Security for mobile apps

Size: px
Start display at page:

Download "Security for mobile apps"

Transcription

1 November 2014 Security for mobile apps This white paper provides education on security considerations and requirements for mobile apps. 1

2 Contents Authentication & security for mobile apps 3 Securing mobile devices 4 MAM vs MDM 5 App data 6 States of data 7 User Authentication 9 Appendix A 17 Appendix B 18

3 Authentication & security for mobile apps Objective The objective of this white paper is to provide education on security considerations and requirements for mobile apps. Along with identifying security risks, considerable detail and technical examples have been used to advise on securing both mobile devices and app data separately. Audience This paper is aimed at the more technologically knowledgeable reader, although it is not intended to exclude the general reader. Introduction Security is an important consideration when developing enterprise and public apps. There are two main factors to consider when talking about security in app development: Securing the mobile devices Securing the app data This document aims to cover as many aspects of securing mobile devices and the apps running on them as possible, but first it is worth covering the main reasons for data loss and leakage in the first place: Carelessness (enterprise and public apps) Devices can be lost or stolen, so any data being stored on them needs to be secured as much as possible. Data also has to have a valid reason for being on the device in the first place, so reviewing the data caching policy of the app, during the solution architecture phase, is very important. Although devices have built in password protection, users may not use secure passwords, making devices vulnerable. Users may also choose to disable or set insecure passcodes, such as 0000, 1234 or their date of birth etc. This can provide easy access to anyone trying to retrieve information from their devices. In the case of enterprise apps, however, this can be mitigated through the use of a Mobile Device Management (MDM) solution. 3

4 Malicious 3rd Parties (enterprise and public apps) Devices can be stolen and hacked, as can the data coming into and from the device. During the initial planning phase of app development, it is important to review the data in transit to ensure the data is being sent in the most secure manner for the context of the app. Malicious employees (enterprise) Disgruntled employees exposing or leaking confidential enterprise information is hard to stop; employees need access to data in order to do their jobs. MDM and Mobile Application Management (MAM) solutions are able to mitigate this to an extent, but they cannot stop truly dedicated attempts entirely. For example, businesses can disable the ability to take screenshots, dictate which apps are allowed to open certain file types and disable copy and paste functionality, but you cannot stop someone taking a photo of the screen with another device. Granted, this has always been an issue. Employees who really want to steal documents will find ways to do so. It s just that they will turn to lower tech options to do so. Securing mobile devices Type of device Before looking into how to secure the data in your app, it s worth taking a look at the devices themselves and any policies that can be applied to them. These policies will differ depending on the category the device falls into. Most devices fall into these 3 categories: 1. Personal 2. Personal managed (BYOD) 3. Company Owned There are different approaches that can be taken for ensuring security, depending on what type of audience the app will be built for. Personal device The device is owned by the end user, in this case you will have no control over the device or the operating system. Any security features will need to be implemented as part of the app. This is most applicable for apps being distributed via public app stores. 4

5 Personal managed (BYOD) If an organisation has a BYOD (Bring Your Own Device) policy in place, it is possible for IT to gain control over some aspects of the device and the operating system, via profiles. These are usually distributed OTA (Over The Air). Profiles allow IT to dictate certain settings and force a device to meet these settings, in order for apps to work. This can include, VPN settings, Passcode enforcement etc. Through installing these profiles, it can be possible for IT to take full control of the device. Apart from extreme circumstances, this is generally not advisable as many users will not accept the profiles and therefore, not use the corporate approved or created apps on their devices. A balance needs to be found between having enough control to protect corporate data and not taking liberties with the users device. Company owned If the devices are owned and distributed by the company then you can almost do what you want with them. Devices in this category should be managed via a MDM solution in order to control: VPN settings Passcode enforcement Pre-installed apps Inactivity lock time Device features: Siri (ios) Camera AirDrop (ios) icloud (ios) Profile Installation App store access Remote wipe Remote lock MAM vs MDM This is an important consideration when choosing distribution and security settings for your apps. The choice really boils down to whether you are implementing a BYOD policy, or whether the devices are corporately owned. 5

6 In some cases, it may be a blend of both depending on what organisations want to control. MAM (Mobile App Management) Mobile App Management is the way to go if you are implementing a BYOD policy. As the name suggests, it allows you to have control over apps and their data without infringing on the users personal usage of the device. One caveat to note is that MAM allows you to control only your apps, not third party apps. MDM (Mobile Device Management) Mobile Device Management is a much better solution, if the devices are owned by the organisation. As these are company assets, IT can have full control over the device and therefore limit the usage of them to purely work related tasks. MDM allows you to control a device at the OS (Operating System) level, not just the apps you have created. This obviously comes with its own issues. One of the reasons ios became popular in the corporate market was executives getting frustrated with not being able to use the devices they had as they wanted to. With the launch of ios 8, Apple has introduced further improvements to management of the device, data and apps; a key benefit for the corporate market. ios 8 provides a MDM framework, which allows IT to fully configure and manage all ios devices within an organisation. OS X Server includes Profile Manager, which is a MDM solution that allows companies to remotely manage ios devices. One benefit of many MDM and MAM solutions is that they can be used to separate personal and corporate data. It can also be used to disable personal apps and enable corporate apps in certain locations. Refer to appendix A for Gartner s Magic Quadrant for enterprise mobility management suites. App data Apps are generally only as good, or as useful as the data that is either served to them, or being generated by them. As a part of the initial planning phase, the data should be reviewed and classified as: 6

7 Public: Data that typically is publicly accessible requires minimal security controls and poses little or no risk to the company s reputation, resources, services, or individuals Private: Data whose unauthorised disclosure may have moderately adverse effects on an organisation's reputation, resources, services, or individuals. This is typically the default classification for most organisations and requires a moderate level of security Sensitive: Data whose unauthorised disclosure may have serious adverse effects on an organisation's reputation, resources, services, or individuals. Typically, this includes data protected under governmental or state regulations, or data that carries with it proprietary, ethical, or privacy considerations. Sensitive data requires the highest level of security. Sensitive data would usually encompass data such as user login credentials, banking details etc. States of data We usually refer to data in two states when developing apps: 1. Data at rest: offline, static data that is stored or cached on the device or server 2. Data in transit: data being sent to and from a device or server (the communications layer) Data at rest Data at rest, up until now, has always been stored on a server and served up by a web page. If you didn t have a connection, the web page would simply not load. Mobile has changed this and now users expect their data to be available even when they are not in range of WiFi or 3/4G networks. This essentially means storing a copy of something previously stored on a secure server on multiple devices potentially. The server is usually under the control of the content owner and measures are put in place to restrict access (physical and virtual) to the data. Once you have sent that data to the device however, it is out of your central control, so steps must be taken to protect data being store on the device. Any data being stored on the device should be classified using one of the three levels mentioned above (public, private, sensitive). Once this has been determined, the decision should be 7

8 made on whether it is being stored or not. If it is being stored, decisions need to be made about which methods should be used to protect it. Public: There is no need to encrypt any part of this data. It can be stored in text files and unencrypted data stores. Usually no form of authentication would be required to access this information Private: Would need to be stored in an encrypted data store or the users keychain Sensitive: Very sensitive data should not be stored on the device and all other avenues must have been explored before making this decision. If it is going to be stored on the device then it should be protected by encrypting the data and the data store Data in transit In the same way as data at rest should be reviewed, so should any network transmissions. Public: this can be transmitted over a HTTP connection, there is no requirement for any more protection than this, but ideally a HTTPS connection should be used if possible Private: Must be sent over a HTTPS connection Sensitive: Must be sent over a HTTPS connection, it is recommended to encrypt the data before sending and, if available, a VPN connection should be used as well. Encryption of data before transmission Instead of purely relying upon the SSL connection to protect the data, the data can also be encrypted on the device or server before sending. A decryption key would be required on the device or server, or both, to facilitate this. VPN Connections VPN connections can be used to ensure that data never leaves your network. VPN connections allow users to only access content on internal systems if they are authenticated at a network level. Access to any systems, such as Sharepoint, that may sit on the internal network, can also be secured with the usual username and password combination, meaning that many systems are behind two layers of authentication. 8

9 Certificate pinning Certificate pinning is a way of adding an extra layer to an HTTPS connection by, bundling the certificate from the server in the app itself. This means that all requests have to exactly match the certificate on the device with the certificate on the server. One of the main drawbacks of using this approach, however, is that the app needs to be updated whenever a new certificate is required. Considerations in development An HTTPS connection is enough to cover public, private and sensitive data while in transit. However, depending on the nature of the data being transmitted, you may want to consider one (or more) of the above additional layers. However, there are some things to consider surrounding the implementation of these layers: Performance: if data is being encrypted and decrypted on the fly then performance can suffer as a result. There are a number of factors to considered here, such as frequency of transmission and size of payload, before opting to do this Secure key generation: In order to encrypt or decrypt data, you must generate a key to use in the encryption process and subsequently in the decryption process. Deciding on the technology to use for this is an important decision. User Authentication Mobile apps and the servers they communicate with should be authenticated using a stateless, token based authentication model. Stateless authentication Mobile apps should be secured using a stateless authentication model. This means that no user state is ever stored on the server and that each individual request made by the client is authenticated. This is usually implemented by sending an authentication token in the header of every request where authentication is required. 9

10 Types of token There should be two types of token created when using stateless authentication: 1. Registration tokens: generated when a new user is created and stored against that user in the database. These should not be deleted unless the user is removed from the system or the account becomes compromised 2. Authentication tokens: generated when the user logs into the app. These can be deleted as and when required, to comply with any company policies surrounding session duration etc Generating tokens Tokens should be generated on the server using an acceptable encryption algorithm and not on the device. Once generated they should be stored against the user in the database. The device should have no need to decrypt an authentication token. It should only have to store it and know which requests require it. This provides several benefits: No sensitive user information is ever stored on the device for the purposes of authentication No decryption keys are ever stored on the device The server maintains control over access No encryption algorithms are stored on the device. Should the code become compromised the authentication code would not be The server retains control over access. Tokens can be deleted server side to force login or to block access completely Mubaloo recommends generating your tokens using Bcrypt. Authenticating a user Refer to appendix B. Recommended authentication model Any user wishing to use the mobile app, will be required to log in via the desktop portal first and generate a one time login code (2 factor auth). This code will be time limited and will be invalidated once the time has elapsed. 10

11 The user will be required to submit: Active Directory credentials Logon name Password Code generated on desktop portal Upon receiving the credentials, the code is validated and if validation passes, an authentication token should be generated using the users Active Directory password. This will create a key and a system wide salt (otherwise known as pepper ). This should then be stored against the user in the server side database. Once the token has been generated (and by definition, the user has been authenticated) the service should send back the user profile in the response body of the authentication / login call. Example HTTP headers An example HTTP request from a device with an authtoken: POST /login/ HTTP/1.1 Host: example.server.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en- US; rv: ) Gecko/ Firefox/3.5.5 (.NET CLR ) Accept: text/html,application/xhtml+xml,application/ xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO ,utf-8;q=0.7,*;q=0.7 X-Auth-Token: <generated token here> Pragma: no-cache Cache-Control: no-cache A salt is a randomly generated value based within the string in the database, so that using hash tables to crack passwords becomes impossible. As each password has its own salt, each one needs to be individually cracked. A pepper is a secret site-wide value based separately from the database. It s used so that if the database is compromised, it will not allow the entire app's passwords to be brute-forced. The server should be configured to look for X-Auth-Token on incoming request headers. The value of this field should be compared to the value stored against that user in the database. If the token is found, allow the response to be sent, however if the token doesn t match or does not exist, the response should be sent with the correct status code (a Unauthorised response). 11

12 Passcode protection If MDM is not available (meaning devices cannot be forced to implement a device-wide passcode), an app level passcode will be implemented. This passcode will have the same characteristics as a device level passcode and the following options will be configurable: Minimum length Passcode characteristics (must include numbers, special characters etc) Inactivity timeout Lifetime Passcode history rules (cannot be the same as previous n passcodes) Number of failed attempts These rules will be stored locally on the device and refreshed, each time the user logs in. Should the rules need to be updated, the users can be forced to re-authenticate by deleting all authentication tokens, in the User table. Passcode reset If the user enters an incorrect passcode n times (dependent on the configuration options received upon login) the users authentication token will be deleted from the device. The user will then be forced to re-authenticate and (upon successful authentication) set a new passcode. App behaviours In order to provide a secure but usable app, the right balance between UX and security needs to be met. If an app is so secure that it makes it difficult for users to use, all the money invested in the app will have been wasted. Systems with high security may also encourage users to circumvent the controls, by using other apps and services - this is generally when corporate data leaks out. Another scenario is if an app is 100% secure but is hard to use, the end users will circumvent the controls that the app is attempting to put in place. Generally, they will do this by using other apps and services to achieve their goals and this usually results in corporate data leakage. 12

13 Likewise if an app is so easy to get into, that there is essentially no protection at all, chances are your legal and Information Security teams will be dead against it. Either the project will never get off the ground, or the data will be so limited, it will prove useless to the user. Either scenario will potentially put barriers in the way of future app development projects by wasting time and money. Example An employee wants to access a sensitive document, for a client contact list on their smartphone, tablet and laptop, as they never know which one they will be using. This list is frequently updated, so access to it on all these platforms is essential. Due to strict IT policies, the app goes into the background after every 30 seconds of inactivity. This means the app requires a complex passcode to be used, every time. The employee gets frustrated with the app, so s a copy of the list to their private (non corporate) account. They also upload it to their Dropbox account where they can now access it, hassle free, from all devices. Good for the employee, bad for corporate data. You can see that a balance needs to be struck here. IT and Information Security consultants and teams are now considering this balance as well as the security and risks of exposing their data. If you are not currently considering this approach you probably should be, some control is better than no control. Implementing an app level passcode system There are several aspects to consider in designing and implementing the passcode protection system: Lifecycle events Mobile apps have several lifecycle events that need to be catered for, usually involving going in and out of the background: The user has elected to close the app (sending it into the background with the home button) The user has switched to another app The user has an incoming call etc The app needs to respond in an appropriate manner in each scenario. Mubaloo recommends, that an app should display the 13

14 passcode entry screen on re-launch after n seconds. (Value to be configurable based on settings from the API). Inactivity timers An inactivity timer, for forcing the user to re-enter their passcode, is also recommended. This should be long enough to allow the user to switch apps for a brief period to check something, but short enough to protect the app data. The timeout duration will be configurable via the API. Passcode rules Passcodes should be complex enough to meet your organisation s criteria but should not be so complex that users are likely to forget them. Again, it s all about finding the balance between security and usability. A secure password (complex string of characters, numbers and symbols) prompted for every time the user puts the app into the background will almost certainly result in the app not being used. Whereas a 4, 5 or 6 digit pin will be much less of a barrier and result in more use. We have usually gone for a 5 or 7 digit PIN, something that s not the same as the users bank card PIN, but also something that will put them off using their date of birth. You can also add validation to the PIN rules, looking out for regular patterns such as 1234 or 0000, but don t make this too complex. Ultimately, if a user wants to use their DOB or an easily guessable number there is not much you can do about it. Push notifications Never send sensitive or secure data via Push. Push notifications are handled by SSL connections, however payload data is visible to Apple as it passes through their APN servers. Mubaloo also recommends not including sensitive information in push titles, or body texts, as these will be visible when the message arrives. Streaming Media Securing streaming media is more complex than other web service requests. As there is no session in place, an alternative mechanism is required. This secures the connection between the device and the server while streaming video. 14

15 Temporary random URLs Temporary video URLs can be produced and sent back to the app upon request. These should be generated in a similar manner to the auth tokens. These URLs should also have a limited lifespan, so that they are destroyed within n seconds of creation. The contents of these URLs can be streamed via an SSL connection. Considerations: Not actually an authenticated call If the URL is guessed then access can be gained. A secure enough generated URL would lessen this risk This approach would allow for playback using the default media player component. Auth Token The header based approach to all the other calls can be used if we build a custom media player into the app. By using a custom media player, we will be able to set the auth token as usual and initiate playback. Apple TouchID API On supported devices (currently the iphone 5s, iphone 6 and iphone 6 Plus, running ios 8) Mubaloo recommends securing access to your app using the TouchID API instead of a PIN or passcode. Conclusion Mobile applications are inherently more secure than desktop applications due to sandboxing; the mobile operating systems have not copied the mistakes of their desktop predecessors. However data caching on devices throws up privacy and security concerns we did not previously encounter in the web world. Ultimately, it s all about balance. You need to find the right balance between what works for you from a data security perspective and what your users will accept from an access perspective, so make sure the right people are involved in the project. Do not leave IT or security out in the cold in favour of UX and do not let security run riot over the UX. 15

16 If the balance is not right your data will be leaked or your application will not be used and you will find it very hard to get buy in for future projects. 16

17 Appendix A Source: (Gartner, June, 2014) 17

18 Appendix B 18

19 Enterprise Mobility Consulting Developing Deploying Security guidelines for mobile app 3

Enterprise Security with mobilecho

Enterprise Security with mobilecho Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Salesforce1 Mobile Security Guide

Salesforce1 Mobile Security Guide Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Guidance End User Devices Security Guidance: Apple ios 7

Guidance End User Devices Security Guidance: Apple ios 7 GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Resco Mobile CRM Security

Resco Mobile CRM Security Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were

More information

End User Devices Security Guidance: Apple OS X 10.10

End User Devices Security Guidance: Apple OS X 10.10 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best

More information

Guidance End User Devices Security Guidance: Apple OS X 10.9

Guidance End User Devices Security Guidance: Apple OS X 10.9 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

SharePlus Enterprise: Security White Paper

SharePlus Enterprise: Security White Paper INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

ios 8 Security and Privacy Changes

ios 8 Security and Privacy Changes ios 8 Security and Privacy Changes Alban Diquet December 5th, 2014 Agenda Data Protection in ios 8 HealthKit Custom Keyboards Local Authentication Privacy Changes Introduction ios 8.0 was released on September

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

BlackBerry 10.3 Work Space Only

BlackBerry 10.3 Work Space Only GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Telstra Mobile Device Management (T MDM) Getting Started Guide

Telstra Mobile Device Management (T MDM) Getting Started Guide Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702 ENTERPRISE SECURITY ios Security Lecture 5 COMPSCI 702 APPLE BUSINESS Apple s ios-based devices have gained popularity among consumers 61.2 million handsets sold in Q1 (2015) More enterprises have started

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s

More information

IBM Cognos Mobile Overview

IBM Cognos Mobile Overview IBM Cognos Business Intelligence 10.2.1 IBM Cognos Mobile Overview Agenda IBM Cognos Mobile Overview Analysis on Mobile Security + Configuration Deploying Good Technology Latest Updates IBM Confidential

More information

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Mobile Device Management (MDM) Policies

Mobile Device Management (MDM) Policies Mobile Device Management (MDM) Policies Best Practices Guide Copyright 2012 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice.

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

How to configure Mac OS X Server

How to configure Mac OS X Server How to configure Mac OS X Server By Rob Buckley In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. See photo story here

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com

Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

SAS Mobile BI Security and the Mobile Device

SAS Mobile BI Security and the Mobile Device SAS Mobile BI Security and the Mobile Device Version 1.0 April 24, 2015 Contents Introduction...1 Security Features Provided by SAS Mobile BI and SAS Visual Analytics...2 Introduction... 2 Lock the SAS

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

ipad in Business The Top Considerations

ipad in Business The Top Considerations ipad in Business The Top Considerations iphone and ipad are the best mobile devices in the world and have transformed the way people work with over 98 percent of the Fortune 500 and over 92 percent of

More information

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11 Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about

More information

ManageEngine Desktop Central. Mobile Device Management User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...

More information

Weak Spots in Enterprise Mobility Management Dennis Schröder

Weak Spots in Enterprise Mobility Management Dennis Schröder Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager

More information

Convenience and security

Convenience and security Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Mobile Configuration Profiles for ios Devices Technical Note

Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011 Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

MDM, COPE, BYOD, MAM, MIM, PIM???

MDM, COPE, BYOD, MAM, MIM, PIM??? MDM, COPE, BYOD, MAM, MIM, PIM??? Peter Teufl peter.teufl@iaik.tugraz.at Overview Deployment scenarios Managed COPE BYOD Consumer Platform security lication security Best Practice Managed Managed Handing

More information