A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment

Size: px
Start display at page:

Download "A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment"

Transcription

1 A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment Dongwan Kang*, Taeeun Kim, Jooyoung Kim, Hwankuk Kim Security Industry Technology Division KISA(Korea Internet&Security Agency) IT Venture Tower, Songpa, Seoul Republic of Korea Abstract: - Recent breakthroughs in communication technologies and smart devices are spurring a shift in the communication environment from a mostly wired one to one that integrates a vast array of wired and wireless technologies. It was only a short while ago that business organizations began to adopt a business environment utilizing mobile devices to increase productivity. This meant abandoning their closed business environment to migrate to an open structure. Such a shift in the business environment is epitomized by the emergence of the BYOD (Bring Your Own Device) policy. BYOD refers to an environment that permits employees to utilize their own ICT devices for corporate purposes, thus enabling business organizations to increase productivity and even save on device purchases. However, many businesses are reluctant to adopt the policy out of concern about the frequent loss of personally-owned devices, low security, etc. Conventional network-based security equipment is limited in the ability to detect abnormal (unauthorized, unwarranted, etc.) activities that can cause system damage or data leakage if consideration is not given to all of the various devices and connection environments. Hence, demands are rising for solutions that can detect abnormal activities by analyzing various user behaviors free from the conventional perspective of network management. This paper proposes and verifies a method that can quantify various connection environments and detect abnormal activities by analyzing behavioral patterns. Key-Words: - BYOD, Security, Anomaly Behavior Detection, Pattern, Bayesian Introduction Recent developments in communication technologies are encouraging both people and businesses to migrate from a mostly wired environment to a wireless one, and even to a wired and wireless-integrated one. In addition, the proliferation of various mobile devices such as laptops, smartphones, tablets and the like that provide mobility are no longer just a means of personal communication but are finding applications in more and more domains of our society including business environments. It was only a short while ago that business organizations began to include mobile devices into their business environment in a bid to increase productivity, so their mostly closed corporate environments began to gradually give way to a more open structure. The recent BYOD (Bring Your Own Device) trend in business environments leads to improved operational efficiency by allowing employees to utilize their own personalized smart devices and also results in reduced device purchase costs. Business organizations usually provide smart devices to their employees for business purposes, but the potential loss of or tampering with the smart devices and cost implications for device purchases are still serious considerations for such a business decision. Therefore, a multi-dimensional data analysis to have insight into the usage of devices for business operation, unwarranted connection to business networks, leakage of corporate data, etc. rather than just connection of devices is required and a security framework based on situational awareness such as [5] is suggested in that regard. This paper proposes a method to identify behavioral patterns of users in a BYOD environment characterized by a variety of environmental factors, and to analyze abnormal activities based on such patterns. BYOD Environment BYOD (Bring Your Own Device) refers to an environment in which individuals are allowed to ISBN:

2 bring their personally owned smart devices such smartphones, laptops, tablets, etc. and connect them to corporate ICT resources such as the corporate database and applications to conduct business operations. The trend requires adoption and adaptation of the requisite technologies, concepts and policies in general. The emergence of BYOD has triggered migrations from closed corporate internal infrastructures to ones that are open by nature. In other words, the business and service servers that previously could only be approached on the intranet of a business organization and not accessible via the Internet by personally-owned smart devices are now being transformed into networks that can be accessed by personally owned smart devices. Corporate data that was processed by and stored in enterprise-owned devices in a closed environment can now be processed by and stored in personally-owned devices operating in an open environment and ownership, control and initiative over devices is shifted from corporate IT departments to individual users. According to a survey of 600 enterprises conducted by Cisco in 0, 95% of them have already permitted individuals to bring their own devices to their workplaces and witnessed gains in productivity of their staff. inherent in the devices, negligence in device management leads to leakages of critical corporate data, and frequent changes compromises efficient control of personally-owned devices[][]. In the previously closed enterprise environment, it was possible to identify devices connected to the enterprise network by managing IPs and MACs statically as such devices were fixed. In addition, it was relatively easy to install and upgrade the data control programs in the enterprise-owned devices as required by business organizations. However, in a BYOD environment, a variety of personally-owned devices are connected to heterogeneous network connection arrangements. For mobile devices epitomized by ios and Android, there are numerous fragmented operating systems available in different versions and customized by the smart device manufacturers. Connection locations can be extended to locations within/out of the company including overseas locations. Furthermore, it is hard to determine whether the security of personally-owned devices is maintained at a predefined level. Risks leading to leakage of data within/out of a company increase ever more as the pathways of data access become more diverse, along with risks of data leakage arising from abuse of authority or malicious practices by internal employees. Figure. BYOD Environment Identified Challenges A new IT environment or policy such as BYOD not only improves convenience but also increases security threats to business organizations []. One of the causes of such security threats stems from the challenge of having to manage the heterogeneity of operating systems among smart devices. At present, many manufacturers are producing smart devices based on a variety of operating systems. According to a survey conducted by OpenSignal in 0, there are no fewer than,997 different models of Android-based smart devices with about 70% of them having adopted Android OS variations adapted by their manufacturers. Let alone these constraints 4 Proposed Solution To resolve the above issues, a security framework based on situational information is proposed as below. [5] defines situational information that, unlike as-is TCP/IP and user groups, is more intuitive and usable for defining behaviors and setting up policies. It identifies patterns of connecting practices of users through such situational information and sets up policies based on a combination of various environmental factors. This paper proposes a situational information approach and pattern analysis based on the above framework and tested it by setting up a virtual business and then analyzing data gathered through a very realistic business simulation. 4. BYOD Security Framework The underlying framework defines situational awareness and behavior data into standardized situational information and actively manages the behavior pattern and security policy based on the situational information. Situational information is expressed in numerical and categorical data and converted into patterns per individual by big data ISBN:

3 analytics, etc. This data pattern is used as criteria by which abnormal behavior of individuals is determined to support customizable detection of individual behavior. Then, a final decision is made in reference to the analytics and control is conducted through an interface with security equipment such as a firewall. 4. Behavior Analysis Approach The behavior analysis approach in this paper used data on the past behavior of users as criteria for abnormal behavior. As connecting behaviors in various devices and environments can be diverse in accordance with the characteristics of individuals, uniform detection criteria cannot be applied to all users indiscriminately. Therefore, in the first step of the behavior analysis behavior data for a specified period is collected, then, in the second step, a significant behavioral pattern is analyzed out of the collected behavior data, then, finally, abnormal behavior of users is determined in reference to the analyzed behavior pattern. Subsequently, the behavior pattern is managed per change in the usage characteristics of users. A B C D E F G H Table. Connection Behavior Information Contents a:mobile, a:tablet, a:desktop, a4:etc b: During the week, b:weekend, b:holyday c:0000~0600, c: , c: , c4:00-800, c5: d:ios, d:macos, d:android, d4:windows, d5:linux, d6:etc e:chrome, e:safari, e:ie, e4:firefox, e5:etc f:inside, f:local, f:oversea g:inter-wire, g:inter-wifi, g:broadband, g4:internet h:0~5, h:6~0, h:~5, h4:6~ (sec) 4.4 Behavioral Pattern Analysis To analyze a behavioral pattern, this paper used Bayesian inference. As there are no criteria for abnormal behavior, abnormal behavior is determined referring to actions taken most frequently as criteria for normal action [4]. 4. Behavior Modelling User behaviors are modeled into categorical data as below. The characteristics and scope of each category is defined in advance to specify the characteristics of each behavior and it is assumed that there is no relation of subordination for each behavior (e.g. browser used per device and network used per location, etc.). Of course, user behaviors can be subject to some behavioral environment, but behavior elements that can differentiate behaviors with discrimination are selected based on independent behavior characteristics as much as possible. Each behavior consists of a set of elements and each user has one of the applicable elements for each behavior. For example, if behavior A is connection time, the elements can be set as {a :AM, a :PM} or {a :0H~6H, a :6H~8H, a:8h~4h}, etc. Then, if a set of user or device behaviors is defined as behavior A={a, a,..., a i}, behavior B={b, b,..., b j},..., behavior N={n, n,..., n k}, current user behavior can be modeled as {a x, b y,..., n z}. Figure. Concept of Behavior Analysis To that end, the occurrence frequency of each behavior element is analyzed and a behavior matrix is configured to analyze the occurrence probability of each element based on such frequency. User behavior = {a x,b y,...,n z} Figure. Behavior Matrix ISBN:

4 For each element constituting behavior for a Bayesian inference, the following computation is made to infer the elements to be inferred from the rest of the behavioral elements. P(A [b,c ]) P(a ){(b a)p(c a) P(a ){(b a )P(c a ) P(a ){(b a )P(c a ) When a element whose occurrence frequency is zero ( 0 ) is to be inferred, Laplace smoothing is applied to prevent calculation error and a calculation result of zero ( 0 ). Inference result represents the importance of the elements likely to occur in consideration of other behavioral elements. By this, the element that is most likely to occur can be inferred. Once the occurrence probability of each element is computed, it is averaged out to estimate the occurrence probability of the entire behavior. 5 Result For this experiment, a virtual enterprise business system was set up and users enrolled to use it as they would normally with their mobile devices for about one month. Based on the actual data collected and a pattern analysis of the users use, the data was expanded and modeled on the assumption that the system would be used for three months. 5. Data Model The data model is based on situational information as shown in Figure 4. Overall, it is found that User and User 4 had distinctive behavior elements whereas it was hard to find any significant characteristics for User 5. Figure 4. Characteristics of User 5. Result Analysis The 0 most frequent and 0 least frequent behaviors were selected per each user. These behaviors were then analyzed in relation to the behavior patterns of the other users. In the test, it was confirmed that the results varied very significantly per user behavior pattern. Criteria for individual behavior determination varied per pattern level and occurrence frequency of each user and, if the behavior pattern was consistent, the occurrence probability for a rd user s behavior was extremely low. 5. Test Pattern data per user was learned by entering modeled user data (5 users, 00 connections). After identifying patterns in the behavior of each user, connection by a rd party in the above scenario was attempted at random and occurrence probability was analyzed based on the behavior pattern of each user. Figure 5. Test Results ISBN:

5 The above graph shows the results of test input behaviors based on the behavioral pattern of each user. Behaviors are configured as below. Table. Input Action Configuration Act No. Contents Avg. Act Count ~0 (USER ) Most Action Pattern 9 ~0 (USER ) Least Action Pattern ~50 (USER ) Most Action Pattern 7 5~60 (USER ) Least Action Pattern 6~80 (USER ) Most Action Pattern 6 8~90 (USER ) Least Action Pattern 9~0 (USER 4) Most Action Pattern 0 ~0 (USER 4) Least Action Pattern ~40 (USER 5) Most Action Pattern 4~50 (USER 5) Least Action Pattern For behaviors found to have a 0% pattern, the occurrence probability was inferred to be 70% or higher for Users,, and 4 whereas about 40% probability was inferred for the other users. However, if the behavior pattern level was under 5% as in the case of User 5, it was effectively difficult to conduct a behavior-based analysis. Table. Behavior Determination Criteria per User Actor Self-Pattern Probability Rate (lower) Major Act (P) Minor Act (P) Other-Pattern Probability Rate (quadrant) Major Act (P) Minor Act (P4) USER USER USER USER USER In the above table, as User 4 is similar in part to User in terms of behavior pattern, the probability analyzed based on other behavior patterns increased. In the final analysis, the patterns of Users and are well identified and therefore the possibility for mis-detecting their behavior is the lowest. 6 Conclusion Approaches to analyzing user behavior vary significantly as they are subject to their intents and purposes. This research has proposed and tested a method for detecting abnormal behavior without uniform criteria but subject to the characteristics of individual behaviors. However, as human behaviors are hard to quantify and vary somewhat according to individual characteristics, the proposed method is limited in reflecting individual characteristics. Further studies will follow to improve the accuracy and viability of the method of determination by analyzing the pattern level of each user and its correlation to collective behaviors based on the behavioral data of a large number of users. Acknowledgments. This work was supported by the IT R&D program of MSIP/KEIT(Ministry of Science, ICT and Future Planning/Korea Evaluation Institute Of Industrial Technology). [R , The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smart work Environment] References: [] Johnson. K, Mobility/BYOD Security Survey. SANS Institute, 0. [] Symantec, Smartphone Honey Stick Project, 0. [] Miller. K.W., Voas. J., Hurlburt. G.F., BYOD: Security and Privacy Considerations, IT Professional 4(5), pp. 5 55, 0. [4] Dongwan K, Joohyoung O, Chetae I, A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory, CSCC(International Conference on Circuits, Systems, Communications and Computers), 04. [5] Dongwan K, Joohyoung O, Chetae I, Context Based Smart Access Control on BYOD Enviroments, 5th International Workshop on Information Security Applications, LNCS Vol. 8909, August 04. Figure 6. Probability Rate by Pattern ISBN:

A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory

A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory Dongwan Kang, Myoungsun Noh, Chaetae Im Abstract Since early days, businesses had started introducing environments for mobile device

More information

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Addressing BYOD Challenges with ForeScout and Motorola Solutions Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless

More information

Structure Based Mobile Device Applications Enterprise Mobility

Structure Based Mobile Device Applications Enterprise Mobility , pp.265-272 http://dx.doi.org/10.14257/ijseia.2014.8.6.21 Structure Based Mobile Device Applications Enterprise Mobility Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology, Catholic

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

BEYOND LIMITATIONS CONNECTING POSSIBILITIES BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

Studying Security Weaknesses of Android System

Studying Security Weaknesses of Android System , pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced

More information

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2 WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

Data Transfer Technology to Enable Communication between Displays and Smart Devices

Data Transfer Technology to Enable Communication between Displays and Smart Devices Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

White paper BYOD. - A blessing or curse in disguise? www.cyberoam.com

White paper BYOD. - A blessing or curse in disguise? www.cyberoam.com White paper BYOD - A blessing or curse in disguise? www.cyberoam.com Contents Something evolving! What is it? BYOD-A brief Well-nested, already! An Enterprise Revolution in Making Security Care-takers

More information

NETOP VISION CLASSROOM MANAGEMENT SOFTWARE. Using Vision in mobile labs and BYOD environments

NETOP VISION CLASSROOM MANAGEMENT SOFTWARE. Using Vision in mobile labs and BYOD environments NETOP VISION CLASSROOM MANAGEMENT SOFTWARE Using Vision in mobile labs and BYOD environments CHANGE IS INEVITABLE Classrooms around the world are evolving and changing. Schools are looking for ways to

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis , pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security

More information

Bring Your Own Device:

Bring Your Own Device: Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some

More information

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource

More information

Case Examples of Services and Applications Utilizing Smartphones

Case Examples of Services and Applications Utilizing Smartphones Case Examples of Services and Applications Utilizing Smartphones Naoya Matsumura Hiroshi Nezu Hideyuki Motoyama Masayuki Takase Recently, smartphones and tablets have seen explosive growth in the consumer

More information

Wireless Presentation Gateway. User Guide

Wireless Presentation Gateway. User Guide User Guide Table of Contents 1 Initial Setup Present Anything Without Wires p. 3 2 From A Laptop (Windows or Mac) First, download he client p. 4 Now connect p. 5 Additional Features p. 6 3 From An ios

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

Designing Enterprise Mobility

Designing Enterprise Mobility Designing Enterprise Mobility Cortado Corporate Server M Work beyond your desk, simply & efficiently Productivity: Work on the go just as easily as from a desktop PC Usability: Mobile access to corporate

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.

Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2. Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.1 Virtualization... 2 Characteristics of virtualizations affecting SDLC...

More information

Development of Mobile Enterprise Inventory Management System Application with CBD

Development of Mobile Enterprise Inventory Management System Application with CBD , pp.385-396 http://dx.doi.org/10.14257/ijseia.2014.8.1.34 Development of Mobile Enterprise Inventory Management System Application with CBD Yvette E. Gelogo 1 and Haeng-Kon Kim 1* 1 School of Information

More information

Power & Environmental Monitoring

Power & Environmental Monitoring Data Centre Monitoring Made Easy Power & Environmental Monitoring Features & Benefits Packet Power provides the easiest, most cost effective way to capture detailed power and temperature information for

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

FIVE KEY BUSINESS INSIGHTS FOR MOBILE SECURITY IN A BYOD WORLD

FIVE KEY BUSINESS INSIGHTS FOR MOBILE SECURITY IN A BYOD WORLD FIVE KEY BUSINESS INSIGHTS FOR MOBILE SECURITY IN A BYOD WORLD IT managers report on today s mobile protection and management challenges ONE FRONT STREET. SUITE 2700 SAN FRANCISCO CA 94111 P +1.414.456.7891

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Fundamentals of a Windows Server Infrastructure MOC 10967

Fundamentals of a Windows Server Infrastructure MOC 10967 Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation

More information

Course Outline. ttttttt

Course Outline. ttttttt 10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This

More information

Structure Based Enterprise Mobility for Mobile Device Applications for AHMS

Structure Based Enterprise Mobility for Mobile Device Applications for AHMS , pp.324-328 http://dx.doi.org/10.14257/astl.2014.51.72 Structure Based Enterprise Mobility for Mobile Device Applications for AHMS Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology,

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

The Holistic Guide to BYOD in Your Business Jazib Frahim

The Holistic Guide to BYOD in Your Business Jazib Frahim The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010

IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010 ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 71 76 IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Management of IT environment end users and the impact of new technological solutions

Management of IT environment end users and the impact of new technological solutions Management of IT environment end users and the impact of new technological solutions Eva Oláhová Slovak University of Agriculture in Nitra Faculty of Economics and Management, Centre of Information Technologies

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Head of User Experience Information Services (IS)

Head of User Experience Information Services (IS) Head of User Experience Information Services (IS) Reporting to: Director of Global IT Programmes and Solutions Salary: 47,787-57,031 per annum (pro rata) depending on skills and experience. Salary progression

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Practical Enterprise Mobility

Practical Enterprise Mobility Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business

More information

PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE.

PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE. Verizon Wireless PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE. THE CONNECTED WORKPLACE SERIES WIRELESS DEVICES CHALLENGE CONTROL. As networks evolve, companies

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals

A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Big Data Collection Study for Providing Efficient Information

Big Data Collection Study for Providing Efficient Information , pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and

More information

Development of a Service Robot System for a Remote Child Monitoring Platform

Development of a Service Robot System for a Remote Child Monitoring Platform , pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

IBM MobileFirst Protect: Secure & Manage your mobile enterprise IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Symantec IT Management Suite 7.5 powered by Altiris

Symantec IT Management Suite 7.5 powered by Altiris Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling Enterprise BYOD with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your organization s wireless network About This White Paper This white

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Information Security Attack Tree Modeling for Enhancing Student Learning

Information Security Attack Tree Modeling for Enhancing Student Learning Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department

More information

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This

More information

User-Based Licensing for Endpoint Protection and BYOD

User-Based Licensing for Endpoint Protection and BYOD User-Based Licensing for Endpoint Protection and BYOD Five reasons why you should license by employee, not devices Contents Can Smarter Licensing Improve Security?. 1 Why Per-Device Licensing No Longer

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Solutions to Trust. NEXThink V5 What is New?

Solutions to Trust. NEXThink V5 What is New? Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product

More information

Dell Bring Your Own Device

Dell Bring Your Own Device Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most

More information

Performance Analysis of Web-browsing Speed in Smart Mobile Devices

Performance Analysis of Web-browsing Speed in Smart Mobile Devices Performance Analysis of Web-browsing Speed in Smart Mobile Devices Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education, kydman@koreatech.ac.kr Abstract The rapid growth of telecommunication

More information

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling BYOD in Government Agencies with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your agency s wireless network About This White Paper This

More information

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years

More information

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

HOW DOES GOOGLE ANALYTICS HELP ME?

HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics tells you how visitors found your site and how they interact with it. You'll be able to compare the behavior and profitability of visitors

More information

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity

More information

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in

More information

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea

More information

Proposal of MDM Management Framework for BYOD use of Large Companies

Proposal of MDM Management Framework for BYOD use of Large Companies , pp.123-128 http://dx.doi.org/10.14257/ijsh.2014.8.1.13 Proposal of MDM Management Framework for BYOD use of Large Companies Misun Song and Kyungho Lee Center for Information Security Technologies, Korea

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Anti-Virus Power Consumption Trial

Anti-Virus Power Consumption Trial Anti-Virus Power Consumption Trial Executive Summary Open Market Place (OMP) ISSUE 1.0 2014 Lockheed Martin UK Integrated Systems & Solutions Limited. All rights reserved. No part of this publication may

More information

MAKING BUSINESS MOBILITY BETTER Best practices for business mobility management

MAKING BUSINESS MOBILITY BETTER Best practices for business mobility management MAKING BUSINESS MOBILITY BETTER Best practices for business mobility management -1- THE MOBILE REVOLUTION - OPPORTUNITIES AND CONCERNS The CIO today faces a versatile environment where cloud and mobility

More information

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015 Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile

More information

BYOD Management : Geo-fence

BYOD Management : Geo-fence Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Mobile App Testing Guide. Basics of Mobile App Testing

Mobile App Testing Guide. Basics of Mobile App Testing 2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and

More information

Assuring Application Security: Deploying Code that Keeps Data Safe

Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

AUGUSTA TECHNICAL COLLEGE INFORMATION TECHNOLOGY PLAN

AUGUSTA TECHNICAL COLLEGE INFORMATION TECHNOLOGY PLAN AUGUSTA TECHNICAL COLLEGE INFORMATION TECHNOLOGY PLAN 2014-2016 Table of Contents Information Technology Plan Table of Contents Mission Statement Current Capabilities Future Plans How to get there AUGUSTA

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information