietary and confidential information of ICS Nett. No part of

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015 For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6

More information

Top 8 Steps for Effective Mobile Security

Top 8 Steps for Effective Mobile Security Top 8 Steps for Effective Mobile Security Larry Pesce With thanks to Chris Crowley and Joshua Wright Top 8 Steps for Effective Mobile Security 2012 Chris Crowley/Joshua Wright 1 Outline Three Truths About

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014 Remote 2014 Monitoring & Control Securing Mobile Devices November 7 th 2014 Purpose / Agenda Ken Lewis, CISSP Director of Cross Domain Security Solutions for Tresys Technology Systems Security Engineer

More information

Mission-Critical Mobile Security: A Stronger, Sensible Approach

Mission-Critical Mobile Security: A Stronger, Sensible Approach Mission-Critical Mobile Security: A Stronger, Sensible Approach An Overview of Unisys Stealth for Mobile By Rob Johnson White Paper 2 Table of Contents Abstract 4 Introduction 4 Unisys Stealth for Mobile

More information

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

IT Security Testing Services

IT Security Testing Services Context Information Security T +44 (0)207 537 7515 W www.contextis.com E gcloud@contextis.co.uk IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information

More information

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes

More information

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com SOSPG2 Implementing Network Access Controls Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com Offer Pa Agenda The BYOD Challenges NAC terms The Big Picture NAC Solutions and Deployment What

More information

White Paper: The Current State of BYOD

White Paper: The Current State of BYOD CTOlabs.com White Paper: The Current State of BYOD May 2012 A White Paper providing context and guidance you can use Inside: Snapshot of a fast moving trend Summary of recent surveys Considerations for

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

The top five enterprise mobility management vendors: product focus and financials

The top five enterprise mobility management vendors: product focus and financials The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

WHITE PAPER SPON. Achieving Rapid Payback With Mobile Device Management. Published November 2012. An Osterman Research White Paper.

WHITE PAPER SPON. Achieving Rapid Payback With Mobile Device Management. Published November 2012. An Osterman Research White Paper. WHITE PAPER N Achieving Rapid Payback With An Osterman Research White Paper Published November 2012 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

20696B: Administering System Center Configuration Manager and Intune

20696B: Administering System Center Configuration Manager and Intune 20696B: Administering System Center Configuration Manager and Intune Course Details Course Code: Duration: Notes: 20696B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

BYOD Enabling Technologies

BYOD Enabling Technologies BYOD Enabling Technologies Bryan Padgett 1 Our Vision for BYOD AGILEX PROPRIETARY 2 The BYOD Challenge Platform Diversity U.S. Smartphone Platform Market Share, December 2014 Source: comscore MobiLens

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

Enterprise Apps: Bypassing the Gatekeeper

Enterprise Apps: Bypassing the Gatekeeper Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security

More information

Mobile App Management:

Mobile App Management: Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management

More information

Cisco & Big Data Security

Cisco & Big Data Security Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager hskuo@cisco.com The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that

More information

Securing Healthcare Data on Mobile Devices

Securing Healthcare Data on Mobile Devices Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

BYOD & MOBILE SECURITY

BYOD & MOBILE SECURITY 2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own

More information

Mobile Security: The good, the bad, the way forward

Mobile Security: The good, the bad, the way forward Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

Protecting Android Mobile Devices from Known Threats

Protecting Android Mobile Devices from Known Threats Protecting Android Mobile Devices from Known Threats Android OS A Popular Target for Hacks White Paper Zero Trust Mobile Security An Introduction to the BETTER Mobile Security Platform BETTER at work.

More information

BYPASSING THE ios GATEKEEPER

BYPASSING THE ios GATEKEEPER BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Going Beyond Mobile Device Management - Leveraging NAC for Mobile Devices

Going Beyond Mobile Device Management - Leveraging NAC for Mobile Devices Going Beyond Mobile Device Management - Leveraging NAC for Mobile Devices events.techtarget.com G. Mark Hardy, CISSP, CISM President, National Security Corporation gmhardy@nationalsecurity.com +1.410.933.9333

More information

CMDSP. CMDSP Training Course. Certified Mobile Device Security Professional CMDSP

CMDSP. CMDSP Training Course. Certified Mobile Device Security Professional CMDSP CMDSP Certified Mobile Device Security Professional CMDSP Training Course CMDSP provides an Mobile IT Administrator the training and knowledge needed to manage an Enterprise s mobile device use. CMDSP

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

KNOVATION SOLUTIONS OUR SOLUTIONS

KNOVATION SOLUTIONS OUR SOLUTIONS COMPANY OVERVIEW KNOVATION SOLUTIONS We are mobile first for the enterprise Knovation Solutions provide innovative, cutting-edge mobility solutions for the corporate/ enterprise sector of the market. With

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information