A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment
|
|
- Amanda Harrison
- 8 years ago
- Views:
Transcription
1 A Study on Anomaly Behavior Analysis using Bayesian Inference in BYOD Environment Dongwan Kang*, Taeeun Kim, Jooyoung Kim, Hwankuk Kim Security Industry Technology Division KISA(Korea Internet&Security Agency) IT Venture Tower, Songpa, Seoul Republic of Korea Abstract: - Recent breakthroughs in communication technologies and smart devices are spurring a shift in the communication environment from a mostly wired one to one that integrates a vast array of wired and wireless technologies. It was only a short while ago that business organizations began to adopt a business environment utilizing mobile devices to increase productivity. This meant abandoning their closed business environment to migrate to an open structure. Such a shift in the business environment is epitomized by the emergence of the BYOD (Bring Your Own Device) policy. BYOD refers to an environment that permits employees to utilize their own ICT devices for corporate purposes, thus enabling business organizations to increase productivity and even save on device purchases. However, many businesses are reluctant to adopt the policy out of concern about the frequent loss of personally-owned devices, low security, etc. Conventional network-based security equipment is limited in the ability to detect abnormal (unauthorized, unwarranted, etc.) activities that can cause system damage or data leakage if consideration is not given to all of the various devices and connection environments. Hence, demands are rising for solutions that can detect abnormal activities by analyzing various user behaviors free from the conventional perspective of network management. This paper proposes and verifies a method that can quantify various connection environments and detect abnormal activities by analyzing behavioral patterns. Key-Words: - BYOD, Security, Anomaly Behavior Detection, Pattern, Bayesian Introduction Recent developments in communication technologies are encouraging both people and businesses to migrate from a mostly wired environment to a wireless one, and even to a wired and wireless-integrated one. In addition, the proliferation of various mobile devices such as laptops, smartphones, tablets and the like that provide mobility are no longer just a means of personal communication but are finding applications in more and more domains of our society including business environments. It was only a short while ago that business organizations began to include mobile devices into their business environment in a bid to increase productivity, so their mostly closed corporate environments began to gradually give way to a more open structure. The recent BYOD (Bring Your Own Device) trend in business environments leads to improved operational efficiency by allowing employees to utilize their own personalized smart devices and also results in reduced device purchase costs. Business organizations usually provide smart devices to their employees for business purposes, but the potential loss of or tampering with the smart devices and cost implications for device purchases are still serious considerations for such a business decision. Therefore, a multi-dimensional data analysis to have insight into the usage of devices for business operation, unwarranted connection to business networks, leakage of corporate data, etc. rather than just connection of devices is required and a security framework based on situational awareness such as [5] is suggested in that regard. This paper proposes a method to identify behavioral patterns of users in a BYOD environment characterized by a variety of environmental factors, and to analyze abnormal activities based on such patterns. BYOD Environment BYOD (Bring Your Own Device) refers to an environment in which individuals are allowed to ISBN:
2 bring their personally owned smart devices such smartphones, laptops, tablets, etc. and connect them to corporate ICT resources such as the corporate database and applications to conduct business operations. The trend requires adoption and adaptation of the requisite technologies, concepts and policies in general. The emergence of BYOD has triggered migrations from closed corporate internal infrastructures to ones that are open by nature. In other words, the business and service servers that previously could only be approached on the intranet of a business organization and not accessible via the Internet by personally-owned smart devices are now being transformed into networks that can be accessed by personally owned smart devices. Corporate data that was processed by and stored in enterprise-owned devices in a closed environment can now be processed by and stored in personally-owned devices operating in an open environment and ownership, control and initiative over devices is shifted from corporate IT departments to individual users. According to a survey of 600 enterprises conducted by Cisco in 0, 95% of them have already permitted individuals to bring their own devices to their workplaces and witnessed gains in productivity of their staff. inherent in the devices, negligence in device management leads to leakages of critical corporate data, and frequent changes compromises efficient control of personally-owned devices[][]. In the previously closed enterprise environment, it was possible to identify devices connected to the enterprise network by managing IPs and MACs statically as such devices were fixed. In addition, it was relatively easy to install and upgrade the data control programs in the enterprise-owned devices as required by business organizations. However, in a BYOD environment, a variety of personally-owned devices are connected to heterogeneous network connection arrangements. For mobile devices epitomized by ios and Android, there are numerous fragmented operating systems available in different versions and customized by the smart device manufacturers. Connection locations can be extended to locations within/out of the company including overseas locations. Furthermore, it is hard to determine whether the security of personally-owned devices is maintained at a predefined level. Risks leading to leakage of data within/out of a company increase ever more as the pathways of data access become more diverse, along with risks of data leakage arising from abuse of authority or malicious practices by internal employees. Figure. BYOD Environment Identified Challenges A new IT environment or policy such as BYOD not only improves convenience but also increases security threats to business organizations []. One of the causes of such security threats stems from the challenge of having to manage the heterogeneity of operating systems among smart devices. At present, many manufacturers are producing smart devices based on a variety of operating systems. According to a survey conducted by OpenSignal in 0, there are no fewer than,997 different models of Android-based smart devices with about 70% of them having adopted Android OS variations adapted by their manufacturers. Let alone these constraints 4 Proposed Solution To resolve the above issues, a security framework based on situational information is proposed as below. [5] defines situational information that, unlike as-is TCP/IP and user groups, is more intuitive and usable for defining behaviors and setting up policies. It identifies patterns of connecting practices of users through such situational information and sets up policies based on a combination of various environmental factors. This paper proposes a situational information approach and pattern analysis based on the above framework and tested it by setting up a virtual business and then analyzing data gathered through a very realistic business simulation. 4. BYOD Security Framework The underlying framework defines situational awareness and behavior data into standardized situational information and actively manages the behavior pattern and security policy based on the situational information. Situational information is expressed in numerical and categorical data and converted into patterns per individual by big data ISBN:
3 analytics, etc. This data pattern is used as criteria by which abnormal behavior of individuals is determined to support customizable detection of individual behavior. Then, a final decision is made in reference to the analytics and control is conducted through an interface with security equipment such as a firewall. 4. Behavior Analysis Approach The behavior analysis approach in this paper used data on the past behavior of users as criteria for abnormal behavior. As connecting behaviors in various devices and environments can be diverse in accordance with the characteristics of individuals, uniform detection criteria cannot be applied to all users indiscriminately. Therefore, in the first step of the behavior analysis behavior data for a specified period is collected, then, in the second step, a significant behavioral pattern is analyzed out of the collected behavior data, then, finally, abnormal behavior of users is determined in reference to the analyzed behavior pattern. Subsequently, the behavior pattern is managed per change in the usage characteristics of users. A B C D E F G H Table. Connection Behavior Information Contents a:mobile, a:tablet, a:desktop, a4:etc b: During the week, b:weekend, b:holyday c:0000~0600, c: , c: , c4:00-800, c5: d:ios, d:macos, d:android, d4:windows, d5:linux, d6:etc e:chrome, e:safari, e:ie, e4:firefox, e5:etc f:inside, f:local, f:oversea g:inter-wire, g:inter-wifi, g:broadband, g4:internet h:0~5, h:6~0, h:~5, h4:6~ (sec) 4.4 Behavioral Pattern Analysis To analyze a behavioral pattern, this paper used Bayesian inference. As there are no criteria for abnormal behavior, abnormal behavior is determined referring to actions taken most frequently as criteria for normal action [4]. 4. Behavior Modelling User behaviors are modeled into categorical data as below. The characteristics and scope of each category is defined in advance to specify the characteristics of each behavior and it is assumed that there is no relation of subordination for each behavior (e.g. browser used per device and network used per location, etc.). Of course, user behaviors can be subject to some behavioral environment, but behavior elements that can differentiate behaviors with discrimination are selected based on independent behavior characteristics as much as possible. Each behavior consists of a set of elements and each user has one of the applicable elements for each behavior. For example, if behavior A is connection time, the elements can be set as {a :AM, a :PM} or {a :0H~6H, a :6H~8H, a:8h~4h}, etc. Then, if a set of user or device behaviors is defined as behavior A={a, a,..., a i}, behavior B={b, b,..., b j},..., behavior N={n, n,..., n k}, current user behavior can be modeled as {a x, b y,..., n z}. Figure. Concept of Behavior Analysis To that end, the occurrence frequency of each behavior element is analyzed and a behavior matrix is configured to analyze the occurrence probability of each element based on such frequency. User behavior = {a x,b y,...,n z} Figure. Behavior Matrix ISBN:
4 For each element constituting behavior for a Bayesian inference, the following computation is made to infer the elements to be inferred from the rest of the behavioral elements. P(A [b,c ]) P(a ){(b a)p(c a) P(a ){(b a )P(c a ) P(a ){(b a )P(c a ) When a element whose occurrence frequency is zero ( 0 ) is to be inferred, Laplace smoothing is applied to prevent calculation error and a calculation result of zero ( 0 ). Inference result represents the importance of the elements likely to occur in consideration of other behavioral elements. By this, the element that is most likely to occur can be inferred. Once the occurrence probability of each element is computed, it is averaged out to estimate the occurrence probability of the entire behavior. 5 Result For this experiment, a virtual enterprise business system was set up and users enrolled to use it as they would normally with their mobile devices for about one month. Based on the actual data collected and a pattern analysis of the users use, the data was expanded and modeled on the assumption that the system would be used for three months. 5. Data Model The data model is based on situational information as shown in Figure 4. Overall, it is found that User and User 4 had distinctive behavior elements whereas it was hard to find any significant characteristics for User 5. Figure 4. Characteristics of User 5. Result Analysis The 0 most frequent and 0 least frequent behaviors were selected per each user. These behaviors were then analyzed in relation to the behavior patterns of the other users. In the test, it was confirmed that the results varied very significantly per user behavior pattern. Criteria for individual behavior determination varied per pattern level and occurrence frequency of each user and, if the behavior pattern was consistent, the occurrence probability for a rd user s behavior was extremely low. 5. Test Pattern data per user was learned by entering modeled user data (5 users, 00 connections). After identifying patterns in the behavior of each user, connection by a rd party in the above scenario was attempted at random and occurrence probability was analyzed based on the behavior pattern of each user. Figure 5. Test Results ISBN:
5 The above graph shows the results of test input behaviors based on the behavioral pattern of each user. Behaviors are configured as below. Table. Input Action Configuration Act No. Contents Avg. Act Count ~0 (USER ) Most Action Pattern 9 ~0 (USER ) Least Action Pattern ~50 (USER ) Most Action Pattern 7 5~60 (USER ) Least Action Pattern 6~80 (USER ) Most Action Pattern 6 8~90 (USER ) Least Action Pattern 9~0 (USER 4) Most Action Pattern 0 ~0 (USER 4) Least Action Pattern ~40 (USER 5) Most Action Pattern 4~50 (USER 5) Least Action Pattern For behaviors found to have a 0% pattern, the occurrence probability was inferred to be 70% or higher for Users,, and 4 whereas about 40% probability was inferred for the other users. However, if the behavior pattern level was under 5% as in the case of User 5, it was effectively difficult to conduct a behavior-based analysis. Table. Behavior Determination Criteria per User Actor Self-Pattern Probability Rate (lower) Major Act (P) Minor Act (P) Other-Pattern Probability Rate (quadrant) Major Act (P) Minor Act (P4) USER USER USER USER USER In the above table, as User 4 is similar in part to User in terms of behavior pattern, the probability analyzed based on other behavior patterns increased. In the final analysis, the patterns of Users and are well identified and therefore the possibility for mis-detecting their behavior is the lowest. 6 Conclusion Approaches to analyzing user behavior vary significantly as they are subject to their intents and purposes. This research has proposed and tested a method for detecting abnormal behavior without uniform criteria but subject to the characteristics of individual behaviors. However, as human behaviors are hard to quantify and vary somewhat according to individual characteristics, the proposed method is limited in reflecting individual characteristics. Further studies will follow to improve the accuracy and viability of the method of determination by analyzing the pattern level of each user and its correlation to collective behaviors based on the behavioral data of a large number of users. Acknowledgments. This work was supported by the IT R&D program of MSIP/KEIT(Ministry of Science, ICT and Future Planning/Korea Evaluation Institute Of Industrial Technology). [R , The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smart work Environment] References: [] Johnson. K, Mobility/BYOD Security Survey. SANS Institute, 0. [] Symantec, Smartphone Honey Stick Project, 0. [] Miller. K.W., Voas. J., Hurlburt. G.F., BYOD: Security and Privacy Considerations, IT Professional 4(5), pp. 5 55, 0. [4] Dongwan K, Joohyoung O, Chetae I, A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory, CSCC(International Conference on Circuits, Systems, Communications and Computers), 04. [5] Dongwan K, Joohyoung O, Chetae I, Context Based Smart Access Control on BYOD Enviroments, 5th International Workshop on Information Security Applications, LNCS Vol. 8909, August 04. Figure 6. Probability Rate by Pattern ISBN:
A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory
A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory Dongwan Kang, Myoungsun Noh, Chaetae Im Abstract Since early days, businesses had started introducing environments for mobile device
More informationAddressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
More informationStructure Based Mobile Device Applications Enterprise Mobility
, pp.265-272 http://dx.doi.org/10.14257/ijseia.2014.8.6.21 Structure Based Mobile Device Applications Enterprise Mobility Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology, Catholic
More informationVIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationEnabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationVIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationBEYOND LIMITATIONS CONNECTING POSSIBILITIES
BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationStudying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
More informationSymantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationWHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with
More informationSecure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
More informationData Transfer Technology to Enable Communication between Displays and Smart Devices
Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased
More information10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
More informationDevice Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
More informationWhite paper BYOD. - A blessing or curse in disguise? www.cyberoam.com
White paper BYOD - A blessing or curse in disguise? www.cyberoam.com Contents Something evolving! What is it? BYOD-A brief Well-nested, already! An Enterprise Revolution in Making Security Care-takers
More informationNETOP VISION CLASSROOM MANAGEMENT SOFTWARE. Using Vision in mobile labs and BYOD environments
NETOP VISION CLASSROOM MANAGEMENT SOFTWARE Using Vision in mobile labs and BYOD environments CHANGE IS INEVITABLE Classrooms around the world are evolving and changing. Schools are looking for ways to
More informationSECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
More informationHow To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
More informationBring Your Own Device:
Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some
More informationIMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource
More informationCase Examples of Services and Applications Utilizing Smartphones
Case Examples of Services and Applications Utilizing Smartphones Naoya Matsumura Hiroshi Nezu Hideyuki Motoyama Masayuki Takase Recently, smartphones and tablets have seen explosive growth in the consumer
More informationWireless Presentation Gateway. User Guide
User Guide Table of Contents 1 Initial Setup Present Anything Without Wires p. 3 2 From A Laptop (Windows or Mac) First, download he client p. 4 Now connect p. 5 Additional Features p. 6 3 From An ios
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More information4 Steps to Effective Mobile Application Security
Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationDesigning Enterprise Mobility
Designing Enterprise Mobility Cortado Corporate Server M Work beyond your desk, simply & efficiently Productivity: Work on the go just as easily as from a desktop PC Usability: Mobile access to corporate
More informationARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org
More informationChapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.
Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.1 Virtualization... 2 Characteristics of virtualizations affecting SDLC...
More informationDevelopment of Mobile Enterprise Inventory Management System Application with CBD
, pp.385-396 http://dx.doi.org/10.14257/ijseia.2014.8.1.34 Development of Mobile Enterprise Inventory Management System Application with CBD Yvette E. Gelogo 1 and Haeng-Kon Kim 1* 1 School of Information
More informationPower & Environmental Monitoring
Data Centre Monitoring Made Easy Power & Environmental Monitoring Features & Benefits Packet Power provides the easiest, most cost effective way to capture detailed power and temperature information for
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationFIVE KEY BUSINESS INSIGHTS FOR MOBILE SECURITY IN A BYOD WORLD
FIVE KEY BUSINESS INSIGHTS FOR MOBILE SECURITY IN A BYOD WORLD IT managers report on today s mobile protection and management challenges ONE FRONT STREET. SUITE 2700 SAN FRANCISCO CA 94111 P +1.414.456.7891
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationFundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
More informationCourse Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
More informationStructure Based Enterprise Mobility for Mobile Device Applications for AHMS
, pp.324-328 http://dx.doi.org/10.14257/astl.2014.51.72 Structure Based Enterprise Mobility for Mobile Device Applications for AHMS Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology,
More informationSANS Mobility/BYOD Security Survey
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationThe Holistic Guide to BYOD in Your Business Jazib Frahim
The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020
More informationBring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
More informationIMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010
ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 71 76 IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationManagement of IT environment end users and the impact of new technological solutions
Management of IT environment end users and the impact of new technological solutions Eva Oláhová Slovak University of Agriculture in Nitra Faculty of Economics and Management, Centre of Information Technologies
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationHead of User Experience Information Services (IS)
Head of User Experience Information Services (IS) Reporting to: Director of Global IT Programmes and Solutions Salary: 47,787-57,031 per annum (pro rata) depending on skills and experience. Salary progression
More informationCloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
More informationPractical Enterprise Mobility
Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business
More informationPRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE.
Verizon Wireless PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE. THE CONNECTED WORKPLACE SERIES WIRELESS DEVICES CHALLENGE CONTROL. As networks evolve, companies
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationA Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationDevice-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationBig Data Collection Study for Providing Efficient Information
, pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and
More informationDevelopment of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationIBM MobileFirst Protect: Secure & Manage your mobile enterprise
IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making
More informationBring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationBring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationSymantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationSOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control
WHITE PAPER Enabling Enterprise BYOD with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your organization s wireless network About This White Paper This white
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationInformation Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
More informationWhat is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER
WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This
More informationUser-Based Licensing for Endpoint Protection and BYOD
User-Based Licensing for Endpoint Protection and BYOD Five reasons why you should license by employee, not devices Contents Can Smarter Licensing Improve Security?. 1 Why Per-Device Licensing No Longer
More informationEXECUTIVE SUMMARY Cloud Backup for Endpoint Devices
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationSolutions to Trust. NEXThink V5 What is New?
Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product
More informationDell Bring Your Own Device
Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most
More informationPerformance Analysis of Web-browsing Speed in Smart Mobile Devices
Performance Analysis of Web-browsing Speed in Smart Mobile Devices Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education, kydman@koreatech.ac.kr Abstract The rapid growth of telecommunication
More informationWHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control
WHITE PAPER Enabling BYOD in Government Agencies with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your agency s wireless network About This White Paper This
More informationA Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years
More informationThe Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
More informationSecuring BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
More informationHOW DOES GOOGLE ANALYTICS HELP ME?
Google Analytics HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics tells you how visitors found your site and how they interact with it. You'll be able to compare the behavior and profitability of visitors
More informationWHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
More informationAchieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert
Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in
More informationVulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
More informationProposal of MDM Management Framework for BYOD use of Large Companies
, pp.123-128 http://dx.doi.org/10.14257/ijsh.2014.8.1.13 Proposal of MDM Management Framework for BYOD use of Large Companies Misun Song and Kyungho Lee Center for Information Security Technologies, Korea
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationNorton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
More informationAnti-Virus Power Consumption Trial
Anti-Virus Power Consumption Trial Executive Summary Open Market Place (OMP) ISSUE 1.0 2014 Lockheed Martin UK Integrated Systems & Solutions Limited. All rights reserved. No part of this publication may
More informationMAKING BUSINESS MOBILITY BETTER Best practices for business mobility management
MAKING BUSINESS MOBILITY BETTER Best practices for business mobility management -1- THE MOBILE REVOLUTION - OPPORTUNITIES AND CONCERNS The CIO today faces a versatile environment where cloud and mobility
More informationSpikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015
Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile
More informationBYOD Management : Geo-fence
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationMobile App Testing Guide. Basics of Mobile App Testing
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
More informationAssuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
More informationWhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
More informationAUGUSTA TECHNICAL COLLEGE INFORMATION TECHNOLOGY PLAN
AUGUSTA TECHNICAL COLLEGE INFORMATION TECHNOLOGY PLAN 2014-2016 Table of Contents Information Technology Plan Table of Contents Mission Statement Current Capabilities Future Plans How to get there AUGUSTA
More informationCourse overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
More information