1 Executive Summary SyncDog Enterprise Mobility: The Big Data Answer for BYOD Mobile computing is adding another layer of complexity to big data, widening the infrastructure attack surface. Organizations unprepared to leverage big data for cyber-threat detection leave themselves to great risk!
2 Mobile devices have now become integral IT worksta ons connec ng users with company and client 24/7/365. The in macy and immediateness of mobile communica on can be the difference-maker between an employee losing or leaving their job and a company losing a valued client. Ready or not, mobility has already injected itself deep into your enterprise IT. The good news is if you know this and are prepared to manage it as you would any other IT asset, chances are you will be able to deliver the expected performance and availability of the IT asset and all the applica ons it serves to the end user. However, the very hybrid nature of a Bring-Your-Own Device (BYOD), part personal a aché - part office companion, means that your security and service delivery approach will have to be quite different than that of an enterprise laptop/desktop/server. Most all technologists agree that this discipline falls within Enterprise Mobility Management (EMM), however, the en rety of the endeavor cannot be completely contained within EMM. If we are going to manage the mobile IT asset as if it were another connected worksta on, the generally accepted EMM defini on does not contain enough checkpoints to use as a guide for best prac ce. How can this be, you might ask, and didn t EMM just arrive on the scene last year? The short answer is blame big data. Because of Informa on Security (InfoSec) and industry compliance concerns from BYOD, IT needs needs to collect user event log data, and mobile devices generate a lot of it. Es mates on data use vary, but on average smartphone users generate around 1GB per month. SyncDog es mates this number is low and represents more users outside of the BYOD ecosystem. The corporate BYOD user who streams personal audio and video, accesses client with file a achments and connects to enterprise file stores, instant messaging and other business applica ons, this number is most likely much higher than 1GB per month. To illustrate at just 1GB per user per month, consider a company the size of St. Petersburg, Florida-based Raymond James Bank at 6,200 employees. If only half are mobile users consuming 1GB of data per month, the mid-sized bank is going to have a 3 terabyte-permonth bandwidth problem. Bandwidth however isn t the only mobile data problem the mid-sized bank will have to consider. For informa on security, compliance and audit purposes, IT managers are going to need to selec vely collect and archive individual device log data for every applica on launched, every file store accessed, and every , every website accessed, every loca on tracked by GPS (where legally allowed or required). It is impera ve that IT managers only capture essen al data and that it be used proac vely for threat detec on. The list goes on and on and with audi ng requirements (some 10 years or longer), this data will con nue to test the capacity limits of storage. Industry analysts from think tanks like Gartner and Forrester Research agree that device and applica on
3 management through a container approach is the best prac ce for mobile data collec on and secure applica on deployment/management. Containeriza on is the process of segmen ng corporate and personal data on the device in containers that can be controlled with encryp on and authen ca on. The prac ce of pu ng data in containers is rela vely new and SyncDog Enterprise is one of only a handful of so ware vendors that is capable of addi onally segmen ng applica ons into containers. The caveat here with containerized applica ons is the flexibility your mobile so ware vendor possesses to handle different applica on frameworks or APIs. SyncDog Enterprise provides both client/server app container and client/server app container with a flexible SDK/API. This allows users to have their own device with their own apps, mul media and on the same device where corporate data and apps are containerized. While EMM centers on managing the mobile asset and applica ons that the asset delivers, big data and real- me monitoring seem to be the forgo en redheaded mobile management stepchildren. A recent study found that the average employee uses three to five different devices to access a corporate datacenter. These devices are all genera ng applica on and event-log data at an alarming pace, as well as placing addi onal performance load on other components in the infrastructure. It is es mated that 90 percent of the world s data today has been produced in Global mobile data traffic will grow just the last 2 years. three times faster than fixed IP traffic from 2012 to Global mobile The asterisk to EMM* is Big Data data traffic was 2 percent of total IP Much has been wri en about MDM and its restric ve approach to BYOD and MDM s evolu on to EMM. TechTarget senior editor, Colin Steele, provides a good defini on of EMM as the all-encompassing approach to security enabling business workers use of smartphones and tablets. Most agree that EMM is the evolu on of enterprise mobile device administra on covering deployment and security (MDM) and traffic in 2012, and will be 9 percent of total IP traffic in Cisco Visual Networking Index: Forecast and Methodology, Whitepaper, May 2013
4 applica on delivery (MAM). But Big Data responsibility in a typical IT enterprise seems to be stuck somewhere between storage administra on, informa on security and applica on delivery. Clearly the asterisk to EMM is Big Data and SyncDog Enterprise has provisions for managing Big Data for mobile administra on, real- me monitoring alerts and informa on security and applica on delivery. SyncDog Enterprise takes a modular a la carte approach to solu on delivery and can be deployed as a fully-integrated solu on or in synchrony with an exis ng BYOD implementa on. The new big 3 we focus on when deploying EMM are Big Data, MDM and MAM. SyncDog Enterprise Big Data focus: SyncDog has a message filtering facility that allows the client to add only event logs that are relevant to IT security and monitoring. This provides clients the ability to collect only the log files needed to correlate events for cyber threat detec on and minimizes the need to collect all log (Big) data. SyncDog delivers performance and availability monitoring through a centralized web-based console, providing live proac ve no fica ons for devices that are genera ng data, including status (on/off), internal and external resource u liza on, and correla on alerts for user logs indica ve of cyber threat. SyncDog Enterprise Mobile Device Management considerations SyncDog Enterprise provides AES 256-bit encryp on on a so ware-based data pla orm. SyncDog Enterprise uses Federal Informa on Processing Standards (FIPS) encryp on for securing , a achments, calendar items, tasks, and contacts. For data on the go, SyncDog Enterprise provides a par oned applica on in an encrypted loca on of the mobile device that does not restrict normal use of the device For mobile iden ty management, SyncDog Enterprise delivers a hardware-separated and encrypted token device
5 that requires mul -factor authen ca on for access. Without knowing both device ID and user ID, no access is granted to the device nor can it access the network. While authen cated, the device operates as normal with no disrup on from the token. SyncDog Enterprise provides cross-pla orm MDM for mobile inventory and asset management with Android, ios, BES and Good Server monitoring, and provides integra on for Ac ve Directory and LDAP. SyncDog Enterprise u lizes an industry-leading event log correla on engine for defending cyber breaches and can no fy a security admin of poten al internal or external threat before the breach occurs. SyncDog Enterprise MDM reduces mobile risk and ensures audit compliance by snapsho ng the known trusted state of the device and no fies security admins if there are any changes to the secure configura on state. The device is con nuously scanned for any changes with detailed event log records accessible from a centralized admin dashboard available through any web browser. An easy-to-use admin dashboard provides simple search for device status and audit history with the capability to perform instant over-the-air lock or wipe. SyncDog Enterprise provides the ability to bulk provision users at onboarding thru end of life. SyncDog Enterprise s peer monitoring system is a locked-down device app, not accessible to the device user SyncDog Enterprise has been deployed worldwide and is currently monitoring more than 400,000 smartphones. SyncDog Enterprise Mobile Application Management focus SyncDog delivers cloud-based MAM to enterprises with both mobile workforces and end-user consumers.
6 SyncDog provides cross-pla orm MAM for mobile with:» Custom applica on store» Applica on tes ng & crash analysis, plus» Applica on performance monitoring with analy cs SyncDog MAM can manage app transac ons through both internal (IT department deployment) and external (Apple or Android) exchanges. SyncDog MAM leverages 128-bit encrypted SSL Since applica ons vary by market segment, MAM deployments are industry-specific. SyncDog has provided MAM to the following segments:» Healthcare Government Media Retail Transporta on U li es Financial SyncDog Enterprise Deployment GOOD NOC Good Technologies Devices GMM/GMC Active Directory PUSH NOTIFICATION SERVICE ios Sentinel DMZ Relay Sentinel Mobile Connector Sentinel Management Server Admin Console Android GCM Big Data/SQL BlackBerry BLACKBERRY NOC BAS/BES Ledger Public Internet DMZ Enterprise Data Center Sentinel Mobile Agent ios / Android / BlackBerry Mobile Device Data Capture Sentinel Server Sentinel Data Push to Mobile Device Sentinel Server Agent About SyncDog SyncDog, Inc Library Street, Suite 500 Reston, VA USA Call: (703) Fax: (703) To overcome BYOD challenges, IT administrators need real-time visibility into the service status of every device on the network, regardless of ownership. Mobile professionals are the new norm and downtime is a productivity killer. Mobile Enterprise Security Correlation made simple!
1 MOBILITY IN FINANCIAL SERVICES A Checklist Towards Regulatory Compliance Whitepaper Whitepaper Brochure 2 A Checklist Towards Regulatory Compliance Like business leaders in every industry, decision makers
Thought Leadership SERIES AUGUST 2011 Unlocking the Power of Mobile Device Management Mobile device management (MDM) is about more than technology it s also about skillful strategic resource management.
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
Why Hosted VoIP? By Clark Atwood Vice President 4801 S Lakeshore Dr Ste 106 Tempe, AZ 85282 Ph: 888.353.9900 Fx: 480.777.1401 Web: www.conciergecom.com Contents Introduc on Who is Concierge Communica ons?...2
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
G00230106 Critical Capabilities for Mobile Device Management Published: 8 August 2012 Analyst(s): Monica Basso, Phillip Redman Mobile device management offerings are expanding from traditional configurations,
The Future of Mobile Enterprise Security Gearing Up for Ubiquitous Computing August 2014 795 Folsom Street, 1 st Floor San Francisco, CA 94107 Tel.: 415.685.3392 Fax: 415.373.3892 Contents Introduction...
SecuRity technologies for mobile and Byod. Executive summary 1.0 the mobile challenges The volume of new malware that is specifically targeting mobile devices is growing at an almost 1.1 increasing threat
White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
10 Essential Elements for a Secure Enterprise Mobility Strategy Best practices for protecting sensitive business information while making people productive from anywhere Mobility and bring-your-own device
THE BENEFITS OF CLOUD NETWORKING 1 White Paper The Benefits of Cloud Networking Enable cloud networking to lower IT costs & boost IT productivity 2 THE BENEFITS OF CLOUD NETWORKING Table of Contents Introduction
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
WHITE PAPER Three Steps to Reduce Mobile Device Security Risks Table of Contents Executive Overview 3 Mobile Device Security: 3 Just as Critical as Security for Desktops, Servers, and Networks 3 Find the
SOTI MobiControl Enterprise Mobile Device Management Manage Support Secure Monitor Track SOTI Inc., a leader in Enterprise Mobile Device Management for over 10 years, has sold millions of licenses to more
G DATA TechPaper #0273 Mobile Device Management G DATA Application Development TechPaper_#0273_2015_04_21 Contents 1. 2. 3. 4. Introduction... 3 Mobile devices in the enterprise... 3 2.1. Benefits... 4
AIIM White Paper Survey Report: Mobile Content Security and Productivity Sponsored by About the White Paper As the non-profit association dedicated to nurturing, growing and supporting the user and supplier
Securing Microsoft s Cloud Infrastructure This paper introduces the reader to the Online Services Security and Compliance team, a part of the Global Foundation Services division who manages security for
Enterprise Readiness of Consumer Mobile Platforms Contents Executive Summary... 3 Mobile Roles and Postures... 4 Mobile Platforms Ratings... 6 BlackBerry OS... 9 Apple ios... 11 Google Android... 13 Microsoft
1 Trader Voice, Only Smarter 2 The World is VoIP: Cue the Soft Phone Revolution. The technology of telephone communica on is comple ng a revolu on that began over 40 years ago. That revolu on is the digi
CENTRIFY WHITE PAPER, FEBUARY 2012 Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches to securing and managing smart
Best Practices for Cloud-Based Information Governance Autonomy White Paper Index Introduction 1 Evaluating Cloud Deployment 1 Public versus Private Clouds 2 Better Management of Resources 2 Overall Cloud
Taking Your Enterprise Mobile: The Mobile opportunities Even though the transition of mobile phones into computers has been a long time coming, the sea change in the past two years is dramatic: Consumer
MOBILE DEVICE SECURITY FOR ENTERPRISES V.2 Final Draft September 12, 2014 firstname.lastname@example.org This revision incorporates comments from the public. Page Building Block 1 Comments 14 Certain commercial
The Microsoft Office 365 Buyer s Guide for the Enterprise Guiding customers through key decisions relative to online communication and collaboration solutions. Version 2.0 April 2011 Note: The information