Master s STI GDWP. Authors: Mark Baggett, mark.baggett@morris.com Jim Horwath, jim.horwath@rcn.com. Submitted: June 6, 2010
|
|
- Norah Robbins
- 8 years ago
- Views:
Transcription
1 Design Phase One of an iphone Rollout Master s STI GDWP Authors: Mark Baggett, mark.baggett@morris.com Jim Horwath, jim.horwath@rcn.com Submitted: June 6, 2010
2 Table of Contents Table of Contents... 2 Executive Summary... 3 Business Advantages of iphone Deployment... 4 Biggest Risks of iphone Usage... 6 Risks Associated with All Mobile Devices... 6 Risks in Current Infrastructure... 8 Mitigation Strategies for Risk... 8 Mitigation Options... 9 Third Party Products Purchase Offerings No Additional Charge Offerings Conclusions Appendix Exchange Settings References... 15
3 Executive Summary GIAC Fortune cookie would like to initiate the deployment of iphones to the workforce. GIAC Fortune Cookie has an existing BlackBerry and Microsoft Exchange infrastructure in place today and would like to maintain the same level of risk during the deployment of iphones. This document explores the business advantages inherent to the use of iphones along with the risk introduced by the device. The team will attempt to reproduce the controls in place today in our BlackBerry environment using the software available at no additional cost from Apple and Microsoft. Then, after exhausting the controls available with the free products, we will analyze the residual risk and existing BlackBerry controls that are not available with these tools. Finally, we examine commercial software offerings that are available to help close gaps not addressed using free products for integration and deployment of iphones into the existing environment. There are several advantages to deploying iphones in our organization. First, we want our customers to perceive us as a forward thinking innovative leader in the Fortune Cookie market. The adoption of technologies such as the iphone helps to mold that customer perception. Second, the world is becoming increasingly mobile. Our customers and employees are moving towards mobile smartphone technology. By embracing this technology, and addressing the risks associated with the use of the technology, we empower our business with the ability to respond to the demands of the mobile market. Last, by providing our employees with devices that bring together business data with the internet and location based services we empower them to make faster better business decisions to drive revenue. There are significant advantages to deploying this technology, but it is not without risk. There are several threats posed by the use of mobile devices in the work place. Those threats include the loss of devices containing sensitive data, mobile malware, and the use of unauthorized devices accessing company data. Until now, we have successfully mitigated those risks with controls implemented by our BlackBerry server. The controls in place today on our BlackBerry BES server include data encryption, password protection, the ability to remotely wipe a device, restrictions on the use of unauthorized software, and the ability to authenticate a remote device. Authenticating the remote device is important because it ensures that we avoid storing sensitive data on non-company devices. Our goal is to maintain the BlackBerry controls in an iphone environment, or otherwise mitigate the risk in order to maintain our current risk posture. While reviewing our current risk posture, the team made a startling discovery. The ActiveSync technology used by the iphone may be active and exposing the company to the risk of rouge mobile devices storing sensitive data. We are taking immediate action to identify the extent of the exposure. An action plan is in place to mitigate the threat. Without a clear understanding of any control
4 gaps that exist between the BlackBerry and the proposed iphone infrastructure, recommendations, planning and budget for a deployment are not possible. The team compared the current BlackBerry BES infrastructure with an iphone infrastructure built with tools from Microsoft and Apple. Unfortunately, the management tools available from Apple and Microsoft left significant gaps in our controls. However, we believe combining third party commercial tools with Microsoft and Apple tools should address all of the risk associated with the iphone. This would align the controls in place for the iphone with the current BlackBerry controls. Although a thorough evaluation of third party products was not possible in a 24- hour period, the team did develop a short list of products that will likely meet the needs of the organization. The products evaluated include ianywhere by Sybase, Smartphone Suite by GuardianEdge (soon to be Symantec) and Enterprise Mobile Manager by Trust Digital (soon to be McAfee). The team recommends a complete evaluation and vetting of the products to determine which products meet our needs. Once the team chooses a product, we recommend the company initiate user education and training, prior to any product deployment. In summary, the iphone is a powerful and flexible technology that will empower our workforce. Adapting available technology today to address the risk associate with this technology will give GIAC a strategic advantage over our competitors, who are not embracing the mobile market. Using third party products, we should be able to fully address the risk associated with the use of this technology and continue to drive GIAC Fortune Cookies as the market leader and innovator. Business Advantages of iphone Deployment The adoption of any technology in an enterprise is a business decision based on risk and value. Introducing the iphone to the enterprise will have several benefits for GIAC s employees, customers, and business partners. The initial analysis is: Use of modern technology portrays the company in a positive manner as being innovative and forward thinking. The convergence of Internet, location-aware services, and business information in a single device empowers the mobile workforce to crush the competition. For example, a sales person can easily identify all potential customers with a given radius of their current location.
5 Potential customer location map By identifying and mitigating risks now, this allows the organization to respond to an increasingly mobile world. The success of the iphone in the consumer market created a wellconnected workforce that is comfortable with iphone technology. Modifying our technology to support this growing market will allow us to create a more intelligent and focused workforce. The iphone is the market innovator and rapidly gaining market share in the mobile device market. According to IDC s Worldwide Quarterly Mobile Phone tracker, the iphone s market share grew faster than all other mobile devices. iphone market share for Q1, erry.html
6 In the summer 2009, Philippe Winthop of Strategy Analytics, did a study named Directory of Business Mobility Solutions. This study of 100 enterprises showed organizations using iphones were more responsive to market information, had faster responses to enterprise information, and better response to outside organizations than organizations using noniphone mobile devices. 2 Please note the success of the iphone has lead to a very competitive smartphone market. Many of the manufacturers of competing smartphones are now offering devices with an iphone like browsing experience. The advantages of the iphone over these competing devices will diminish over time. There are some indications that smartphones based upon Google s Android may overtake the iphone in the market place. 3 Once we develop the risk mitigation strategies for the iphone, GIAC Fortune Cookie s will be better prepared to address the risk in other mobile devices. Biggest Risks of iphone Usage Note: The risks discussed below are valid as of June The smartphone industry is evolving at a rapid pace; information provided below may not be valid in the future. The value of any company is its intellectual property. Intellectual property comes in many forms: customer contacts, contract bids, salary information, product information, marketing strategies, etc. Employees demand freedom and access to critical resources whenever they travel. Technology is spoiling users with the ability to access business critical data everywhere. However, this flexibility brings with it a responsibility to be very careful not to place a firm in additional risk by exposing intellectual property. Risks Associated with All Mobile Devices All mobile devices share a common set of risks and exposures. The chart below highlights the three major categories of risk that affect all mobile devices. 2 ngtitles&mid=b4771c6f22f34e4ca3fffda61e0ea2c5&tier=4&id=33cd8f28dc99448aafa803a DE2B2F1A0 3
7 Table with common mobile device risks and mitigations We mitigate all the risks above by implementing the following security configurations and technologies on our Blackberry BES server. 4 We utilize end-to-end encryption of s and credentials as they travel across the wireless networks. This prevents the exposure of confidential communications and internal credentials as they pass across untrusted open networks. Implementation of device encryption protecting data stored on devices while at rest. An unauthorized person in possession of the device cannot access the data without the password. Idle time password protection. If any GIAC-owned BlackBerry device is unsecured for more than five minutes, the device will lock itself requiring a password for access. GIAC uses device configuration policies to enforce minimum-security requirements. GIAC requires password protection for handheld devices and prevents password guessing by an individual who finds or steals the device. If an intruder incorrectly guesses a password ten times, the device initiates a disk wipe of all data. GIAC has the ability to activate a KILL function allowing the administrator to wipe data from lost or stolen devices. By applying policies, GIAC can minimize the exposure to malware by restricting the use of unauthorized software on mobile devices. GIAC displays an ownership statement on the locked screen of a BlackBerry, with a contact number to recover lost or stolen devices. With various Smartphone management tools available from the Apple, Microsoft and other iphone, the Security Operations Team is only able to implement some of these controls on the iphone. However, without the use of addition software there are still some residual risks. We will discuss these risks later in the mitigation section. Some of these risks may even apply to the current infrastructure. 4
8 Risks in Current Infrastructure Responding to the request for adding iphone support provided the Security Operations Team with the opportunity to understand iphone technology and doing so reviewed possible risks in our current infrastructure. The following diagram illustrates how proposed iphones would access company and Fortune Cookie Application. Unauthorized mobile device GIAC DMZ Internet GIAC Fortune Cookie Application GIAC Fortune Cookie Employees Authorized mobile devices External Firewall External Outlook Web Server Internal Firewall Exchange Servers Near Term Storage Mobile infrastructure June 2010 An iphone connects to GIAC s Internet-facing Outlook Web Access servers. Microsoft Exchange 2003 and later supports ActiveSync allowing mobile devices to store company . During analysis of threats associated with integration of a new technology like the iphone, the team uncovered default settings in our Microsoft Exchange ActiveSync environment that are adding additional risk and exposure to company data. By default, deployments of Microsoft Exchange has Microsoft Active Sync enabled for all users and devices, allowing any smart devices such as the iphone, Android and Microsoft Mobile Smartphones to download and store company . This default setting allows users to synchronize without any policies in place. The Security Operations Team recommends immediate remediation and details of this configuration are available in the Appendix. A change management ticket request (REQLO127001) is open for the remediation. The team will notify the Incident Response Team concerning any existing devices already containing company data. Mitigation Strategies for Risk We mitigate the vast majority of risks associated with mobile devices with controls in place on our BlackBerry server. To maintain our existing level of security, the Security Operations team first attempted to duplicate the Blackberry controls on the iphone. The initial approach was to maintain those controls by using Apple s
9 iphone Configuration Utility (Apple ICU) to implement the Center for Internet Security s iphone configuration Benchmark. The team reviewed the CIS standards and industry best practices for iphone deployments. The team created an iphone policy to enforce the best practices outlined in the CIS benchmark. The team created this template only to prove the feasibility of using Apple s ICU to implement all of the controls available to us today on the Blackberry BES. The team did not vet the policy build for acceptability in our enterprise. The team explored other tools such as Microsoft Exchanges Mobile Device manager, and third party security products in order to mitigate residual risk left unchanged by the use of Apple s ICU and the CIS Benchmark. Mitigation Options The Center for Internet Security (CIS) has a document recommending the best practices for iphone configuration. The document recommends establishing a minimum baseline enforceable through system controls such as: Requiring all iphones to be running the latest revision of firmware, as of the writing of this document the latest revision is The disabling of all VPN, Wireless, Bluetooth, and Location-based services when the iphone is not in use. CIS recommends implementing best practices by using the iphone Configuration Utility (ICU). The business and Security Operations should develop its own configuration standard based on CIS Benchmark adopting it to meet business needs. Once the business and Security Operations agrees on a workable configuration, this configuration will become the company Gold configuration standard. Corporate policy will require all devices will adhere to the Golden configuration. The use of Apple s ICU and the CIS Benchmark mitigated many of the risks associated with weak passwords and poor configuration on the iphone. In the diagram below there is a policy named CIS Recommendations. All of the suggested settings of the CIS Benchmark are set in the General and Passcode sections of the policy, highlighted below.
10 Screenshot of Apple s ICU However, it left notable gaps when compared to the controls on the BlackBerry. Specifically: GIAC cannot encrypt the phone without using additional software. Not having data encrypted introduces additional risk to the firm and the iphone user. The native wipe function available on the iphone does not remove the data; it only renders the iphone unusable. A user can retrieve data off the phone after an iphone wipe. It is not possible to add custom banners displaying contact information in the event the iphone is lost and the finder wants to return it. This is only possible with additional software. After a gap analysis of this configuration against the CIS Benchmark, the team determined there are several critical security settings not configurable in Apple s ICU tool. Section 1 of the CIS guide contains several of the non-configurable settings. Additional risks addressed on the BlackBerry server, but missing in the CIS Benchmark include the ability to wipe the device remotely. Tools such as Microsoft Exchange Mobile Device Management (MDM) can help reduce the risk and exposure. MDM only partially addresses one of these residual risks. It provides the ability to remotely wipe a device. However, the wipe only places the device in recovery mode, and since the device lacks effective encryption, the data remains at risk. iphone supports disk encryption; however, this encryption has proven to be an ineffective control. 5 Using MDM to wipe a device renders the device temporarily unusable. Administrators can use the MDM to remotely disable the device. 5
11 Screenshot of remote disk wipe capability 6 ICU and MDM do not address all the risks. The devices still lack encryption and a true wipe capability. Additionally, we cannot prevent the installation of unapproved software. This can lead to malware and vulnerabilities on our smartphones. There are additional tools available from third party software vendors that will increase the security posture of GIAC iphones. These tools should provide the full suite of controls available on the BlackBerry. These commercial tools will need vetting through the corporate process weighing the benefits and deficiencies of each offering. Adding one or more of the tools below should allow GIAC to align an iphone deployment with the current BlackBerry deployment. The following graphic depicts a list of critical BlackBerry controls currently in use, and the tools to implement said controls on the iphone. 6
12 Security controls matrix If the third party tools deliver the functionality they market, the iphone does not increase the risk of exposing sensitive data. The team recommends GIAC begin an evaluation of third party offerings to mitigate risk prior to iphone adoption. Third Party Products Knowing that we will have to use a third party tool to help address the risks, the team reviewed the marketing materials for several products and services. The team did not find any mobile service providers that offered equivalent controls. The team did find several software offerings that claimed to address all the required controls. The team compiled a short list of companies meeting the product requirements. This is not an exhaustive list. Purchase Offerings ianywhere Mobile Office for iphone by Sybase. This software combines fully integrated wireless and PIM data with on-device security and business process mobilization. 7 Trust Digital EMM manages the entire lifecycle of the iphone with tools and facilities. McAfee announced their intent to purchase Trusted Digital May 25 of this year. 8 GuardianEdge Smartphone Suite. Symantec announce their intent to purchase GuardianEdge in April of this year WP.pdf
13 No Additional Charge Offerings Apple iphone Configuration Utility available at: Exchange Management Console: 76e9c677e802&displaylang=en Conclusions After evaluating the risk mitigated by the management tools provided at no cost by Microsoft and Apple, we believe the firm will be unable to maintain the current level of security provided by our BlackBerry environment. If senior leadership wants to maintain the current level of security without accepting additional risk, GIAC Fortune Cookies must evaluate third party products to secure the iphone. While a complete evaluation of products is impossible in a 24-hour period, the security team identified several products that claim to address most of the risks introduced by the iphone. The security team recommends an evaluation of products to determine whether they deliver the services advertised, and selection of the product that best meets our needs. Finally, Security Operations will collaborate with senior leadership to initiate a security education program for employees before issuing smartphone devices and on an on-going basis.
14 Appendix Exchange Settings GIAC can control the ability to synchronize a mobile device by the msexchomaadminwirelessenable attribute on each users account. By default, this value is not set (it is NULL). A null value allows the user to synchronize any mobile device that supports active sync with their account. To prevent users from synchronizing their this value much be changed to 7. Here is an explanation of the msexchomaadminwirelessenable attribute: 1 (bit 0) = 1 to disable Server Activesync, 0 to enable it 2 (bit 1) = 1 to disable Outlook Mobile Access, 0 to enable it 4 (bit 2) = 1 to disable Always Up-To-Date (AUTD), 0 to enable it = 7 = All ActiveSync Features disabled In addition to setting, this value on existing accounts actions need to be taken to ensure that new accounts created also have their value changed to 7.
15 References "Massive IPhone Security Issue Could Endanger Enterprise Adoption." ReadWriteWeb - Web Apps, Web Technology Trends, Social Networking and Social Media. 31 May Web. 06 June < Cassavoy, Liane. "How Much Does an IPhone Cost - The Price of the IPhone 3G." Cell Phones -- News, Reviews, and More about the Latest Cell Phones and Smartphones. Web. 06 June < "Mobile Messaging with Exchange Server 2007 Part 2: Managing Mobile Devices." Microsoft Exchange Server Resource Site: Articles & Tutorials. Web. 06 June < 2007/mobility-client-access/mobility-client-access/mobile-messaging-exchangeserver-2007-part2.html>. Oliver, Sam. "AppleInsider IPhone Market Share Grows to 16% at Expense of BlackBerry." AppleInsider Apple Insider News and Analysis. 07 May Web. 06 June < 16_at_expense_of_blackberry.html>. Nunziata, Susan. "4 Real Benefits Of IPhone In The Enterprise In This Issue Mobile Enterprise Magazine." 4 Real Benefits of IPhone in the Enterprise. Web. 06 June < Publishing&mod=PublishingTitles&mid=B4771C6F22F34E4CA3FFFDA61E0E A2C5&tier=4&id=33CD8F28DC99448AAFA803ADE2B2F1A0>. TinyComb, "Google s Android To Take Over The IPhone By 2012 â TinyComb." TinyComb â Hand Picked Tech News. Web. 06 June < 2012/>. "IPhone 3GS Encryption useless?" Security and the Net. Web. 06 June < "Mobile Smartphone Security Software and Protection from GuardianEdge." Enterprise Data Encryption and Endpoint Data Protection Software for Hard Drives,
16 Removable Storage and Smartphones GuardianEdge. Web. 06 June <
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationMobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSecuring end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
More informationIf you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
More informationSecurity. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
More informationThe User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationTrust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
More informationHow To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
More informationHow To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device
Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationMobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition
Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationCorporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
More informationBlackBerry Universal Device Service. Demo Access. AUTHOR: System4u
Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationProactive controls to mitigate IT security risk
Proactive controls to mitigate IT security risk Policy Compliance Content Security Secure Access Endpoint Security Information security risk mitigation Empowering people to work securely The Cryptzone
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More information[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationMcAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationSecuring mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
More informationManaging Mobility. 10 top tips for Enterprise Mobility Management
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
More information{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationInformation Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationExchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationProduct Analysis: 2012 Frost & Sullivan Customer Value Enhancement Award in Mobile Device Management
2012 2012 North American Mobile Device Management Customer Value Enhancement Award 2012 Frost & Sullivan 1 We Accelerate Growth Customer Value Enhancement Award Mobile Device Management North America,
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationSimplifying Desktop Mgmt With Novell ZENworks
Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America jmarton@novell.com Ryan Radschlag Network Manager Hartford Joint #1
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More information5 Things You Need to Know About ipad in the Enterprise
5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationThanks for joining We ll start at 10am
Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy Mobile Device Management Learn the basics to build your MDM Strategy Poll Question #1 3 of 39
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationMy CEO wants an ipad now what? Mobile Security for the Enterprise
My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationSpecial Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationSimplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationEmbracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo. Sheldon.Hebert@fixmo.
Embracing BYOD Without Compromising Security or Compliance The Mobile Risk Management Company Sheldon Hebert SVP Enterprise Accounts, Fixmo Sheldon.Hebert@fixmo.com New Realities of Enterprise Mobility
More informationSupplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
More informationMcAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
More informationBasic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
More informationBYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationGetting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationBlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationDeciphering the Safe Harbor on Breach Notification: The Data Encryption Story
Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their
More informationReal-World Scale for Mobile IT: Nine Core Performance Requirements
White Paper Real-World Scale for Mobile IT: Nine Core Performance Requirements Mobile IT Scale As the leader in Mobile IT, MobileIron has worked with hundreds of Global 2000 companies to scale their mobile
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More information