BYOD(evice) without BYOI(nsecurity)
|
|
|
- Emma Anderson
- 10 years ago
- Views:
Transcription
1 BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate
2 Agenda Drivers for Bring Your Own Device (BYOD) Industry Cardinal Health business Current state BYOD implementation Vision Security guiding principles Approach and timeline Lessons learned 2 D
3 Cardinal Health Leading provider of products and services across the healthcare supply chain Extensive footprint across multiple channels Serving >40,000 customers with renewed focus Approximately 30,000 employees with direct operations in 10 countries >$103B FY11 pro forma revenue* Number 19 on the Fortune 500 list Broadest view of the healthcare supply chain 3 D
4 Changing Industry & Consumerization Estimated 10 billion smart phones by 2014 Android & ios sales brisk over last 2 years Consumers now largest computing purchaser Consumerization impacts business environs Global ICT development, What devices do you use for work? Nextbigfuture.com Source: Forrester Q US Workforce Technology & Engagement Survey 4 G
5 Business Drivers To Change Growth Strategy Cost Efficiency Client Satisfaction Productivity Improvement Collaboration/ Communication Enabling New Business Opportunities Securing the Environment Regulatory Compliance Risk Call to Action 5 D
6 Stakeholders in the Mobile Device Environment Mobile Worker Gen Net CFO/CIO Legal Knowledge Worker 6 D
7 Cardinal Health SmartPhone Environment Today s Environment 1. Personal liable cell phones 2. Multiple controls 3. Strong growth in Tablets 4. Sensitive information on personal devices Impact 1. Explosion of smart phones 2. Support issues 3. Devices on the network 4. Violations of policy Today s Controls 1. Personal device waivers 4. Password screensaver enforcement 2. Remote wipe 5. Excessive password retry Wipe 3. Device level encryption 6. Some monitoring controls Will our controls support the future needs? 7 G
8 VDI & BYOD Vision Provide greater device flexibility and choice Reduce Cardinal Health s total cost of ownership Leverage the benefits of new technology Support a mobile workforce application access, anywhere, anytime, anyplace Embrace consumerization of IT, leverage new strategies for optimizing employee productivity Transition to self service model Improve security through centralized data control, patching and upgrades 8 G
9 VDI & BYOD Principles Personal devices will not have the ability to download and save Cardinal Health information Improve Security Personal devices will not have direct access to Cardinal Health s internal network Security controls will be implemented in the Cardinal Health environment to minimize impact to personal devices Local archives (.pst files) will not be allowed within the virtual environment 9 D
10 Cardinal Health s Approach to BYOD(evice) IT developed Vision and Principles Desktop Server Architecture Security Network Security solutions built into the program A program level approach that includes all non company owned devices (today and tomorrow) A common platform to support those devices 10 G
11 BYOD: Program Roadmap and Timeline Pilot Q1 Pilot Q2 Pilot Q3 Pilot Q4 Year 2 Year 3 Year 4 Internal Pilot VDI BYOD Ref. Architecture Managed Services Security Core Pilot Network Segmented Security Provide Recommendations Secure Program Funding Sustain Pilot Users Sustain Pilot Users 3 Year VDI Deployment 13,000 Users Dependent on VDI: Projected 10% of users over 3 years (2,000 VDI Users) Collaboration Productivity Tools Security Unified Communications Pilot Recommend Secure Program Funding Hybrid Deployment Office Collaboration tools Unified Communications (Voice/Video/IM) Web Conferencing 11 G
12 Segmentation of BYOD Traffic 12 D
13 VDI & BYOD The Journey Isn t Complete Yet Work in Process End user acceptance Business involvement Subsidy to employees Worker segmentation Expansion & Maturity of DLP Mobile application delivery Partitioning of corporate and personal data 13 D
14 Application Build a collaborative approach with Business, Legal, Infrastructure, Risk & Architecture Identify user segmentation Geographical Role Common Applications Virtualize / isolate applications Security Revisit policies, particularly User Access Policy DLP & information classification Segmentation Senior leadership support to overcome resistance Realistic expectations VDI / BYOD is NOT one size fits all 14 -
15 15 Portions Copyright 2012, Cardinal Health, Inc. or one of its subsidiaries. All rights reserved.
16 Cisco s BYOD Strategy & Deployment 2012 Nasrin Rezai CTO Security WW Security Architectures Session ID: HOT-107 Session Classification: Intermediate
17 Cisco-on-Cisco Cisco IT Security Strategy BYOD Journey Lessons Learned
18 Cisco IT Strategy
19 Market Transitions 7 Billion New Wireless Devices by 2015 Mobile Devices Blurring the Borders Changing the Way We Work Consumer Workforce Employee Partner Physical Virtual Video projected to quadruple IP traffic by 2014 to 767 exabytes Anyone, Anywhere, Anytime IT Resources MOBILITY WORKPLACE EXPERIENCE VIDEO
20 Security Trends & Opportunities for Cisco IT Social networking (virtual friends ) Sophisticated Cyber attacks (Advance Persistent Threats) Cloud, XaaS (disappearing perimeter) Who I work with (Collaborative IP Protection) What I use to work (end point identification) Where I work from (location awareness) Product Strategy Accelerator Cisco-on-Cisco Success Product Direction Best Practice Leadership Securely Enable NBM s I/PaaS Offerings New revenue streams COGS Mindset
21 Pervasive Security Accelerator Vision CIO / CSO Cisco is secure. We will not get compromised in the marketplace. We can secure our services without slowing down my client business. We are ready because we embraced security. I am responsible for I know how to the security of my leverage the security service, and able to capabilities needed to make data-driven protect my service decisions Security does not get in the way of doing my business. I know what is expected from me. Employee We know what threats and data patterns to monitor, and how to respond Service Owner Service Architect Security Operations
22 PSA : Top-Level Architecture View Highly Transformational Architecture Focus Areas for PSA Governance Plane IT Governance Service Security Prime Decision Making Model (NEW role) Security Operations Security-IT OM Integration Simplified & Unified Metrics Operational Security Excellence Policy Enforcement (Control) Behavior + Threats Compliance (Visibility) Management Plane Identity & Access Secure Path / Threat Protection Data Foundational Identity Mgmt Access Policy Mgmt NG Strong/Adaptive AuthC Privileged Access Mgmt Secure Data Delivery Device Profiling / Posture Contextual Network Access Threat Detection/Mitigation Data Governance Data Visibility & Control Data Plane
23 BYOD Cloud Shift 1 Access Controls & Trust Access Entitlement Identity & location Guest Vendor HRE Untrusted Device Trusted Device VDI 2 Segment Services in Restricted DC (TrustSec) data Sensitive data Public data 4Enforce in the network Guest (ISE) Access (Default) VXI Only Employee Trusted Device or VXI 3 Manage through Policy (ISE)
24 Cisco IT BYOD Journey
25 BYOD Mobile Landscape Platform Dec 2009 Dec 2010 Dec 2011 iphone 2,266 9% 10,662 32% 20,581 41% ipad 0 0% 1,822 6% 8,144 16% BlackBerry 13,611 53% 15,188 46% 12,290 24% Android 0 0% 1,390 4% 5,234 10% Others 9,647 38% 4,292 12% 2,185 5% Cisco Cius 0 0% 0 0% 2,104 4% 25,524 33,354 50,538 Total Smartphones and Tablets at Cisco 4% 10% 41% 24% 16% Cisco s total mobile device count grew 52% in 12 months.
26 Cisco BYOD Deployment Strategy IT Managed PCs Trusted Platforms IT Virtual Apple Mac Machine laptop / registered BYOD PC Mobile Devices / Tablets Untrusted Platforms BYOD / Any PC device Mobile Devices /Tablets IT Services Help Desk Support Yes Yes No Yes No No Yes Yes Yes Yes Yes Yes Corporate Access (Apps, print, etc.) Yes Yes Yes Yes Limited Limited Registered / Accounted For Yes Yes Yes Yes No No Network User attribution (customer tools, Yes Yes Yes Yes Yes Yes 8021x,TrustSec) Policy Enforcement Wired/Wireless / Yes Yes Yes Yes Yes Yes Remote (ISE) Malware (WSA, ESA)- On Network Yes Yes Yes Yes Yes Yes Security Monitoring - On Network Yes Yes Yes Yes Yes Yes Direct Network Access Yes Yes Yes Yes Limited / VDI Limited / VDI VPN (AnyConnect) Yes Yes Yes Yes Limited Limited ScanSafe Yes Yes Yes Yes Yes Yes Device AV/SPAM Yes Yes As Capable As Capable As capable As Capable Patch Management Yes Yes Yes Yes Yes No CSA/HIPS Yes Yes Yes No Yes No Password Protected Yes Yes Yes Yes Yes No Encryption/Remote Wipe/Asset Yes Yes Yes Yes No No Management Device Identity/Certificate Yes Yes Yes Yes Yes Yes Device Authentication (TrustSec, ISE) Yes Yes Yes Yes No No User Authentication (TrustSec, ISE) Yes Yes Yes Yes Yes Yes Application App store, application virtualization Yes Yes Yes Yes No No Mobile App Development & Security Yes Yes Yes Yes No No Data /Policy/Process Secure Data Storage (on device) Yes Yes Yes Yes No No
27 Policy Evolution: Acceptable Use, Rules of Use
28 Hard Work & Results: Company Gains 52% more devices 18% more users 24% fewer cases
29 Hard Work & Results: Company Gains We Also Project: Removal of Local IT for Extranet Partners Cost of reduced ACL changes Security Monitoring Support Cost reduction
30 BYOD Application
31 Top 10 - Major IT BYOD Questions How To: Increase visibility and policy based control? Deal with Architectural Change? Enable Service Delivery? Manage Identity, Entitlement & Access? Maintain Cost, Licensing & Asset Controls? Manage Deperimeterization Scenarios? Understand Impact to Compliance? Maintain Standards? Deal with Application Interoperability? Ch g O ti l & S t
32 How to Embrace Mobility While Ensuring Security Some Questions to Answer Do I have the WLAN capacity and reliability to support increase in mobile devices and future applications? How do I enforce security policies on non-compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don t have visibility? How do I minimize emerging threats targeted at mobile devices? How do I monitor and troubleshoot user and client connectivity issues on my access (wired/wireless) network? Is my network capable of delivering the scalability and performance required to realize the benefits of a BYOD strategy?
33 Summary On Your BYOD Journey Establish Governance Business Sponsors HR and Legal Align to Broader IT strategy Workforce Enablement & Mobility Globalization & New Business Model Cloud Transition Take a user Centric Approach Employees, Contractors, Partners Balance Risk Management with TCO, User Experience and Security Take Architectural & Phased Approach to Delivery Bake Security Architecture into the broader business and IT architecture Educate & Communicate!!!
34 Thank You
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
Mobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment
Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities
Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials
BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. [email protected]. Co-Author Bitkom Leitfaden BYOD
BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland [email protected] CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
The flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER
The BYOD Opportunity Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER Table of Contents Abstract.... 3 Introduction.... 3 A New Approach to BYOD... 3 Positive Results....
Delivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Mobilizing Business Applications, Efficiently and Affordably
VERIZON APPLICATIONS AND CLOUD Mobilizing Business Applications, Efficiently and Affordably Mobile connectivity has become a way of life and an expectation for much of today s workforce. With pervasive
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Bring Your Own Device
Bring Your Own Device Cisco Values in BYOD Eric NG ([email protected]) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
Solutions for admission control and data loss prevention in a modern corporate network
Solutions for admission control and data loss prevention in a modern corporate network 15 th Finance Tech Forum Yasen Spasov Sales & Pre-sales Manager Executive Summary Founded in 1995 Subsidiary of INTRACOM
Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Secure Network Access for Personal Mobile Devices
White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should
Securing and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Securing BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
Simplifying Desktop Mgmt With Novell ZENworks
Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America [email protected] Ryan Radschlag Network Manager Hartford Joint #1
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape
Office anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape Consumers adopting mobile RISKS Users Devices Apps Data Users
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Welcome to the era of the anywhere worker
Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility
Generating leads with Meraki's Systems Manager. Partner Training"
Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution
trends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
SANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
How To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect [email protected]
SOSPG2 Implementing Network Access Controls Nate Isaacson Security Solution Architect [email protected] Offer Pa Agenda The BYOD Challenges NAC terms The Big Picture NAC Solutions and Deployment What
Security and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions
MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
THE EDGE OF TOMORROW JUST HAPPENS TO BE TODAY. EXPLORE THE INTERNET OF EVERYTHING.
THE EDGE OF TOMORROW JUST HAPPENS TO BE TODAY. EXPLORE THE INTERNET OF EVERYTHING. Giving our partners the EDGE at Comstor Our unique offering The EDGE of tomorrow just happens to be today As a value added
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
Cisco Validated Design
Device Freedom Without Compromising the IT Network Last Updated: February 7, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems Development
Cisco Validated Design
Device Freedom Without Compromising the IT Network Last Updated: February 20, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
Optimizing the Mobile Cloud Era Through Agility and Automation
Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
The Evolution of Traditional Telecoms to IP Communications
Telecoms Enterprise Day 2014 The Evolution of Traditional Telecoms to IP Communications Presented by Andy Openshaw 28 March 2014 Hot topics The shift from TDM to IP communication platforms The growth in
Device Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Tom Schauer TrustCC [email protected] 253.468.9750 - cell
Tom Schauer TrustCC [email protected] 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü
Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management
Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor
Cisco s BYOD / Mobility
Cisco s BYOD / Mobility CONTROL and VISIBILITY for IT DEVICE CHOICE and PREDICTABILITY for Users BALANCE between the number of wired ports and wireless radios 2011 Cisco and/or its affiliates. All rights
