HUAWEI TECHNOLOGIES CO., LTD. Huawei BYOD Security Solution
|
|
- Blaise Hancock
- 8 years ago
- Views:
Transcription
1 HUAWEI TECHNOLOGIES CO., LTD. Huawei BYOD Security Solution
2 Huawei BYOD Security Solution 1
3 Overview In 2012, about 20% of enterprise employees bring their own iphones, ipads, or Android phones into offices for related work activities. As IT consumerization drives a new fashion with Bring Your Own Device (BYOD), Anydevice is gaining real freedom. Today, BYOD is no longer a trend but is overwhelmingly changing people's working mode as a mandatory supplementary office means. BYOD enables people to have more time scraps to receive and send s, track sales opportunities, and push forward enterprise information management, so that customers' contact interface tend to be more de-layered to improve decision-making efficiency and quicken response. The openness of BYOD, however, may easily introduce numerous security or management risks. Are you ready to greet challenges from BYOD? Trends and Challenges BYOD further extends the boundaries of an enterprise office environment, enabling people to work on the same mobile device or download desired games from application stores. As people switch between enterprise office applications and personal applications in an instant, the boundaries between personal applications and enterprise applications become increasingly ambiguous. To most enterprises, it is impracticable to simply deny BYOD's access to enterprise applications. Young employees, born in an era of IT popularization, are not strange to mobile information technologies but urgently hope for employers to offer BYOD support. This requirement is driving enterprises to make changes and adapt to updates of BYOD. On the other hand, however, BYOD brings a huge number of issues, just like the tip of an iceberg, where huge risks are concealed beneath the sea surface. The smart and open mobile platform that comes with BYOD turns mobile terminals into new security vulnerabilities, which may easily incur a variety of problems, such as malicious code intrusion, mixing of personal and enterprise applications, data disclosure, and heterogeneous multi-platform management. All these pose great challenges to enterprises in terms of IT management. First, the IT department of an enterprise will detect that the corporate IT policy and configuration rules conflict with consumable applications and related settings. Specifically, security policies and management technologies based on traditional PCs can hardly be transplanted to mobile devices, especially those personal devices that are not owned and controlled by the enterprise. In this case, the enterprise needs to create a strategy especially for BYOD, including policy definitions and new management methods. The first step is to determine what mobile devices are permitted and what resources are accessible to these mobile devices, so that the first gate is properly built for security management and control. Second, BYOD devices access enterprise information by browsing web pages, downloading applications, and receiving or sending s. The enterprise information is not protected at all. Furthermore, smart mobile devices integrate the functions and features of PCs, and may cause the same application to more easily suffer from malicious attacks. Today, mobile devices incur more than two million types of malicious software, 30% of which are Trojan Horse programs exercising remote control to steal privacy and sensitive data. Mobile devices have already become a new bed of roses for new security risks along with the misuse of root rights and the application of hacker technologies. According to 71% of the interviewees, mobile devices, especially Android devices, are a top factor accountable for security incidents. Third, transplanting the applications of an enterprise to diversified mobile devices is no doubt another nightmare of its IT department. Then how can an enterprise simply and efficiently migrate its businesses to and deploy enterprise businesses in a mobile environment to avoid the high cost incurred by complex independent development, rapidly create value, and help the IT department to stand firm in a complex mobile environment? This undoubtedly poses a great challenge to today's enterprises. 2
4 Fourth, as mobile applications are being rapidly developed and put into use, an enterprise will face a lack of means to manage these applications. If employees can download and install consumable applications on devices as they wish, system reliability will be threatened and new security risks will be introduced, causing enterprise data loss or device malfunction. Finally, mobile devices are small and may be easily lost or stolen. Statistics show that plenty of customer data, including sensitive customer information and sensitive enterprise data, is stored on mobile devices for 47% of interviewed enterprises. Device loss does not merely mean the disclosure and loss of sensitive commercial information, but may incur risks for an enterprise in terms of law compliance. Overview of Huawei BYOD Security Solution To resolve the conflict between personal requirements of enterprise employees and the policy of an enterprise, Huawei developed an effective tradeoff solution, so that employees enjoy more freedom to select devices. Employees can conveniently access the internal corporate network using any device at any time and any place, and run internal applications without compromising the corporate security policy at all. Huawei is dedicated to providing customers with end-to-end (E2E) mobile security management and flexible application release capability. Huawei BYOD security solution provides total protection for mobile offices in five dimensions (mobile terminal security, network transmission security, application security, sensitive data security, and security management), aiming to help enterprises attain an optimal tradeoff between the high efficiency of BYOD and information security. Furthermore, Huawei has developed a simple platform which can migrate applications to mobile devices to deal with the increasingly complex mobile environment. This platform features high expansibility and helps better control costs, so that enterprises are even more competitive in globalized businesses. Architecture and Key Components Essentially three issues, Identity, Privacy, and Compliance, need to be addressed in mobile security and management. Huawei BYOD security solution provides security that is mostly common in the industry and the simplest and easiest management approach for enterprise customers while centering around the three issues. Terminal side Access side DMZ Intranet Office-based WiFi Security Application management distribution Assets IT services management UI design Application compilation Application integration Application release and maintenance LDAP NonOffice-based SSL Access switch SACG Device interface Development platform Business object Workflow Supporting platform Application interface Mobile security client AnyOffice 2G/GPRS/3G Pubilic WiFi Firewall VPN Unified policy management platform (including MDM) Firewall MEAP server OA and other servers AnyOffice security platform Identity Privacy Compliance Authentication Application Access control Link security Threat defense Data protection and authorization security Management security Mobile strong Mobile NAC SSL or UDP DDoS Mobile sandbox Application Security management authentication tunnel encryption Web VPN L3 VPN Network antivirus Network IDS/IPS Web/ ; DLP Anti-theft monitoring Application management Assets management IT services 3 1. Smart Mobile Access Client AnyOffice Huawei BYOD security solution provides a unified secure mobile client known as the AnyOffice client. As a simple mobile client, the AnyOffice client provides unique interaction interfaces between users, networks, and applications. It enables management and maintenance to be much easier.
5 The AnyOffice client is also a secure mobile office workspace, which integrates a series of applications, such as a secure sandbox, secure client, secure browser, mobile device management (MDM) software, Layer 3 virtual private network (L3 VPN) client, and virtual desktop on only one agent to meet universal mobile office requirements, enabling employees to access the internal corporate network securely, conveniently, and efficiently. Furthermore, the AnyOffice client is context-aware and can work with a security access control gateway (SACG) and an SVN SSL VPN gateway on the network side to attain the following objectives: Intelligent detection of users on the internal corporate network and external networks Application security policies for seamless handover Consistent user experience 2. Consistent Network Access Control* In Huawei BYOD security solution, the SACG is a dedicated access control gateway developed based on a Huawei carrier-class firewall hardware platform. It has the following features: Cooperates with the AnyOffice client and an admission control server to provide unified network access control and guarantee consistent policy enforcement in different environments, such as corporate LANs, WLANs, or remote access environments. Attains security policy compliance and controls device access based on identity authentication and the security states of devices, ensuring that only secure, authorized, and legitimate users access the enterprise network from appropriate terminals. Furthermore, Huawei BYOD security solution provides two optional network admission control means, 802.1x switches and software firewalls, for flexible access in various scenarios. 3. Secure Remote VPN Access The SVN2000 or SVN5000 series SSL VPN gateway is based on a Huawei high-reliability hardware platform and a dedicated real-time operating system. It has the following features: Provides industry-leading system performance, security, and reliability. Offers a flexible, secure, and controllable E2E link encryption mechanism for users. Protects security during remote VPN access. 4. Carrier-Class Mobile Threat Defense Huawei carrier-class high-reliability USG series firewalls can be deployed on enterprise network borders to comprehensively defend the network against security threats. While integrating the cutting-edge intrusion prevention and antivirus technologies of Symantec, and an industry-leading deep packet inspection (DPI) technology, the USG series firewalls provide professional content security protection capability, including network antivirus (AV) function, intrusion prevention system (IPS), distributed denial of service (DDoS), and content filtering. 5. Unified Security Policy Management* Huawei BYOD security solution provides a unified security policy management mechanism to exercise unified security policies inside the entire organization. It applies different policies based on different user roles, device types, locations, time periods, and areas, ensuring that secure access is controlled at a fine granularity for enterprise applications at various sensitivity levels. The solution also provides a unified and intuitive security policy management platform to effectively reduce management complexity and save IT manpower inputs. 6. Simple Platform for Releasing Mobile Enterprise Applications As mentioned previously, mobile applications of enterprises can hardly be transplanted and released. Huawei provides an industry-leading mobile enterprise application platform (MEAP) to smoothly migrate enterprise applications. It has the following features: Provides a simple integrated development environment (IDE). Supports HTML5, native, and hybrid applications, which can be developed in one step and released time and again across the platform, obviously reducing development complexity and saving costs for enterprises. 4
6 5 5
7 Highlights of the Solution I C compliance Device management throughout the entire lifecycle Identity Unified network access control P Privacy complete data security and threat defense Identity Unified Network Access Control 1. Context-Aware Network Access Control The solution provides fine-granularity access control policies based on context awareness (What device, Who, Where, When, and How). The IT department can configure multiple policy templates for a user role on the unified policy management platform, and uniformly distribute these templates to the AnyOffice client. The AnyOffice client, which is context-aware, intelligently starts a security module which mates with the device environment and works with the SVN VPN gateway, SACG, or 802.1x switch to precisely control network access. A user can freely and remotely access the enterprise network from a coffee shop, airport, or branch office. The SVN device transparently switches the user's session from the SVN device to the SACG. This process is completely transparent to the user. The AnyOffice client can shield all complex network connections, enabling users to gain the simplest but seamless access experience. 2. Unified Security Policy Management* The unified policy management platform guarantees a unified policy source to ensure consistent security policies on the entire network and compliance with enterprise security policies at ease. It really enables any person to access internal corporate resources freely without borders by using any authorized physical device (such as a laptop, smartphone, or pad) or virtual device from any place and through any network (such as a wired, wireless, or remote network). The management platform provides simple and easy-to-use management UIs to attain the total visibility and controllability of mobile devices while improving the work efficiency of the IT department. Privacy Complete Data Security and Threat Defense 1. E2E Data Leakage Prevention Data security on the device side: The AnyOffice client creates a security zone where personal applications are isolated from enterprise applications on the same mobile device by applying an innovative sandbox technology. The security zone eliminates numerous risks, such as data disclosure and virus infection incurred when personal applications or data are mixed with enterprise applications or data. It helps attain a tradeoff between personal requirements and enterprise policy enforcement. When a user logs in to the AnyOffice client, all enterprise business transactions will be processed within an enclosed secure environment separately from personal applications. Data, once created, is stored in a secure isolated zone at the very beginning and protected through encryption. The AnyOffice client process acts as an operating system kernel and performs the following functions: Monitors the behaviors of enterprise applications. Prevents personal applications from accessing enterprise applications. Blocks data behaviors such as copying, pruning, and pasting between personal applications and enterprise applications. Disables or enables application downloading or uploading based on a preset policy. Wipes temporary files and data without leaving any trace during application de-registration to further reduce the data disclosure risk. 6
8 Personal applications Enterprise applications OA CRM Personal data Enterprise data Create Run De-register Mandatory isolation Encrypted storage Behavior monlitoring Clearance uponxit Security of data transmission: In terms of data transmission, the SVN SSL VPN gateway provides intensive L3 VPN or Layer 4 virtual private network (L4 VPN) transmission based on data encryption to guarantee data confidentiality and security, and to prevent malicious data sniffing or tampering. Data security on the server side: Mobile devices are small and may be easily lost or stolen. There are innumerable reports about data disclosure incidents arising from device loss or stealing every year. Huawei BYOD security solution provides powerful anti-theft functions, such as remote locking, remote data wipe, and data backup and restoration through interaction with a backend management system. These anti-theft functions, plus other features such as global positioning system (GPS) and automatic alarms, ensure that data is not disclosed even when devices are lost. 2. Mobile Application Security Secure Browser As enterprise applications such as conference systems, attendance management systems, document inquiry systems, and customer relationship management (CRM) systems are deployed in a web manner, the time is calling for a unified browser to access these internal applications. A secure browser can automatically adjust the layout of web pages according to the resolution of the terminal screen to bring smooth and consistent access experience to users. A secure browser also provides crucial security protection capability. First, the secure browser, which is based on a sandbox module of the AnyOffice client, can isolate personal applications and control users' access behavior to enterprise B/S applications. Second, the secure browser provides the L4 VPN function, which enables users to smoothly access enterprise websites without installing or enabling any other VPN dial-up software on terminals. Third, the secure browser supports traceless browsing. When exiting the secure browser, a user can clear temporary files, cookies, and the browsing history without leaving any access trace. The secure browser can also provide intensive encrypted protection for files and data locally stored. Finally, the secure browser supports the black list function to effectively prevent phishing and malicious software intrusion. Secure Push Mail services are the earliest mobile office application. Standard transfer protocols, such as the Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol Version 4 (IMAP4), can run on a secure client. The secure client can also push s in real time to enable real-time processing in the era of Now Economy. The secure Push Mail provides powerful security features to reduce the risks of data disclosure and virus infection that may come with mobile s. It supports the L4 VPN technology for automatic data encryption during transmission to prevent malicious interception or tampering. The secure Push Mail encrypts s by using an intensive encryption algorithm on terminals before s are stored, and keys are dynamically obtained but not locally stored. Furthermore, the secure Push Mail supports abundant security control policies, including whether to permit forwarding, download attachments, upload attachments, and browse attachments online. The IT department can deliver different control policies based on different roles of employees. 7
9 3. Carrier-Class Mobile Threat Defense on the Network Side Huawei carrier-class high-reliability USG series firewalls can be deployed on enterprise network borders to comprehensively defend the network against security threats in the following three scenarios: Defense against threats from the Internet to the mobile platform: The defense means include preventing DDoS attacks, defending against unauthorized access, defending against hacker springboard invasion, preventing virus infection, guarding against Trojan Horse spreading, and filtering malicious s. Defense against threats from mobile devices to servers in an LAN: The defense means include defending against unauthorized access to internal servers, defending against malicious invasion from employees, preventing virus infection, and guarding against Trojan Horse spreading. Defense against information disclosure from mobile office terminals to the Internet: The defense means include defending against unauthorized uniform resource locator (URL) access, preventing access to malicious web pages, filtering web pages, and filtering the body or attachments. Compliance Lifecycle-based Mobile Device Management Deploy Retire Device lifecycle Retire Run 1. Acquire Huawei BYOD security solution complies with the IT infrastructure library (ITIL) assets management specification. It supports assets discovery and registration of standard corporate devices and BYOD devices, and password initialization. Huawei BYOD security solution also provides custom templates for end user agreements. 2. Deploy Before deploying a mobile office solution, an enterprise must guarantee its mobile devices security compliance. In Huawei BYOD security solution, the host firewalls, VPNs, and Wi-Fi modules of mobile devices can be securely configured, and security policies can be delivered to them. Huawei BYOD security solution supports the enforcement of enterprise security policies. Securely distributing mobile applications is a core issue for consideration during mobile office deployment. Huawei BYOD security solution integrates an enterprise application store to securely and remotely distribute, install, and configure mobile enterprise applications. Furthermore, the enterprise can define application white list and black list policies based on user roles to ensure that right persons access right applications and data. Finally, Huawei BYOD security solution provides an application signature verification feature and the anti-uninstall of resident services to ensure that authorized applications are not maliciously tampered or uninstalled, so that an integral application environment is maintained on mobile terminals. 3. Run The focus should be on the security of applications and data in the running phase. Huawei BYOD security solution provides the following features to protect the security of data on mobile terminals: 8
10 Password policies Jailbreak detection and isolation Controlling peripheral disclosure channels, such as SIM cards, SD storage cards, cameras, Bluetooth, Wi-Fi, USB, GPS, and recorders As mobile devices may be easily lost, Huawei BYOD security solution provides the following functions to deal with device loss: Encryption of key data of enterprises Remote backup, recovery, and synchronization Remote locking Data wipe Furthermore, the IT department can consolidate application security through remote upgrade and patching. In the backend management system, the IT department can query and audit a list of all mobile devices and the status of each mobile device, such as the device model, operating system type, and operating system version. The IT department can output an assets audit report after auditing the mobile devices. Alleviating the pressure on IT infrastructure is an important indicator of whether a mobile office solution is successful. Huawei BYOD security solution supports a friendly and easy-to-use self-help portal, through which employees can perform the following common operations: Registration Password resetting Loss reporting Locking Data backup and restoration Remote data wipe Therefore, Huawei BYOD security solution can greatly alleviate the pressure on IT support personnel. Huawei BYOD security solution also integrates a centralized management console, which supports even more complex management functions, such as message pushing and fault locating. The application programming interface (API) on the console supports integration with the existing help desk systems of enterprises to further improve support service efficiency. 4. Retire If an employee quits from the enterprise or a device is lost, the IT department may first uninstall remaining applications from the device, then wipe data, and finally de-register the device to prevent data disclosure. If the device is a standard device of the enterprise, the IT department can re-register and re-bind the retired device, and deploy security polices and applications on the device later when necessary. 5. Flexible Application Release Enterprises may find it hard to develop mobile applications due to the diversification of mobile devices and the complexity of enterprise applications. To relieve this headache, Huawei provides a centralized MEAP, which allows centralized adaptation and interconnection between mobile terminals and enterprise applications, and therefore improves system expansibility. Huawei MEAP has the following features: Supports HTML5 and native applications. Supports hybrid application development and deployment, where native applications serve as containers and HTML5 serve as UIs. Provides an IDE where auxiliary service logic design modules are embedded to reduce the number of codes. Supports one-off application development and application release across multiple platforms to help reduce development complexity and shorten the go-live time of applications. In the design and development phase, enterprises can design abundant embedded security features, such as secure sockets layer (SSL), single sign-on (SSO), and MDM, in mobile applications. These security features can be associated with one another to consolidate application security. Huawei MEAP supports a development process that threads through the entire lifecycle of applications. The process consists of design, development, testing, deployment, and maintenance phases, ensuring that application development activities are continuously and efficiently performed. 9
11 Selecting Huawei Huawei provides a market-leading BYOD security solution for enterprises and industrial customers. BYOD mobile services involve terminal devices, bottom-layer firmware, system software, and application middleware. They form an integrated ecological chain and place an emphasis on the integration of the upstream and downstream. Renowned for an open mind, Huawei is able to closely cooperate with mobile original equipment manufacturers (OEMs), integrators, mobile or wireless operators, and the other members of the ecological system to quicken steps in bringing into reality the particular value and features of the BYOD security solution. While providing deep security control for devices and applications, Huawei BYOD security solution offers a good choice for enterprises to exercise simple but efficient security management. It emancipates enterprises from worrying about mobile service deployment and helps enterprises improve the return on investment (ROI). Huawei BYOD security solution enables you to: Create a secure zone where an enterprise environment and a personal environment are isolated from each other, helping to attain an optimal tradeoff between security and efficiency for BYOD. Provide E2E ability to guard against the disclosure of sensitive data while data is at a standstill, in motion, being used, or being stored. Provide an industry-leading, consistent, and secure access means for ubiquitous endpoints, and a unified security policy management platform*. Exercise deep security management and control of devices and applications. Provide lifecycle-based mobile device management and a complete security management process covering Acquire, Deploy, Run, and Retire phases. Supported Client Platforms Device Platform Version iphone 3G/3Gs iphone 4/4s ipad Android (such as Huawei and Samsung) ios or above ios 4.0 or above ios or above Android 2.2 or above Windows XP, Vista, Windows 7 Windows Phone Windows Phone 8* * indicates a feature to be supported by later versions of Huawei BYOD security solution. 10
12 Copyright Huawei Technologies Co., Ltd All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademark Notice, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd. Other trademarks, product, service and company names mentioned are the property of their respective owners. General Disclaimer The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice. HUAWEI TECHNOLOGIES CO., LTD. Huawei Industrial Base Bantian Longgang Shenzhen , P.R. China Tel: Version No.: M C-1.0
HUAWEI TECHNOLOGIES CO., LTD. Huawei AnyOffice Mobile Security Solution
HUAWEI TECHNOLOGIES CO., LTD. 1 2 1 Overview In 2012, 20% of global employees brought their own mobile devices to work, such as the iphone, ipad, or Android based devices. Along with huge IT consumption,
More informationBEYOND LIMITATIONS CONNECTING POSSIBILITIES
BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in
More informationHuawei AnyOffice MDM Technical White Paper
Huawei AnyOffice MDM Technical White Paper Contents 1 Background... 1 2 Solution Overview... 2 3 Lifecycle-Based MDM... 5 3.1 Acquirement...5 3.2 Deployment...6 3.2.1 Secure Access to Intranet Resources...6
More informationHow To Create A Network Access Control (Nac) Solution
Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security
More informationLog Audit Ensuring Behavior Compliance Secoway elog System
As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationUnited Security Technology White Paper
United Security Technology White Paper United Security Technology White Paper 1 Challenges...6 1.1 Security Problems Caused by Mobile Communication...6 1.2 Security Fragmentation Problems...8 2 United
More informationProven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationMOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
More informationHUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper
Doc. code HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper Issue 1.0 Date 2014-08-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationHuawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationProduct Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
More informationSVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationHuawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationQuidway SVN3000 Security Access Gateway
Quidway SVN3000 Security Access Gateway SSL/IPSec VPN Access Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview With the rapid development and popularization of the Internet, informatization of enterprise
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationProtecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
More information4 Steps to Effective Mobile Application Security
Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationSVN3000 Security Access Gateway SSL/IPSec VPN Access Gateway
With the development of across-region services and establishment of enterprise branches, remote office has seen increasing demand. Thus, interconnections between branches and secure access for employees
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationSECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationDeploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
More informationHuawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.
Eudemon 1000E-X Series Firewall Huawei Technologies Co., Ltd. Product Overview With the dramatic increase in threats to networks, users are become ever more concerned by application- and service-based
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationKaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationSecuring mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationEudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationSamsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationa) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationSonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationHow To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
More informationHuawei Agile WAN Solution
Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service
More informationNorton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
More informationHuawei Eudemon200E-N Next-Generation Firewall
Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT
More informationBest Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
More informationProtecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationBuilding A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
More informationEUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
More informationHuawei PAN BYOD Converged Network Solution
Huawei PAN BYOD Converged Network Solution Background According to a report from IDC, by the end of 2015, users will use more mobile devices than PCs to surf the Internet. With the popularity of smart
More informationFIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More information{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
More informationBlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationINSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
More informationVodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationMobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
More informationHuawei esight Brief Product Brochure
Huawei esight Brief Product Brochure esight Integrated Enterprise NMS As the network scales and the number of enterprise network applications continue to grow, so does the number of devices, such as multi-service
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationSolutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
More informationSupplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationThe dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationBENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
More informationThe Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationWhy Switch from IPSec to SSL VPN. And Four Steps to Ease Transition
Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationHow to Secure Your Environment
End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge
More informationCisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
More information