MAJOR SHIFTS DRIVEN BY HIGH-SPEED NETWORKS
|
|
- Cuthbert Rich
- 8 years ago
- Views:
Transcription
1 MAJOR SHIFTS DRIVEN BY HIGH-SPEED NETWORKS Prof. Dr. Reinhard Posch CIO Federal Government AUSTRIA
2 PILLARS FOR FUTURE COMMUNICATION mobility FUTURE ICT agility SECURITY AND IDENTITY JURISDICTION AWARENESS HIGH SPEED NETWORKS
3 HIGH SPEED MOBILE DEVICES DIGITAL:AUSTRIA Mobile and distributed computing is driving Big Data and bandwidth New paradigms open up a variety of business models ALLWAYS ON BLURRS DATA LOCATION CAUSING MASSIVE TRAFFIC
4 HIGH SPEED AND CLOUD DIGITAL:AUSTRIA application and data floating around to optimize cost and performance CLOUD ULTRA HIGH SPEED IS AND WILL BE INCREASINGLY A COMPETITIVE FACTOR DECISIVELY IMPORTANT FOR PROVIDERS SECURITY WILL ADD A FURTHER DIMENSION WITH NEED FOR SPEED
5 SECURITY : SPECIFIC ISSUES WITH CLOUD
6 PRESENT CLOUDS NOT LEGALLY FIT CLOUD o eidas regulation asks Member States to notify and control qualified electronic identities and other services o Member States have to take liabilities o Present mechanisms in the PUBLIC CLOUDs neither fulfil technological nor legal requirements
7 eid : SECURITY : MOBILE DEVICES The Cloud - the future - the challenge STORAGE DOCUMENT COLLABORATION WEB SERVICES SECURITY PROVIDER HOW TO ACCESS HOW TO SIGN HOW TO ENCRYPT Tablett Mobile Laptop PC...
8 RISK CHANGES WITH CLOUD DIGITAL:AUSTRIA ATTACK POTENTIAL CLOUD DAMAGE POTENTIAL * VALUE PROTECTION PROVISIONING USER
9 HIGH SPEED : SECURITY IN THE CLOUD DIGITAL:AUSTRIA ADMINISTRATION SMEs EDUCATION WEBSERVICES Open DATA (GOV) CLOUD BYOD = existing devices, PCs, laptops, tablets... HTML5 WEBAPPS SSO MINIMUM FOCUS ON DEVICE PROPERTIES AVOID LOCAL PROCESSING AND STORAGE STORAGE e.g: SAP DOCS MAIL/CAL... Specific APPS SECURITY SERVICES... COMMUNICATION AND PRIVACY A CONDITIO SINE QUA NON FOR THE PUBLIC SECTOR
10 CRYPTO AND THE CLOUD DIGITAL:AUSTRIA KEEPING USABILITY AND CONVENIENCE OBSERVING NATIONAL INTERSTS MANAGING THE COMPLEXITY RESEARCH TO CLOSE THE OPEN ISSUES CRYPTO FOR CLOUD CRYPTO UNDER NATIONAL CONTROL KEEPING CONTROL OF COST AND EFFICIENCY DATA PROTECTION AND SECURITY MIGHT ALLOW EUROPE TO APPROACH COMPETITIVENESS IN CLOUD COMPUTING.
11 CAN WE CLOSE THE SECURITY LOOP? DIGITAL:AUSTRIA o Service hopping to WEB, FACEBOOK to APP etc. transition from one service to another offers security gaps in may cases o o o Identity is still at a very low level most cloud and other services are still at a one factor static identity which can easily be phished User Awareness not up to the security needs experience shows that there is little chance to tune it Liabilities and contracts protect services rather than users IDENTITY AND LIABILITY ARE THE MOST PROMISING AREAS WHERE IMPROVEMENT MIGHT HAPPEN
12 SKYTRUST : SECURITY WITH CLOUD IS RERALITY Separation CLOUD - SECURITY BYOS enabling the user bring your own security
13 eid : THE BASIC INGREDIENT FOR SECURITY : We need to know who is who before we can secure interests o o o o o Multi factor Crypto based Replay resistant Simple Accepted
14 STORK : where the EU ID story began. : Minimum security : Mutual recognition : Single protocol : Public and private Model for eidas
15 CLOUD : THE PRIMARY KEY QUALIFIED eid BIRTH ROLES CONTRACT CONTRACT SCHOOL MANDATES DELIVER DELIVER HEALTH NON NATURAL PERSONS WARRANTY WARRANTY DEATH PUBLIC SECTOR UNIQUENESS EiDaS EU-WIDE CERTAINTY AND LEGAL BASIS COOPERATE COOPERATE PRIVATE SECTOR NO NEED FOR UNIQUENESS
16 A COLLABORATIVE MOBILE INFRASTRUCTURE NEED FOR EUROPEAN APPROACH MEMBER STATE MEMBER STATE MEMBER COMPONENT COMPONENT STATE eid REGISTE RBASE MEMBER COMPONENT MS STATE X eid REGISTE RBASE COMPONENT eid REGISTE MS RBASE Y eid REGISTE MX RBASE Z????? eservices eidb eids COMMON eid COMPONENT SC HSM PRIVATE SECTOR COMPONENT PRIVATE SECTOR CERTIFICATES, COMPONENT PRIVATE SMS SECTOR CERTIFICATES, CA COMPONENT MS PRIVATE A SMSSECTOR CERTIFICATES, CA MS COMPONENT PRIVATE B SMS SECTOR CERTIFICATES, CA COMPONENT MS C SMS CERTIFICATES, CA MS D SMS?????? public or private anywhere oauth2 STANDARD INTERFACE S USER PC or. TABLET (nowledge) USER MOBILE (second factor
17 JURISDICTION AWARENESS DIGITAL:AUSTRIA : keeping control over intellectual properties : meeting national requirements : empowering the user : allowing secure reliable models
18 BASIC NEEDS ALSO TO BE ENSURED WITH CLOUD o user and service need to know which jurisdiction the partner is following and which jurisdiction for the transactions they agree IN PRACTICE THIS IS MOSTLY UNKNOWN AT PRESENT o user and service need to be able to make sure that they are the only ones able to access content and communications AS WE HAVE SEEN IN THE RECENT MICROSOFT CASE JURISDICTION MATTERS o lawful access might be needed STILL AN OPEN ISSUE WITH GOVERNMENT DATA AND CLOUD
19 CLOUD : LAW ENFORCEMENT GOV DATA How can CAs proof that they have NOT been forced to issue a "second" certificate with given parameters.
20 LIABILITY THIS IS WHERE JURISDICTION MATTERS o empowering users giving the user the choice o helping net neutrality to happen o allowing proof juridical origin at the point in time of communication o availability for all services o ensure liabilities
21 ENHANCING LOW LEVEL PROTOCOLS DIGITAL:AUSTRIA A B Jurisdiction awareness SCENARIO B C e.g. general Government Data E-Health SCENARIO A e.g. sensitive Government Data SCENARIO C e.g. E-Commerce PROVIDER LIABLE TO DELIVER CORRECT INFORMATION: COMMUNICATION LEFT TRACES IN A, B, C, UNKNOWN
22 CLOUD : LAW ENFORCEMENT GOVERNMENT DATA As yet there is no framework or agreement on how to handle law enforcement where needed in a mixed public / private sector data center OUTSIDE ONES OWN JURISDICTION The Snowden / NSA situation told us that written and unwritten agreement lack efficiency The problem cannot be solved on a self regulatory basis as the companies do not have the decisive influence WE STILL NEED MODELS AND TOOLS TO ENSURE TRUST AND TRUSTWORTHYNESS
23 FUTURE CHALLENGE : DOCUMENT COLLABORATION DOC-EDIT In the WEB bandwith bandwidth to to enable convenience and and acceptance SECURITY TO ALLOW TAKE-UP
24 CLOUD AND USER CONTROLLED CRYPTO CLOUD USER SPHERE SKYTRUST DOC-EDIT In the WEB SKYTRUST CLOUD TO PDF & SIGN
25 THANK YOU FOR LISTENING
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
More informationProposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM(2012 238 final) {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA
More informationtrust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE
trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE new regulation eidas... "...told him that she was the only one of her kind in all the universe" POLICY AND REGULATION FOR EUROPE
More informationProposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market [COM(2012) 238 final] {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA
More informationIT-Security All safe and sound?
IT-Security All safe and sound? The building blocks for secure E-Government Dr. Vienna, 20.10.2014 Das E-Government Innovationszentrum ist eine gemeinsame Einrichtung des Bundeskanzleramtes und der TU
More informationPublic Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationEnabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationIntroduction to Hosted Desktop Services (HDS)
Introduction to Hosted Desktop Services (HDS) Powerdial Services Ltd Introduction to Hosted Desktop Service Overview 2014 Hosted Desktops What are they? It s your computer but hosted in the Cloud It s
More informationDS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationSecure Information Technology Center Signature verification and digital services
Secure Information Technology Center Signature verification and digital services Herbert Leitold, A-SIT Study Visit Georgian Delegation Vienna, 16 th February 2015 Zentrum für sichere Informationstechnologie
More informationFundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic
Fundamentals of Secure Collaboration in the Mobile Workforce Sinisha Patkovic 1 DISCUSSION Hyper connected X-Times future and blurring of lines between personal, social cloud, & enterprise. CIO Challenge:
More informationData Privacy in the Cloud E-Government Perspective
Data Privacy in the Cloud E-Government Perspective Herbert Leitold; EGIZ, A-SIT International Cloud Symposium 2011, Panel on Data Privacy and the Role Policy Plays in Defining Trust Requirements Ditton
More informationSeven Ways to Create an Unbeatable Enterprise Mobility Strategy
Seven Ways to Create an Unbeatable Enterprise Mobility Strategy A practical guide to what business and IT leaders need to do NOW to manage their business s mobile future By Arun Bhattacharya, CA Technologies
More informationCopyright Giritech A/S. Secure Mobile Access
Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary
More informationThe Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
More informationSignicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08
Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this
More informationSECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
More informationCloud computing as a transformational technology
ASX 200 Roundtable Summary paper 2011 Cloud computing as a transformational technology Sponsored by Cloud computing as a transformational technology The Australian Institute of Company Directors hosted
More informationanywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape
Office anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape Consumers adopting mobile RISKS Users Devices Apps Data Users
More informationExpert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015.
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 eidas Regulation By Alessandra Sbordoni Legal Officer, eidas Task Force
More informationAuthentication Scenarios India. Ramachandran
Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationSome Public Sector Cloud Views
Some Public Sector Cloud Views Herbert.Leitold@a-sit.at Digital Enterprise Europe, London, June 11 th, 2014 Zentrum für sichere Informationstechnologie - Austria Expectations and Take Up some are high
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationEuropean Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
More informationThe demand of Cloud Computing in Europe: drivers, barriers, market estimates
The demand of Cloud Computing in Europe: drivers, barriers, market estimates Gabriella Cattaneo Associate VP IDC European Government Consulting Research In Future Cloud Computing workshop Bruxelles, May
More informationSecurity & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
More informationROADMAP. A Pan-European framework for electronic identification, authentication and signature
TITLE OF THE INITIATIVE ROADMAP A Pan-European framework for electronic identification, authentication and signature TYPE OF INITIATIVE CWP Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT
More informationITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices
ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices The Landscape of IT Services Provision is Changing! Customers and users are demanding a higher level of customer service
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationSolve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationEasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks
EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationWHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control
WHITE PAPER Enabling BYOD in Government Agencies with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your agency s wireless network About This White Paper This
More informationSEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
More informationEmerging Trends in the Network Security Market in India, CY 2013
Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive
More informationThe Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
More informationScoping Cross-Border e-id Management and Facilitating International e-trade
Scoping Cross-Border e-id Management and Facilitating International e-trade Prof. dr. HONG XUE Director of Beijing Normal University Institute for Internet Policy & Law UNCITRAL Colloquium on Identity
More information"choose your own device" : the employer still provides the hardware and the employee can choose e.g. the model.
WHAT IS BYOD? BYOD comes in "different shades of grey". "bring your own device" : employees are allowed to use their privately owned hard- and software. IT-applications and company data of the employer
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationTablets: Will They Replace PCs?
Tablets: Will They Replace PCs? By Phil Clarke Research Analyst, Nemertes Research Executive Summary As mobility becomes more prevalent within the enterprise, tablets are becoming crucial tools with specific
More informationMobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
More informationWhat is the HP Business Helpdesk number to call for support? Call 1-877-219-5006 to get support or for questions about the program.
FAQ General information and Frequently Asked Questions (FAQs) What is the HP Business Helpdesk number to call for support? Call 1-877-219-5006 to get support or for questions about the program. What are
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationONLINE PAYMENT PRIVACY POLICY
ONLINE PAYMENT PRIVACY POLICY Updated: June, 2013 In order to operate the College online-payments system, Sanjari International College (SIC) may collect and store personal information student/customer
More informationegovernment 2020 new media and technologies for better citizenship oriented communication and applications
egovernment 2020 new media and technologies for better citizenship oriented communication and applications Christian Rupp, Austrian Federal Chancellery Federal Republic of Austria Area: 83 879 km² - Population:
More informationRolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market
Rolling out eidas Regulation (EU) 910/2014 Boosting trust & security in the Digital Single Market Trust in the Digital World 2016 Conference 15 June 2016 The Hague (NL) Andrea SERVIDA DG CONNECT, European
More informationEvolving in the global digital scenario. Politecnico di Torino
Evolving in the global digital scenario Claudio G. Demartini Claudio G. Demartini Politecnico di Torino Trends: Time Machine Before Now http://www.baekdal.com/analysis/market-of-information 29/10/2013
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationDesktop Virtualization
Desktop Virtualization VMware View for the Post PC Era Bart Van de Putte, I.R.I.S. ICT OUR END USER COMPUTING VISION Cloud Computing is changing the Way We Collaborate and Work ACCESS: U.S. Employees Survey
More informationINCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.
INCO-TRUST: Intl Co-Operation in Trustworthy, Secure and Dependable ICT Infrastructures Neeraj Suri, TU Darmstadt, Germany James Clarke, Waterford Institute of Technology, Ireland INCO-TRUST Canada US
More informationHow To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
More informationCUSTOMER AWARENESS TRAINING FOR INTERNET BANKING
CUSTOMER AWARENESS TRAINING FOR INTERNET BANKING Recently, Eagle Bank & Trust & Trust has seen significant changes in the internet banking threat landscape. Fraudsters have continued to develop and deploy
More informationMobility Trends. Work-life modes. Lessons from the Cisco BYOD program. Thoughts for the CIO. BYOD Players. BYOD Summary. Agenda
Agenda Mobility Trends Work-life modes Lessons from the Cisco BYOD program Thoughts for the CIO BYOD Players BYOD Summary 3 What is driving this movement to BYOD? Consumerization of Mobility and IT Macro-economic
More informationMobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options
Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring
More informationCitrix Enterprise Mobility Management Solutions
Citrix Enterprise Mobility Management Solutions Achi Lewis achi.lewis@citrix.com Regional Manager UK&I XenMobile EMEA How Mobile Feels Today User Needs Freedom to access all their apps and data from any
More informationTaking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia
Taking Charge with Apps, Policy, Security and More October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia http://pinterest.com/visualoop/byod-infographics/ vs. NSFW PSFW NSFW Security & Compliance
More informationCisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
More informationSERIES A : GUIDANCE DOCUMENTS. Document Nr 3
DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
More informationSOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business
SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.
More informationThe cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
More informationBYOD Privacy and Security in Europe
BYOD Privacy and Security in Europe BYOD: Overview 2 BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco,
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationDeliver World-Class Smartphone and Tablet Applications with Oracle Mobile
Deliver World-Class Smartphone and Tablet Applications with Oracle Mobile Oracle Mobile Strategy and Overview Ravi Pinto, Director, Product Management ravi.pinto@oracle.com Copyright 2014 Oracle and/or
More informationIdentity Relationship and Access Management for the Extended Enterprise
Identity Relationship and Access Management for the Extended Enterprise Benefits in External Identity Management CONTENTS Introduction... 3 Internal vs External identities... 3 Productivity vs Convenience...
More informationProtect Your Mobile World
Protect Your Mobile World Doward Wilkinson Mobile Strategic Trend s May, 2012 1 It is a Fact We Live in a Mobile World People Devices Apps Access Payments Commerc Market e Opportuni At Risk ty 2 In the
More informationBYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker
QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors
More informationIT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
More informationHow Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
More informationGlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
More informationWho Controls Your Information in the Cloud?
Who Controls Your Information in the Cloud? threat protection compliance archiving & governance secure communication Contents Who Controls Your Information in the Cloud?...3 How Common Are Information
More informationSOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control
WHITE PAPER Enabling Enterprise BYOD with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your organization s wireless network About This White Paper This white
More informationMobile Device Management horizons for CERN Managed ios and Mac Self-Service. Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS)
Mobile Device Management horizons for CERN Managed ios and Mac Self-Service Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS) Today s agenda Introduction MDM market CERN numbers and trends CERN
More informationMDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
More informationEnabling mobile workstyles with an end-to-end enterprise mobility management solution.
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
More informationDocument Sharing on Mobile Devices. Securing Productivity on the Go! www.maas360.com
Document Sharing on Mobile Devices Securing Productivity on the Go! www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationRoadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
More informationIn Sync: Cloud Computing Solution and SME Industry IT Requirement
In Sync: Cloud Computing Solution and SME Industry IT Requirement Harinder Kaur Assistant Professor, University College of Engineering, Punjabi University, Patiala - 147001 Abstract Cloud Computing is
More information2010/TELMIN/TPD/010 Advancing Cloud Computing Through Public Policy: New Opportunities, New Challenges, New Responsibilities
2010/TELMIN/TPD/010 Advancing Cloud Computing Through Public Policy: New Opportunities, New Challenges, New Responsibilities Submitted by: Microsoft 8 th Ministerial Meeting on Telecommunications and Information
More informationCLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
More informationCONSUMERLAB. Flexibility in work life
CONSUMERLAB Flexibility in work life An Ericsson ConsumerLab Insight Summary Report June 2015 contents ANY PLACE IS A WORK PLACE 3 TOWARDS GREATER FLEXIBILITY 4 ENABLING MOBLITY 5 THERE S AN APP FOR THAT
More informationSecuring Identities & Trust
Securing Identities & Trust Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2 About
More informationSecuring the Mobile Enterprise. How mobile devices, BYOD and other trends are driving a need for a new approach to mobile security
Securing the Mobile Enterprise How mobile devices, BYOD and other trends are driving a need for a new approach to mobile security Table of Contents Securing and Managing the Mobile Enterprise... 3 Introduction...
More informationEnabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R
Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Table of Contents Introduction.......................................................... 3 The Challenge
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More informationAPRIL 2013. 8 Must-Have Features for Endpoint Backup
APRIL 2013 8 Must-Have Features for Endpoint Backup Ensure corporate data is secure and protected by choosing an endpoint backup solution with the eight features below. 1. Advanced deduplication Because
More informationGuide to building a secure and trusted BYOID environment
e-healthcare e-gaming e-insurance e-commerce e-banking e-government Guide to building a secure and trusted BYOID environment Bring-Your-Own-Identity is not new. People have been using their social media
More informationLEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and
More informationDell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations
Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationView from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST Thibault.devalroger@opentrust.com
More informationStandards in the Digital Single Market: setting priorities and ensuring delivery
Case Id: c2b48264-98a2-4dab-b05c-7e21b2b028b9 Date: 24/12/2015 15:19:42 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information
More informationexpanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
More information