Master s STI GDWP. Authors: Mark Baggett, mark.baggett@morris.com Jim Horwath, jim.horwath@rcn.com. Submitted: June 6, 2010

Size: px
Start display at page:

Download "Master s STI GDWP. Authors: Mark Baggett, mark.baggett@morris.com Jim Horwath, jim.horwath@rcn.com. Submitted: June 6, 2010"

Transcription

1 Design Phase One of an iphone Rollout Master s STI GDWP Authors: Mark Baggett, mark.baggett@morris.com Jim Horwath, jim.horwath@rcn.com Submitted: June 6, 2010

2 Table of Contents Table of Contents... 2 Executive Summary... 3 Business Advantages of iphone Deployment... 4 Biggest Risks of iphone Usage... 6 Risks Associated with All Mobile Devices... 6 Risks in Current Infrastructure... 8 Mitigation Strategies for Risk... 8 Mitigation Options... 9 Third Party Products Purchase Offerings No Additional Charge Offerings Conclusions Appendix Exchange Settings References... 15

3 Executive Summary GIAC Fortune cookie would like to initiate the deployment of iphones to the workforce. GIAC Fortune Cookie has an existing BlackBerry and Microsoft Exchange infrastructure in place today and would like to maintain the same level of risk during the deployment of iphones. This document explores the business advantages inherent to the use of iphones along with the risk introduced by the device. The team will attempt to reproduce the controls in place today in our BlackBerry environment using the software available at no additional cost from Apple and Microsoft. Then, after exhausting the controls available with the free products, we will analyze the residual risk and existing BlackBerry controls that are not available with these tools. Finally, we examine commercial software offerings that are available to help close gaps not addressed using free products for integration and deployment of iphones into the existing environment. There are several advantages to deploying iphones in our organization. First, we want our customers to perceive us as a forward thinking innovative leader in the Fortune Cookie market. The adoption of technologies such as the iphone helps to mold that customer perception. Second, the world is becoming increasingly mobile. Our customers and employees are moving towards mobile smartphone technology. By embracing this technology, and addressing the risks associated with the use of the technology, we empower our business with the ability to respond to the demands of the mobile market. Last, by providing our employees with devices that bring together business data with the internet and location based services we empower them to make faster better business decisions to drive revenue. There are significant advantages to deploying this technology, but it is not without risk. There are several threats posed by the use of mobile devices in the work place. Those threats include the loss of devices containing sensitive data, mobile malware, and the use of unauthorized devices accessing company data. Until now, we have successfully mitigated those risks with controls implemented by our BlackBerry server. The controls in place today on our BlackBerry BES server include data encryption, password protection, the ability to remotely wipe a device, restrictions on the use of unauthorized software, and the ability to authenticate a remote device. Authenticating the remote device is important because it ensures that we avoid storing sensitive data on non-company devices. Our goal is to maintain the BlackBerry controls in an iphone environment, or otherwise mitigate the risk in order to maintain our current risk posture. While reviewing our current risk posture, the team made a startling discovery. The ActiveSync technology used by the iphone may be active and exposing the company to the risk of rouge mobile devices storing sensitive data. We are taking immediate action to identify the extent of the exposure. An action plan is in place to mitigate the threat. Without a clear understanding of any control

4 gaps that exist between the BlackBerry and the proposed iphone infrastructure, recommendations, planning and budget for a deployment are not possible. The team compared the current BlackBerry BES infrastructure with an iphone infrastructure built with tools from Microsoft and Apple. Unfortunately, the management tools available from Apple and Microsoft left significant gaps in our controls. However, we believe combining third party commercial tools with Microsoft and Apple tools should address all of the risk associated with the iphone. This would align the controls in place for the iphone with the current BlackBerry controls. Although a thorough evaluation of third party products was not possible in a 24- hour period, the team did develop a short list of products that will likely meet the needs of the organization. The products evaluated include ianywhere by Sybase, Smartphone Suite by GuardianEdge (soon to be Symantec) and Enterprise Mobile Manager by Trust Digital (soon to be McAfee). The team recommends a complete evaluation and vetting of the products to determine which products meet our needs. Once the team chooses a product, we recommend the company initiate user education and training, prior to any product deployment. In summary, the iphone is a powerful and flexible technology that will empower our workforce. Adapting available technology today to address the risk associate with this technology will give GIAC a strategic advantage over our competitors, who are not embracing the mobile market. Using third party products, we should be able to fully address the risk associated with the use of this technology and continue to drive GIAC Fortune Cookies as the market leader and innovator. Business Advantages of iphone Deployment The adoption of any technology in an enterprise is a business decision based on risk and value. Introducing the iphone to the enterprise will have several benefits for GIAC s employees, customers, and business partners. The initial analysis is: Use of modern technology portrays the company in a positive manner as being innovative and forward thinking. The convergence of Internet, location-aware services, and business information in a single device empowers the mobile workforce to crush the competition. For example, a sales person can easily identify all potential customers with a given radius of their current location.

5 Potential customer location map By identifying and mitigating risks now, this allows the organization to respond to an increasingly mobile world. The success of the iphone in the consumer market created a wellconnected workforce that is comfortable with iphone technology. Modifying our technology to support this growing market will allow us to create a more intelligent and focused workforce. The iphone is the market innovator and rapidly gaining market share in the mobile device market. According to IDC s Worldwide Quarterly Mobile Phone tracker, the iphone s market share grew faster than all other mobile devices. iphone market share for Q1, erry.html

6 In the summer 2009, Philippe Winthop of Strategy Analytics, did a study named Directory of Business Mobility Solutions. This study of 100 enterprises showed organizations using iphones were more responsive to market information, had faster responses to enterprise information, and better response to outside organizations than organizations using noniphone mobile devices. 2 Please note the success of the iphone has lead to a very competitive smartphone market. Many of the manufacturers of competing smartphones are now offering devices with an iphone like browsing experience. The advantages of the iphone over these competing devices will diminish over time. There are some indications that smartphones based upon Google s Android may overtake the iphone in the market place. 3 Once we develop the risk mitigation strategies for the iphone, GIAC Fortune Cookie s will be better prepared to address the risk in other mobile devices. Biggest Risks of iphone Usage Note: The risks discussed below are valid as of June The smartphone industry is evolving at a rapid pace; information provided below may not be valid in the future. The value of any company is its intellectual property. Intellectual property comes in many forms: customer contacts, contract bids, salary information, product information, marketing strategies, etc. Employees demand freedom and access to critical resources whenever they travel. Technology is spoiling users with the ability to access business critical data everywhere. However, this flexibility brings with it a responsibility to be very careful not to place a firm in additional risk by exposing intellectual property. Risks Associated with All Mobile Devices All mobile devices share a common set of risks and exposures. The chart below highlights the three major categories of risk that affect all mobile devices. 2 ngtitles&mid=b4771c6f22f34e4ca3fffda61e0ea2c5&tier=4&id=33cd8f28dc99448aafa803a DE2B2F1A0 3

7 Table with common mobile device risks and mitigations We mitigate all the risks above by implementing the following security configurations and technologies on our Blackberry BES server. 4 We utilize end-to-end encryption of s and credentials as they travel across the wireless networks. This prevents the exposure of confidential communications and internal credentials as they pass across untrusted open networks. Implementation of device encryption protecting data stored on devices while at rest. An unauthorized person in possession of the device cannot access the data without the password. Idle time password protection. If any GIAC-owned BlackBerry device is unsecured for more than five minutes, the device will lock itself requiring a password for access. GIAC uses device configuration policies to enforce minimum-security requirements. GIAC requires password protection for handheld devices and prevents password guessing by an individual who finds or steals the device. If an intruder incorrectly guesses a password ten times, the device initiates a disk wipe of all data. GIAC has the ability to activate a KILL function allowing the administrator to wipe data from lost or stolen devices. By applying policies, GIAC can minimize the exposure to malware by restricting the use of unauthorized software on mobile devices. GIAC displays an ownership statement on the locked screen of a BlackBerry, with a contact number to recover lost or stolen devices. With various Smartphone management tools available from the Apple, Microsoft and other iphone, the Security Operations Team is only able to implement some of these controls on the iphone. However, without the use of addition software there are still some residual risks. We will discuss these risks later in the mitigation section. Some of these risks may even apply to the current infrastructure. 4

8 Risks in Current Infrastructure Responding to the request for adding iphone support provided the Security Operations Team with the opportunity to understand iphone technology and doing so reviewed possible risks in our current infrastructure. The following diagram illustrates how proposed iphones would access company and Fortune Cookie Application. Unauthorized mobile device GIAC DMZ Internet GIAC Fortune Cookie Application GIAC Fortune Cookie Employees Authorized mobile devices External Firewall External Outlook Web Server Internal Firewall Exchange Servers Near Term Storage Mobile infrastructure June 2010 An iphone connects to GIAC s Internet-facing Outlook Web Access servers. Microsoft Exchange 2003 and later supports ActiveSync allowing mobile devices to store company . During analysis of threats associated with integration of a new technology like the iphone, the team uncovered default settings in our Microsoft Exchange ActiveSync environment that are adding additional risk and exposure to company data. By default, deployments of Microsoft Exchange has Microsoft Active Sync enabled for all users and devices, allowing any smart devices such as the iphone, Android and Microsoft Mobile Smartphones to download and store company . This default setting allows users to synchronize without any policies in place. The Security Operations Team recommends immediate remediation and details of this configuration are available in the Appendix. A change management ticket request (REQLO127001) is open for the remediation. The team will notify the Incident Response Team concerning any existing devices already containing company data. Mitigation Strategies for Risk We mitigate the vast majority of risks associated with mobile devices with controls in place on our BlackBerry server. To maintain our existing level of security, the Security Operations team first attempted to duplicate the Blackberry controls on the iphone. The initial approach was to maintain those controls by using Apple s

9 iphone Configuration Utility (Apple ICU) to implement the Center for Internet Security s iphone configuration Benchmark. The team reviewed the CIS standards and industry best practices for iphone deployments. The team created an iphone policy to enforce the best practices outlined in the CIS benchmark. The team created this template only to prove the feasibility of using Apple s ICU to implement all of the controls available to us today on the Blackberry BES. The team did not vet the policy build for acceptability in our enterprise. The team explored other tools such as Microsoft Exchanges Mobile Device manager, and third party security products in order to mitigate residual risk left unchanged by the use of Apple s ICU and the CIS Benchmark. Mitigation Options The Center for Internet Security (CIS) has a document recommending the best practices for iphone configuration. The document recommends establishing a minimum baseline enforceable through system controls such as: Requiring all iphones to be running the latest revision of firmware, as of the writing of this document the latest revision is The disabling of all VPN, Wireless, Bluetooth, and Location-based services when the iphone is not in use. CIS recommends implementing best practices by using the iphone Configuration Utility (ICU). The business and Security Operations should develop its own configuration standard based on CIS Benchmark adopting it to meet business needs. Once the business and Security Operations agrees on a workable configuration, this configuration will become the company Gold configuration standard. Corporate policy will require all devices will adhere to the Golden configuration. The use of Apple s ICU and the CIS Benchmark mitigated many of the risks associated with weak passwords and poor configuration on the iphone. In the diagram below there is a policy named CIS Recommendations. All of the suggested settings of the CIS Benchmark are set in the General and Passcode sections of the policy, highlighted below.

10 Screenshot of Apple s ICU However, it left notable gaps when compared to the controls on the BlackBerry. Specifically: GIAC cannot encrypt the phone without using additional software. Not having data encrypted introduces additional risk to the firm and the iphone user. The native wipe function available on the iphone does not remove the data; it only renders the iphone unusable. A user can retrieve data off the phone after an iphone wipe. It is not possible to add custom banners displaying contact information in the event the iphone is lost and the finder wants to return it. This is only possible with additional software. After a gap analysis of this configuration against the CIS Benchmark, the team determined there are several critical security settings not configurable in Apple s ICU tool. Section 1 of the CIS guide contains several of the non-configurable settings. Additional risks addressed on the BlackBerry server, but missing in the CIS Benchmark include the ability to wipe the device remotely. Tools such as Microsoft Exchange Mobile Device Management (MDM) can help reduce the risk and exposure. MDM only partially addresses one of these residual risks. It provides the ability to remotely wipe a device. However, the wipe only places the device in recovery mode, and since the device lacks effective encryption, the data remains at risk. iphone supports disk encryption; however, this encryption has proven to be an ineffective control. 5 Using MDM to wipe a device renders the device temporarily unusable. Administrators can use the MDM to remotely disable the device. 5

11 Screenshot of remote disk wipe capability 6 ICU and MDM do not address all the risks. The devices still lack encryption and a true wipe capability. Additionally, we cannot prevent the installation of unapproved software. This can lead to malware and vulnerabilities on our smartphones. There are additional tools available from third party software vendors that will increase the security posture of GIAC iphones. These tools should provide the full suite of controls available on the BlackBerry. These commercial tools will need vetting through the corporate process weighing the benefits and deficiencies of each offering. Adding one or more of the tools below should allow GIAC to align an iphone deployment with the current BlackBerry deployment. The following graphic depicts a list of critical BlackBerry controls currently in use, and the tools to implement said controls on the iphone. 6

12 Security controls matrix If the third party tools deliver the functionality they market, the iphone does not increase the risk of exposing sensitive data. The team recommends GIAC begin an evaluation of third party offerings to mitigate risk prior to iphone adoption. Third Party Products Knowing that we will have to use a third party tool to help address the risks, the team reviewed the marketing materials for several products and services. The team did not find any mobile service providers that offered equivalent controls. The team did find several software offerings that claimed to address all the required controls. The team compiled a short list of companies meeting the product requirements. This is not an exhaustive list. Purchase Offerings ianywhere Mobile Office for iphone by Sybase. This software combines fully integrated wireless and PIM data with on-device security and business process mobilization. 7 Trust Digital EMM manages the entire lifecycle of the iphone with tools and facilities. McAfee announced their intent to purchase Trusted Digital May 25 of this year. 8 GuardianEdge Smartphone Suite. Symantec announce their intent to purchase GuardianEdge in April of this year WP.pdf

13 No Additional Charge Offerings Apple iphone Configuration Utility available at: Exchange Management Console: 76e9c677e802&displaylang=en Conclusions After evaluating the risk mitigated by the management tools provided at no cost by Microsoft and Apple, we believe the firm will be unable to maintain the current level of security provided by our BlackBerry environment. If senior leadership wants to maintain the current level of security without accepting additional risk, GIAC Fortune Cookies must evaluate third party products to secure the iphone. While a complete evaluation of products is impossible in a 24-hour period, the security team identified several products that claim to address most of the risks introduced by the iphone. The security team recommends an evaluation of products to determine whether they deliver the services advertised, and selection of the product that best meets our needs. Finally, Security Operations will collaborate with senior leadership to initiate a security education program for employees before issuing smartphone devices and on an on-going basis.

14 Appendix Exchange Settings GIAC can control the ability to synchronize a mobile device by the msexchomaadminwirelessenable attribute on each users account. By default, this value is not set (it is NULL). A null value allows the user to synchronize any mobile device that supports active sync with their account. To prevent users from synchronizing their this value much be changed to 7. Here is an explanation of the msexchomaadminwirelessenable attribute: 1 (bit 0) = 1 to disable Server Activesync, 0 to enable it 2 (bit 1) = 1 to disable Outlook Mobile Access, 0 to enable it 4 (bit 2) = 1 to disable Always Up-To-Date (AUTD), 0 to enable it = 7 = All ActiveSync Features disabled In addition to setting, this value on existing accounts actions need to be taken to ensure that new accounts created also have their value changed to 7.

15 References "Massive IPhone Security Issue Could Endanger Enterprise Adoption." ReadWriteWeb - Web Apps, Web Technology Trends, Social Networking and Social Media. 31 May Web. 06 June < Cassavoy, Liane. "How Much Does an IPhone Cost - The Price of the IPhone 3G." Cell Phones -- News, Reviews, and More about the Latest Cell Phones and Smartphones. Web. 06 June < "Mobile Messaging with Exchange Server 2007 Part 2: Managing Mobile Devices." Microsoft Exchange Server Resource Site: Articles & Tutorials. Web. 06 June < 2007/mobility-client-access/mobility-client-access/mobile-messaging-exchangeserver-2007-part2.html>. Oliver, Sam. "AppleInsider IPhone Market Share Grows to 16% at Expense of BlackBerry." AppleInsider Apple Insider News and Analysis. 07 May Web. 06 June < 16_at_expense_of_blackberry.html>. Nunziata, Susan. "4 Real Benefits Of IPhone In The Enterprise In This Issue Mobile Enterprise Magazine." 4 Real Benefits of IPhone in the Enterprise. Web. 06 June < Publishing&mod=PublishingTitles&mid=B4771C6F22F34E4CA3FFFDA61E0E A2C5&tier=4&id=33CD8F28DC99448AAFA803ADE2B2F1A0>. TinyComb, "Google s Android To Take Over The IPhone By 2012 â TinyComb." TinyComb â Hand Picked Tech News. Web. 06 June < 2012/>. "IPhone 3GS Encryption useless?" Security and the Net. Web. 06 June < "Mobile Smartphone Security Software and Protection from GuardianEdge." Enterprise Data Encryption and Endpoint Data Protection Software for Hard Drives,

16 Removable Storage and Smartphones GuardianEdge. Web. 06 June <

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

BES10 Cloud architecture and data flows

BES10 Cloud architecture and data flows BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Securing end-user mobile devices in the enterprise

Securing end-user mobile devices in the enterprise IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus. Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Trust Digital Best Practices

Trust Digital Best Practices > ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or

More information

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee

More information

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Proactive controls to mitigate IT security risk

Proactive controls to mitigate IT security risk Proactive controls to mitigate IT security risk Policy Compliance Content Security Secure Access Endpoint Security Information security risk mitigation Empowering people to work securely The Cryptzone

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Product Analysis: 2012 Frost & Sullivan Customer Value Enhancement Award in Mobile Device Management

Product Analysis: 2012 Frost & Sullivan Customer Value Enhancement Award in Mobile Device Management 2012 2012 North American Mobile Device Management Customer Value Enhancement Award 2012 Frost & Sullivan 1 We Accelerate Growth Customer Value Enhancement Award Mobile Device Management North America,

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Simplifying Desktop Mgmt With Novell ZENworks

Simplifying Desktop Mgmt With Novell ZENworks Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America jmarton@novell.com Ryan Radschlag Network Manager Hartford Joint #1

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

5 Things You Need to Know About ipad in the Enterprise

5 Things You Need to Know About ipad in the Enterprise 5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Thanks for joining We ll start at 10am

Thanks for joining We ll start at 10am Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy Mobile Device Management Learn the basics to build your MDM Strategy Poll Question #1 3 of 39

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Ben Hall Technical Pre-Sales Manager

Ben Hall Technical Pre-Sales Manager Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

The Maximum Security Marriage:

The Maximum Security Marriage: The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

Special Report. Choosing the right mobile device platform for your business

Special Report. Choosing the right mobile device platform for your business Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo.

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo. Embracing BYOD Without Compromising Security or Compliance The Mobile Risk Management Company Sheldon Hebert SVP Enterprise Accounts, Fixmo Sheldon.Hebert@fixmo.com New Realities of Enterprise Mobility

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

IBM United States Software Announcement 215-078, dated February 3, 2015

IBM United States Software Announcement 215-078, dated February 3, 2015 IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their

More information

Real-World Scale for Mobile IT: Nine Core Performance Requirements

Real-World Scale for Mobile IT: Nine Core Performance Requirements White Paper Real-World Scale for Mobile IT: Nine Core Performance Requirements Mobile IT Scale As the leader in Mobile IT, MobileIron has worked with hundreds of Global 2000 companies to scale their mobile

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information