Mobile App Security Take Any Mobile App and Make It Secure
|
|
- Darleen Maxwell
- 8 years ago
- Views:
Transcription
1 Mobile App Security Take Any Mobile App and Make It Secure Ray Bennett Microstrategy - Director, Mobile Service Line World, Las Vegas, 2015
2 Agenda - State of the Art Mobile App Security Introduction - Mobile Security Concerns - MicroStrategy s 7 Pillars of Mobile App Security MicroStrategy Security Model 1. Authentication 2. Device/Application 3. Data 4. Authorization 5. Operations 6. Platform Mobile Device Management (MDM) Summary
3 Introduction What are the threats and what is at stake?
4 Mobile Security Concerns and Risks Most Concerning - Lack of Control Network Domain: More Control External Domain: Less Control Malware Rootkits Botnets Phishing Ransom-ware Intrusions
5 Top Mobile Threats for 2015 According to McAfee Labs *From: McAfee Labs Threats Report.
6 How Big a Problem is Mobile Malware? Total mobile malware samples exceeded 5 million in Q3 2014, up by 16% in this quarter and 112% in the past year *From: McAfee Labs Threats Report.
7 The Expanding Mobile Device Ecosystem Increased exposure Devices do not work in a vacuum - Connect to one or more cloud-based services (enterprise Exchange server, Gmail, MobileMe, icloud, etc.), home or work PC, or all of above When properly deployed, both platforms allow users to simultaneously synchronize devices with private and enterprise cloud services without risking data exposure - However, there are several scenarios in which services may be abused by employees, resulting in exposure of enterprise data
8 Mobile Means More Exposure Victims of our own success Cloud Ever Expanding Attack Surface Internet of Things BYOD Bluetooth More >> Users Device Types Integration Points Moving Parts
9 What is Compromised and Needs Protecting? Names, Telephone Numbers - Contact Information Addresses Text Messages Notes Browser history Application Data (Financial Numbers, Forecasts) Trade Secrets..and on
10 Microstrategy Mobile Secure Solution Preview A Complete, Flexible, and Customizable Security Model Authentication - Multi-factor, via Touch ID, Passcode & Certificate Communication - Information Flow Mobile Server Intelligence Server Firewall Firewall Device Security - Native hardware security including passcode, auto-lock, failed attempt limits Application Security - Double encryption with app level passcode, online or offline Data Protection - AES 256-bit encryption of data in transit and at rest Authorization - Access managed dynamically based on profile and privileges Operations Engineered process and methodology that defines how mobile technology is to be securely used Platform Security - multi-tier architecture to ensure integrity of mobile computing / BI data
11 Mobile Security Custom Models are a balancing act A Mobile Security Model needs to be Customizable 1. Authentication 2. Device 3. Application 4. Data 5. Authorization 6. Operations 7. Platform Fully Open Unsecured Least Secure Fully Lock Down Most Secure
12 Tolerance to Risk vs. Corporate and User Needs A Mobile Security Model Needs to be Flexible Security Functionality User Experience
13 Authentication Credentials Request and Access Log-ins
14 Microstrategy Mobile - User Authentication Device Level and Application Authentication Device ios Profile Logon Network Logon (if using VPN or Tunnel) Microstrategy Project Meta-Data Logon 1. Standard 2. Windows 3. LDAP 4. Database Mobile Server Authentication Account/Logon that Mobile Server Web Pool Runs Under: 1. Anonymous 2. Basic 3. Windows (Service Account)
15 Microstrategy App Passcode, as of 9.4.1, Update 3 An added layer of authentication protection Device level application security Issues credential challenge on each entry Encrypts local caches
16 Microstrategy App Passcode First Entry into App Create and Confirm password Challenge Create Confirm
17 Microstrategy App Passcode Each Successive Entry Attempt
18 Touch ID New in 9.4.1, Update 5 Advanced Biometric Authentication Integration 5X stronger According to Apple, there is 1 in 50K chance of registering a false fingerprint match versus 1 in 10K chance of guessing a 4-digit passcode No guessing Trying out 50,000 different fingerprints is an incredible logistical challenge. Hack proof Apple doesn t store the fingerprint as an image; they store it as a mathematical representation that hackers can t reverse engineer. Convenient Split second access. Don t have to remember an additional passcode. Unique to you; impossible to forget. Supported on ios8 for iphone 5s, 6, 6+, ipad Air 2, ipad Mini 3
19 Touch ID Microstrategy Application Level *Unsupported platforms simply enter passcode
20 Touch ID Microstrategy Document Level
21 Introducing - Microstrategy 9s + The world s most sophisticated Analytics Platform. Now including the world s most simple, seamless and sophisticated identity platform.
22 What is Usher? The future of identification and authentication Usher is a self-service, cloud-based application that simplifies user authentication and delivers unprecedented system security. Protect Cyber Assets Replace Physical Badges Secure Facilities and Entryways Monitor and Manage Activities
23 Log into applications without entering password credentials Bluetooth, QR Code
24 Log into applications without entering password credentials Fingerprint
25 See it for yourself with the Secure Analytics 9s Demo Microstrategy default iphone App Download
26 Microstrategy 9s with Usher iphone Application Access Demo 26
27 Microstrategy 9s with Usher Time and Geo-Fence Restrictions User Does Not Satisfy Following Condition: Time Geolocation
28 Microstrategy 9s Builds on top of existing secure architecture and provides 3 factor authentication
29 Microstrategy 9s Usher platform architecture
30 Getting Started with Microstrategy 9s
31 Single SignOn (SSO) OOB Support Seamless SSO Support for Authentication Providers Tivoli Siteminder Oblix Okta Seamless SSO Support for Portal Server Applications Microsoft Sharepoint IBM Websphere Oracle WebLogic SAP Enterprise Portal Also 3 rd Party Identity Management Systems that support SAML (Security Assertion Markup Language) Federated Identity Management Systems (Ping-Fed) TBA
32 Single SignOn (SSO) Basic Mechanism Device side Application Supports: HTML Forms Consumption Allows Custom Log-on Screen Work-flow
33 Device/Application Mobile User Hardware and Software
34 MicroStrategy Mobile Application Security MicroStrategy Mobile Server MicroStrategy Intelligence Server Web User Authen'ca'on Support for SSO Link Encryp'on User Authen'ca'on Standard LDAP Database NT Expira'on can be set to enforce MicroStrategy user creden'als when opening the app User creden'als are stored encrypted on device. Applica'on data is encrypted on device. Caches can be cleared when exi'ng the applica'on. Isola'on protects App data from other Apps. Apps are signed to ensure the App is authen'c. Run'me checks enforce App Security. Password required aeer 'meout or suspended state (Confiden'al Project Mode) Single sign- on support. LDAP, Kerberos, NT Integra'on. Independent Third Party Security Tes'ng
35 Apple ios ios8 Secure Encryption Model
36 Google Android Security Model 1. Security at the Operating System level through the Linux kernel 2. Mandatory application sandbox 3. Secure inter-process communication 4. Application signing 5. Application-defined and user granted permissions
37 Security Models Android and ios devices - varying degrees Isolation - Limits app s ability to access sensitive data or systems on device Permissions-based access control - Grants set of permissions to each app and then limits each app to accessing device data/systems within the scope of permissions Traditional access control - Protects devices by using techniques such as passwords and idle time screen locking Limited Hardware Access - Apps can not directly access the underlying hardware Data Encryption - Conceals data at rest on device to address device loss or theft
38 Apple s ios vs. Google s Android A General Summation ios A locked-down platform - Strict Controls on Device and Store - Well designed and thus far, resistant to attack - Rigorous certification model which vets the identity of software authors and weeds out attackers Android Freedom with precaution - Major improvement over traditional computing programs - Less rigorous certification model which allows a more open development environment - Relies on users to make important security decisions
39 Data Protecting Sensitive Data at Rest and in Transit
40 Symmetric Cryptography/Encryption Protects data at rest or in transit (i.e., AES (128, 192, 256)) Hello! 6&%3!aO! Hello!
41 Asymmetric (Public Key) Cryptography/Encryption Exchange symmetric keys, digital signing, x.509 certificate authentication Hello! 6&%3!aO! Hello!
42 Asymmetric Encryption x.509 Certificates Certificate Authority Collects Applicant s Money Validates Applicant s Identity Issues Digital Certificate Issues Private Key X.509 Certificate Private Key Version Unique Serial Number Certificate Signature Algorithm CA Name Validity Period Subject Name Public Key Algorithm Subject Public Key CA Signature
43 Putting It All Together Transport Layer Security (TLS). Also SSL Creates Session Key Uses Session Key to Encrypt Hello! Hello Back!, Server sends Cert Client Cert, Key Exchange, Verify Trust Established Encrypted Communication Asymmetric Symmetric
44 Authorization Implementing boundaries and restrictions
45 Mobile Administrator Utility Security Tab
46 Mobile Server Configuration Admin Settings
47 Mobile Server Configuration Admin Settings
48 Mobile Server Configuration Admin Settings ipad Settings Part 1
49 Mobile Server Configuration Admin Settings ipad Settings Part 2
50 Mobile Server Configuration Admin Settings ipad Settings Part 3
51 Mobile Server Configuration Admin Settings
52 Mobile Server Configuration Admin Settings
53 Mobile Server Configuration Admin Settings
54 User Configuration Microstrategy Mobile App
55 Authorizing User Access to Secure Objects and Data
56 Authorizing User Access to Secure Objects and Data Information Not-Sharing East Northeast Southeast Central West West Total Exec
57 Authorizing User Access to Secure Objects and Data East Region Users East Northeast Southeast Total Exec
58 Authorizing User Access to Secure Objects and Data West Region Users West West Total Exec
59 Authorizing User Access to Secure Objects and Data CXO Executive User No Viewing Restrictions Northeast Southeast Central West Total Exec
60 Authorizing User Access to Secure Objects and Data Information Not-Sharing East West Exec
61 Authorizing User Access to Secure Objects and Data Information Not-Sharing East West Exec
62 Row Level Security Filters Tabular View
63 Authorizing User Access to Secure Objects and Data Users Iden'fied by a Unique Login and User Name Defined in the Metadata Repository Exists Across Mul'ple Projects User Groups Set of Users Can assign Privileges and ACLs Privileges Apply to All Projects Security Roles Set of Privileges Can be assigned to Users and/or Groups Apply to Specified Projects ACLs can be Assigned to User Groups
64 Granting Access Permissions in Microstrategy Privileges Relates to a user s ability to perform certain functions/tasks such as Mobile, Exporting Data, Drilling, etc. Object Permissions via ACL (Access Control List) Provides user, group, role access/restriction on project metadata objects Security Filters (Could use System User Prompt) Introduces column in database tables for user or group or role End user only sees that row if they have explicit access
65 Operations Process and Methods for the User Community
66 Operational Security Situational Awareness - Keep users informed of the importance and impact of their actions Establish Security Policy Passcode Required Passcode Complexity Procedures for Reporting Lost/Stolen Device Device Management Proactive Monitoring Response to lost/stolen device report Information Management Policies for handling of sensitive data Sensitivity Reduction Information Deception Ensure proper placement and operation of WiFi Equipment
67 Platform Providing Secure Connection Access to the Mobile Server
68 Virtual Private Network (VPN) Device Clients
69 Virtual Private Network (VPN) Secure Pin s Generates access credential based on coordinated algorithm processing Physical Tokens iphone Passcode Generator Provides an extra layer of protection Results in extra user authentication step.
70 Virtual Private Networks (VPNs)
71 HTTPS Encrypted Communication (TLS, SSL) Digitally Signed Cert
72 Recommended MicroStrategy Mobile Security Architecture X.509 Cer'ficate Request Firewall MicroStrategy Cer'ficate Server CRL Firewall Cer'ficate Revoca'on List LDAP Server MD HTTPS (AES) MicroStrategy Mobile Server MicroStrategy Intelligence Server DWH
73 Microstrategy Cloud Hosted Model
74 On Premise
75 Platform Network Security WEP (Wired Equivalent Privacy) - Most common protocol - Currently considered not secure WPA (WiFi Protected Access) or WPA2 - Used in commercial WiFi systems - Extremely difficult to compromise Disable identifier broadcasting Maintain wireless emissions within physical corporate boundaries
76 Mobile Device Management (MDM)
77 Mobile Device Management (MDM) AirWatch MobileIron Citrix
78 MDM Benefits of an MDM Integration Supports a variety of mobile devices (Phones, Tablets, Printers) Provides centralized control to manage, monitor, and support mobile users Supports BYOD models Asserts control over user experience Enforces specific levels of security policy across all mobile devices Protects proprietary organizational information Provides On-Demand VPN (or other) access Supports monitoring Supports ActiveSync ( platforms)
79 MDM Integration Internal App Store Distribution Xcode Distribution/Save/Archive MDM Managed Internal App Store
80 MDM API Integration Code Level App Wrapping Code Level App Wrapping Sandboxes and Containers
81 Code Level App Wrapping Secured by Good Dynamics By Microstrategy v Registered on Sep 11, 2014
82 MDM API Integration Current/Planned Offerings Exists for (update 1, 2, 3, 4). Previously for Currently available in Beta Planned. In contract negotiation and test Planned.
83 Summary Microstrategy Low Vulnerability Mobile Security Model
84 Microstrategy Low Vulnerability Mobile Security Model Communications Data in transit always encrypted (Symmetric and Asymmetric) Network administration Firewall Mobile Server Firewall Intelligence Server
85 Microstrategy Low Vulnerability Mobile Security Model Emissions Data in motion encrypted with WPA and WPA2 Disable Identifier Broadcasting Maintain wireless emissions within corporate boundary Firewall Mobile Server Firewall Intelligence Server
86 Microstrategy Low Vulnerability Mobile Security Model Firewall Device ios/android Protections Digital X-509 certificates ios Remote Wipe Device Lock Max number of failed attempts Mobile Server Firewall Intelligence Server
87 Microstrategy Low Vulnerability Mobile Security Model Mobile Server Firewall Firewall Application Encrypt user credentials and app data Clear credentials Clear caches Leverage ios sandboxing Digitally sign apps Runtime checks Single SignOn (LDAP, Kerberos, Tivoli, etc.) Intelligence Server
88 Microstrategy Low Vulnerability Mobile Security Model Firewall Data User and Group Authentication Privileges ACL s Security Roles Database Level Security Mobile Server Firewall Intelligence Server
89 Microstrategy Low Vulnerability Mobile Security Model Mobile Server Firewall Firewall Authentication App passcode (Complexity, Expiration) Touch ID Microstrategy 9s (Usher Mobile Identity) Digital Signing and Certificates (e.g., HTTPS) VPN Tunneling Auth Models (e.g., Windows NT, LDAP, Basic, etc.) Intelligence Server
90 Microstrategy Low Vulnerability Mobile Security Model Mobile Server Intelligence Server Firewall Firewall Operations MDM Device activation, user authentication, certificate enrollment Configuration profiles, Restrict device features Policy and restrictions enforcement Asset management, theft and loss prevention Situational Awareness
91 MSTR SDK (Extending OOTB Capabilities) Application Device Side Edit un-compiled Objective-C code via X-code Potential customizations: - Rebranding - Springboard icon - Opening logo animation - Custom help - Custom Visualizations Mobile Server Side Java Task Framework (e.g., Mobile Logon Task) XML Configuration Files
92 For More Information
93 For More Information Mobile Security Whitepaper Secure Mobile Computing and Business Intelligence on Apple and Android Mobile Devices Security.pdf MicroStrategy Product Manuals Administration Guide Mobile Administration and Design Guide New Microstrategy Community - Mobile Discussion Forums and Knowledge Base Microstrategy Apple App Store Download(s)
94 Thankyou! Questions? Ray Bennett,
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationWHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated.
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationWHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices Mobile App Platform Copyright Information All Contents Copyright 2014 Incorporated. All Rights Reserved.
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationSecure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationSharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationFrequently asked questions
Frequently asked questions FAQ: MicroStrategy 9s/9.5 General What is MicroStrategy 9s? MicroStrategy 9s combines the world s most sophisticated analytics platform with Usher, a revolutionary security platform.
More informationIBM Cognos Mobile Overview
IBM Cognos Business Intelligence 10.2.1 IBM Cognos Mobile Overview Agenda IBM Cognos Mobile Overview Analysis on Mobile Security + Configuration Deploying Good Technology Latest Updates IBM Confidential
More informationDeploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationSAS Mobile BI Security and the Mobile Device
SAS Mobile BI Security and the Mobile Device Version 1.0 April 24, 2015 Contents Introduction...1 Security Features Provided by SAS Mobile BI and SAS Visual Analytics...2 Introduction... 2 Lock the SAS
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationWHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
More informationFrequently asked questions
Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide
More informationANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics
MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy
More informationA brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationMobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More information#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s
#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationEnable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora
Enable and Turn on MicroStrategy 9s for Existing Projects Mox Weber, Suhrud Atre, and Rakesh Arora MicroStrategy World Tracks This Session is Part of MicroStrategy World Track 06: Enterprise BI I Forward-Looking
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationMobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationRoadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
More informationLeveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
More informationipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
More informationMobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition
Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationcompany policies are adhered to and all parties (traders,
APPLICATION SECURITY OVERVIEW Users have access to additional layers of security that are controlled and determined by the company s ICE administrator. These are designed to ensure company policies are
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationBYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationHow To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More information{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSalesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationSecure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
More informationSamsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationEnd User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationSecure Business Intelligence on Apple Mobile Devices
Secure Business Intelligence on Apple Mobile Devices MicroStrategy Mobile for iphone and ipad MOBILE INTELLIGENCE Copyright Information All Contents Copyright 2011 MicroStrategy Incorporated. All Rights
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationDUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationSucceeding in your BYOD initiative with the MicroStrategy Mobile App Platform
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy bkolburn@microstrategy.com The Mobile Service Line A commitment
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationImprove your mobile application security with IBM Worklight
Improve your mobile application security with IBM Worklight Contents 1 Introduction 2 IBM Worklight overview 4 Enabling mobile security with IBM Worklight 6 Integrating IBM Worklight with enterprise security
More informationSingle Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
More informationCentrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationSecure Your Analytical Insights on the Plane, in the Café and on the Train with SAS Mobile BI
Paper SAS299-2014 Secure Your Analytical Insights on the Plane, in the Café and on the Train with SAS Mobile BI ABSTRACT Christopher Redpath and Meera Venkataramani, SAS Institute Inc., Cary, NC Security-conscious
More informationSecurity Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationIntegrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationTop. Reasons Federal Government Agencies Select kiteworks by Accellion
Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationmanaging SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
More informationMobile Security Mobile Device Management Mobile Application Management
Mobile Security Mobile Device Management Mobile Application Management Corporate Overview Largest MDM provider with over 300+ employees, 150 focused on R&D Provide mobility solutions to 1500+ global customers
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationSecurely Yours LLC We secure your information world. www. SecurelyYoursllc.com
We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed
More informationSalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationWHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)
WHITEPAPER NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) INTRODUCTION The proliferation of mobile applications, including mobile apps custom to an organization, makes the need for an SSO solution
More informationiphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
More informationHow To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device
Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...
More informationStep-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
More information