{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
|
|
- Lorena Leonard
- 8 years ago
- Views:
Transcription
1 {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk
2
3 Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling all competitors in the market combined. With the newer models flying off the shelves, the number of ipad owners continues to soar. K-12 has been impacted by ipads from several perspectives. For example, teachers want access to BYOD (bring your own device) programs, and instruction is now being facilitated by the ipad and other tablets. The ipad s ability to engage students is irrefutable, and schools are impacted by everyone s interest in using the device at school. With the introduction of any new technology, however, comes risk. Apple s consumerdriven success has not garnered them many points in the school environment. As such, many district IT departments are reluctant to provision ipads for staff and students. That is about to change. Apple claims that increasing numbers of districts are deploying or piloting the ipad, and the company is working to achieve greater acceptance with the latest update to ios version 7 which adds many educational specific features. The company s updates to the ios have helped achieve that greater acceptance by enhancing many security features, such as enterprise single sign-on. The new ios also includes enhancements to device management and control, including single app mode for classrooms. The recent enhancements and features will foster better adoption and control over district-owned ipads. What follows are answers to some commonly asked questions surrounding the district-wide management of ipads. 1
4 ipad Security for K-12 Understanding & Mitigating Risk How can schools best manage applications at the student level? Once the excitement of getting ipads settles in, the anxiety of managing these devices kicks in. You can do it the hard way (manually), use configuration profiles, or use a mobile device management (MDM) solution. The obvious choice would be to use an MDM. An MDM allows you to simultaneously control and configure a large pool of ipads. Now with the advent of ios 7, Apple has greatly enhanced the management capabilities of ios, allowing far more control than ever before. How? The magical app to do this is the freely available Apple Configurator. This application allows you to create groups of devices and manage each group independently with its own configuration profile. When it comes to application ownership, there are three models: (1.) personal user can install; (2.) institutional district owns application licenses and they are transferrable; and (3.) a layered or shared model where districts and the user can install applications. It is probably safe to say that most districts deploy an institutional model. This model is designed for when ipads are shared between users. The Apple Configurator allows you to purchase and deploy applications, create devices and user groups, create a master or template for a group and push the configuration to other (ipads) in the group, and checkin/check-out devices to users. What authentication parameters are available on the ipad, and can I enforce secure passwords on the ipad centrally? The ipad s newest operating system (ios 7) allows system administrators to employ the same type of authentication parameters used in most information security policies. The following authentication settings are configurable on the ipad: Require passcode on device Allow simple value Require alphanumeric value Minimum passcode length Minimum number of complex characters Maximum passcode age Auto-lock Passcode history Grace period for device lock Maximum number of failed attempts 2 Employing these authentication parameters centrally can be achieved with the use of third-party MDM software. In order to distribute a policy across multiple devices, a
5 Plante Moran configuration profile can be installed on each device that manages security settings. This configuration profile can be protected from alteration by the end user by restricting access to the profile with the use of an administrator password, so only authorized individuals can make changes to the settings. Configuration profiles used in conjunction with MDM allow an administrator to make configuration changes centrally and push the updates out to users without the need of any interaction from the end user. What logging settings are available on the ipad? The ipad does not have built-in logging capabilities; however, with the use of third-party MDM software several different types of activity can be logged and monitored. Applications are available for the ipad that allow districts to centrally log and monitor the following types of activities: Unauthorized attempts to access secure networks Types of devices accessing the network Users authenticating to the network Applications installed on devices GPS location Device information Compliance and security information Should security for mobile devices like the ipad be included in annual security awareness training? The use of devices like the ipad in a school district pose several risks specific to the device (largely due to its mobility) that should be communicated to staff to ensure that the appropriate precautions are taken to secure your district s information. Mobile device security training should be administered to all employees who require the use of mobile devices like the ipad before they are allowed to connect these devices to the district s internal network. 3
6 ipad Security for K-12 Understanding & Mitigating Risk Are there ipad security training programs for IT administrators? Most vendors of MDM software offer training programs for their management systems. In some cases, vendors have created webinars that show the capabilities of their MDM products and, in turn, explain how the products are administered. Can I limit my staff s ability to download apps, or are there any security risks by letting them download whatever they want? End users can be restricted from downloading applications (apps) with the use of MDM software or the built-in parental controls. Most MDM software suites include the ability to completely restrict a user s ability to download apps, and some have options to make only approved apps available for download with the use of a configurable app market. The apps located in the Apple App Store are required to go through a screening process before they enter the market; however, in the past, apps have made it through Apple s code review process only to be later pulled for performing actions that Apple does not permit. This will occasionally occur despite Apple s best efforts. Allowing staff to jailbreak and install any apps they want could result in the propagation of malicious code across your entire network. 4 I am able to provide web filtering within the district, what happens when devices leave our network? Historically this has been a challenge with earlier versions of ios and the ipad. Districts ended up disabling the native web browser, Safari, and utilized third-party application web browsers in order to obtain the needed content filtering. Seeing this need, Apple has implemented low-level web filtering into ios 7 software. This means that all web traffic, irrespective of browser (Safari, Chrome, Dolphin) will be subjected to the enforced content filtering rules on any network. These settings are managed using MDM software and can
7 Plante Moran provide a whitelist and blacklist of sites, as well as the ability to analyze web content in real time to determine its appropriateness. This new functionality gives the district peace of mind that the device can be adequately filtered, regardless of the web browser and network connection. Can ipads be jailbroken like iphones? How do I prevent end users from doing that? Many idevice users may have heard of the term jailbreaking at some point. Jailbreaking allows users to gain full access and bypass built-in security features of the ios software. Jailbreaking utilities such as PwnageTool, redsn0w, and JailbreakMe.com have made it easier for even the least technical user to crack open the ipad and install software through unofficial channels. Districts should understand the potential security threats of jailbroken devices and implement strict controls to prevent it. In addition to restricting a user s ability to install applications, websites, or explicit media content, most MDM software also provides scanning capabilities to detect whether the operating system has been compromised. Also, use of ipads should be included as part of the district s acceptable use policy. Additionally, this risk can be mitigated by keeping the ipad s ios software current as Apple typically finds and resolves issues that enable devices to be jailbroken. Q Does the concept of local administrator apply? Can end users surpass district policies? The ipad s ios software restricts users from creating multiple user accounts. While this may be a limitation in some sense, it also effectively eliminates the risk of end users having local administrator account privileges. As long as devices are appropriately configured and enforced, administrators can be reasonably assured that ipad users cannot bypass district policies. 5
8 ipad Security for K-12 Understanding & Mitigating Risk Is there a secure mechanism for teachers, staff, and students to connect to our internal network remotely? The ipad s built-in VPN client currently supports the following VPN protocols by default: SSL VPN Cisco IPSec L2TP over IPSec PPTP In addition, third-party software can be installed that allows for additional protocol support. ios 7 natively introduces the concept of per-app VPN, which allows individual apps to establish a secure VPN connection and close that connection when it s no longer needed. This feature allows the VPN traffic to be isolated and not exposed to all apps running on the device. How do backups work? How do I ensure backups occur as scheduled? Users can use itunes to synchronize (sync) ipad data onto a laptop or workstation, and vice versa. itunes also creates a backup of ipad data and configurations via the itunes sync process and offers a restore feature for users wishing to return to a previously backed up state. Users can also use the backup and restore features to transfer information from one device to another. It should be noted that itunes keeps only one backup for each device. itunes can be configured to automatically launch the sync process every time an ipad is connected to the computer. Similarly, ipad backups should be configured to require encryption using Apple s iphone Configuration Utility. Apple continues to enhance, expand, and promote its cloud-based solution icloud for data synchronization and backup. The icloud backup service captures not only device-specific settings, but also app data, imessage (or SMS & MMS) data, and can also store your personal files. This data stored in Apple s servers could violate HIPAA HITEC. It is recommended that companies use Apple s configuration utility to disable icloud backups, icloud documents and data, and photo stream. 6
9 Plante Moran Vulnerability Threat Risk Information travels across wireless networks, which are often less secure than wired networks. Mobility provides users with the opportunity to leave district boundaries and thereby eliminates many security controls. Bluetooth technology is very convenient for many users to have hands-free conversations; however, it is often left on and then is discoverable. Unencrypted information is stored on the device. Lost data may affect staff productivity. The device has no authentication requirements applied. The district s IT department is not managing the device. The device allows for installation of unsigned third-party applications. Malicious outsiders can do harm to the district. Mobile devices cross boundaries and network perimeters, carrying malware, and can bring this malware into the district network. Hackers can discover the device and launch an attack. In the event that a malicious outsider intercepts data in transit or steals a device, or if the staff member loses the device, the data are readable and usable. Mobile devices may be lost or stolen due to their portability. Data on these devices are not always backed up. In the event that the device is lost or stolen, outsiders can access the device and all of its data. If no mobile device strategy exists, staff may choose to bring in their own, unsecured devices. While these devices may not connect to the virtual private network (VPN), they may interact with or store sensitive documents. Applications may carry malware that propagates Trojans or viruses; the applications may also transform the device into a gateway for malicious outsiders to enter the district s network. Information interception resulting in a breach of sensitive data, district reputation, adherence to regulation, and legal action. Malware propagation, which may result in data leakage, data corruption, and unavailability of necessary data. Device corruption, lost data, call interception, and possible exposure of sensitive information. Exposure of sensitive data, resulting in damage to the district, students, or staff. Staff dependent on mobile devices unable to work in the event of broken, lost, or stolen devices, and data that are not backed up. Data exposure, resulting in damage to the district and liability and regulation issues. Data leakage, malware propagation, and unknown data loss in the case of device loss or theft. Malware propagation, data leakage, and intrusion on the district s network. Source: ISACA Securing mobile devices,
10 ipad Security for K-12 Understanding & Mitigating Risk Without an enforceable way to require ipad backups, policies and procedures continue to play a significant role in backup management. Districts should communicate to end users the importance of frequent, periodic backups, and discourage the creation and/or storage of confidential or critical information on mobile devices like the ipad whenever possible. A Powerful Possibility There are many things that need to be taken into consideration when looking at incorporating the ipad, but we have to remember that the majority of these security implications will be addressed for any new technology. The main security risk that the ipad poses is its mobility and the decentralization of information, but there are ways to secure it and with business going mobile, this device can be a powerful tool. Districts should be well versed in the security implications an ipad brings to the table but they should also be aware that risks are no greater with the ipad than with any other emerging technology. It appears that this one s here to stay. Sources Apples-iPad/
11 ipad Security for K-12 Understanding & Mitigating Risk Contacts Judy Wright Partner Information Technology Consulting Direct Dial: Mobile: Fax: MARVIN SAUER Principal Information Technology Consulting Direct Dial: Mobile: Fax: SRI CHALASANI Senior Manager Information Technology Consulting Direct Dial: Mobile: Fax:
12 plantemoran.com
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationWhy you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationGuidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
More informationipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationMobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
More informationEnd User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
More informationMobile Devices in Healthcare: Managing Risk. June 2012
Mobile Devices in Healthcare: Managing Risk June 2012 1 Table of Contents Introduction 3 Mobile Device Risks 4 Managing Risks and Complexities 5 Emerging Solutions 7 Conclusion 7 References 8 About the
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationMobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall
Mobile security and your EMR Presented by: Shawn Tester & Allen Cornwall Date: October 14, 2011 Overview General Security Challenges & best practices Mobile EMR interfaces - EMR Access - Today & Future
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationKaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationMobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
More informationThe Top Five Security Challenges Presented by Mobile SharePoint Access
The Top Five Security Challenges Presented by Mobile SharePoint Access and how they are addressed by Colligo Briefcase Enterprise The flood of ipads and iphones into the enterprise brings huge productivity
More informationONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
More informationMobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
More informationAddressing NIST and DOD Requirements for Mobile Device Management
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationiphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
More informationSecurity for the Road Warrior
Security for the Road Warrior Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Version 1.1 We are all mobile We all travel from home to campus or from
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationBYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
More informationTALLAN INC. MDM STRATEGY GUIDE 4/10/2014 WE BUILD SOFTWARE THAT HELPS OUR CLIENTS GROW DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead
TALLAN INC. MDM STRATEGY GUIDE 4/10/2014 DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead Brian Sampson Mobile Practice Lead Adam Worobec Senior Director WE BUILD SOFTWARE THAT HELPS OUR CLIENTS
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
More informationWhite Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
More informationSuccessful Mobile Deployments Require Robust Security
By: Maribel D. Lopez FIRMS MUST BUILD SECURITY ENABLED MOBILITY Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as 9irms look to increase productivity
More informationA Guide to Consumerization & Building a BYOD Policy June 2012
INTRODUCTION iphones, ipads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationBYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security whitepapers@contextis.co.uk October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
More informationStudents Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationMOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationWhite Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
More informationGood for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
More informationEnterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationThe Risks and Rewards of Social Media and Mobile Devices
The Risks and Rewards of Social Media and Mobile Devices October 29-30, 2012 Tony Brooks, CISA Principal & Director of IT Assurance Tony and Brooks, Risk Services CISA, CRISC Partner HORNE - IT LLP Assurance
More informationHow To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
More informationEasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
More informationIAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner johannes.feichtner@iaik.tugraz.at IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationSYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
More informationThe Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
More informationAddressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360.
MaaS360.com > White Paper Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility www.maas360.com 1 Copyright 2014 Fiberlink Communications Corporation.
More informationMobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationGetting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationEnd User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationThanks for joining We ll start at 10am
Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy Mobile Device Management Learn the basics to build your MDM Strategy Poll Question #1 3 of 39
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationMobile Device Management
G DATA TechPaper #0273 Mobile Device Management G DATA Application Development TechPaper_#0273_2015_04_21 Contents 1. 2. 3. 4. Introduction... 3 Mobile devices in the enterprise... 3 2.1. Benefits... 4
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationBring Your Own Device:
Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some
More informationStable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationEnterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationBYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
More informationCertified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
More informationMobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
More informationPULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
More informationWHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
More informationParla, Secure Cloud Email
Parla, Secure Cloud Email Secure Email, Instant Messaging, Calendar, Contacts, Tasks, File sharing and Notes across all devices The 1 st Secure Email and Instant Messaging from and European Security Vendor
More informationDeploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
More informationipad Deployment Guide
ipad Deployment Guide Prepared by Taaleem Central Office ITSS ipad Deployment Guide Deployment Considerations Wi-Fi and Networking The network infrastructure must set up to work correctly with Bonjour,
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More information[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
More informationUNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny
132 3089 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny In the Matter of DOCKET
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationUse of tablet devices in NHS environments: Good Practice Guideline
Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood
More informationWashwood Heath Academy Use by staff of private communication devices policy
As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationData Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense
Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense Consumerization of IT Fast & disruptive Enables business Increases productivity It s Mine! THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More information